Use of Privileged Utility Programs

Book a Meeting Login Competency Implementation of Control A 8.18 Use of Privileged Utility Programs This competency covers essential topics to secure and manage privileged utility programs. It includes the fundamentals of utility programs, access control implementation, logging, best practices, compliance requirements, and ISO/IEC 27001 integration. 5 Trainers About Course Overview: This competency focuses on securing and managing privileged utility programs, which are essential for managing system resources. The course will cover the fundamentals of these programs, their role in organizations, and the risks associated with improper use. In addition, it explores best practices, including access control and logging, and compliance requirements in accordance with ISO/IEC 27001. What You’ll Learn: Understanding the function and purpose of privileged utility programs How to implement and enforce access control for utility programs Best practices for logging, monitoring, and managing usage How to prevent unauthorized use and exceptions Integration of utility program management with ISO/IEC 27001 How to conduct audits to ensure compliance with security standards Who Should Take This Course? This course is perfect for: Security administrators and managers IT professionals managing privileged programs and access System administrators Compliance officers and auditors Cybersecurity professionals looking to enhance their skills in program security Organizations implementing ISO/IEC 27001 standards What You’ll Get: A certification upon completion Detailed understanding of how to manage privileged utility programs securely Practical knowledge of implementing access control and logging strategies A comprehensive understanding of how to meet compliance requirements for ISO/IEC 27001 Hands-on guidance with practical examples and tools Module 1 Introduction to Utility Programs Overview of Utility Programs (15 mins) Identifying and Assessing Utility Programs (15 mins) Authorization and Access Control (15 mins) Segregation and Limitation Practices (14 mins) Take the Practice Quiz Module 2 Implementing Access Controls and Logging Access Control Procedures (15 mins) Defining and Documenting Authorizations (15 mins) Logging and Monitoring Use (15 mins) Practical Examples and Tools (14 mins) Take the Practice Quiz Module 3 Best Practices and Compliance Best Practices for Utility Program Management (15 mins) Compliance Requirements and Standards (14 mins) Handling Unauthorized Use and Exceptions (14 mins) Case Studies and Lessons Learned (15 mins) Take the Practice Quiz Module 4 Integration and ISO/IEC 27001 Integrating Utility Program Management with ISO/IEC 27001 (15 mins) Continuous Improvement and Feedback (15 mins) Implementation as per ISO/IEC 27001 (15 mins) Audit as per ISO/IEC 27001 (14 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Implementation of Control A 8.18 Privileged Utility Programs Access Control Logging ISO/IEC 27001 About the Trainer Kevin Kamanga Cybersecurity Project Manager and ISMS Auditor Kevin Kamanga is a Project Manager and ISMS Auditor with a strong foundation in human resources and IT. A JKUAT graduate, he is skilled in Network Administration, DNS, and Network Security. Kevin holds numerous certifications, including Fortinet FortiGate Administrator, Fortinet Certified Associate in Cybersecurity, Lead Cybersecurity Manager (PECB), PRINCE2 Practitioner, and Cisco Certified Network Professional (CCNP) Enterprise. His expertise spans cybersecurity, project management, and digital transformation, making him a valuable asset in enhancing organizational security and operational efficiency. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Implementation of Control A 8.6 Capacity Management

Book a Meeting Login Competency Implementation of Control A 8.32 Change Management This competency provides a comprehensive understanding of capacity management across various domains, emphasizing its importance in optimizing resources and maintaining operational efficiency. Participants will explore key strategies in demand management, forecasting techniques, and the management of IT infrastructure components like servers and networks. Additionally, the competency covers capacity management implementation and auditing in accordance with ISO/IEC 27001, ensuring compliance and best practices across different industries and organizational structures. 5 Trainers About Course Overview: In this competency, participants will explore the principles of capacity management, focusing on how to manage resources like servers, networks, and storage systems efficiently. The course will delve into various planning strategies, forecasting methods, and the importance of effective demand management. The module also integrates capacity management practices with ISO/IEC 27001 standards, ensuring comprehensive and compliant management processes. What You’ll Learn: Key strategies for managing capacity and optimizing resources The fundamentals of demand management and workload modeling Techniques for measuring capacity and forecasting resource needs How to manage server, network, and storage capacity effectively Integration of capacity management with ISO/IEC 27001 for best practices and compliance How to perform audits on capacity management processes Who Should Take This Course? This course is perfect for: IT managers and infrastructure professionals System administrators and network engineers Capacity planners and resource managers Security professionals focused on infrastructure management Compliance and audit professionals Business continuity and disaster recovery managers What You’ll Get: A certification of completion Practical knowledge on optimizing IT infrastructure and resources A comprehensive understanding of capacity management principles and best practices Insights into managing resources in compliance with ISO/IEC 27001 Hands-on experience with forecasting, demand management, and capacity planning Module 1 Introduction to Capacity Management Capacity Management Overview (16 mins) Capacity Management Process Framework (15 mins) Case Studies in Capacity Management (16 mins) Business Impact of Poor Capacity Management (14 mins) Take the Practice Quiz Module 2 Capacity Planning Strategies Demand Management (15 mins) Capacity Measurement and Metrics (14 mins) Forecasting Techniques (15 mins) Workload Modeling and Resource Scaling (15 mins) Take the Practice Quiz Module 3 Capacity Management in IT Infrastructure Server Capacity Management (15 mins) Network Capacity Management (15 mins) Storage and Database Capacity Management (15 mins) Hardware and Infrastructure Capacity Management (16 mins) Take the Practice Quiz Module 4 Other Considerations and ISO/IEC 27001 Capacity Management Across Different Sectors (16 mins) Capacity Management Across Different IT Environments (15 mins) Implementation as per ISO/IEC 27001 (15 mins) Auditing as per ISO/IEC 27001 (16 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Implementation of Control 8.32 Change Management Information Processing Facilities ISO/IEC 27001 Risk Assessment About the Trainer Leighton Johnson Information Security Expert and Senior Security Engineer Leighton R. Johnson III is the founder, CTO, and Senior Security Engineer for the Information Security and Forensics Management Team (ISFMT), specializing in computer security, forensics consulting, and certification training. With over 40 years of experience, he has expertise in computer security, information operations, software development lifecycle, systems engineering, database administration, and data modeling. Leighton has delivered classes and seminars on computer security and forensics across the U.S., Asia, and Europe for the past 20 years. He has served as an adjunct professor at Augusta University and St. Louis University and is a certified Lead Implementer and Lead Auditor (LI/LA), CMMC/CCP/CCA/Provisional Instructor. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.
Implementation of Control A 8.32 Change Management

Book a Meeting Login Competency Implementation of Control A 8.32 Change Management This competency focuses on effective change management in information processing facilities. Participants will learn structured procedures for planning, authorizing, and documenting changes, emphasizing defined roles and risk assessments. The module integrates change management with ICT continuity and ISO/IEC 27001 requirements, enhancing organizational resilience. By aligning these strategies, you will improve operational stability and security, ensuring your organization is prepared for potential disruptions. 5 Trainers About Course Overview: This competency emphasizes the importance of structured change management procedures to maintain information security during system modifications. Participants will learn the core processes of planning, authorizing, testing, and documenting changes while aligning with ICT continuity and ISO/IEC 27001 standards. The goal is to enhance organizational resilience and ensure secure, smooth transitions during system updates and changes. What You’ll Learn: How to establish and follow structured change management procedures The importance of defined roles and responsibilities during the change process Techniques for performing risk assessments and impact analysis How to ensure successful planning, authorization, and testing of changes The integration of change management with ICT continuity and ISO/IEC 27001 Practical strategies for monitoring and reviewing implemented changes Who Should Take This Course? This course is perfect for: Change management professionals IT managers and system administrators Risk managers and compliance officers Information security teams Auditors responsible for IT systems and processes Business continuity managers What You’ll Get: A certification of completion Practical knowledge on structuring and managing changes securely Strategies for integrating change management with ICT continuity and ISO/IEC 27001 Hands-on experience with change authorization, testing, and documentation Access to course materials in multiple languages Module 1 Introduction to Change Management in Information Processing Facilities Overview of Change Management (16 mins) Change Management Procedures (15 mins) Roles and Responsibilities (15 mins) Risk Assessment and Impact Analysis (16 mins) Take the Practice Quiz Module 2 Planning and Authorizing Changes Change Planning and Assessment (16 mins) Change Authorization Process (16 mins) Communication of Changes (15 mins) Testing and Acceptance (15 mins) Take the Practice Quiz Module 3 Implementing and Documenting Changes Deployment Plans (15 mins) Documentation and Evidence Retention (14 mins) Monitoring and Review (15 mins) Successful Change Management Case Studies (15 mins) Take the Practice Quiz Module 4 ICT Continuity and ISO/IEC 27001 Integrating Change Management with ICT Continuity (15 mins) Response and Recovery Procedures (15 mins) Implementation as per A 8.32 ISO/IEC 27001 (14 mins) Auditing as per A 8.32 ISO/IEC 27001 (15 mins) Take the Practice Quiz Specialization · 4 modules Watch Now 4 Modules 100% Positive Reviews (24 reviews) 104 Lessons (4h 15m) 3,011 Students Languages Available: Spanish, English, German, French Exam Certificate upon completion of the course Tags Implementation of Control 8.32 Change Management Information Processing Facilities ISO/IEC 27001 Risk Assessment About the Trainer Kevin Kamanga Cybersecurity Project Manager and ISMS Auditor Kevin Kamanga is a Project Manager and ISMS Auditor with a strong foundation in human resources and IT. A JKUAT graduate, he is skilled in Network Administration, DNS, and Network Security. Kevin holds numerous certifications, including Fortinet FortiGate Administrator, Fortinet Certified Associate in Cybersecurity, Lead Cybersecurity Manager (PECB), PRINCE2 Practitioner, and Cisco Certified Network Professional (CCNP) Enterprise. His expertise spans cybersecurity, project management, and digital transformation, making him a valuable asset in enhancing organizational security and operational efficiency. Get Industry Insights and Special Offers Company About Us Contact Us Help Center Popular Courses Business Consulting and Industry Insights AI Prompt Engineering Cyber Resilience with ISO/IEC 27032 Auditing Control A 5.37 Documented Operating Procedures Management Systems Auditing Information Security Management based on ISO/IEC 27001 Privacy Policy Terms of Service Cookie Policy © PECB Skills 2025. All rights reserved.