Certified Lead Implementer Professional



After mastering all the necessary concepts of Environmental Management Systems, you can sit for the exam and apply for a “PECB Certified ISO 14001 Lead Implementer” credential. By holding a PECB Lead Implementer Certificate, you will be able to demonstrate that you have the practical knowledge and professional capabilities to implement ISO. This professional certification is intended for information security professionals wanting to understand the steps required to implement the ISO 27001 standard (as opposed to the ISO 27001 Lead Auditor certification which is intended for an auditor wanting to audit and certify a system to the ISO 27001 standard).

Certified Lead Implementer ProfessionalCertified

1. Introduction to GDPR & Privacy concepts

  • GDPR Background
  • Territorial scope
  • Mapping of GDPR with BS 10012:2017
  • Privacy Terms and Definitions
  • How do we recognize PII?
  • Phases of PII processing Lifecycle
  • Privacy Principles - BS10012:2017 and GDPR
  • Rights of Natural Persons
Certified Lead Implementer Professional 2. Major risks to a company's IT framework
  • Application related RISKS
  • Network related RISKS
  • Storage related RISKS
3. Stakeholders expectations for privacy

Certified Lead Implementer Professional Development

Implementer
  • Privacy vs Security
  • IT Governance vs Data Governance
  • Roles and Responsibilities of DPO, Controller, Processor,etc
  • The role of the IT professional & other stakeholders in
  • Privacy Foundational elements - Organizational Privacy
  • Privacy Foundational elements - Organizational Privacy
  • Privacy Foundational elements - Organizational Security
  • Incident Response - Security and Privacy Perspective
Certified Lead Implementer Professional

Certified Lead Implementer Professional Training

4. System Development Lifecycle and Enterprise Architecture

Certified Lead Implementer Professional Certification

  • Privacy Impact Assessments (PIA)
  • Common Privacy Principles
  • The Collection Process - Notice
  • The Collection Process - Choice, Control & Consent
  • Other topics related to Collection
  • Security Practices and Limitations on Use
  • Disclosure
  • Retention - Records, Limitations, Access
  • Retention - Security Considerations
  • Destruction
  • Limitations of Access Mgmt & Least Privilege principle
  • UBAC & RBAC
  • Context of Authority
  • Cross Site Authentication & Authorization Models
  • Credit card information & Processing
  • PCI-DSS & PA-DSS
  • Remote Access & BYOD - Privacy & Security Consideration
  • Remote Access & BYOD - Access to Computers & Architecture