BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//wp-events-plugin.com//6.4.7.3//EN
BEGIN:VEVENT
UID:476@acinfotec.com
DTSTART:20260113T023000Z
DTEND:20260116T093000Z
DTSTAMP:20251127T065300Z
URL:https://www.acinfotec.com/training-event/cism-examination-preparation-
 exam-excluded-5/
SUMMARY:CISM Examination Preparation (Exam Excluded)
DESCRIPTION:About this course\nWhile information has become more easily acc
 essible and readily available\, the associated risks and security threats 
 have not only increased in number\, but also complexity.  As a result\, t
 he importance of ensuring that an enterprise’s information is protected 
 has also increased.  It is now more important than ever for executives to
  ensure that their IT security managers have the expertise needed to reduc
 e risk and protect the enterprise.\n\nDesigned specifically for informatio
 n security professionals who are preparing to sit for the CISM exam\, the 
 course focuses on the four content areas of the Certified Information Secu
 rity Manager (CISM) job practice:  information security governance\, risk
  management and compliance\, information security program development and 
 management\, information security incident management. Sample exam items w
 ill be used throughout the course to reinforce content and familiarize att
 endees with the CISM exam question format.\nCourse Benefits\nThe demand fo
 r skilled information security management professionals is on the rise\, a
 nd the CISM certification is the globally accepted standard of achievement
  in this area.\n\nCISMs understand the business. They know how to manage a
 nd adapt technology to their enterprise and industry.\nWho should Attend?\
 n\n 	Risk managers.\n 	Security professionals with front-line experience.\
 n 	Security auditors.\n 	Information security staff.\n 	Compliance personn
 el.\n 	Information security managers.\n 	CSOs\, CISOs and CIOs.\n 	Informa
 tion security assurance providers\n\nCourse Contents\nDay 1 – Informatio
 n Security Governance\n\nAttendees will understand the broad requirements 
 for effective information security governance\, the elements and actions r
 equired to develop an information security strategy\, and be able to formu
 late a plan of action to implement this strategy.\n\n 	Establish and maint
 ain an information security strategy and align the strategy with corporate
  governance\n 	Establish and maintain an information security governance f
 ramework\n 	Establish and maintain information security policies\n 	Develo
 p a business case\n 	Identify internal and external influences to the orga
 nization\n 	Obtain management commitment\n 	Define roles and responsibilit
 ies\n 	Establish\, monitor\, evaluate and report metrics\n\nDay 2 – Info
 rmation Risk Management and Compliance\n\nAttendees will be able to manage
  information security risks.\n\n 	Establish a process for information asse
 t classification and ownership\n 	Identify legal\, regulatory\, organizati
 onal and other applicable requirements\n 	Ensure that risk assessments\, v
 ulnerability assessments and threat analyses are conducted periodically.\n
  	Determine appropriate risk treatment options.\n 	Evaluate information se
 curity controls\n 	Identify the gap between current and desired risk level
 s\n 	Integrate information risk management into business and IT processes\
 n 	Monitor existing risk.\n 	Report noncompliance and other changes in inf
 ormation risk\n\nDay 3 – Information Security Program Development and Ma
 nagement\n\nAttendees will be able to develop and manage an information se
 curity plan.\n\n 	Establish and maintain the information security program\
 n 	Ensure alignment between the information security program and other bus
 iness functions\n 	Identify\, acquire\, manage and define requirements for
  internal and external resources\n 	Establish and maintain information sec
 urity architectures\n 	Establish\, communicate and maintain organizational
  information security standards\, procedures\, guidelines\n 	Establish and
  maintain a program for information security awareness and training\n 	Int
 egrate information security requirements into organizational processes\n 	
 Integrate information security requirements into contracts and activities 
 of third parties\n 	Establish\, monitor and periodically report program ma
 nagement and operational metrics\n\nDay 4 – Information Security Inciden
 t Management \n\nStudents will effectively manage information security wit
 hin an enterprise and develop policies and procedures to respond to and re
 cover from disruptive and destructive information security events.\n\n 	Es
 tablish and maintain an organizational definition of\, and severity hierar
 chy for\, information security incidents\n 	Establish and maintain an inci
 dent response plan\n 	Develop and implement processes to ensure the timely
  identification of information security incidents\n 	Establish and maintai
 n processes to investigate and document information security incidents\n 	
 Establish and maintain incident escalation and notification processes\n 	O
 rganize\, train and equip teams to effectively respond to information secu
 rity incidents\n 	Test and review the incident response plan periodically\
 n 	Establish and maintain communication plans and processes\n 	Conduct pos
 t-incident reviews\n 	Establish and maintain integration among the inciden
 t response plan\, disaster recovery plan and business continuity plan\n\nC
 ertification and Accreditation\nTo become a CISM\, an applicant must:\n•
  Achieve a passing score on the CISM exam.\n• Submit an application with
  verified evidence of three years of work experience as described below.\n
 • Agree to abide by the ISACA Code of Professional Ethics\, which can be
  viewed at www.isaca.org/ethics.\n• Agree to abide by the CRISC continui
 ng professional education (CPE) policy\, which can be viewed at ISACA CISM
  Maintenance Page.\nExamination\n\n 	Computer-based examination\n 	4 hours
 \n 	150 multiple-choice question exam\n 	ISACA uses a 200 - 800 point scal
 e with 450 as the passing mark for the exams\n\nTraining Info\nLanguage :
  Conducted in Thai Language\nDuration : 4 Days\nDate :  Jan 13 - 16\, 2
 026\nTime : 9.30 am. – 16.30 pm.\nLocation : ACinfotec Training Cent
 er\nContact : T 02 670 8980-4 ext.321-323\nEmail : training@acinfotec.com\
 nPrice : 34\,000 Baht (Ex.Vat 7%)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/2.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:997@acinfotec.com
DTSTART:20260114T023000Z
DTEND:20260116T093000Z
DTSTAMP:20260105T035316Z
URL:https://www.acinfotec.com/training-event/cgeit-certified-in-the-govern
 ance-of-enterprise-it-exam-prep-new-4/
SUMMARY:CGEIT - Certified in the Governance of Enterprise IT (Exam Prep.) -
  New!
DESCRIPTION:About this course\nCertified in the Governance of Enterprise IT
 ® (CGEIT®) certification is framework agnostic and the only IT governanc
 e certification for the individual. Whether you’re seeking a new career 
 opportunity or striving to grow within your current organization\, CGEIT p
 roves your expertise in enterprise IT governance\, resources\, benefits an
 d risk optimization.\nWho should attend?\n\n 	CISO/CTO\n 	Information Secu
 rity\n 	Compliance Manager\n 	Governance Risk Consultant\n\nCourse Content
 s\nValidate your proficiencies for handling the challenges and responsibil
 ities of a modern IT governance expert with a CGEIT\, which focuses on the
 se domains:\n\nDomain 1. GOVERNANCE OF ENTERPRISE IT\n\nThis domain deals 
 with the organizational structure of building IT frameworks\, the strategy
  and technology aspects of IT governance and essential knowledge about gov
 erning various types of information.\n\nA—GOVERNANCE FRAMEWORK\n\n 	Comp
 onents of a Governance Framework\n 	Organizational Structures\, Roles and 
 Responsibilities\n 	Strategy Development\n 	Legal and Regulatory Complianc
 e\n 	Organizational Culture\n 	Business Ethics\n\nB—TECHNOLOGY GOVERNANC
 E\n\n 	Governance Strategy Alignment with Enterprise Objectives\n 	Strateg
 ic Planning Process\n 	Stakeholder Analysis and Engagement\n 	Communicatio
 n and Awareness Strategy\n 	Enterprise Architecture\n 	Policies and Standa
 rds\n\nC— INFORMATION GOVERNANCE\n\n 	Information Architecture\n 	Inform
 ation Asset Lifecycle\n 	Information Ownership and Stewardship\n 	Informat
 ion Classification and Handling\n\nDomain 2. IT RESOURCES\n\nThis domain p
 rovides insight about where to effectively allocate your IT resources and 
 how to ensure IT resources are streamlined for performance.\n\nA— IT RES
 OURCE PLANNING\n\n 	Sourcing Strategies\n 	Resource Capacity Planning\n 	A
 cquisition of Resources\n\nB— IT RESOURCE OPTIMIZATION\n\n 	Sourcing Str
 ategies\n 	Resource Capacity Planning\n 	Acquisition of Resources\n\nDomai
 n 3. BENEFITS REALIZATION\n\nThis domain’s focus is on managing performa
 nce\, monitoring and reporting\, and analyzing IT-enabled technology inves
 tment management.\n\nA— IT PERFORMANCE AND OVERSIGHT\n\n 	Performance Ma
 nagement\n 	Change Management\n 	Governance Monitoring\n 	Governance Repor
 ting\n 	Quality Assurance\n 	Process Development and Improvement\n\nB— M
 ANAGEMENT OF IT-ENABLED INVESTMENTS\n\n 	Business Case Development and Eva
 luation\n 	IT Investment Management and Reporting\n 	Performance Metrics\n
  	Benefit Evaluation Methods\n\nDomain 4. RISK OPTIMIZATION\n\nThis domain
  is about mitigating potential IT risks and challenges and overseeing the 
 risks of IT management capabilities.\n\nA–RISK STRATEGY\n\n 	Risk Framew
 orks and Standards\n 	Enterprise Risk Management\n 	Risk Appetite and Risk
  Tolerance\n\nB–RISK MANAGEMENT\n\n 	IT-Enabled Capabilities\, Processes
  and Services\n 	Business Risk\, Exposures and Threats\n 	Risk Management 
 Lifecycle\n\n Training Info\nDuration:  3 Days\nDate: Jan 14 - 16\, 2026
 \nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16
 th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTra
 ining Fees: 34\,900 (Exam Included)\nTel : 02 670 8980-3 ext. 321-323\nE-m
 ail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/06/CGEIT-1.png
CATEGORIES:Compliance,Data Governance,ISC2 &amp; ISACA,Risk Management
 &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:906@acinfotec.com
DTSTART:20260119T023000Z
DTEND:20260123T093000Z
DTSTAMP:20260115T024805Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-270012013-
 lead-implementer-exam-included/
SUMMARY:PECB Certified ISO 27001 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nISO/IEC 27001 Lead Auditor training enables 
 you to develop the necessary expertise to perform an Information Security 
 Management System (ISMS) audit by applying widely recognized audit princip
 les\, procedures and techniques. During this training course\, you will ac
 quire the necessary knowledge and skills to plan and carry out internal an
 d external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certifi
 cation process.\n\nBased on practical exercises\, you will be able to mast
 er audit techniques and become competent to manage an audit program\, audi
 t team\, communication with customers\, and conflict resolution.\n\nAfter 
 acquiring the necessary expertise to perform this audit\, you can sit for 
 the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” c
 redential. By holding a PECB Lead Auditor Certificate\, you will demonstra
 te that you have the capabilities and competencies to audit organizations 
 based on best practices.\nWho Should Attend\n\n 	Auditors seeking to perfo
 rm and lead Information Security Management System (ISMS) certification au
 dits\n 	Managers or consultants seeking to master an Information Security 
 Management System audit process\n 	Individuals responsible for maintaining
  conformance with Information Security Management System requirements\n 	T
 echnical experts seeking to prepare for an Information Security Management
  System audit\n 	Expert advisors in Information Security Management\n\nCou
 rse Contents\nDay 1: Introduction to the information security management s
 ystem (ISMS) and ISO/IEC 27001\n\n 	Training course objectives and structu
 re\n 	Standards and regulatory frameworks\n 	Certification process\n 	Fund
 amental concepts and principles of information security\n 	Information sec
 urity management system (ISMS)\n\nDay 2: Audit principles\, preparation\, 
 and initiation of an audit\n\n 	Fundamental audit concepts and principles\
 n 	The impact of trends and technology in auditing\n 	Evidence-based audit
 ing\n 	Risk-based auditing\n 	Initiation of the audit process\n 	Stage 1 a
 udit\n\nDay 3: On-site audit activities\n\n 	Preparing for stage 2 audit\n
  	Stage 2 audit\n 	Communication during the audit\n 	Audit procedures\n 	C
 reating audit test plans\n\nDay 4: Closing the audit\n\n 	Drafting audit f
 indings and nonconformity reports\n 	Audit documentation and quality revie
 w\n 	Closing of the audit\n 	Evaluation of action plans by the auditor\n 	
 Beyond the initial audit\n 	Managing an internal audit program\n 	Closing 
 of the training course\n\nDay 5: Certification Exam\nTraining Info\nDurati
 on:  5 Days\nDate:  Jan 19 - 23\, 2026\nTime:  9.30 am. – 16.30 pm.
 \nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphi
 ni Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 Baht (ex.vat7%)
 \nTel.02 670 8980-4 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nwww.
 pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:526@acinfotec.com
DTSTART:20260119T023000Z
DTEND:20260123T093000Z
DTSTAMP:20260115T024815Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-270012013-
 lead-implementer-thai-exam-included-4/
SUMMARY:PECB Certified ISO 27001 Lead Implementer (Thai) Exam Included
DESCRIPTION:About this course\nInformation security threats and attacks gro
 w and improve constantly. As such\, organizations are increasingly concern
 ed about\nhow their valuable information is handled and protected. The bes
 t form of defense against them is the proper implementation\nand managemen
 t of information security controls and best practices. Information securit
 y is the globally accepted benchmark\nand also a key expectation and requi
 rement of customers\, legislators\, and other interested parties.\n\nThis 
 training course is designed to prepare you to implement an information sec
 urity management system (ISMS) based on\nthe requirements of ISO/IEC 27001
 . It aims to provide a comprehensive understanding of the best practices o
 f an ISMS and a\nframework for its continual management and improvement.\n
 \nThe training content is packed with practical exercises and case studies
  which will help you get equipped with real-world\nexpertise that you can 
 apply to your day-to-day operations and activities. Our training courses a
 re all-inclusive\, meaning that\nthey cover everything you need to get the
  certifiate\n\nCourse Benefits\n\n\n\n 	Acknowledge the correlation betwee
 n ISO/IEC 27001\, ISO/IEC 27002 and other standards and regulatory frame
 works\n 	Master the concepts\, approaches\, methods and techniques used fo
 r the implementation and effective management of an ISMS\n 	Learn how to i
 nterpret the ISO/IEC 27001 requirements in the specific context of an orga
 nization\n 	Learn how to support an organization to effectively plan\, imp
 lement\, manage\, monitor and maintain an ISMS\n 	Acquire the expertise to
  advise an organization in implementing Information Security Management Sy
 stem best practices\n\n\n\nWho should attend?\n\n 	Managers or consultants
  involved in Information Security Management\n 	Expert advisors seeking to
  master the implementation of an Information Security Management System\n 
 	Individuals responsible for maintaining conformance with ISMS requirement
 s\n 	ISMS team members\n\n\n\n\nCourse Contents\nDay 1: Introduction to IS
 O/IEC 27001 and initiation of an ISMS\n\n 	Training course objectives and 
 structure\n 	Standards and regulatory frameworks\n 	Information Security M
 anagement System (ISMS)\n 	Fundamental information security concepts and p
 rinciples\n 	Initiation of the ISMS implementation\n 	Understanding the or
 ganization and its context h ISMS scope\n\nDay 2: Planning the implementat
 ion of an ISMS\n\n 	Leadership and project approval\n 	Organizational stru
 cture\n 	Analysis of the existing system\n 	Information security policy\n 
 	Risk management\n 	Statement of Applicability\n\nDay 3: Implementation of
  an ISMS\n\n 	Documented information management\n 	Selection and design of
  controls\n 	Implementation of controls\n 	Trends and technologies\n 	Comm
 unication\n 	Competence and awareness\n 	Security operations management\n\
 nDay 4: ISMS monitoring\, continual improvement\, and preparation for the 
 certification audit\n\n 	Monitoring\, measurement\, analysis\, and evaluat
 ion\n 	Internal audit\n 	Management review\n 	Treatment of nonconformities
 \n 	Continual improvement\n 	Preparing for the certification audit\n 	Cert
 ification process and closing of the training course\n\nDay 5: Certificati
 on Exam\nTraining Info\nDuration:  5 Days\nDate:  Jan 19-23\, 2026\nTim
 e:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl
 .\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining
  Fees: 51\,500 Baht (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.tra
 ining@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:558@acinfotec.com
DTSTART:20260122T023000Z
DTEND:20260123T093000Z
DTSTAMP:20251219T034906Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -technology-cipt-new/
SUMMARY:Certified Information Privacy Technologist (CIPT) (Thai)
DESCRIPTION: \n\nAbout this course\nData privacy regulations worldwide requ
 ire privacy protections be built into products and services. IAPP Privacy 
 in Technology training\, aligned with the ANSI/ISO-accredited CIPT certif
 ication program\, will provide you with the knowledge to recognize privac
 y threats and skills to apply technical strategies to mitigate privacy ris
 k throughout the software and systems development lifecycles.\n Course Be
 nefits\nPrivacy in Technology training teaches technology and data profess
 ionals how to understand and integrate strategies and techniques to minimi
 ze privacy threats. The curriculum includes privacy-by-design principles\;
  implementing data- and process-oriented strategies to support privacy pol
 icies\; and managing threats from AI\, location tracking\, etc.\n Who sho
 uld attend?\n\n 	Data Scientists/Analysts/Architects\n 	IT Managers and Ad
 ministrators\n 	Records Managers\n 	System Developers\n 	Software Engineer
 s/Designers\n 	Privacy Engineers/Developers\n 	System Administrators\n 	UX
  Designers\n 	Cybersecurity Professionals\n\n Course Contents\nModule 1: 
 Foundational Principles in Technology\n\n 	Summarizes the foundational ele
 ments for embedding privacy in technology through privacy by design and va
 lue sensitive design\; reviews the data life cycle and common privacy risk
  models and frameworks.\n\nModule 2: The Tech Pro’s Role in Privacy\n\n 
 	Reviews the fundamentals of privacy as they relate to the privacy technol
 ogist\; describes the privacy technologist’s role in ensuring compliance
  with privacy requirements and meeting stakeholder privacy expectations\; 
 explores the relationship between privacy and security.\n\nModule 3: Priva
 cy threats and violations\n\n 	Identifies inherent risks throughout the st
 ages of the data life cycle and explores how software security helps mitig
 ate privacy threats\; examines the impacts that behavioral advertising\, c
 yberbullying and social engineering have on privacy within the technologic
 al environment.\n\nModule 4: Technical measures and privacy-enhancing tech
 nologies \n\n 	Outlines the strategies and techniques for enhancing privac
 y throughout the data life cycle\, including: identity and access manageme
 nt\; authentication\, encryption\, and\naggregation\; collection and use o
 f personal information.\n\nModule 5: Privacy engineering\n\n 	Explores the
  role of privacy engineering within an organization\, including the object
 ives of privacy engineering\, privacy design patterns\, and software priva
 cy risks.\n\nModule 6: Privacy-by-design methodology\n\n 	Illustrates the 
 process and methodology of the privacy-by-design model\; explores practice
 s to ensure ongoing vigilance when implementing privacy by design.\n\nModu
 le 7: Technology challenges for privacy\n\n\n 	Examines the unique challen
 ges that come from online privacy issues\, including automated decision ma
 king\, tracking and surveillance technologies\, anthropomorphism\, ubiquit
 ous computing and mobile social computing.\n\n\n\n\n 	Privacy in Technolog
 y online training.\n 	One-year IAPP membership.\n 	CIPT sample questions (
 digital).\n 	CIPT certification exam.\n 	Two digital textbooks.\n\nTrainin
 g Info:\n\nLanguage: Conducted in Thai Language\nDuration: 2 Days\nDate:
  Jan 22 - 23\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, Grande 
 Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 49\,
 900 (Exam Included)\nTel : 02 670 8980-3 ext. 321-323\nE-mail: training@ac
 infotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/cipt-seal.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:679@acinfotec.com
DTSTART:20260128T023000Z
DTEND:20260130T093000Z
DTSTAMP:20260107T084906Z
URL:https://www.acinfotec.com/training-event/certified-soc-analyst-csa-tha
 i-exam-included/
SUMMARY:Certified SOC Analyst | CSA (Exam Included)
DESCRIPTION:\nAbout this course\nThe Certified SOC Analyst (CSA) program is
  the first step to joining a security operations center (SOC). It is engin
 eered for current and aspiring Tier I and Tier II SOC analysts to achieve 
 proficiency in performing entry-level and intermediate-level operations.\n
 \nCSA is a training and credentialing program that helps the candidate acq
 uire trending and in-demand technical skills through instruction by some o
 f the most experienced trainers in the industry. The program focuses on cr
 eating new career opportunities through extensive\, meticulous knowledge w
 ith enhanced level capabilities for dynamically contributing to a SOC team
 . Being an intense 3-day program\, it thoroughly covers the fundamentals o
 f SOC operations\, before relaying the knowledge of log management and cor
 relation\, SIEM deployment\, advanced incident detection\, and incident re
 sponse. Additionally\, the candidate will learn to manage various SOC proc
 esses and collaborate with CSIRT at the time of need. To read more about S
 OC and how they are important to many industries\nIndustries That Must Hav
 e a (SOC)\nMany industries are dependent on Security Operations Management
 \, including:\n\nWhy Must Organizations Have Log Management and a SOC Team
 ?\nLog management is an organized approach to deal with large volumes of c
 omputer-generated log data. It allows multiple operations on data like gen
 eration\, collection\, centralization\, parsing\, transmission\, storage\,
  archival\, and disposal.\n\nOrganizations have a Security Operations Cent
 er team and a log management solution in order to:\n\n\n 	Comply with appl
 icable regulatory standards such as PCI-DSS\, HIPAA\, RMiT\, ISO 27001\, a
 nd others.\n 	Protect servers storing sensitive data from internal and ext
 ernal threats.\n 	Secure proprietary information and intellectual property
 .\n\n\nBesides log management\, Security Operations Center analysts can al
 so integrate Security Information and Event Management (SIEM) tools in the
 ir process. These software tools aggregate security data from multiple sou
 rces\, such as network devices\, servers\, and other locations. SIEM tools
  then connect the dots to discover the trends and detect cyber threats so 
 that organizations can act on the alerts.\nHow Does a SOC Help?\n\n 	For t
 he Payment Card Industry (PCI)\, it is mandatory to maintain a Security
  Operations Center. According to the PCI Compliance Security Standard Coun
 cil\, any merchant processing and storing credit card data should be PCI c
 ompliant. PCI compliance helps to ensure secure online transactions and pr
 otection against identity theft.\n 	In such a scenario\, a SOC team helps 
 to:\n 	Monitor firewalls\, their logs\, and any configuration change to id
 entify an irregularity.\n 	Increase the speed of incident remediation.\n 	
 Check firewall and router configuration standards by comparing them  with
  documented services\, ports\, and protocols.\n\n&nbsp\;\n\nAs the healthc
 are industry contains crucial health data\, such as holistic reports of pa
 tients including personalized diagnoses and treatments\, it is an alluring
  target to cybercriminals. Threat actors monetize patient data by selling 
 it to the highest bidder or blackmailing the victim.\n\nFor keeping protec
 ted health information (PHI) secure\, healthcare organizations require a S
 OC 2 audit. SOC 2 compliance ensures:\n\n 	Customer trust\n 	Brand reputat
 ion\n 	Business continuity\n 	Competitive advantage\n\n&nbsp\;\n\n\n\nThe
  manufacturing sector has always been a vulnerable industry as it posses
 ses intellectual property and advanced technologies. Consider a Department
  of Defense (DoD) contractor for example: It is a must to meet the NIST cy
 bersecurity standards to maintain DFARS (Defense Federal Acquisition Regul
 ation Supplement) compliance. The NIST SP 800-171 outlines guidelines for 
 Audit and Accountability\, Configuration Management\, Identification\, and
  Authentication\, with several other criteria.\nSOC analysts are needed in
  the manufacturing industry to:\n\n 	Set up alerts to monitor potential th
 reats.\n 	Promptly remediate ongoing and possible security threats.\n\n&nb
 sp\;\n\n\n\nCybercriminals are eyeing financial services for their bulk 
 transactions and real-time monitoring of activities. Apart from external a
 ttacks\, institutions are also vulnerable to lost employee devices (like p
 hones) and insider threats.\n\nBanking and Financial services should perfo
 rm SOC Type 1 and SOC Type 2 audits along with annual SOC 1 SSAE 18 report
 s. Being in clear nexus with the Internal Control Over Financial Reporting
  (ICFR) concept\, these audits effectively report on internal controls. Th
 ey reveal:\n\n 	Weaknesses in security controls like improperly provisione
 d information systems\, weak authentication parameters\, lack of multiple 
 layers of security\, and others.\n 	Shortcomings in operational controls.\
 n 	Flaws in documentation.\n\n&nbsp\;\n\n\n\nAs government agencies store 
 personal information along with criminal records and religious and politic
 al inclinations\, they are a prized target for cyber attackers.\n\nGovernm
 ent institutions need SOC teams for:\n\n 	Network monitoring in real time.
 \n 	Analyzing activities on servers\, endpoints\, and databases.\n 	Lookin
 g for an incident or signs of a breach.\n\n&nbsp\;\n\n&nbsp\;\n\n\n\nEduca
 tion establishments are easy targets for cybercriminals. They not only car
 ry personal data but also valuable research data and allow access to large
 r networks.\n\nA Security Operations Center can help an educational instit
 ution’s IT staff respond to growing security threats by:\n\n 	Identifyin
 g and monitoring institutional assets and data.\n 	Neutralizing threats.\n
  	Providing cybersecurity metrics to the IT staff.\n\n&nbsp\;\nTarget Audi
 ence\n\n 	SOC Analysts (Tier I and Tier II)\n 	Network and Security Admini
 strators\, Network and Security Engineers\, Network Defense Analyst\, Netw
 ork Defense Technicians\, Network Security Specialist\, Network Security O
 perator\, and any security professional handling network security operatio
 ns\n 	Cybersecurity Analyst\n 	Entry-level cybersecurity professionals\n 	
 Anyone who wants to become a SOC Analyst.\n\nLearning Objectives of CSA\n\
 n 	Gain Knowledge of SOC processes\, procedures\, technologies\, and workf
 lows.\n 	Gain a basic understanding and in-depth knowledge of security thr
 eats\, attacks\, vulnerabilities\, attacker’s behaviors\, cyber killchai
 n\, etc.\n 	Able to recognize attacker tools\, tactics\, and procedures to
  identify indicators of compromise (IOCs) that can be utilized during acti
 ve and future investigations.\n 	Able to monitor and analyze logs and aler
 ts from a variety of different technologies across multiple platforms (IDS
 /IPS\, end-point protection\, servers\, and workstations).\n 	Gain knowled
 ge of the Centralized Log Management (CLM) process.\n 	Able to perform Sec
 urity events and log collection\, monitoring\, and analysis.\n 	Gain exper
 ience and extensive knowledge of Security Information and Event Management
 .\n 	Gain knowledge of administering SIEM solutions (Splunk/AlienVault/OSS
 IM/ELK).\n 	Understand the architecture\, implementation and fine-tuning o
 f SIEM solutions (Splunk/AlienVault/OSSIM/ELK).\n 	Gain hands-on experienc
 e in SIEM use case development process.\n 	Able to develop threat cases (c
 orrelation rules)\, create reports\, etc.\n 	Learn use cases that are wide
 ly used across the SIEM deployment.\n 	Plan\, organize\, and perform threa
 t monitoring and analysis in the enterprise.\n 	Able to monitor emerging t
 hreat patterns and perform security threat analysis.\n 	Gain hands-on expe
 rience in the alert triaging process.\n 	Able to escalate incidents to app
 ropriate teams for additional assistance.\n 	Able to use a Service Desk ti
 cketing system.\n 	Able to prepare briefings and reports of analysis metho
 dology and results.\n 	Gain knowledge of integrating threat intelligence i
 nto SIEM for enhanced incident detection and response.\n 	Able to make use
  of varied\, disparate\, constantly changing threat information.\n 	Gain k
 nowledge of Incident Response Process.\n 	Gain understating of SOC and IRT
  collaboration for better incident response.\n\n\nTraining Info\nDuration:
   3 Days\nDate:  January 28 – 30\, 2026\nTime:  9.30 am. – 16.30 p
 m.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lu
 mphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 39\,000 Baht (ex.va
 t 7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@acinfotec.com\n\nww
 w.eccouncil.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 1/12/CSA.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:538@acinfotec.com
DTSTART:20260202T023000Z
DTEND:20260206T093000Z
DTSTAMP:20260107T084943Z
URL:https://www.acinfotec.com/training-event/pecb-certified-data-protectio
 n-officer-cdpo-thai-exam-included-2/
SUMMARY:PECB Certified Data Protection Officer (CDPO) (Exam Included)
DESCRIPTION:Why should you attend?\nAs data protection is becoming more and
  more valuable\, the need for organizations to protect these data is also 
 constantly increasing. Besides violating the fundamental rights and freedo
 ms of persons\, not complying with the data protection regulations can lea
 d to risky situations that could harm an organization’s credibility\, re
 putation\, and financial status. This is where your skills as a data prote
 ction officers come to place.\n\nThe PECB Certified Data Protection Office
 r training course will help you acquire the knowledge and skills to serve 
 as a Data Protection Officer (DPO) so as to help organizations ensure comp
 liance with the General Data Protection Regulation (GDPR) requirements.\n\
 nBased on practical exercises\, you will be able to master the role of the
  DPO and become competent to inform\, advise\, and monitor compliance with
  the GDPR and cooperate with the supervisory authority.\n\nAfter attending
  the training course\, you can sit for the exam\, and if you successfully 
 pass the exam\, you can apply for the “PECB Certified Data Protection Of
 ficer” credential. The internationally recognized “PECB Certified Data
  Protection Officer” certificate will prove that you have the profession
 al capabilities and practical knowledge to advise the controller and the p
 rocessor on how to meet their obligations regarding the GDPR compliance.\n
 Who should attend?\n\n 	Managers or consultants seeking to prepare and sup
 port an organization in planning\, implementing\, and maintaining a compli
 ance program based on the GDPR\n 	DPOs and individuals responsible for mai
 ntaining conformance with the GDPR requirements\n 	Members of information 
 security\, incident management\, and business continuity teams\n 	Technica
 l and compliance experts seeking to prepare for a data protection officer 
 role\n 	Expert advisors involved in the security of personal data\n\nCours
 e agenda \nDay 1: Introduction to the GDPR concepts and principles\n\n 	Tr
 aining course objectives and structure\n 	General Data Protection Regulati
 on (GDPR)\n 	Core considerations for the GDPR\n\nDay 2: Designation of the
  DPO and analysis of the GDPR compliance program\n\n 	Designation of the D
 PO\n 	Analysis of the GDPR compliance program\n 	Relationship with the top
  management\n 	Data protection policy\n 	Register of processing activities
 \n 	Risk management process\n\nDay 3: DPO operations\n\n 	Data protection 
 impact assessment\n 	Documentation management\n 	Evaluation of the data pr
 otection controls\n 	Data protection and technology\n 	Awareness\, trainin
 g\, and communication\n\nDay 4: Monitoring and continual improvement of GD
 PR compliance\n\n 	Incident management and personal data breaches\n 	Monit
 oring and measuring compliance\n 	Data protection internal audit\n 	Treatm
 ent of non conformity\n 	Continual improvement\n 	Closing the training cou
 rse\n\nDay 5: Certification Exam\n\nTraining Info\n\n\n\nLanguage : Condu
 cted in Thai Language\nDuration : 5 Days\nDate :  Feb 2 - 6\, 2026\nTime
  : 9.30 am. – 16.30 pm.\nVenue : ACinfotec Training Center\n16th Fl.\,
  Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nPrice : 51\
 ,500 Baht (Ex.vat 7%)\nContact : T 02 670 8980-4 ext.321-323\nE training@
 acinfotec.com\n\n\n\nwww.pecb.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:252@acinfotec.com
DTSTART:20260202T023000Z
DTEND:20260206T093000Z
DTSTAMP:20260107T084959Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-20000-lead
 -implementer/
SUMMARY:PECB Certified ISO 20000:2018 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nThis five-day intensive course enables the p
 articipants to develop the necessary expertise to support an organization 
 in implementing and managing a Service Management System as specified in I
 SO/IEC 20000-1. Also\, the participant will gain a thorough understanding 
 of in best practices for planning and implementing Service Management proc
 esses starting from the six fields of ISO 20000: planning and implementing
  new and changed services\, service delivery process\, relationship manage
 ment processes\, problem resolution process\, control processes and releas
 e processes.\n\nThis training is consistent with the project management pr
 actices established in ISO 10006 (Quality Management Systems – Guideline
 s for Quality Management in Projects). This training is fully compatible w
 ith ISO 20000-2 (Guidelines for the Implementation of an SMS) and ITIL.\nL
 earning Objectives\n• To understand the implementation of an Service Man
 agement System in accordance with ISO 20000\n• To gain a comprehensive u
 nderstanding of the concepts\, approaches\, standards\, methods and techni
 ques allowing an effective management of an Service Management System\n•
  To know the interrelationships between ISO/IEC 20000-1\, ISO/IEC 20000-2 
 and ITIL\n• To acquire expertise to support an organization in implement
 ing\, managing and maintaining an Service Management System (SMS) as speci
 fied in ISO/IEC 20000\n• To acquire the necessary expertise to manage a 
 team in implementing the ISO 20000 standard\n Prerequisite\n• ISO 20000
  Foundation Certification or basic knowledge of ISO 20000 and ITIL is reco
 mmended\n Who Should attend?\n• Project managers or consultants wanting
  to implement of an Service Management System (SMS)\n• ISO 20000 auditor
 s who wish to fully understand the SMS implementation process\n• Persons
  responsible for the SMS conformity in an organization\n• Technical expe
 rts wanting to prepare for an SMS function\nCourse Agenda\n\nDay 1: Introd
 uction to Service Management System (SMS) concepts as required by ISO 2000
 0 Initiating an SMS\n\no Presentation of the ISO 20000 family of standards
  and comparison with ITIL V2 and V3\no Fundamental principles of Service M
 anagement System\no Preliminary analysis and establishment of the maturity
  level of an existing SMS\no Writing a business case and a project plan fo
 r the implementation of an SMS\n\nDay 2: Planning an SMS based on ISO 2000
 0\n\no Definition of the scope of an SMS\no Definition of an SMS policy an
 d objectives\no Documentation of the processes and procedures and SLAs\no 
 Budgeting and accounting for IT services\n\nDay 3: Implementing an SMS bas
 ed on ISO 20000\n\no Change\, configuration\, release\, capacity and avail
 ability management\no Service continuity and security management\no Incide
 nt and problem management\no Operations management of an SMS\n\nDay 4: Con
 trolling\, monitoring\, measuring and improving an SMS certification audit
  of an SMS in accordance with ISO 20000\n\no Controlling and monitoring an
  SMS\no Development of metrics\, performance indicators and dashboards\no 
 ISO 20000 internal Audit and Management review\no Implementation of a cont
 inual improvement program\no Preparing for an ISO 20000 certification audi
 t\n\nDay 5: Certification Exam (3 Hours)\n\nTraining Info\n\nDuration:  
 5 Days\nDate:  Feb  2 - 6\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue
 :  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bl
 dg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 Baht (ex.vat7%)\nTel
 . 02 670 8980-4 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nwww.pecb
 .com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:737@acinfotec.com
DTSTART:20260202T023000Z
DTEND:20260206T093000Z
DTSTAMP:20251127T065413Z
URL:https://www.acinfotec.com/training-event/certified-ethical-hacker-cehv
 13-thai-exam-included-new/
SUMMARY:Certified Ethical Hacker (CEHv13) (Exam Included)
DESCRIPTION:Certified Ethical Hacker (CEHv13) Powered by AI CapabilitiesLE
 ARN | CERTIFY | ENGAGE | COMPETE\nWhat’s New in The CEH v13?\nThe C|EH v
 13 not only provides extensive hands-on coverage but also integrates AI in
 to all fve phases of ethical hacking:\n\nMaster AI to Automate Ethical Hac
 king Tasks\, to hack and defend against AI systems\, and boost your task e
 ffciency by 40% in your job role.\nDevelop a Hacker’s Mindset: Master th
 e 5 Phases of Ethical Hacking and Gain AI Skills to Automate Them1. Reconn
 aissance | Learn to gather essential information about your target 2. Vuln
 erability Scanning | Gain the ability to identify weaknesses in the target
  system 3. Gaining Access | Learn how to actively exploit identifed vulner
 abilities 4. Maintaining Access | Develop skills to maintain continued acc
 ess to the target systems\nLearn AI Tools:\n• ShellGPT• ChatGPT• Fra
 udGPT• WormGPT• DeepExploit• Nebula• Veed.io And many more!\nThe C
 |EH v13 is a specialized\, one-of-a- kind training program that helps you 
 gain expertise in ethical hacking\, AI\, and machine learning. With hands-
 on training labs\, knowledge-based and practical exams\, a mock ethical ha
 cking engagement on live networks\, and a global hacking competition\, thi
 s program ensures you master the most in-demand skills needed to excel and
  stand out in the cybersecurity industry.This learning framework offers no
 t only a comprehensive training program to prepare you for the certifcatio
 n exam but also the industry’s most robust\, in-depth\, hands- on lab an
 d practice range experience.\n\nCourseware Cyber Range Gain Skills\n\nKnow
 ledge-Based Practical ExamGain Recognition \n\nLive Cyber Range Gain Exper
 ience\n\nGlobal EthicalHacking CompetitionGain Respect\nBeat Hackers in th
 eir Own Game with CEH v13! A RevolutionaryWay to Learn Ethical Hacking\n1.
  Learn - 20 modules - 2500+ pages of student manual - 2000 pages of lab ma
 nual - Over 221 hands-on labs to practice attack vectors and hacking tools
  - AI integrated skills in the 5 phases of the ethical hacking framework -
  Hacking AI system\, based on the Top 10 OWASP vulnerabilities - Over 4000
  hacking and security tools - Learn how to hack multiple operating systems
  (Windows 11\, Windows servers\, Linux\, Ubuntu\, Android) - More than 50%
  of training time is dedicated to labs2. Certify - Knowledge-Based Exam (A
 NAB ISO 17024 and US DoD 8140)- 4 hours / 125 multiple-choice questions - 
 Practical Exam (ANAB ISO 17024 and US DoD 8140)- 6 hours / 20 real scenari
 o based questions\n3. Engage - 4000 hacking tools - 550 attack techniques 
 Conduct a real-world ethical hacking assignmentApply the 5 phases\n1. Reco
 nnaissance 2. Scanning 3. Gaining access 4. Maintaining access 5. Covering
  your tracks\n4. Compete\n- New challenges every month - 4-hour CTF compet
 ition - Compete with your peers worldwide Hack your way to the top of the 
 leaderboard Focus on new attack vectorsExploit emerging vulnerabilities Ch
 allenges include:- Ransomware - Web app hardening - Unpatched software - S
 ystem hacking - Service exploitation - Incident response - Forensic analys
 is- Web app hacking and pen testing - Reverse engineering - Cryptography -
  Encryption - Hacking cloud networks - ICS/SCADA\nCourse Outline\n20 Modul
 es that help you master the foundations of Ethical Hacking and prepare to 
 challenge the CEH certification exam.\nModule 1: Introduction to Ethical H
 acking| Learn the fundamentals and key issues in information security\, in
 cluding the basics of ethical hacking\, information security controls\, re
 levant laws\, and standard procedures. Module 2: Foot Printing and Reconna
 issance| Learn how to use the latest techniques and tools for footprinting
  and reconnaissance\, a critical pre-attack phase of ethical hackingModule
  3: Scanning Networks|Learn different network scanning techniques and coun
 termeasures.Module 4: Enumeration|Learn various enumeration techniques\, i
 ncluding Border Gateway Protocol (BGP) and Network File Sharing (NFS) expl
 oits and associated countermeasures. Module 5: Vulnerability Analysis| Le
 arn how to identify security loopholes in a target organization’s networ
 k\, communication infrastructure\, and end systems. Different types of vul
 nerability assessment and vulnerability assessment tools are also included
 . Module 6: System Hacking| Learn about the various system hacking methodo
 logies used to discover system and network vulnerabilities\, including ste
 ganography\, steganalysis attacks\, and how to cover tracks Module 7: Malw
 are Threats| Learn about different types of malware (Trojan\, viruses\, wo
 rms\, etc.)\, APT and fleless malware\, malware analysis procedures\, and 
 malware countermeasures. Module 8: Sniffing| Learn about packet sniffng te
 chniques and their uses for discovering network vulnerabilities\, plus cou
 ntermeasures to defend against sniffng attacks.Module 9: Social Engineerin
 g| Learn social engineering concepts and techniques\, including how to ide
 ntify theft attempts\, audit human-level vulnerabilities\, and suggest soc
 ial engineering countermeasures.Module 10: Denial-of-Service| Learn about 
 different Denial of Service (DoS) and Distributed DoS (DDoS) attack techni
 ques\, plus the tools used to audit a target and devise DoS and DDoS count
 ermeasures and protections.Module 11: Session Highjacking| Learn the vario
 us session-hijacking techniques used to discover network-level session man
 agement\, authentication\, authorization\, and cryptographic weaknesses an
 d associated countermeasures.Module 12: Evading IDS\, Firewalls\, and Hone
 ypots| Learn about frewalls\, intrusion detection systems (IDS)\, and hone
 ypot evasion techniques\; the tools used to audit a network perimeter for 
 weaknesses\; and countermeasures. Module 13: Hacking Web Servers| Learn a
 bout web server attacks\, including a comprehensive attack methodology use
 d to audit vulnerabilities in web server infrastructures and countermeasur
 es.Module 14: Hacking Web Applications| Learn about web application attack
 s\, including a comprehensive hacking methodology for auditing vulnerabili
 ties in web applications and countermeasures.Module 15: SQL Injection| Lea
 rn about SQL injection attack techniques\, evasion techniques\, and SQL in
 jection countermeasures.Module 16: Hacking Wireless Networks| Learn about 
 different types of encryption\, threats\, hacking methodologies\, hacking 
 tools\, security tools\, and countermeasures for wireless networks.Module 
 17: Hacking Mobile Platforms| Learn mobile platform attack vectors\, Andro
 id and iOS hacking\, mobile device management\, mobile security guidelines
 \, and security tools. Module 18: IoT and OT Hacking| Learn different type
 s of Internet of Things (IoT) and operational technology (OT) attacks\, ha
 cking methodologies\, hacking tools\, and countermeasures. Module 19: Clo
 ud Computing| Learn different cloud computing concepts\, such as container
  technologies and serverless computing\, various cloud computing threats\,
  attacks\, hacking methodologies\, and cloud security techniques and tools
 . Module 20: Cryptography| Learn about encryption algorithms\, cryptograp
 hy tools\, Public Key Infrastructure (PKI)\, email encryption\, disk encry
 ption\, cryptography attacks\, and cryptanalysis tools\n\nTraining Info\n\
 n\n\nDuration : 5 Days Language: Conduct in Thai Time : 09.30-04.30 pm.Tr
 aining Date: Feb 2 - 6\, 2026Tel. 02 670 8980-4 ext.321-323Price: Please C
 all Email. training@acinfotec.com https://www.eccouncil.org/  
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/CEH-300x233.jpg
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:842@acinfotec.com
DTSTART:20260203T023000Z
DTEND:20260206T093000Z
DTSTAMP:20260107T085017Z
URL:https://www.acinfotec.com/training-event/csslp-certified-secure-softwa
 re-lifecycle-professional-exam-prep-new-2/
SUMMARY:CSSLP - Certified Secure Software Lifecycle Professional (Exam Prep
 )
DESCRIPTION:CSSLP - Certified Secure Software Lifecycle Professional (Exam 
 Prep)\nAbout this course\nEarning the globally recognized CSSLP secure sof
 tware development certification is a proven way to build your career and b
 etter incorporate security practices into each phase of the software devel
 opment lifecycle (SDLC).\n\nCSSLP certification recognizes leading applica
 tion security skills. It shows employers and peers you have the advanced t
 echnical skills and knowledge necessary for authentication\, authorization
  and auditing throughout the SDLC using best practices\, policies and proc
 edures established by the cybersecurity experts at ISC2. Prove your skills
 \, advance your career\, and gain support from a community of cybersecurit
 y leaders here to help you throughout your professional journey.\nWho shou
 ld attend?\n\n 	Software developers\n 	Software architects\n 	Software eng
 ineers\n 	Application security specialists\n 	Penetration testers\n 	Proje
 ct managers\n 	Anyone involved in the software development lifecycle (SDLC
 )\n\nCourse Contents\nDomain 1. Secure Software Concepts\n\nDomain 2. Secu
 re Software Lifecycle Management\n\nDomain 3. Secure Software Requirements
 \n\nDomain 4. Secure Software Architecture and Design\n\nDomain 5. Secure 
 Software Implementation\n\nDomain 6. Secure Software Testing\n\nDomain 7. 
 Secure Software Deployment\, Operations\, Maintenance\n\nDomain 8. Secure 
 Software Supply Chain\n\n&nbsp\;\nCSSLP Examination Information\n\n\n\nLen
 gth of exam\n3 hours\n\n\nNumber of items\n125\n\n\nItem format\nMultiple 
 choice\n\n\nPassing grade\n700 out of 1000 points\n\n\nLanguage availabili
 ty\nEnglish\n\n\nTesting center\nPearson VUE Testing Center\n\n\n\n\nCSSLP
  Examination Weights\n\n\n\nDomains\nAverage Weight\n\n\n1. Secure Softwar
 e Concepts\n12%\n\n\n2. Secure Software Lifecycle Management\n11%\n\n\n3. 
 Secure Software Requirements\n13%\n\n\n4. Secure Software Architecture and
  Design\n15%\n\n\n5. Secure Software Implementation\n14%\n\n\n6. Secure So
 ftware Testing\n14%\n\n\n7. Secure Software Deployment\, Operations\, Main
 tenance\n11%\n\n\n8. Secure Software Supply Chain\n10%\n\n\nTotal\n100%\n\
 n\n\nTraining Info\nLanguage: Conducted in Thai Language\nDuration: 4 
 Days\nDate: Feb 3 - 6\, 2026\nPrice: 38\,000.- (ex.vat)\nVenue: ACinfotec 
 Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab)
  \, Rama 4 Rd.\nTel : 02 670 8980-4 ext.321-323\nE-mail: training@acinfo
 tec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/07/images.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:662@acinfotec.com
DTSTART:20260205T023000Z
DTEND:20260206T093000Z
DTSTAMP:20260107T085112Z
URL:https://www.acinfotec.com/training-event/pecb-certified-gdpr-foundatio
 n-thai-exam-included/
SUMMARY:PECB Certified GDPR Foundation (Exam Included)
DESCRIPTION:About this course\n\nGDPR Foundation training enables you to le
 arn the basic elements to implement and manage a compliance framework with
  regard to the protection of personal data. During this training course\, 
 you will be able to understand the fundamental privacy principles and beco
 me familiar with the role of the Data Protection Officer.\n\nAfter complet
 ing this course\, you can sit for the exam and apply for a “PECB Certifi
 ed GDPR Foundation” credential. A PECB Foundation Certificate shows that
  you have understood the fundamental methodologies\, requirements\, framew
 ork and management approach.\nWho should attend?\n\n 	Individuals involved
  in Personal Data Protection and Information Security\n 	Individuals seeki
 ng to gain knowledge about the main privacy principles\n 	Individuals inte
 rested to pursue a career in Data Protection\n\nLearning objectives\n\n 	U
 nderstand the General Data Protection Regulation  requirements and the fu
 ndamental principles of privacy\n 	Understand the obligations\, roles and 
 responsibilities of the Data Protection Officer\n 	Understand the concepts
 \, approaches\, methods and techniques to effectively align a compliance f
 ramework with regard to the protection of personal data\n\nCourse agenda\n
 Day 1: Introduction to GDPR and Data Protection Principles\nDay 2: The Gen
 eral Data Protection Regulation requirements and Certification Exam\nGener
 al information\n\n 	Certification fees are included on the exam price.\n 	
 Training material containing over 200 pages of information and practical e
 xamples will be distributed\n 	A participation certificate of 14 CPD (Cont
 inuing Professional Development) credits will be issued\n 	In case of exam
  failure\, you can retake the exam within 12 months for free\n\n Training 
 info\nDuration:  2 Days\nDate:  Feb 5 - 6\, 2026\nTime:  9.30 am. –
  16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre 
 Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 32\,000 Bah
 t (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@acinfotec.c
 om\n\n\n\nwww.pecb.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:663@acinfotec.com
DTSTART:20260205T023000Z
DTEND:20260206T093000Z
DTSTAMP:20260107T085117Z
URL:https://www.acinfotec.com/training-event/pecb-certified-gdpr-foundatio
 n-thai-exam-included-2/
SUMMARY:PECB Certified GDPR Foundation(Exam Included)
DESCRIPTION:About this course\n\nGDPR Foundation training enables you to le
 arn the basic elements to implement and manage a compliance framework with
  regard to the protection of personal data. During this training course\, 
 you will be able to understand the fundamental privacy principles and beco
 me familiar with the role of the Data Protection Officer.\n\nAfter complet
 ing this course\, you can sit for the exam and apply for a “PECB Certifi
 ed GDPR Foundation” credential. A PECB Foundation Certificate shows that
  you have understood the fundamental methodologies\, requirements\, framew
 ork and management approach.\nWho should attend?\n\n 	Individuals involved
  in Personal Data Protection and Information Security\n 	Individuals seeki
 ng to gain knowledge about the main privacy principles\n 	Individuals inte
 rested to pursue a career in Data Protection\n\nLearning objectives\n\n 	U
 nderstand the General Data Protection Regulation  requirements and the fu
 ndamental principles of privacy\n 	Understand the obligations\, roles and 
 responsibilities of the Data Protection Officer\n 	Understand the concepts
 \, approaches\, methods and techniques to effectively align a compliance f
 ramework with regard to the protection of personal data\n\nCourse agenda\n
 Day 1: Introduction to GDPR and Data Protection Principles\nDay 2: The Gen
 eral Data Protection Regulation requirements and Certification Exam\nGener
 al information\n\n 	Certification fees are included on the exam price.\n 	
 Training material containing over 200 pages of information and practical e
 xamples will be distributed\n 	A participation certificate of 14 CPD (Cont
 inuing Professional Development) credits will be issued\n 	In case of exam
  failure\, you can retake the exam within 12 months for free\n\n Training 
 info\nDuration:  2 Days\nDate:  Feb 5 - 6\, 2026\nTime:  9.30 am. –
  16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre 
 Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 32\,000 Bah
 t (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@acinfotec.c
 om\n\n\n\nwww.pecb.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:239@acinfotec.com
DTSTART:20260209T023000Z
DTEND:20260212T093000Z
DTSTAMP:20260107T085127Z
URL:https://www.acinfotec.com/training-event/digital-forensics-foundation-
 english/
SUMMARY:Digital Forensics Foundation (English)
DESCRIPTION:About this course\nA 4 day practical training course for people
  who are responsible for digital forensic investigations or are wishing to
  become a digital forensic investigator. The course will provide a solid f
 oundation in the understanding of digital forensics principles and techniq
 ues. Each subject is covered in depth and supported by practical scenario 
 based exercises to reinforce the learning points. The candidate will use a
  range of free and open source forensic tools. This allows the candidate t
 he opportunity to practice what they have learnt on the course without the
  need to invest in expensive forensic software / hardware. The course has 
 been designed by experienced forensic investigators with many years’ exp
 erience ensuring the course content is both relevant and practical.\nWho S
 hould attend?\nThe course is aimed at people who are responsible for digit
 al forensic investigations or are wishing to become digital forensic inves
 tigators\, including: IT security professionals and law enforcement office
 rs.\n\nCourse Contents\n\n1 – Introduction to Digital Forensics\n• Def
 ine Digital Forensics\n• Define the types of Forensic Investigations\n
 • Legal Considerations 7 – File Systems &amp\; Data Storage\n• Intro
 duction to File Systems\n• Data Storage\n• File System Metadata\n• L
 ive\, Deleted and Unallocated Data\n• File Slack and Ram Slack\n• NTFS
  Compression and Encryption\n\n2 – Investigation Fundamentals\n• Best 
 Practice Guidelines\n• The Four Principles of Computer Based Evidence\n
 • The basics of information gathering 8 – File Information\n• Date a
 nd Time Stamps\n• File Metadata\n\n3 – Identification and seizure of d
 igital equipment\n• Evidence Handling &amp\; Chain of Custody\n• Ident
 ifying Electronic Sources of Evidence\n• Seizure of Electronic Devices 9
  – Forensic Analysis Techniques\n• Analysis Environments\n• Case Pre
 paration\n• Folder / File Recovery\n• File Signatures and Data Carving
 \n• Data Reduction and Hash Analysis\n• Keyword Searching\n• Evidenc
 e Corroboration\n\n4 – Forensic Acquisitions\n• Forensic Acquisitions\
 n• Forensic Image\n• Forensic Clone\n• Forensic Image vs. Forensic C
 lone\n• FTK Imager\n• Mounting a Forensic Image\n• Hash Values 10 
 – Windows OS Artefacts\n• The Windows Registry\n• Internet History\n
 • Link Files\n• Previously connected USB Devices\n• Log Files\n• P
 refetch Files\n\n5 – Understanding Digital Data\n• Binary Digits\n• 
 Binary Conversion\n• Storage Devices\n• Understanding Electronic Data 
 11 – Forensic Challenges\n• Encryption and Passwords\n• Data Wiping\
 n• Malicious Activity\n\n6 – Understanding Hard Drive Terminology\n•
  Physical Drives\n• Understanding Hard Drive Terminology\n• Unified Ex
 tensible Firmware Interface (UEFI)\n• GUID Partition Table (GPT)\n\n7 
 – File Systems &amp\; Data Storage\n• Introduction to File Systems\n
 • Data Storage\n• File System Metadata\n• Live\, Deleted and Unalloc
 ated Data\n• File Slack and Ram Slack\n• NTFS Compression and Encrypti
 on\n\n8 – File Information\n• Date and Time Stamps\n• File Metadata\
 n\n9 – Forensic Analysis Techniques\n• Analysis Environments\n• Case
  Preparation\n• Folder / File Recovery\n• File Signatures and Data Car
 ving\n• Data Reduction and Hash Analysis\n• Keyword Searching\n• Evi
 dence Corroboration\n\n10 – Windows OS Artefacts\n• The Windows Regist
 ry\n• Internet History\n• Link Files\n• Previously connected USB Dev
 ices\n• Log Files\n• Prefetch Files\n\n11 – Forensic Challenges\n•
  Encryption and Passwords\n• Data Wiping\n• Malicious Activity\n\n12 
 – Reporting\n• Purpose and layout of Report\n• Content of Report\nTr
 aining Info\nDuration:  4 Days\nDate:  Feb 9 - 12\, 2026\nTime:  9.30
  am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande
  Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 39\
 ,800 Baht (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@aci
 nfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/01/image004.png
CATEGORIES:Digital Forensics,ICMS
END:VEVENT
BEGIN:VEVENT
UID:273@acinfotec.com
DTSTART:20260209T023000Z
DTEND:20260213T093000Z
DTSTAMP:20260107T085137Z
URL:https://www.acinfotec.com/training-event/pecb-iso-29100-certified-lead
 -privacy-implementer-clpi-thai-3/
SUMMARY:PECB ISO 29100 Certified Lead Privacy Implementer – CLPI (Exam In
 cluded)
DESCRIPTION:\nCourse Overview\nThis five-day intensive course enables parti
 cipants to develop the necessary expertise to support an organization in 
 implementing and managing a Privacy Framework based on ISO 29100. Partici
 pants will gain a thorough understanding of how to design\, build and lead
  organizations privacy programs in all processes of ICT systems and servi
 ces\, through the use of best practices.\n\nThe training provides a privac
 y framework which specifies a common privacy terminology\, defines the ac
 tors and their roles in processing personally identifiable information (PI
 I)\, describes privacy safeguarding considerations and provides reference
 s to known privacy principles for information\ntechnology.\nWho Should Att
 end\n\n 	Project managers or consultants wanting to prepare and to support
  organizations on implementing and managing a Privacy\nFramework\n 	Securi
 ty auditors who wish to fully understand the Privacy Framework implementat
 ion process\n 	Experienced IT security management professionals\n 	IT secu
 rity professionals interested in earning Privacy Management Framework cert
 ification\n 	Privacy Officers\, Data Protection Officers\, and Compliance 
 professionals with an interest in privacy legislation and risk\n 	Security
  professionals with front-line experience\n 	Information security staff\n 
 	Expert advisors in information technology\n 	Persons and organizations in
 volved in tasks where privacy controls are required for the processing of 
 PII\n\nLearning Objectives\n\n 	To understand the core competences on Priv
 acy Framework\n 	To gain a comprehensive understanding of the concepts\, a
 pproaches\, standards\, methods and techniques required for the\neffective
  protection of personally identifiable information (PII)\n 	To define priv
 acy safeguarding requirements related to PII within an ICT environment\n 	
 To understand the relationship between the components of Privacy Framework
  with existing security standards and various\napplicable laws\n 	To acqui
 re necessary expertise in privacy governance\, specifically in personally 
 identifiable information governance\n 	To acquire necessary expertise in p
 rivacy risk management compliance connected with personally identifiable i
 nformation\n 	To develop knowledge and skills required to advise for impro
 ve organizations’ privacy programs through the use of best\npractices\n 
 	To improve the capacity for analysis of privacy incident management\n\nCo
 urse Contents \n\nIntroduction to Privacy Framework concepts as recommend
 ed by ISO 29100\n\n▶ Privacy Framework based on ISO 29100 and regulatory
  framework\n▶ Fundamental Principles of Privacy\n▶ Privacy Legislation
  US &amp\; Europe\n▶ Writing a business case and a project plan for the 
 implementation of a Privacy Framework\n▶ Initiating the Privacy Framewor
 k implementation\n\nPlanning the implementation of the Privacy Framework\n
 \n▶ Preliminary analysis of Existing Controls\n▶ Leadership and approv
 al of the Privacy Framework project\n▶ Defining the scope of a Privacy F
 ramework\n▶ Development of a Privacy policy\n▶ Selection of the approa
 ch and methodology for risk assessment\n▶ Control Statement and manageme
 nt decision to implement the Privacy Framework\n▶ Definition of the orga
 nizational structure of Privacy\n\nImplementing a Privacy Framework\n\n▶
  Implementation of a document management framework\n▶ Design of controls
  and writing procedures and specific policies\n▶ Implementation of priva
 cy controls\n▶ Development of a training &amp\; awareness program and co
 mmunicating about the privacy\n▶ Incident management\n▶ Operations Man
 agement\n\nPrivacy Framework measurement and continuous improvement\n\n▶
  Monitoring\, Measurement\, Analysis and Evaluation\n▶ Internal Audit\n
 ▶ Management Review\n▶ Treatment of problems and points of concern\n
 ▶ Continual improvement\n▶ Competence and evaluation of implementers\n
 \nCertification Exam\n\n Training Info\n\n\n\n\nLanguage : Conducted in 
 Thai Language\nDuration : 5 Days\nDate :  Feb 9-13\, 2026\nTime : 9.30 
 am. – 16.30 pm.\nVenue : ACinfotec Training Center\n16th Fl.\, Grande C
 entre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nPrice : THB 51\,500
  (Excluding 7% VAT)\nContact : T 02 670 8980-4 ext.321-323\nE training@ac
 infotec.com\n\n\n\nwww.pecb.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:417@acinfotec.com
DTSTART:20260211T023000Z
DTEND:20260213T093000Z
DTSTAMP:20260107T085146Z
URL:https://www.acinfotec.com/training-event/itil-4-foundation-english-cla
 ss/
SUMMARY:IT Service Management based on Best Practice
DESCRIPTION:About this course\nExtensive research has consistently shown th
 at ITSM is fundamental to businesses\, enables transformation and helps or
 ganizations realize value. Many organizations invest heavily in adopting a
 nd adapting ITSM Best Practice into their business practices and upskillin
 g their workforce with ITSM Best Practice  qualifications.\n\nITSM Best P
 ractice will help businesses navigate the new technological era\, commonl
 y known as the Fourth Industrial Revolution. The speed of current breakthr
 oughs is disrupting almost every industry on a global scale. The Fourth In
 dustrial Revolution is marked by emerging technology in fields including r
 obotics\, artificial intelligence\, nanotechnology\, quantum computing\, b
 iotechnology\, the Internet of Things (IoT)\, 3D printing\, autonomous veh
 icles and much more.\n\nITSM Best Practice provides a practical and flexib
 le basis to support organizations on their journey into the new world of d
 igital transformation by helping them align their human\, digital and phys
 ical resources\, adopt emerging technologies into their IT operations to c
 ompete within the complex modern landscape.\n\n\n\n&nbsp\;\nWho should att
 end?\nThe target audience for this course and qualification are:\n\n 	Indi
 viduals at the start of their journey in Service Management\n 	ITSM Manage
 rs and aspiring ITSM Managers\n 	Individuals working in other parts of IT 
 (digital\, product development) with strong interface with service deliver
 y\n 	Existing ITSM Best Practice qualification holders wishing to update t
 heir knowledge\n\nCourse Benefits\nOn completion of this course\, the foll
 owing learning outcomes will be achieved\n\n 	\n\n 	Understand key service
  management concepts\n 	Understand how the ITSM Best Practice guiding prin
 ciples can help an organization adopt and adapt service management Underst
 and the four dimensions of service management\n 	Understand the purpose an
 d components of the ITSM Best Practice service value system Understand the
  activities of the service value chain\, and how they interconnect\n 	Know
  the purpose and key terms of selected ITSM Best Practice practices with f
 ocus on key\nselected practices\n\n\n\n\nCourse Contents\n Understand Key
  Concepts of Service Management\n• Service Management\n• Service and r
 elationship with Value\, Outcome\, Cost and Risks\n• Service Consumers\,
  Service Providers\, Users\, Customer\n• Understanding Nature and Compon
 ents of Value\n• Value Co-Creation\n• Understanding Service Relationsh
 ips\n\nITSM Best Practice Guiding Principles\n• Focus on Value\n• Star
 t Where You Are\n• Progress Iteratively With Feedback\n• Collaborate a
 nd Promote Visibility\n• Think and Work Holistically\n• Keep It Simple
  and Practical\n• Optimize and Automate\n\nITSM Best Practice Service Va
 lue System\n• Four Dimensions of Service Management\n• Components of t
 he Service Value System including Value Chain\, Governance and Practices\n
 • Value Chain Activities within the Value System\n\nITSM Practices\n• 
 3 Categories of ITSM Practices\n• Purpose and detailed look at selected 
 Practices (including):\n• Incident Management\n• Problem Management\n
 • Change Control\n• Service Level Management\n• Continual Improvemen
 t\n• Service Request Management\n• Service Desk\n• Information Secur
 ity Management\n• Relationship Management\n• Service Configuration Man
 agement\n• Supplier Management\n\n\nTraining info\nDuration:  3 Days\n
 Language: Conduct in Thai\nDate:  Feb 11 - 13\, 2026\nTime:  9.30 am. 
 – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Cent
 re Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: Please C
 all\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 9/02/สีน้ำเงินเข้ม-สีฟ้าอมเข
 ยว-สีแดง-ทันสมัย-เทคโนโลยี-
 ข่าว-ทั่วไป-ท่อนเริ่มyoutube.png
CATEGORIES:ITIL
END:VEVENT
BEGIN:VEVENT
UID:604@acinfotec.com
DTSTART:20260216T023000Z
DTEND:20260219T093000Z
DTSTAMP:20260122T042501Z
URL:https://www.acinfotec.com/training-event/comptia-security-exam-include
 d-11/
SUMMARY:CompTIA Security+ (Exam Included)
DESCRIPTION:\nAbout this course \nCompTIA® Security+® is the primary cour
 se you will need to take if your job responsibilities include securing net
 work services\, devices\, and traffic and your organization as a whole inc
 luding the physical security elements and operational security measures. I
 t is also the main course you will take to prepare for the CompTIA Securit
 y+ Certification examination.\n\nIn this course\, you will build on your k
 nowledge and professional experience with security fundamentals\, networks
 \, and organizational security as you acquire the specific skills required
  to implement basic security services on any type of computer network. Thi
 s course can benefit you in two ways. If you intend to pass the CompTIA Se
 curity+ (Exam SY0-701) Certification examination\, this course can be a si
 gnificant part of your preparation. But certification is not the only key 
 to professional success in the field of computer security.\n\nToday's job 
 market demands individuals with demonstrable skills\, and the information 
 and activities in this course can help you build your computer security sk
 ill set so that you can confidently perform your duties in any security-re
 lated professional role.\n\nWho should attend?\nThis course is targeted to
 ward the information technology (IT) professional who has networking and a
 dministrative skills in Windows®-based Transmission Control Protocol/Inte
 rnet Protocol (TCP/IP) networks and familiarity with other operating syste
 ms\, such as Mac OS® X\, Unix\, or Linux\, and who wants to further a car
 eer in IT by acquiring a foundational knowledge of security topics\; prepa
 re for the CompTIA Security+ Certification examination\; or use Security+ 
 as the foundation for advanced security certifications or career roles.\n\
 n\n\n\n\n\n\n\nCourse Contents\n\n\n\n\n\nModule 1: General Security Conce
 pts\n\n 	Compare and contrast various types of security controls.\n 	Summa
 rize fundamental security concepts.\n 	Explain the importance of change ma
 nagement processes  and the impact to security.\n 	Explain the importance
  of using appropriate cryptographic solutions.\n\nModule 2: Security Opera
 tions\n\n 	Given a scenario\, apply common security techniques to computin
 g resources.\n 	Explain the security implications of proper hardware\, sof
 tware\, and data asset management.\n 	Explain various activities associate
 d with vulnerability management.\n 	Explain security alerting and monitori
 ng concepts and tools.\n 	Given a scenario\, modify enterprise capabilitie
 s to enhance security.\n 	Given a scenario\, implement and maintain identi
 ty and access management.\n 	Explain the importance of automation and orch
 estration related to secure operations.\n 	Explain appropriate incident re
 sponse activities.\n 	Given a scenario\, use data sources to support an in
 vestigation.\n\nModule 3: Security Architecture\n\n 	Compare and contrast 
 security implications of different architecture models.\n 	Given a scenari
 o\, apply security principles to secure enterprise infrastructure.\n 	Comp
 are and contrast concepts and strategies to protect data.\n 	Explain the i
 mportance of resilience and recovery in security architecture.\n\nModule 4
 : Threats\, Vulnerabilities\, and Mitigations\n\n 	Compare and contrast co
 mmon threat actors and motivations.\n 	Explain common threat vectors and a
 ttack surfaces.\n 	Explain various types of vulnerabilities.\n 	Given a sc
 enario\, analyze indicators of malicious activity.\n 	Explain the purpose 
 of mitigation techniques used to secure the enterprise.\n\nModule 5: Secur
 ity Program Management and Oversight\n\n 	Summarize elements of effective 
 security governance.\n 	Explain elements of the risk management process\n 
 	Explain the processes associated with third-party risk assessment and man
 agement.\n 	Summarize elements of effective security compliance.\n 	Explai
 n types and purposes of audits and assessments.\n 	Given a scenario\, impl
 ement security awareness practices.\n\nAbout the exam\nThe new CompTIA Sec
 urity+ (SY0-701) represents the latest and greatest in cybersecurity\, cov
 ering the most in-demand skills related to current threats\, automation\, 
 zero trust\, IoT\, risk – and more. Once certified\, you’ll understand
  the core skills needed to succeed on the job – and employers will notic
 e too. The Security+ exam verifies you have the knowledge and skills requi
 red to:\n\n 	Assess the security posture of an enterprise environment and 
 recommend and implement appropriate security solutions.\n 	Monitor and sec
 ure hybrid environments\, including cloud\, mobile\, Internet of Things (I
 oT)\, and operational technology.\n 	Operate with an awareness of applicab
 le regulations and policies\, including principles of governance\, risk\, 
 and compliance.\n 	Identify\, analyze\, and respond to security events and
  incidents.\n\nCompTIA Security+ is compliant with ISO 17024 standards and
  approved by the U.S. DoD to meet directive 8140/8570.01-M requirements. R
 egulators and government rely on ANSI accreditation because it provides co
 nfidence and trust in the outputs of an accredited program. Over 2.3 milli
 on CompTIA ISO/ANSI-accredited exams have been delivered since January 1\,
  2011.\nTraining Info\nLanguage : Conducted in Thai Language\nDuration : 4
  Days\nDate : Feb 16 - 19\, 2026\nTime : 9.30 - 16.30 pm\nVenue : ACinfote
 c Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workla
 b) \, Rama 4 Rd.\nContact: 02 670 8980-4 ext.321-323\nE training@acinfot
 ec.com\nPrice: 45\,000 baht (Ex.vat 7%)\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:827@acinfotec.com
DTSTART:20260216T023000Z
DTEND:20260217T093000Z
DTSTAMP:20260115T024827Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-270012
 022-transition-exam-included-5/
SUMMARY:PECB Certified ISO/IEC 27001 Transition (Exam Included)
DESCRIPTION:About this course\n\nThe ISO/IEC 27001 Transition training cour
 se enables participants to thoroughly understand the differences between I
 SO/IEC 27001:2013 and ISO/IEC 27001:2022. In addition\, participants will 
 acquire knowledge on the new concepts presented by ISO/IEC 27001:2022.\n\n
 The new version of ISO/IEC 27001 has been recently published and is now al
 igned with the new version of ISO/IEC 27002\, which was published in Febru
 ary\, 2022. The major changes between ISO/IEC 27001:2022 and ISO/IEC 27001
 :2013 are noticed in the information security controls of Annex A\, wherea
 s a few other minor changes are present in the clauses of the standard too
 . Furthermore\, the title of ISO/IEC 27001:2022 differs from the title of 
 ISO/IEC 27001:2013\, as now the standard is titled Information security\,
  cybersecurity and privacy protection — Information security management 
 systems — Requirements.\n\nThe “PECB ISO/IEC 27001 Transition” train
 ing course provides detailed information on the revised clauses\, the new 
 terminology\, and the differences in the controls of Annex A. Additionally
 \, this training course provides participants with the necessary knowledge
  to support organizations in planning and implementing the changes in thei
 r ISMS to ensure conformity with ISO/IEC 27001:2022. As such\, you will be
  able to participate in projects to transition from an ISMS based on ISO/I
 EC 27001:2013 to an ISMS based on ISO/IEC 27001:2022.\nWho should attend?\
 n\n 	This training course is intended for:\n\n 	Individuals seeking to rem
 ain up-to-date with ISO/IEC 27001 requirements for an ISMS\n 	Individuals 
 seeking to understand the differences between ISO/IEC 27001:2013 and ISO/I
 EC 27001:2022 requirements\n 	Individuals responsible for transitioning an
  ISMS from ISO/IEC 27001:2013 to ISO/IEC 27001:2022\n 	Managers\, trainers
 \, and consultants involved in maintaining an ISMS\n 	Professionals wishin
 g to update their ISO/IEC 27001 certificates\n\n\n\nLearning objectives\nU
 pon successfully completing the training course\, participants will be abl
 e to:\n\n 	Explain the differences between ISO/IEC 27001:2013 and ISO/IEC 
 27001:2022\n 	Interpret the new concepts and requirements of ISO/IEC 27001
 :2022\n 	Plan and implement the necessary changes to an existing ISMS in a
 ccordance with ISO/IEC 27001:2022\n\nCourse agenda\n\n 	Day 1: Introducti
 on to ISO/IEC 27001:2022 and comparison to ISO/IEC 27001:2013\n 	Day 2: C
 omparison between Annex A controls of ISO/IEC 27001:2013 and ISO/IEC 27001
 :2022\n\nEducational approach\n\n 	This training course is based on theory
 \, and best practices used in the process of transitioning an ISMS from IS
 O/IEC 27001:2013 to ISO/IEC 27001:2022\n 	Lecture sessions are illustrated
  with quizzes\n 	Quizzes have a similar structure to the certification exa
 m\n\n Training info\nDuration:  2 Days\nDate:  Feb 16-17\, 2026\nTime:
   9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\
 , Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining F
 ees: 27\,000 Baht (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.train
 ing@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,Information Security (ISO 27001/ISMS),PECB (Official
 PECB course)
END:VEVENT
BEGIN:VEVENT
UID:412@acinfotec.com
DTSTART:20260216T023000Z
DTEND:20260216T093000Z
DTSTAMP:20260107T085204Z
URL:https://www.acinfotec.com/training-event/principal-of-it-governance-ri
 sk-and-compliance-thai-3/
SUMMARY:Principal of IT Governance\, Risk and Compliance (Thai)
DESCRIPTION:About this course\nThis course defines IT Governance broadly as
  a collection of management\, planning and performance reporting and revie
 wing processes\, which establish controls and performance metrics over key
  IT investments\; business/IT alignment decisions\; the effectiveness of I
 T program and project deployment\, the efficiency of IT delivery\, infrast
 ructure and operational services and new or change request authorizations 
 and compliance with regulations\, laws and organizational policies.\n\nThe
  broad definition encompasses how well IT is providing value to and servic
 ing the business as well as doing its part in complying with regulations a
 nd organizational policies and plans. This is a “How to” Course that i
 s Pragmatic and Actionable. This course will enable an organization to mig
 rate from its current state of IT governance to a higher level of IT matur
 ity and impact the bottom line significantly.\nWho Should attend?\n\n 	IT 
 professionals working in audit\, compliance\, risk\, security and governan
 ce.\n 	Managers and Executives concerned about the quality of business inf
 ormation.\n\nCourse Contents\nOverview of IT Governance\n\n 	Why IT govern
 ance? Driving forces and challenges\n 	IT Governance VS Enterprise Governa
 nce\n 	Executive View of IT governance\n 	Who benefits and what are the va
 lue propositions?\n 	The Role of the Board and Executive Management in IT 
 Governance\n 	Enterprise Governance of The Securities and Exchange Commiss
 ion (SEC) and their relationship with IT governance\n\nOverview of Industr
 y Best Practice Standards\, Model and Guidelines covering some aspect of I
 T governance\n\n 	PMBOK\, PRINCE2\, CMMI\, ITIL\, ISO 20000\, ISO 27001\, 
 ISO 22301\, COBIT\, COSO ERM\, SOX\, IIA Guidance on Governance\n 	IT Gove
 rnance framework\n 	Key Governance Processes- Planning\, Execution\, Perfo
 rmance Management and Balanced Scorecard\, Steering Groups\, Outsourcing e
 tc.\n\nPrinciples of Business/IT Alignment Excellence\n\n 	Business and IT
  Plans\n 	Investment/Portfolio Management Criteria\n 	IT Engagement Model\
 n\nPrinciples of Program/Project Management Excellence\n\n 	PM Life Cycle 
 Phases and Templates\n 	PM Metrics\n 	Project Risk Management\n\nPrinciple
 s of IT Service Management and Delivery Excellence\n\n 	 ITIL (IT Infrast
 ructure Library) and its value\, metrics\, work flows\n 	Overview of ISO 2
 0000 service management system\n\nPrinciples of Information Security Manag
 ement\n\n 	Security Risk Management\n 	ISO 27001 information security mana
 gement system\n\nPrinciples of Vendor Management and Outsourcing Excellenc
 e\n\n 	Vendor Selection\, Negotiations and Management\n 	IT Governance in 
 relations with Outsourcing\n\nUsing COBIT 4.1 as a tool for implementing I
 T Governance\n\n 	COBIT 4.1 introduction\n 	COBIT principles and enablers\
 n 	Roadmap to Implement IT Governance\n 	Difference between COBIT 4.1 and 
 COBIT 5\n 	COBIT 4.1 and SOX\n\nSelected Case Studies and Lessons Learned\
 n\nTraining Info\n\nDuration:  1 Day\nDate:  Feb 16\, 2026\nTime:  9.
 30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Gran
 de Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 9
 \,000 Baht (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@ac
 infotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/08/it_governance1.png
CATEGORIES:Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:833@acinfotec.com
DTSTART:20260223T023000Z
DTEND:20260227T093000Z
DTSTAMP:20260107T085223Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-42001-
 ai-lead-implementer/
SUMMARY:PECB Certified ISO/IEC 42001 Lead Implementer (Artificial Intellige
 nce Management System) (Exam Included)
DESCRIPTION:PECB Certified ISO/IEC 42001 Artificial Intelligence Management
  System Lead Implementer\nThe ISO/IEC 42001 Lead Implementer training cour
 se provides the participants with the essential competencies needed to eff
 ectively plan\, implement\, manage\, monitor\, maintain\, and continually 
 improve an artificial intelligence management system (AIMS).\nAbout this c
 ourse\nArtificial intelligence (AI) is becoming a driving force in today
 ’s technology landscape. Its application has spanned across numerous sec
 tors. Its rapid expansion brought unique challenges and considerations tha
 t demand specific expertise to ensure its effective implementation and res
 ponsible management. The PECB ISO/IEC 42001 Lead Implementer training cour
 se is your gateway to mastering the practical implementation and responsib
 le management of AI management system.\n\nThe PECB ISO/IEC 42001 Lead Impl
 ementer training course is designed to prepare you to implement AI managem
 ent system in accordance with ISO/IEC 42001. It provides you with the nece
 ssary competencies to effectively translate AI strategies into actionable 
 solutions. It aims to provide a comprehensive understanding of AI implemen
 tation best practices and a framework for its successful integration withi
 n organizations\, equipping you with the hands-on expertise to drive AIMS 
 implementation projects.\n\nAfter successfully completing the course and p
 assing the exam\, you can apply for the “PECB Certified ISO/IEC 42001 Le
 ad Implementer” credential that demonstrates your ability to effectively
  implement AI strategies.\nWho Should Attend?\nThis training course is int
 ended for:\n\n 	Professionals responsible for overseeing and managing AI p
 rojects\n 	Consultants advising on AI implementation strategies\n 	Expert 
 advisors and specialists aiming to master the practical implementation of 
 AIMS in accordance with ISO/IEC 42001\n 	Individuals tasked with ensuring 
 that AI projects adhere to AI requirements within an organization\n 	Membe
 rs of AIMS implementation teams involved in the implementation of AI syste
 ms\n 	Executives and managers seeking to make informed decisions regarding
  AI implementation and its alignment with ISO/IEC 42001\n\n Objectives\nA
 fter successfully completing the training course\, you will be able to:\n\
 n 	Explain the fundamental concepts and principles of an AIMS based on ISO
 /IEC 42001\n 	Interpret the ISO/IEC 42001 requirements for an AIMS from th
 e perspective of an implementer\n 	Initiate and plan the implementation of
  an AIMS based on ISO/IEC 42001 by utilizing PECB’s IMS2 Methodology and
  other best practices\n 	Support an organization in operating\, maintainin
 g\, and continually improving an AIMS based on ISO/IEC 42001\n 	Prepare an
  organization to undergo a third party certification audit\n\nCourse Conte
 nts\nDay 1 Introduction to ISO/IEC 42001 and the initiation of an AIMS imp
 lementation\n• Training course objectives and structure\n• Standards a
 nd regulatory frameworks\n• Artificial intelligence management system (A
 IMS)\n• Fundamental concepts and principles of artificial intelligence\n
 • AIMS implementation approaches\n• Leadership and project approval\n
 • Roles and responsibilities\n\nDay 2 Implementation plan of an AIMS\n
 • The organization and its context\n• AIMS scope\n• Analysis of the 
 existing system\n• AI policy\n• AI risk management\n• Statement of A
 pplicability\n\nDay 3 Implementation of an AIMS\n• Selection and design 
 of controls\n• Implementation of controls\n• Management of documented 
 information\n• Communication\n• Competence and awareness\n• Manageme
 nt of AI operations\n\nDay 4 AIMS monitoring\, continual improvement\, and
  preparation for the certification audit\n• Monitoring\, measurement\, a
 nalysis and evaluation\n• Internal audit\n• Management review\n• Tre
 atment of nonconformities\n• Continual improvement\n• Preparation for 
 the certification audit\n• Closing of the training course\n\nDay 5 Certi
 fication Exam\nTraining Info\nDuration:  5 Days\nDate: Feb 23-27\, 2026\
 nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16t
 h Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTrai
 ning Fees: 51\,500 Baht (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mai
 l.training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:AI Intelligent,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:684@acinfotec.com
DTSTART:20260224T023000Z
DTEND:20260227T093000Z
DTSTAMP:20260107T085229Z
URL:https://www.acinfotec.com/training-event/comptia-cloudexam-included/
SUMMARY:CompTIA Cloud+ (Exam Included)
DESCRIPTION:About this course\nCompTIA Cloud+ is a global certification tha
 t validates the skills needed to deploy and automate secure cloud environm
 ents that support the high availability of business systems and data. It i
 s the only performance-based IT certification that views cloud-based infra
 structure services in the context of broader IT systems operations regardl
 ess of the platform. Migrating to the cloud presents opportunities to depl
 oy\, optimize\, and protect mission critical applications and data storage
 . It validates the technical skills needed to secure these valuable assets
 . The reality of operating multi-cloud environments poses new challenges. 
 It is ideal for cloud engineers who need to have expertise across multiple
  products and systems and is the only cloud focused certification approved
  for DoD 8570.01-M\, offering an infrastructure option for individuals who
  need to certify in IAM Level I\, CSSP Analyst and CSSP Infrastructure Sup
 port roles. \nWho should attend?\n\n 	Systems Administrator\n 	Systems En
 gineer\n 	Network Engineer\n 	Cloud Project Manager\n 	Cloud Engineer\n 	N
 etwork Administrator\n 	Cloud Specialist\n\nCourse Contents\n\n\n\n\n\n\nC
 loud Architecture &amp\; Design\nAnalyze the different cloud models to des
 ign the best solution to support business requirements.\n\n\n\n\n\n\n\nClo
 ud Security\nManage and maintain servers\, including OS configurations\, a
 ccess control and virtualization.\n\n\n\n\n\n\n\nCloud Deployment\nAnalyze
  system requirements to successfully execute workload migrations to the cl
 oud.\n\n\n\n\n\n\n\n\n\nOperations &amp\; Support\nMaintain and optimize c
 loud environments\, including proper automation and orchestration procedur
 es\, backup and restore operations\, and disaster recovery tasks.\n\n\n\n\
 n\n\n\nTroubleshooting\nTroubleshoot capacity\, automation\, connectivity 
 and security issues related to cloud implementations.\n\n\n\n\n\n\nTrainin
 g Info\nDuration:  4 Days\nDate: Feb 24-27\, 2026\nTime:  9.30 am. – 
 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre P
 oint Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 45\,000 Baht
  (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@acinfotec.co
 m\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:571@acinfotec.com
DTSTART:20260226T023000Z
DTEND:20260227T093000Z
DTSTAMP:20251219T034724Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -manager-cipm-new/
SUMMARY:Certified Information Privacy Manager (CIPM) (Thai)
DESCRIPTION: \nAbout this course\nBusiness functions such as marketing\, f
 inance\, human resources and customer service have privacy responsibilitie
 s that can expose their organizations to financial loss and damage to repu
 tation. IAPP Privacy Program Management Training\, the training aligned wi
 th ANSI/ISO-accredited CIPM certification\, gives professionals the skill
 s to operationalize privacy and minimize risks to reputation from improper
  handling of personal data.\n Course Benefits\nCIPM training teaches a pr
 ocess for conceptualizing\, designing\, building and operating a data priv
 acy management program. The curriculum\, available in French\, German and 
 English\, includes creating a company vision\, structuring data protection
  teams\, developing and implementing system frameworks\, and measuring per
 formance.\n Who should attend?\n\n 	Anyone involved with data protection 
 processes and programs\n 	Data Protection Officers\n 	Data Protection Mana
 gers\n 	Auditors\n 	Legal Compliance Officers\n 	Security Managers\n 	Info
 rmation Managers\n\n Course Contents\nModule 1: Introduction to Privacy P
 rogram Management\n\n\n 	Identifies privacy program management responsibil
 ities and describes the role of accountability in privacy program manageme
 nt.\n\nModule 2: Privacy Governance\n\n\n 	Examines considerations for dev
 eloping and implementing a privacy program\, including the position of the
  privacy function within the organization\, role of the\nDPO\, program sco
 pe and charter\, privacy strategy\, support and ongoing involvement of key
  functions and privacy frameworks.\n\nModule 3: Applicable Laws and Regula
 tions\n\n\n 	Discusses the regulatory environment\, common elements across
  jurisdictions and strategies for aligning compliance with organizational 
 strategy.\n\nModule 4: Data Assessments\n\n\n 	Relates practical processes
  for creating and using data inventories/ maps\, gap analyses\, privacy as
 sessments\, privacy impact assessments/data protection impact\nassessments
  and vendor assessments.\n\nModule 5: Policies\n\n\n 	Describes common typ
 es of privacy-related policies\, outlines components and offers strategies
  for implementation.\n\nModule 6: Data Subject Rights\n\n\n 	Discusses ope
 rational considerations for communicating and ensuring data subject rights
 \, including privacy notice\, choice and consent\, access and rectificatio
 n\, data\nportability\, and erasure.\n\nModule 7 : Training and Awareness\
 n\n 	Outlines strategies for developing and implementing privacy training 
 and awareness programs.\n\n\nModule 8 : Protecting Personal Information\n\
 n\n 	Examines a holistic approach to protecting personal information throu
 gh privacy by design.\n\nModule 9 : Data Breach Incident Plans\n\n\n 	Prov
 ides guidance on planning for and responding to a data security incident o
 r breach.\n\nModule 10 : Monitoring and Auditing Program Performance\n\n\n
  	Relates common practices for monitoring\, measuring\, analyzing and audi
 ting privacy program performance.\n\nTraining Info:\n\nLanguage: Conducte
 d in Thai Language\nDuration: 2 Days\nDate: Feb 26 - 27\, 2026\nVenue: A
 Cinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, 
 (Worklab) \, Rama 4 Rd.\nTraining Fees: 49\,900 (Exam Included)\nTel : 02 
 670 8980-3 ext. 321-323\nE-mail: training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/10/CIPM_Seal_Final_CMYK-01-1.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:203@acinfotec.com
DTSTART:20260302T023000Z
DTEND:20260302T093000Z
DTSTAMP:20260107T085328Z
URL:https://www.acinfotec.com/training-event/it-risk-management-based-on-i
 so-27005-and-iso-31000/
SUMMARY:IT Risk Management Based on ISO 27005 and ISO 31000
DESCRIPTION:About this course\nDuring this 1-day course\, you will learn a 
 variety of topics regarding IT risks. Risks related to information systems
  and computer networks require different approaches to deal with and also 
 new types of controls and countermeasures. This course covers various topi
 cs that IT professionals need to know in order to prepare themselves again
 st various kinds of risks related to information systems. This course will
  provide knowledge for audience to understand IT risks and how to manage r
 isks based on global risk management standards such as ISO27005 and ISO310
 00 so that they will be prompted and defended against possible risks and a
 ttacks.\nCourse Benefits\n\n 	Gain understanding of IT risks\n 	Learn and 
 understand how to manage risks based on ISO 27005 and ISO 31000 standards\
 n 	Enhance skills required for implementing security controls against iden
 tified risks\n 	Be prompted to apply knowledge given from the course to re
 al-world scenarios\n\nWho should attend?\n\n 	IT Professionals\n 	Informat
 ion security professionals\n 	Risk management professionals\n 	Anyone who 
 is responsible for and interested in managing IT risks\n\nCourse Contents\
 n\n 	Fundamental of IT risks in relations with other types of risks\n 	Var
 ious types of IT risks\, e.g. systems\, networks\, applications\, web appl
 ications\, cloud computing\, etc.\n 	Risk management framework based on IS
 O 27005\n 	Risk identification\, evaluation\, treatment\, acceptance\, com
 munications and surveillance\, Risk assessment methodologies\n 	Risk manag
 ement framework based on ISO 31000\n 	Risk identification\, evaluation\, t
 reatment\, acceptance\, communications and surveillance\, Risk assessment 
 methodologies\n 	Risk management case studies\n\n&nbsp\;\n\nTraining Info\
 n\nDuration:  1 Day\nDate:  Mar 2\, 2026\nTime:  9.30 am. – 16.30 p
 m.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lu
 mphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 9\,000 Baht (ex.vat
 7%)\nTel.02 670 8980-4 ext.321-323\nE-mail.training@acinfotec.com\n\n&nbsp
 \;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-3.png
CATEGORIES:Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:322@acinfotec.com
DTSTART:20260302T023000Z
DTEND:20260302T093000Z
DTSTAMP:20260107T085320Z
URL:https://www.acinfotec.com/training-event/computer-forensics-awareness-
 and-incident-response-thai-2/
SUMMARY:Computer Forensics Awareness and Incident Response (Thai)
DESCRIPTION:About this course\nCompanies are faced with cyber security thre
 ats on a daily basis. Many are external threats but many of the threats co
 me from within the networks resulting in both financial loss and loss of c
 onfidential company data. During an investigation\, IT staff will often be
  asked to collect electronic data. It is vital that any electronic data t
 hat may be used in future legal proceedings is collected following corre
 ct forensic procedures to maintain the integrity of the data and to ensur
 e the evidence can be used in court.\n\nWho Should attend?\nIT professiona
 ls who may be required to collect and preserve electronic data that could
  later be used as evidence in legal proceedings. IT managers who may be 
 responsible for overseeing the collection and preservation of electronic d
 ata.\nAim of the Course: \n\n\nThis is a one day course aimed at IT staff
  that may have to deal with cyber security threats. The candidate will be 
 trained in basic forensic procedures and how to respond to cyber security 
 threats.\nCourse Contents\n\nThe course will cover the following subjects:
 \n\n\n 	Introduction\n 	Cyber Threats 2020\n 	Economic Crime Thailand\n 	D
 efine Digital Forensics\n 	Legal Consideration\n 	Evidence Handling &amp\;
  Chain of Custody\n 	Exercise 1: Identifying Sources of Electronic Devices
 \n 	Why is Digital Forensics Important to your Organization?\n 	Good Pract
 ice Guidelines for Digital Evidence\n 	The Four Principles of Computer Bas
 ed Evidence\n 	Forensic Acquisitions\n 	Forensic Acquisition Tools\n 	Exer
 cise 2: Creating a Forensic Image\n 	Exercise 3 – Creating a Custom Cont
 ent Forensic Image\n 	Exercise 4 – Mounting a Forensic Image\n 	Hash Val
 ues (Digital Fingerprint)\n 	Exercise 5 – Identifying Hash Values of Fil
 es\n 	Persistent Vs Volatile Data\n 	Dealing with Live Systems\n 	Dealing 
 with Servers\n 	Exercise 6 – Capturing Volatile Data\n 	Capturing RAM Me
 mory\n 	Exercise 7 – Capturing RAM Memory\n 	How to Perform Bulk Forensi
 c Imaging?\n 	Exercise 8 – Creating a Easy2Boot Bootable hard drive\n 	P
 reparing an Incident Response Plan\n\nTraining Info\n\nDuration:  1 Day\
 nDate:  Mar 2\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfote
 c Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workla
 b) \, Rama 4 Rd.\nTraining Fees: 9\,950 Baht (ex.vat7%)\nTel. 02 670 8980-
 4 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/01/image004.png
CATEGORIES:Digital Forensics,ICMS
END:VEVENT
BEGIN:VEVENT
UID:973@acinfotec.com
DTSTART:20260304T023000Z
DTEND:20260306T093000Z
DTSTAMP:20260107T085334Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-27035-
 lead-incident-manager-exam-included-3/
SUMMARY:PECB Certified ISO/IEC 27035 Lead Incident Manager (Exam Included)
DESCRIPTION:Course Overview\nIn this five-day intensive course participants
  develop the competence to master a model for implementing an incident man
 agement process throughout their organization using the ISO/IEC 27035 stan
 dard as a reference framework. Based on practical exercises\, participants
  acquire the necessary knowledge and skills to manage information security
  incidents in time by being familiar with their life cycle. During this tr
 aining\, we will present the ISO/IEC 27035 information security incident m
 anagement standard\, a process model for designing and developing an organ
 izational incident management process\, and how companies may use the stan
 dard. This training is also fully compatible with ISO/IEC 27035 which supp
 orts ISO/IEC 27001 by providing guidance for incident management.\nWho Sho
 uld attend?\n\n 	Incident managers\n 	Business Process Owners\n 	Informati
 on Security Risk Managers\n 	Regulatory Compliance Managers\n 	Members of 
 Incident Response Team\n 	Persons responsible for information security or 
 conformity within an organization\n\nCourse Objectives\nTo understand the 
 concepts\, approaches\, methods\, tools and techniques allowing an effecti
 ve information security incident management according to ISO/IEC 27035\n\n
  	To understand\, interpret and provide guidance on how to implement and m
 anage incident management processes based on best practices of ISO/IEC 270
 35 and other relevant standards\n 	To acquire the competence to implement\
 , maintain and manage an ongoing information security incident management 
 program according to ISO/IEC 27035\n 	To acquire the competence to effecti
 vely advise organizations on the best practices in information security ma
 nagement\n\nCourse Contents\nDay 1: Introduction\, incident management fra
 mework according to ISO/IEC 27035\n\n 	Concepts and definitions related to
  information security and incident management\n 	Incident management stand
 ards\, and best practices\n 	Choosing an incident management framework\n 	
 Understanding an organization and its context\n\nDay 2 : Planning the impl
 ementation of an Organizational Incident Management Process based on ISO/I
 EC 27035\n\n 	Incident management strategy and project management\n 	Plann
 ing the implementation of an effective incident management process\n 	Prel
 iminary analysis and selection of an approach and methodology\n 	Design an
 d document an incident detection\, reporting and management process\n 	Def
 ining roles and responsibilities in the context of the implementation and 
 management of an Incident Management Process\n\nDay 3: Implementing an Inc
 ident Management Process\n\n 	Define the document and record management pr
 ocesses\n 	Incident Management policies &amp\; procedures\n 	Implementatio
 n of security processes and controls related to incident management\n 	Cha
 nge management process\n 	Incident analysis processes\n 	Effective communi
 cation and the communication strategies\n 	Establish the Information Secur
 ity Incident Response Team\n\nDay 4: Monitoring\, measuring and improving 
 an Incident Management Process\n\n 	Monitoring and evaluating the effectiv
 eness of incident management process in operations\n 	Development of metri
 cs\, performance indicators and dashboards\n 	Management reviews\n 	Implem
 entation of a continual improvement program\n 	Develop and propose the bes
 t corrective and preventive action plans\n\nDay 5: Certification Exam\nTra
 ining Info\nDuration:  5 Days\nDate:  Mar 4 - 6\, 2026\nTime:  9.30 am
 . – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Ce
 ntre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,50
 0 Baht (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@acinfo
 tec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:257@acinfotec.com
DTSTART:20260304T023000Z
DTEND:20260306T093000Z
DTSTAMP:20260107T085340Z
URL:https://www.acinfotec.com/training-event/pecb-certified-isoiec-27035-l
 ead-incident-manager-2/
SUMMARY:PECB Certified ISO/IEC 27035 Lead Incident Manager (Exam Included)
DESCRIPTION:Course Overview\nIn this five-day intensive course participants
  develop the competence to master a model for implementing an incident man
 agement process throughout their organization using the ISO/IEC 27035 stan
 dard as a reference framework. Based on practical exercises\, participants
  acquire the necessary knowledge and skills to manage information security
  incidents in time by being familiar with their life cycle. During this tr
 aining\, we will present the ISO/IEC 27035 information security incident m
 anagement standard\, a process model for designing and developing an organ
 izational incident management process\, and how companies may use the stan
 dard. This training is also fully compatible with ISO/IEC 27035 which supp
 orts ISO/IEC 27001 by providing guidance for incident management.\nWho Sho
 uld attend?\n\n 	Incident managers\n 	Business Process Owners\n 	Informati
 on Security Risk Managers\n 	Regulatory Compliance Managers\n 	Members of 
 Incident Response Team\n 	Persons responsible for information security or 
 conformity within an organization\n\nCourse Objectives\nTo understand the 
 concepts\, approaches\, methods\, tools and techniques allowing an effecti
 ve information security incident management according to ISO/IEC 27035\n\n
  	To understand\, interpret and provide guidance on how to implement and m
 anage incident management processes based on best practices of ISO/IEC 270
 35 and other relevant standards\n 	To acquire the competence to implement\
 , maintain and manage an ongoing information security incident management 
 program according to ISO/IEC 27035\n 	To acquire the competence to effecti
 vely advise organizations on the best practices in information security ma
 nagement\n\nCourse Contents\nDay 1: Introduction\, incident management fra
 mework according to ISO/IEC 27035\n\n 	Concepts and definitions related to
  information security and incident management\n 	Incident management stand
 ards\, and best practices\n 	Choosing an incident management framework\n 	
 Understanding an organization and its context\n\nDay 2 : Planning the impl
 ementation of an Organizational Incident Management Process based on ISO/I
 EC 27035\n\n 	Incident management strategy and project management\n 	Plann
 ing the implementation of an effective incident management process\n 	Prel
 iminary analysis and selection of an approach and methodology\n 	Design an
 d document an incident detection\, reporting and management process\n 	Def
 ining roles and responsibilities in the context of the implementation and 
 management of an Incident Management Process\n\nDay 3: Implementing an Inc
 ident Management Process\n\n 	Define the document and record management pr
 ocesses\n 	Incident Management policies &amp\; procedures\n 	Implementatio
 n of security processes and controls related to incident management\n 	Cha
 nge management process\n 	Incident analysis processes\n 	Effective communi
 cation and the communication strategies\n 	Establish the Information Secur
 ity Incident Response Team\n\nDay 4: Monitoring\, measuring and improving 
 an Incident Management Process\n\n 	Monitoring and evaluating the effectiv
 eness of incident management process in operations\n 	Development of metri
 cs\, performance indicators and dashboards\n 	Management reviews\n 	Implem
 entation of a continual improvement program\n 	Develop and propose the bes
 t corrective and preventive action plans\n\nDay 5: Certification Exam\nTra
 ining Info\nDuration:  5 Days\nDate:  Mar 4 - 6\, 2026\nTime:  9.30 am
 . – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Ce
 ntre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,50
 0 Baht (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@acinfo
 tec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:552@acinfotec.com
DTSTART:20260304T023000Z
DTEND:20260306T093000Z
DTSTAMP:20260210T042632Z
URL:https://www.acinfotec.com/training-event/ec-council-certified-incident
 -handler-ecihv2-thai-exam-included-2/
SUMMARY:EC-Council Certified Incident Handler (ECIHv3) (Exam Included)
DESCRIPTION:About this course\nEC-Council's Certified Incident Handler prog
 ram equips students with the knowledge\, skills\, and abilities to effecti
 vely prepare for\, deal with\, and eradicate threats and threat actors in 
 an incident. This program provides the entire process of incident handling
  and response and hands-on labs that teach the tactical procedures and tec
 hniques required to effectively plan\, record\, triage\, notify and contai
 n. Students will learn the handling of various types of incidents\, risk a
 ssessment methodologies\, as well as laws and policies related to incident
  handling. After attending the course\, students will be able to create IH
 &amp\;R policies and deal with different types of security incidents such 
 as malware\, email security\, network security\, web application security\
 , cloud security\, and insider threat-related incidents.\n\nThe E|CIH (EC-
 Council Certified Incident Handler) also covers post incident activities s
 uch as containment\, eradication\, evidence gathering and forensic analysi
 s\, leading to prosecution or countermeasures to ensure the incident is no
 t repeated. The E|CIH is a method-driven course that provides a holistic a
 pproach covering vast concepts related to organizational IH&amp\;R\, from 
 preparing/planning the incident handling response process to recovering or
 ganizational assets from the impact of security incidents. These concepts 
 are essential for handling and responding to security incidents to protect
  organizations from future threats or attacks.\n\nWith over 95 advanced la
 bs\, 800 tools covered\, and exposure to incident handling activities on m
 any different operating systems\, E|CIH provides a well-rounded\, but tact
 ical approach to planning for and dealing with cyber incidents. The E|CIH 
 program addresses all stages involved in the IH&amp\;R process\, and this 
 attention toward a realistic and futuristic approach makes E|CIH one of th
 e most comprehensive IH&amp\;R-related certifications in the market today\
 nWho should attend?\n\n 	Incident Handler\n 	Incident Responder\n 	Inciden
 t Response Consultant/Associate /Analyst/Engineer/Specialist/ Expert/Manag
 er\n 	CSIRT Analyst/Engineer/Manager\n 	Information Security Associate/Ana
 lyst/Engineer/Specialist/Manager\n 	Cyber Defense Security Consultant/Asso
 ciate/Analyst\n 	IT Security Operations Center Analyst (SOC Analyst/Engine
 er)\n 	Cyber Forensic Investigator/Consultant/Analyst/Manager\n 	Digital F
 orensic Analyst\n 	Cyber Risk Vulnerability Analyst/Manager\n 	Cyber Intel
 ligence Analyst and Cyber Security Threat Analyst/Specialist\n 	Cyber Secu
 rity Incident Response Team Lead\n 	Penetration Tester\n\n\n\n\n\n\nLearn 
 the 9 Stages of Incident Handling &amp\; Response (IH &amp\; R) Process\n\
 n 	Planning\n 	Recording &amp\; Assignment\n 	Triage\n 	Notification\n 	Co
 ntainment\n 	Post Incident Activities\n 	Recovery\n 	Eradication\n 	Eviden
 ce Gathering &amp\; Forensics Analysis\n\nKey Features &amp\; Critical Com
 ponents of E|CIH Program\n\n 	\n1600+ Pages of the comprehensive student m
 anual\n\n 	\n800+ Incident handling and response tools\n\n 	\n780+ Illustr
 ated instructor slides\n\n 	\n125 Incident handling templates\, checklists
 \, and toolkits\n\n 	\n95 Labs environment simulates a real-time environme
 nt (Covered in 22 Scenario-based Labs)\n\n 	\n10+ Incident handling playbo
 oks and runbooks\n\n 	\n100%  Compliance to NICE 2.0 Framework\n\n 	\n100
 % compliance with CREST CCIM\n\n\nBased on a Comprehensive Industry-wide J
 ob Task Analysis (JTA)\nStructured approach for performing incident handli
 ng and response process.\nFocus on developing skills in handling different
  types of cybersecurity incidents\n\n\n\n\n\nCourse Contents\n\n 	Module 0
 1: Introduction to Incident Handling and Response\n 	Module 02: Incident H
 andling and Response Process\n 	Module 03: First Response\n 	Module 04: Ha
 ndling and Responding to Malware Incidents\n 	Module 05: Handling and Resp
 onding to Email Security Incidents\n 	Module 06: Handling and Responding t
 o Network Security Incidents\n 	Module 07: Handling and Responding to Web 
 Application Security Incidents\n 	Module 08: Handling and Responding to Cl
 oud Security Incidents\n 	Module 09: Handling and Responding to Insider Th
 reats\n 	Module 10: Handling and responding to Endpoint Security Incidents
  (New!!)\n\n\nTop: Latest Templates\, Checklists\, and Toolkits:\n\n• Di
 gital Forensics eadiness Policy Document Template\n• Incident Handling a
 nd Response Plan Template\n• Incident Handling and Response Policy and P
 rocedure Document Template\n• Incident Handler Checklist\n• Incident R
 esponder Toolkit Requirements\n• Forensics Investigative Analysis Report
  Recognition / Endorsement / Mapping\nTraining Info\nDuration:  3 Days\nD
 ate:  Mar 4 - 6\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfo
 tec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Work
 lab) \, Rama 4 Rd.\nTraining Fees: 45\,000 Baht (ex.vat7%)\nTel. 02 670 8
 980-4 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nwww.eccouncil.com\
 n\n&nbsp\;\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/hc135990835053.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:897@acinfotec.com
DTSTART:20260305T023000Z
DTEND:20260306T093000Z
DTSTAMP:20260107T085356Z
URL:https://www.acinfotec.com/training-event/digital-governance-for-se-am-
 iso-38500-cobit-2019-new-3/
SUMMARY:Digital Governance for SE-AM : ISO 38500 & COBIT 2019 (New!!)
DESCRIPTION:Digital Governance for SE-AM: ISO 38500 &amp\; COBIT 2019\nเ
 กี่ยวกับหลักสูตร\nการกำกับ
 ดูแลที่ดี เป็นหลักเกณฑ์ใน
 การขับเคลื่อนให้ฝ่ายจัดก
 ารสามารถปฏิบัติงานให้บรร
 ลุผลสำเร็จตามกรอบนโยบายภ
 ารกิจหน้าที่ ยุทธศาสตร์ หร
 ือแผนงาน กำหนดโดยการดําเน
 ินงานดังกล่าวต้องสามารถส
 ะท้อนได้ทั้งมิติกระบวนกา
 รทำงานที่มีประสิทธิภาพ มี
 คุณภาพ และได้มาตรฐาน รวมถึ
 งต้องสอดคล้องตามแนวทาง แล
 ะประยุกต์ใช้กับ SE-AM ด้วย ร่ว
 มกับมิติด้านผลลัพธ์ที่เป
 ็นเลิศที่สามารถสร้างการเ
 ติบโตอย่างยั่งยืนให้แก่ร
 ัฐวิสาหกิจ ควบคู่กับการสร
 ้างผลกระทบเชิงบวกต่อสังค
 ม และสิ่งแวดล้อมได้อย่างส
 มดุล ซึ่งการจะดำเนินการให
 ้เกิดความครบถ้วนตามหลักก
 ารข้างต้น มีความจําเป็นที
 ่องค์กรต้องสามารถประยุกต
 ์ใช้หลักการบริหารจัดการน
 วัตกรรม (Innovation Management) ร่วมกับหล
 ักมาตรฐานการพัฒนาความยั่
 งยืนในระดับองค์กร (Organizational Sustai
 nable Development) ได้อย่างมีประสิทธิ
 ผลในเชิงยุทธศาสตร์ ดังนั้
 น การกำกับดูแลด้านดิจิทัล 
 หรือธรรมภิบาลด้านดิจิทัล (
 Digital Governance) จะช่วยให้การดำเนิน
 งานบนระบบดิจิทัลของหลาย ๆ 
 องค์กรในปัจจุบัน มีความโป
 ร่งใส เป็นระบบ สามารถตรวจส
 อบย้อนหลัง รวมถึงสามารถสร
 ้างความน่าเชื่อถือของระบ
 บดิจิทัลขององค์กร สอดรับก
 ับกฎหมาย ระเบียบ ข้อบังคับ
  มาตรฐานระดับสากล แนวปฏิบั
 ติที่ดีที่เกี่ยวข้อง\nวัตถ
 ุประสงค์\n\n 	เพื่อให้ผู้เข้
 าอบรมได้เข้าใจถึงความสำค
 ัญ และวัตถุประสงค์ของการก
 ำกับดูแลด้านดิจิทัลที่เพ
 ียงพอและสอดรับกับกฎหมาย ร
 ะเบียบ ข้อบังคับ มาตรฐานระ
 ดับสากล แนวปฏิบัติที่ดีที
 ่เกี่ยวข้อง\n 	เพื่อให้ผู้เ
 ข้าอบรมได้เรียนรู้แนวทาง
 การนำ State Enterprise Assessment Model (SE-AM)\, ISO 38500 แ
 ละ COBIT 2019 ตลอดจนกฎหมาย ระเบีย
 บ ข้อบังคับ มาตรฐานระดับสา
 กล แนวปฏิบัติที่ดีที่เกี่
 ยวข้องมาประยุกต์ใช้ในองค
 ์กรอย่างมีประสิทธิภาพ\n 	เพ
 ื่อให้ผู้เข้าอบรมมีแนวทา
 งการดําเนินงานด้านพัฒนาค
 วามยั่งยืนที่ชัดเจน รวมถึ
 งมีองค์ประกอบ และสาระสำคั
 ญ/กรอบการดําเนินงานตามมาต
 รฐาน/แนวปฏิบัติที่ดีที่เก
 ี่ยวกับการกำกับดูแลด้านด
 ิจิทัลที่เป็นที่ยอมรับโด
 ยทั่วไx\n\nหลักสูตรนี้เหมาะก
 ับใคร\n\n 	ผู้บริหารระดับสูง (
 Executives\, Board of Directors)\n 	ผู้บริหารสาย
 งาน IT / Digital Transformation\n 	Enterprise Architect / IT Governa
 nce / Risk &amp\; Compliance Officer\n 	ที่ปรึกษา (Consu
 ltants) และผู้วางกลยุทธ์ด้านดิ
 จิทัล\n\nรายละเอียดหลักสูตร\
 n\n 	State Enterprise Assessment Model (SE-AM)\n\n 	Corporate Governance &
 amp\; Leadership\n 	Strategic Planning\n 	Risk Management &amp\; Internal 
 Control\n 	Stakeholder and Customer Management\n 	Digital Technology\n 	Hu
 man Capital Management\n 	Knowledge Management &amp\; Innovation Managemen
 t\n 	Internal Audit\n\n\n 	SE-AM: Digital Governance and Roadmap\n 	ISO 38
 500 and other related standards\n 	ISO 38500 SE-AM\n 	6 principles\n 	Esta
 blish responsibilities\n 	Plan to best support the organization\n 	Make ac
 quisitions for valid reasons\n 	Ensure necessary levels of performance\n 	
 Ensure conformance with rules\n 	Ensure respect for human factors\n 	Enter
 prise Architecture (EA)\n 	Model for Corporate Governance of ICT\n 	COBIT 
 2019 Principles\n 	COBIT 2019: 40 Governance Objectives\n 	Workshop เร
 ื่อง COBIT 2019 Implementation\n 	Applying Specific COBIT 2019 for
  ISO 38500\n 	Applying Specific COBIT 2019 for SE-AM\n\nTraining info:\nDu
 ration:  2 Days\nDate: Mar 5-6\, 2026\nTime:  9.30 am. – 16.30 pm.\nV
 enue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphin
 i Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 21\,900 Baht (ex.vat7%)\
 nFor Onsite training: Please Call\nTel. 02 670 8980-4 ext.321-323\nE-mail
 .training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/05/Yellow-and-Black-Modern-Medical-LinkedIn-Article-Cover-Image.png
CATEGORIES:Data Governance,Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:400@acinfotec.com
DTSTART:20260305T023000Z
DTEND:20260306T093000Z
DTSTAMP:20260107T085348Z
URL:https://www.acinfotec.com/training-event/pcip-pci-professional-new/
SUMMARY:PCIP (PCI Professional) (Exam Excluded)
DESCRIPTION:\nAbout this course\nThis course will cover PCI DSS in detail i
 ncluding: Scoping &amp\; Segmentation\, 12 main requirements\, appendix A1
 -A3\, and compensating control. Overview of PA-DSS\, PCI PTS\, P2PE will a
 lso be provided. Furthermore\, other core knowledge including: basic of pa
 yment card transaction\, determining assessment type and level\, SAQ selec
 tion and description\, and Attestation of Compliance\, Report of Complianc
 e\, Certification of Compliance will also be covered. The course is design
 ed to prepare attendee to be ready for PCIP examination.\n Who Should att
 end?\n\n 	Prospect PCI DSS Auditor/Assessor\n 	PCI DSS Project Manager / C
 oordinator / Implementer / Technical Leader\n 	Security/Technology\, Compl
 iance/Risk/Governance\n 	Audit/Finance\n 	e-Commerce\n 	Product Developmen
 t\, Marketing or Sales (develop or sell payments-oriented products)\n 	En
 thusiast pursuing PCIP certification examination\n\nHow to Prepare?\nPrior
  to taking the PCIP training and/or exam\, candidates should familiarize t
 hemselves with information regarding the PCI Standards and supporting docu
 ments. These materials along with the current version of the PCI DSS may b
 e found in the Document Library.\nCourse Contents\n\n 	Overview of PCIP qu
 alification\n 	Introduction to PCI DSS\n 	Introduction to other PCI SSC st
 andards: PA-DSS\, PCI PTS\, P2PE\n 	Basic of Payment Card Transaction\n 	D
 etermining Assessment Type and Level\n 	Scoping and Segmentation\n 	PCI DS
 S: 12 main requirements\n 	PCI DSS: Appendix A1-A3\n 	Compensating Control
 \n 	Self-Assessment Questionnaire (SAQ)\n 	AoC\, RoC\, CoC Explanation\n 	
 Practice Question\n\nHow to become a PCIP?\nThe qualification exam is admi
 nistered at a Pearson VUE Test Center. You will have 90 minutes to complet
 e 60 multiple-choice questions. No electronic devices may be used during t
 he closed-book exam.\nScheduling the exam\n\n 	All scheduling/rescheduling
  is done via Pearson VUE’s online scheduling system – you select the t
 est location\, date and time most convenient for you.\n 	You will receive 
 an email containing Instructions and a voucher to schedule your exam withi
 n 2-3 business days of payment processing.\n\n\n 	If you choose the Exam-o
 nly or instructor-led class option\, the exam must be completed within a 3
 0 day test window.\n 	If you choose the eLearning Course\, the exam must b
 e completed within a 90 days test window.\n\nExam Results and Next Steps\n
 \n 	Pass/Fail results are provided immediately following the conclusion of
  your exam.\n 	Passing candidates will receive a Certificate of Qualificat
 ion via email within 2-3 business days.\n 	If a passing score is not achie
 ved\, a total of three (3) attempts are permitted (a retake fee will apply
 ). After three failed attempts a six month waiting period must be observed
  before you can re-apply to the program as a new candidate.\n\nTraining In
 fo\nDuration:  2 Days\nDate:  Mar 5 - 6\, 2026\nTime:  9.30 am. – 1
 6.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Po
 int Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 32\,000 Baht 
 (ex.vat7%)\nTel. 02 670 8980-4 ext.321-323\nE-mail.training@acinfotec.com
 \n\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/02/PCI.jpg
CATEGORIES:PCI
END:VEVENT
BEGIN:VEVENT
UID:240@acinfotec.com
DTSTART:20260309T023000Z
DTEND:20260313T093000Z
DTSTAMP:20260107T085449Z
URL:https://www.acinfotec.com/training-event/irca-iso-270012013-isms-lead-
 auditor-2/
SUMMARY:IRCA ISO 27001:2013 ISMS Lead Auditor
DESCRIPTION:About this course\nISO/IEC 27001:2013 – Information security 
 management system lead auditor teaches students the fundamentals of auditi
 ng information security management systems to ISO/IEC 27001. This five day
  intensive course trains students on how to conduct audits for certificati
 on bodies and facilitate the ISO/IEC 27001 registration process.\n\nThe au
 diting exercises and lectures are based on ISO 19011:2011\, “Guidelines 
 for Quality and/or Environmental Management Systems Auditing.” The cours
 e is designed specifically for those people who wish to conduct external a
 ssessments or internal audits to ISO/IEC 27001\, although students will al
 so gain the knowledge and understanding necessary to give practical help a
 nd information to other individuals and organizations working toward confo
 rmance to the standard.\nPrerequisites\n\n 	A prior knowledge of the requi
 rements of ISO 27001 would be beneficial.\n\nLearning Objective\n\n 	Revie
 w the requirements of ISO/IEC 27001\n 	Understand the relationship between
  ISO/IEC 27001 and ISO/IEC 27002\n 	Learn how to assess security threats a
 nd vulnerabilities\n 	Understand security controls and countermeasures\n 	
 Understand the roles and responsibilities of the auditor\n 	Learn how to\,
  plan\, execute\, report\, and follow-up on an information security manage
 ment system audit\n\nCourse Contents\nDay 1 :\n\no  Course Introduction\n
 \n– Housekeeping\n\n– Course and learner objectives\n\n– Course stru
 cture and methods\n\n– Delegate assessment\n\no  What is an Information
  Security Management System?\n\n– Information security\n\n– Management
  systems\n\n– Purpose and benefits of ISO 27001\n\n– Related standards
 \n\no  Process Approach\n\n– PDCA model\n\n– Process model\n\no  Ove
 rview of ISO 27001 contents\n\no  ISO 27001 Mandatory clauses 4 – 8\n\n
 Day 2 :\n\no  Course Recap day 1. Questions and Answers\n\no  Controls\n
 \no  Overview of the audit process\n\no  Auditing the SOA\n\no  Audit a
 nd Auditors\n\n– Definitions\n\n– 1st\, 2nd and 3rd party audits\n\n
 – Roles and responsibilities of auditors and lead auditors\n\n– Skills
  and characteristics of effective auditors\n\no  Audit Planning\n\n– In
 formation needed to plan the audit\, and things to consider\n\n– Prelimi
 nary visits\n\n– Preparation of an audit plan\n\no  Audit communication
 s and meetings\n\n– Good practice for communication during the audit\n\n
 – Formal meetings\n\n– Opening meeting – what to cover and how\n\no
   Checklists\n\n– Benefits and drawbacks\n\n– Content – what to inc
 lude\n\n– Developing a checklist for a specific audit\n\nDay 3 :\n\no  
 Process Audits\n\no  Case studies\n\no  Conducting the audit\n\n– inte
 rviewing\n\n– sampling\n\n– note taking\n\n– interacting with the au
 ditee\n\n– who’s involved and general points\n\no  Nonconformities\n\
 n– definition of nonconformity\n\n– linking to requirements of ISO 270
 01\n\n– grading nonconformity reports\n\n– structure and content of no
 nconformity reports\n\nDay 4 :\n\no  Case studies\n\n– including interv
 iewing.\n\n– developing and following audit trails\n\n– identifying no
 n conformities\n\no  Specimen Examination\n\n– Review of answers\n\n–
  Layout and marking scheme of the papers\n\no  Closing Meeting\n\n– Out
 comes\n\n– Content\n\n– Identifying possible issues and how to prevent
  or deal with these\n\no  Corrective Actions\n\n– Corrective action pro
 cess\n\n– Evaluating corrective actions\n\no  Reporting the audit\n\n
 – Purpose and content of the written audit report\n\no  Next steps\n\n
 – action planning\n\n– further development\n\n– auditor registration
 \n\nDay 5 :\n\no  Course Evaluations\n\no  Examination Rules\n\no  Writ
 ten Examination\n\no  End of the Course\nTraining Info\nDuration:  5 Da
 ys\nDate:  Mar 9-13\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  AC
 infotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (
 Worklab) \, Rama 4 Rd.\nTraining Fees: 38\,000 Baht (ex.vat7%)\nTel. 02 67
 0 8980-3 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/irca_logo-e1441254509693.jpg
CATEGORIES:IRCA (Official IRCA course)
END:VEVENT
BEGIN:VEVENT
UID:536@acinfotec.com
DTSTART:20260309T023000Z
DTEND:20260313T093000Z
DTSTAMP:20260107T085408Z
URL:https://www.acinfotec.com/training-event/cissp-exam-preparation-exam-e
 xcluded-6/
SUMMARY:CISSP Exam Preparation (Exam Excluded)
DESCRIPTION:\nAbout This Course\nThe CISSP has clearly emerged as THE key c
 ertification for security professionals. In fact\, in an informal survey o
 f information security jobs on a major employment Web site\, over 70 perce
 nt of the positions required CISSP certification! Corporations are demandi
 ng experienced information security professionals with the certifications 
 to prove it to protect their information and assets.\n\nThe CISSP Prep cla
 ss was developed to meet current demands and the growing needs of the comp
 uter industry. This class provides the student with the level of knowledge
  needed as part of the (ISC)2 certification requirements for the Certified
  Information System Security Professional (CISSP) Certification. This cert
 ification is rapidly becoming a requirement for employment with security t
 asks. Students gain a solid background on security concerns\, communicatio
 ns\, infrastructure\, basic cryptography\, and operational\nWho should att
 end?\n\nThe CISSP is ideal for experienced security practitioners\, manage
 rs and executives interested in proving their knowledge across a wide arra
 y of security practices and principles\, including those in the following 
 positions:\n\n 	Security Manager\n 	Security Auditor\n 	Security Architect
 \n 	Security Consultant\n 	Network Architect\n 	Chief Information Security
  Officer\n 	Chief Information Officer\n 	Director of Security\n 	IT Direct
 or/Manager\n 	Security Systems Engineer\n 	Security Analyst\n\nCourse Cont
 ents\n\nThe CISSP exam evaluates your expertise across eight security doma
 ins. Think of the domains as topics you need to master based on your profe
 ssional experience and education.\n\n\nDomain 1 : Security and Risk Manage
 ment (Security\, Risk\,Compliance\, Law\, Regulations\, and Business Conti
 nuity)\n\n 	Confidentiality\, integrity\, and availability concepts\n 	Sec
 urity governance principles\n 	Compliance\n 	Legal and regulatory issues\n
  	Professional ethics\n 	Security policies\, standards\, procedures and gu
 idelines\n 	Business continuity requirements\n 	Personnel security policie
 s\n 	Risk management concepts\n 	Threat modeling\n 	Risk considerations\n 
 	Security education\, training\, and awareness\n\nDomain 2 : Asset Securit
 y (Protecting Security of Assets)\n\n 	Information and asset classificatio
 n\n 	Ownership (e.g. data owners\, system owners)\n 	Protect privacy\n 	Ap
 propriate retention\n 	Data security controls\n 	Handling requirements (e.
 g. markings\, labels\,storage)\n\nDomain 3 : Security Engineering (Enginee
 ring and Management of Security)\n\n 	Engineering processes using secure d
 esign principles\n 	Security models fundamental concepts\n 	Security evalu
 ation models\n 	Security capabilities of information systems\n 	Security a
 rchitectures\, designs\, and solution elements vulnerabilities\n 	Web-base
 d systems vulnerabilities\n 	Mobile systems vulnerabilities\n 	Embedded de
 vices and cyber-physical systems vulnerabilities\n 	Cryptography\n 	Site a
 nd facility design secure principles\n 	Physical security\n\nDomain 4 : Co
 mmunication and Network Security (Designing and Protecting Network Securit
 y)\n\n 	Secure network architecture design (e.g. IP &amp\; non-IP protocol
 s\, segmentation)\n 	Secure network components\n 	Secure communication cha
 nnels\n 	Network attacks\n\nDomain 5 : Identity and Access Management (Con
 trolling Access and Managing Identity)\n\n 	Physical and logical assets co
 ntrol\n 	Identification and authentication of people and devices\n 	Identi
 ty as a service (e.g. cloud identity)\n 	Third-par ty identity services (e
 .g. on-premise)\n 	Access control attacks\n 	Identity and access provision
 ing lifecycle (e.g. provisioning review)\n\nDomain 6 : Security Assessment
  and Testing (Designing\, Performing\, and Analyzing Security Testing)\n\n
  	Assessment and test strategies\n 	Security process data (e.g. management
  and operational controls)\n 	Security control testing\n 	Test outputs (e.
 g. automated\, manual)\n 	Security architectures vulnerabilities\n\nDomain
  7 : Security Operations (Foundational Concepts\, Investigations\, Inciden
 t Management\, and Disaster Recovery)\n\n 	Investigations support and requ
 irements\n 	Logging and monitoring activities\n 	Provisioning of resources
 \n 	Foundational security operations concepts\n 	Resource protection techn
 iques\n 	Incident management\n 	Preventative measures\n 	Patch and vulnera
 bility management\n 	Change management processes\n 	Recovery strategies\n 
 	Disaster recovery processes and plans\n 	Business continuity planning and
  exercises\n 	Physical security\n 	Personnel safety concerns\n\nDomain 8 :
  Software Development Security (Understanding\,Applying\, and Enforcing So
 ftware Security)\n\n 	Security in the software development life cycle\n 	D
 evelopment environment security controls\n 	Software security effectivenes
 s\n 	Acquired software security impact\n\nCISSP Changes To Computerized Ad
 aptive Testing\n(ISC)² has introduced Computerized Adaptive Testing (CAT)
  for all English CISSP exams worldwide. Based on the same exam content out
 line as the linear\, fixed-form exam\, CISSP CAT is a more precise and eff
 icient evaluation of your competency. CISSP CAT enables you to prove your 
 knowledge by answering fewer items and completing the exam in half the tim
 e.\nHow Does it Work?\nEach candidate taking the CISSP CAT exam will start
  with an item that is well below the passing standard. Following a candida
 te’s response to an item\, the scoring algorithm re-estimates the candid
 ate’s ability based on the difficulty of all items presented and answers
  provided. With each additional item answered\, the computer's estimate of
  the candidate’s ability becomes more precise – gathering as much info
 rmation as possible about a candidate’s true ability level more efficien
 tly than traditional\, linear exams.\n\nThis more precise evaluation enabl
 es us to reduce the maximum exam administration time from 6 hours to 3 hou
 rs\, and it reduces the items necessary to accurately assess a candidate
 ’s ability from 250 items on a linear\, fixed-form exam to as little as 
 100 items on the CISSP CAT exam.\n\nThe exam content outline and passing s
 tandard for both versions of the examination are exactly the same. Each ca
 ndidate will be assessed on the same content and must demonstrate the same
  level of competency regardless of the exam format.\n\nCISSP exams in all 
 other languages\, as well as all CISSP concentration exams are delivered a
 s linear\, fixed-form exams.\nTraining Info\nDuration : 5 Days\nDate : Ma
 r 9-13\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Training Center\
 n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\n
 Training Fee : 38\,000 Baht (ex.vat 7%)\nExam Fee : Please call\nTel. 02 6
 70 8980-4 ext.321-323\nEmail. training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-1.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:857@acinfotec.com
DTSTART:20260309T023000Z
DTEND:20260313T093000Z
DTSTAMP:20260107T085434Z
URL:https://www.acinfotec.com/training-event/computer-hacking-forensic-inv
 estigator-chfiv10exam-included/
SUMMARY:Computer Hacking Forensic Investigator (CHFIv11)(Exam Included)
DESCRIPTION:COMPUTER HACKING FORENSIC INVESTIGATOR V11\nBuild Ultimate Inve
 stigative Skills And Organizational Forensic Readiness With Advanced Strat
 egies\nAbout this course\nEC-Council's CHFI program enabled cybersecurity 
 professionals with the knowledge and skills to perform effective digital f
 orensics investigations and accomplish forensic readiness. Master the meth
 odological approach of forensics process\, evidence handling procedures\, 
 chain-of-custody\, acquisition\, preservation\, analysis\, and reporting o
 f digital evidence\, legal procedures to ensure it is admissible in court.
  Build skills beyond tradional hardware and memory forensics and with clou
 d forensics\, mobile and loT\, investigating web application attacks\, and
  malware forensics. CHFI equips you with skills to validate/triage inciden
 ts and guide the incident response teams.\n\nㆍ Build job ready skills on
  immersive 68 forensic labs\n\nㆍ Earn globally recognized and demanded b
 y employers\n\nㆍ Flexible learning options without quitting your current
  jobs\nCourse Benefits\n\n 	Master a methodological forensics framework ap
 proach for performing digital forensics investigation.\n 	Build skills for
  investigating diverse types of digital forensic investigations.\n 	70+ GB
  of craftd evidence files for investigating purposes:\n 	Gain in-depth kno
 wledge in volatie and non-volatile data acquisitin and examinatin of Mac o
 perating systems and also RAM forensics\, Tor forensics.\n 	Become profici
 ent in malware forensics process and malware analysis\, including the late
 st analysis: BlackCat (ALPHV)\n 	Learn social media forensics and wireless
  network forensics.\n 	Learn electron application and web browser forensic
 s.\n 	Gain in-depth skills in mobile forensics analysis.\n 	Learn how to p
 erform digital forensics investigating through Python scripting.\n 	Master
  a unique skill set with C|HFI - the first certifcation to offer dark web
  &amp\; IoT forensics.\n 	Become skilled in forensic methodologies for
  cloud infrastructure (AWS\, Azure and GCP).\n 	Learn techniques such as d
 efeating anti-forensic techniques\, Windows ShellBags\, etc.\n 	Learn the 
 latest digital forensics tools/platforms and frameworks.\n 	40% of trainin
 g time is dedicated to lab training that simulates real-life networks and 
 platforms.\n 	The C|HFI is designed by SMEs and digital forensics practiti
 oners worldwide aftr a rigorous JTA of the job roles involved in the field
  of digital. forensics\, increasing your employability\n\n\n\nWho should a
 ttend?\n\n\n\n\n\n 	Cybersecurity professionals Drive your cybersecurity c
 areer forward with CHFI.\n 	Teams and organizations Turbocharge you teams 
 knowledge with certified.\n 	Government and military CHFI is trusted and h
 ighly valued globally by government departments and defense bodies.\n 	Edu
 cators Create and grow your own cybersecurity courses and programs.\n\n\n\
 n\n\n\n\n\nCourse Content\n\n\n\n\n\n\n\n\n\n 	Computer Forensics in Today
 ’s World\n 	Computer Forensics Investigation Process\n 	Understanding Ha
 rd Disks and File Systems\n 	Data Acquisition and Duplication\n 	Defeating
  Anti-Forensics Techniques\n 	Windows Forensic\n 	Linux and Mac Forensics\
 n 	Network Forensics\n 	Malware Forensics\n 	Investigating Web Attacks\n 	
 Dark Web Forensics\n 	Cloud Forensics\n 	Email and Social Media Forensics\
 n 	Mobile Forensics\n 	IoT Forensics\n\nTraining Info\nDuration : 5 Days\
 nDate : Mar 9 - 13\, 2026\nTime : 9.30-16.30 pm.\nTraining Fee : 50\,000 
 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext. 321 - 323\nEmail. training@acinf
 otec.com\n\n\nwww.eccouncil.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/12/CHFI-certi.jpg
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:491@acinfotec.com
DTSTART:20260311T023000Z
DTEND:20260313T093000Z
DTSTAMP:20260107T085541Z
URL:https://www.acinfotec.com/training-event/ccsk-certificate-of-cloud-sec
 urity-knowledge-exam-excluded-4/
SUMMARY:CCSK PLUS (Lectures + Lab + Exam)
DESCRIPTION:About this course\nThe CCSK Plus builds on the foundation clas
 s with expanded material and offers extensive hands-on activities that re
 inforce classroom instruction. Students engage in a scenario of bringing a
  fictional organization securely into the cloud\, which gives them the opp
 ortunity to apply their knowledge by performing a series of activities tha
 t would be required in a real-world environment. Students will come away r
 eady to earn their Certificate of Cloud Security Knowledge (CCSK).\n\nCou
 rse Benefits\n\n 	Get hands-on experience securing an organization in the 
 cloud.\n 	Prepare to earn the widely recognized standard of expertise for 
 cloud security\, the Certificate of Cloud Security Knowledge (CCSK).\n 	Le
 arn and practice applying the knowledge from all 14 domains of the CSA Sec
 urity Guidance v4.\n\n Who should attend?\n\n 	\n\n 	IT Professionals\n 	
 Developers\n 	IT Operations\n 	Audit/Compliance Managers\n\nThe CCSK is de
 signed for any IT professional working in cloud computing. It is an essent
 ial credential for all security professionals to show proof of skills to c
 urrent and future employers. Because the CCSK is designed to deliver a wel
 l rounded view of cloud security\, professionals with less experience or n
 on-security backgrounds also find significant value in the training and ce
 rtificate\, particularly developers\, IT operations\, and audit/compliance
  professionals.\n\nCourse Contents\n\n 	Domain 1: Cloud Computing Concepts
  and Architecture\n 	Domain 2: Cloud Governance\n 	Domain 3: Risk\, Audit 
 &amp\; Compliance\n 	Domain 4: Organization Management\n 	Domain 5: Identi
 ty and Access Management\n 	Domain 6: Security Monitoring\n 	Domain 7: Inf
 rastructure and Networking\n 	Domain 8: Cloud Workload Security\n 	Domain 
 9: Data Security\n 	Domain 10: Application Security\n 	Domain 11: Insident
  Response &amp\; Resilience\n 	Domain 12: Related Technologies\n\n\n\nWhat
 ’s New in CCSK v5\n\n 	Latest in cloud architecture\, cloud native secur
 ity\, workload\, virtual networking\, data protection\, DevSecOps\, Zero T
 rust\, Generative AI and more.\n 	Vital information about managing risks\,
  achieving compliance\, and understanding the shared responsibility betwee
 n cloud provide and cloud user\n 	Organization management content\, includ
 ing governance\n 	Permanent access to CCSK Orb\, CSA’s revolutionary CCS
 K chatbot designed to help you master the body of knowledge\n\n\n\n\nCCSK 
 Plus Course - Additional Lab Content\n\n\n\n\nCore Account Security\nLearn
  what to configure in the first 5 minutes of opening a new cloud account a
 nd enable security controls such as MFA\, basic monitoring\, and IAM.\n\n\
 n\n\n\n\n\nIAM and Monitoring In-Depth\nExpand on your work in the first l
 ab and implement more-complex identity management and monitoring. This inc
 ludes expanding IAM with Attribute Based Access Controls\, implementing se
 curity alerting\, and understanding how to structure enterprise-scale IAM 
 and monitoring.\n\n\n\n\n\n\n\nNetwork and Instance Security\nCreate a vir
 tual network (VPC) and implement a baseline security configuration. You wi
 ll also learn how to securely select and launch a virtual machine (instanc
 e)\, run a vulnerability assessment in the cloud\, and connect to the inst
 ance.\n\n\n\n\n\n\n\n\n\nEncryption and Storage Security\nExpand your depl
 oyment by adding a storage volume encrypted with a customer managed key. Y
 ou will also learn how to secure snapshots and other data.\n\n\n\n\n\n\n\n
 Application Security and Federation\nFinish the technical labs by complete
 ly building out a 2-tier application and implementing federated identity u
 sing OpenID.\n\n\n\n\n\n\n\nRisk and Provider Assessment\nPractice using t
 he CSA Cloud Controls Matrix and STAR registry to evaluate risk and select
  a cloud provider.\n\n\n\n\n\n\n\n\n\nTraining Info\nDuration : 3 Days\nDa
 te : Mar 11 - 13\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Traini
 ng Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ra
 ma 4 Rd.\nTraining Fee : 69\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext.
 321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/CCSK_logo.png
CATEGORIES:Cloud Computing,Cloud security,Cloud Security
END:VEVENT
BEGIN:VEVENT
UID:545@acinfotec.com
DTSTART:20260312T023000Z
DTEND:20260313T093000Z
DTSTAMP:20260107T085552Z
URL:https://www.acinfotec.com/training-event/ccsk-foundation-lectures-incl
 uded-exam-voucher-2/
SUMMARY:Certificate of Cloud Security Knowledge (CCSK) - Lectures (Exam Inc
 luded)
DESCRIPTION:About this course\nThe CCSK Foundation course starts with the f
 undamentals\, then increases in complexity as it works through all 16 doma
 ins of the CSA Security Guidance\, recommendations from the European Union
  Agency for Network &amp\; Information Security (ENISA)\, and an overview 
 of the Cloud Controls Matrix.\nCourse Benefits\n\n 	Prove your competency
  in key cloud security issues through an organization that specializes in 
 cloud research.\n 	Increase employment opportunities by filling the skill
 s-gap for cloud-certified professionals.\n 	Demonstrate your technical kn
 owledge\, skills\, and abilities to effectively use controls tailored to t
 he cloud.\n 	Learn to establish a baseline of security best practices whe
 n dealing with a broad array of responsibilities\, from cloud governance t
 o configuring technical security controls.\n 	Complement other credential
 s such as the CISA\, CISSP and CCSP.\n\n Who should attend?\n\n 	Informat
 ion Security\n 	Senior Consultant Manager\n 	Security Architecture\n 	Solu
 tion Architecture\n 	SR Cloud\n 	Security Analyst\n 	Specialist\n 	Lead Co
 mpliances\n 	Director\n\nCourse Contents\n\n 	Domain 1 : Cloud Computing C
 oncepts and Architecture\n 	Domain 2 : Governance and Enterprise Risk Mana
 gement\n 	Domain 3 : Legal Issues\, Contracts\, and Electronic Discovery\n
  	Domain 4 : Compliance and Audit Management\n 	Domain 5 : Information Gov
 ernance\n 	Domain 6 : Management Plane and Business Continuity\n 	Domain 7
  : Infrastructure Security\n 	Domain 8 : Virtualization and Containers\n 	
 Domain 9 : Incident Response\n 	Domain 10 : Application Security\n 	Domain
  11 : Data Security and Encryption\n 	Domain 12 : Identity\, Entitlement a
 nd Access Management\n 	Domain 13 : Security as a Service\n 	Domain 14 : R
 elated Technologies\n 	Extra Domain : Cloud Controls Matrix\n 	Extra Domai
 n : ENISA Recommendations\n\nTraining Info\nDuration : 2 Days\nDate : Mar
  12 - 13\, 2023\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Training Cente
 r\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.
 \nTraining Fee : 45\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext.321-323\
 nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/CCSK_logo.png
CATEGORIES:Cloud Computing,Cloud security,Cloud Security
END:VEVENT
BEGIN:VEVENT
UID:249@acinfotec.com
DTSTART:20260316T023000Z
DTEND:20260320T093000Z
DTSTAMP:20260107T085609Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-28000-supp
 ly-chain-security-lead-auditor/
SUMMARY:PECB Certified ISO 28000 Supply Chain Security Lead Auditor (Exam I
 ncluded)
DESCRIPTION:About this course \nThis five-day intensive course enables part
 icipants to develop the necessary expertise to audit a Supply Chain Securi
 ty Management System (SCSMS) and to manage a team of auditors by applying 
 widely recognized audit principles\, procedures and techniques. During thi
 s training\, the participant will acquire the necessary knowledge and skil
 ls  to proficiently plan and perform internal and external audits in comp
 liance with ISO 19011 the certification process according to ISO 17021. Ba
 sed on practical exercises\, the participant will develop the skills (mast
 ering audit techniques) and competencies (managing audit teams and audit p
 rogram\, communicating with customers\, conflict resolution\, etc.) necess
 ary to conduct efficiently an audit.\nCourse Benefits\n\n 	To acquiring th
 e expertise to perform an ISO 28000 internal audit following ISO 19011 gui
 delines\n 	To acquiring the expertise to perform an ISO 28000 certificatio
 n audit following ISO 19011 guidelines and ISO 17021\, ISO 28003 specifica
 tions\n 	To acquiring the necessary expertise  to manage a SCSMS audit te
 am\n 	To understanding the operation of an ISO 28000 conformant Supply Cha
 in Security Management System\n 	To understand the relationship between a 
 Supply Chain Security Management System\, including risk management\, cont
 rols and compliance with the requirements of different stakeholders of the
  organization\n 	To improve the ability to analyze the internal and extern
 al environment of an organization\, risk assessment and audit decision-mak
 ing in the context of a SCSMS\n\nWho should attend?\n\n 	Internal auditors
 \n 	Auditors wanting to perform and lead Supply Chain Security Management 
 System (SCSMS)  certification audits\n 	Project managers or consultants w
 anting to master the Supply Chain Security Management System audit process
 \n 	Persons responsible for the supply chain security or conformity in an 
 organization\n 	Members of a supply chain security team\n 	Expert advisors
  in supply chain security\n 	Technical experts wanting to prepare for an s
 upply chain security audit function\n\n Course Contents\nDay 1: Introduct
 ion to Supply Chain Security Management System (SCSMS) concepts as require
 d by ISO 28000\n\n 	Presentation of the standards ISO 28000 family of stan
 dards and the regulatory and legal framework related to supply chain secur
 ity\n 	Fundamental principles of Supply chain security\n 	ISO 28000 certif
 ication process\n 	Supply Chain Security Management System (SCSMS)\n 	Deta
 iled presentation of the clauses of ISO 28000\n\nDay 2: Planning and Initi
 ating an ISO 28000 audit\n\n 	Fundamental audit concepts and principles\n 
 	Audit approach based on evidence and on risk\n 	Preparation of an ISO 280
 00 certification audit\n 	SCSMS documentation audit\n 	Conducting an openi
 ng meeting\n\nDay 3: Conducting an ISO 28000 audit\n\n 	Communication duri
 ng the audit\n 	Audit procedures: observation\, document review\, intervie
 w\, sampling techniques\, technical verification\, corroboration and evalu
 ation\n 	Audit test plans\n 	Formulation of audit findings\n 	Documenting 
 nonconformities\n\nDay 4: Concluding and ensuring the follow-up of an ISO 
 28000 audit\n\n 	Audit documentation\n 	Quality review\n 	Conducting a clo
 sing meeting and conclusion of an ISO 28000 audit\n 	Evaluation of correct
 ive action plans\n 	ISO 28000 surveillance audit\n 	ISO 28000 internal aud
 it management program\n\nDay 5: Certification Exam\n Training Info\nDurat
 ion:  5 Days\nDate:  Mar 16 - 20\, 2026\nTime:  9.30 am. – 16.30 pm.
 \nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lump
 hini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 Baht (ex.vat7
 %)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nw
 ww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:492@acinfotec.com
DTSTART:20260316T023000Z
DTEND:20260319T093000Z
DTSTAMP:20260107T085624Z
URL:https://www.acinfotec.com/training-event/cisa-examination-preparation-
 thai-exam-excluded/
SUMMARY:CISA Examination Preparation (Exam Excluded)
DESCRIPTION:About this course\nThe mark of excellence for a professional ce
 rtification program is the value and recognition it bestows on the individ
 ual who achieves it. Since 1978\, the Certified Information Systems Audito
 r (CISA) program\, sponsored by ISACA®\, has been the globally accepted s
 tandard of achievement among information systems (IS) audit\, control and 
 security professionals.\n\nThis four-day training course prepares particip
 ants for the CISA examination by providing a conducive learning environmen
 t where the skill sets and knowledge required of an information systems au
 dit\, control and security professional can be acquired comprehensively.\n
 \nWith the completion of the course\, participants will be equipped with t
 he knowledge of the core competencies that define a successful Information
  Systems auditor. For participants preparing to sit for the CISA examinati
 on\, the examination-oriented approach will also prepare participants more
  than adequately for this examination leading to one of the industry’s m
 ost highly sought after certification today.\nCourse Benefits\nWith the co
 mpletion of this course\, participants will have a thorough understanding 
 of the following core CISA competencies\n• To successful complete of the
  CISA® examination\n• To learn how to do Information systems auditing\,
  control or security experience\n• Adherence to the Code of Professional
  Ethics\n• Adherence to the Continuing Professional Education(CPE) progr
 am\n• Compliance with the Information Systems Auditing Standards\nWho sh
 ould attend?\n• IT Auditor\n• Internal Auditor CIA\n• Internal IT Au
 ditor\n• Information Security Consultant/Professional\n• The CISA desi
 gnation is for Information Systems Audit professionals who have 5 years of
  front-line experience with the audit of information systems.\n• IT prof
 essional performing the roles of Internal IT Auditors will also find this 
 course crucial for them to expect their responsibilities professionally.\n
 • IT professionals seeking to further their knowledge into the areas of 
 IT Information Systems Management and Audit requirements will also find th
 is course beneficial\nCourse Contents\nIntroduction\n• Certification Pre
 requisites\n• Examination information\n• Certification Application\n
 • Certification Maintenance and Renewal\n\nThe Process of Auditing Infor
 mation Systems\n\n 	Management of the IS Function\n 	ISACA IT Audit and As
 surance Standards and Guidelines\n 	Risk Analysis\n 	Internal Controls\n 	
 Performing an IS Audit\n 	Control Self Assessment\n 	The Evolving IS Audit
  Process\n\nGovernance and Management of IT\n\n 	Corporate Governance\n 	I
 T Governance\n 	IT Monitoring and Assurance Practices for Board and Senior
  Management\n 	Information Systems Strategy\n 	Maturity and Process Improv
 ement Models\n 	IT Investment and Allocation Practices\n 	Policies and Pro
 cedures\n 	Risk Management\n 	IS Management Practices\n 	IS Organizational
  Structure and Responsibilities\n 	Auditing IT Governance Structure and Im
 plementation\n 	Business Continuity Planning\n 	Auditing Business Continui
 ty\n\nInformation Systems Acquisition\, Development and Implementation\n\n
  	Business Realization\n 	Project Management Structure\n 	Project Manageme
 nt Practices\n 	Business Application Development\n 	Business Application S
 ystems\n 	Alternative Forms of Software Project Organization\n 	Alternativ
 e Development Methods\n 	Infrastructure Development/Acquisition Practices\
 n 	Information Systems Maintenance Practices\n 	System Development Tools a
 nd Productivity Aids\n 	Process Improvement Practices\n 	Application Contr
 ols\n 	Auditing Application Controls\n 	Auditing Systems Development\, Acq
 uisition and Maintenance\n\nInformation Systems Operations\, Maintenance a
 nd Support\n\n 	Information Systems Operations\n 	Information Systems Hard
 ware\n 	IS Architecture and Software\n 	IS Network Infrastructure\n 	Audit
 ing Infrastructure and Operations\n 	Disaster Recovery Planning\n\nProtect
 ion of Information Assets\n\n 	Importance of Information Security Manageme
 nt\n 	Logical Access\n 	Network\n 	Infrastructure Security\n 	Auditing Inf
 ormation Security Management\n 	Framework\n 	Auditing Network Infrastructu
 re Security\n 	Environmental Exposures and Controls\n 	Physical Access Exp
 osures and Controls\n 	Mobile Computing\n\nExamination Preparation and Tec
 hniques\n• Administration\n• Techniques\n• Tips and Hints\n• FAQ\n
 Certification\nBeing recognized as a CISA brings with it a great number of
  professional and organizational benefits. Successful achievement demonstr
 ates and attests to an individual’s information systems audit expertise 
 and indicates a desire to serve an organization with distinction. This exp
 ertise is extremely valuable given the changing nature of information tech
 nology and the need to employ certified professionals who are able to appl
 y the most effective information systems audit\, control and security prac
 tices\, and who have an awareness of the unique requirements particular to
  information technology environments. Those who become CISAs join other re
 cognized professionals worldwide who have earned this highly sought after 
 professional designation.\nExamination\n• Paper-based Examination\n• 4
  Hours\n• 200 MCQ Questions\n• Minimum score of 450 out of a possible 
 maximum of 800\nTraining Info\nDuration:  4 Days\nDate:  Mar 16 - 19\, 
 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center
 \n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\
 nTraining Fees: 34\,000 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE
 -mail.training@acinfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/3.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:399@acinfotec.com
DTSTART:20260316T023000Z
DTEND:20260319T093000Z
DTSTAMP:20260107T085644Z
URL:https://www.acinfotec.com/training-event/comptia-cybersecurity-analyst
 -cysa-new/
SUMMARY:CompTIA Cybersecurity Analyst (CySA+)(Exam Included)
DESCRIPTION:About this course\nThe CSA+ certification acronym has changed t
 o CySA+. CompTIA and its partners will make the change by June 29th\, 2018
 . The exam code will remain the same.\n\nAs attackers have learned to evad
 e traditional signature-based solutions such as firewalls\, an analytics-b
 ased approach within the IT security industry is increasingly important fo
 r most organizations. The behavioral analytics skills covered by CySA+ ide
 ntify and combat malware\, and advanced persistent threats (APTs)\, result
 ing in enhanced threat visibility across a broad attack surface. CompTIA C
 ySA+ is for IT professionals looking to gain the following security analys
 t skills:\n\n 	Configure and use threat detection tools.\n 	Perform data a
 nalysis.\n 	Interpret the results to identify vulnerabilities\, threats an
 d risks to an organization.\n\n\n\nCourse Objectives\nAfter completing the
  CompTIA CySA+ course\, delegates will have the skills and knowledge to:\n
 \n 	Assess information security risk in computing and network environments
 \n 	Analyse the cybersecurity threat landscape\n 	Analyse reconnaissance t
 hreats to computing and network environments\n 	Analyse attacks on computi
 ng and network environments\n 	Analyse post-attack techniques on computing
  and network environments\n 	Implement a vulnerability management program\
 n 	Evaluate the organization's security through penetration testing\n 	Col
 lect cybersecurity intelligence\n 	Analyse data collected from security an
 d event logs\n 	Perform active analysis on assets and networks\n 	Respond 
 to cyber security incidents\n 	Investigate cyber security incidents\n 	Add
 ress security issues with the organization's technology architecture\n\n\n
 \nCourse Content\n\n\nLesson 1: Assessing Information Security Risk \n\n 	
 Topic A: Identify the Importance of Risk Management\n 	Topic B: Assess Ris
 k\n 	Topic C: Mitigate Risk\n 	Topic D: Integrate Documentation into Risk 
 Management\n\n\n\n\nLesson 2: Analysing the Threat Landscape \n\n 	Topic A
 : Classify Threats and Threat Profiles\n 	Topic B: Perform Ongoing Threat 
 Research\n\n\nLesson 3: Analysing Reconnaissance Threats to Computing and 
 Network Environments \n\n 	Topic A: Implement Threat Modeling\n 	Topic B: 
 Assess the Impact of Reconnaissance Incidents\n 	Topic C: Assess the Impac
 t of Social Engineering\n\nLesson 4: Analysing Attacks on Computing and Ne
 twork Environments \n\n 	Topic A: Assess the Impact of System Hacking Atta
 cks\n 	Topic B: Assess the Impact of Web-Based Attacks\n 	Topic C: Assess 
 the Impact of Malware\n 	Topic D: Assess the Impact of Hijacking and Imper
 sonation Attacks\n 	Topic E: Assess the Impact of DoS Incidents\n 	Topic F
 : Assess the Impact of Threats to Mobile Security\n 	Topic G: Assess the I
 mpact of Threats to Cloud Security\n\nLesson 5: Analysing Post-Attack Tech
 niques \n\n 	Topic A: Assess Command and Control Techniques\n 	Topic B: As
 sess Persistence Techniques\n 	Topic C: Assess Lateral Movement and Pivoti
 ng Techniques\n 	Topic D: Assess Data Exfiltration Techniques\n 	Topic E: 
 Assess Anti-Forensics Techniques\n\nLesson 6: Managing Vulnerabilities in 
 the Organization \n\n 	Topic A: Implement a Vulnerability Management Plan\
 n 	Topic B: Assess Common Vulnerabilities\n 	Topic C: Conduct Vulnerabilit
 y Scans\n\nLesson 7: Implementing Penetration Testing to Evaluate Security
  \n\n 	Topic A: Conduct Penetration Tests on Network Assets\n 	Topic B: Fo
 llow Up on Penetration Testing\n\nLesson 8: Collecting Cybersecurity Intel
 ligence \n\n 	Topic A: Deploy a Security Intelligence Collection and Analy
 sis Platform\n 	Topic B: Collect Data from Network-Based Intelligence Sour
 ces\n 	Topic C: Collect Data from Host-Based Intelligence Sources\n\nLesso
 n 9: Analysing Log Data \n\n 	Topic A: Use Common Tools to Analyse Logs\n 
 	Topic B: Use SIEM Tools for Analysis\n 	Topic C: Parse Log Files with Reg
 ular Expressions\n\nLesson 10: Performing Active Asset and Network Analysi
 s \n\n 	Topic A: Analyse Incidents with Windows-Based Tools\n 	Topic B: An
 alyse Incidents with Linux-Based Tools\n 	Topic C: Analyse Malware\n 	Topi
 c D: Analyse Indicators of Compromise\n\nLesson 11: Responding to Cybersec
 urity Incidents \n\n 	Topic A: Deploy an Incident Handling and Response Ar
 chitecture\n 	Topic B: Mitigate Incidents\n 	Topic C: Prepare for Forensic
  Investigation as a CSIRT\n\nLesson 12: Investigating Cybersecurity Incide
 nts \n\n 	Topic A: Apply a Forensic Investigation Plan\n 	Topic B: Securel
 y Collect and Analyse Electronic Evidence\n 	Topic C: Follow Up on the Res
 ults of an Investigation\n\nLesson 13: Addressing Security Architecture Is
 sues \n\n\n 	Topic A: Remediate Identity and Access Management Issues\n 	T
 opic B: Implement Security During the SDLC\n\n\nExam Description\nThe Comp
 TIA Cybersecurity Analyst (CySA+) certification verifies that successful c
 andidates have the knowledge and skills required to configure and use thre
 at detection tools\, perform data analysis and interpret the results to id
 entify vulnerabilities\, threats and risks to an organization\, with the e
 nd goal of securing and protecting applications and systems within an orga
 nization.\n\nNumber of Questions : Maximum of 85 questions (Multiple choic
 e and performance-based)\n\nLength of Test: 165 minutes\n\nPassing Score: 
 750 (on a scale of 100-900)\nTraining info\nDuration:  4 Days\nDate:  
 Mar 16-19\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Tra
 ining Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \,
  Rama 4 Rd.\nTraining Fees: 47\,000 Baht (ex.vat7%)\nTel. 02 670 8980-3 ex
 t.321-323\nE-mail.training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:882@acinfotec.com
DTSTART:20260316T023000Z
DTEND:20260320T093000Z
DTSTAMP:20260115T024906Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-270012022-
 lead-implementer-thai-exam-included/
SUMMARY:PECB Certified ISO 27001 Lead Implementer (Thai) Exam Included
DESCRIPTION:About this course\nInformation security threats and attacks gro
 w and improve constantly. As such\, organizations are increasingly concern
 ed about\nhow their valuable information is handled and protected. The bes
 t form of defense against them is the proper implementation\nand managemen
 t of information security controls and best practices. Information securit
 y is the globally accepted benchmark\nand also a key expectation and requi
 rement of customers\, legislators\, and other interested parties.\n\nThis 
 training course is designed to prepare you to implement an information sec
 urity management system (ISMS) based on\nthe requirements of ISO/IEC 27001
 . It aims to provide a comprehensive understanding of the best practices o
 f an ISMS and a\nframework for its continual management and improvement.\n
 \nThe training content is packed with practical exercises and case studies
  which will help you get equipped with real-world\nexpertise that you can 
 apply to your day-to-day operations and activities. Our training courses a
 re all-inclusive\, meaning that\nthey cover everything you need to get the
  certifiate\n\nCourse Benefits\n\n\n\n 	Acknowledge the correlation betwee
 n ISO/IEC 27001\, ISO/IEC 27002 and other standards and regulatory frame
 works\n 	Master the concepts\, approaches\, methods and techniques used fo
 r the implementation and effective management of an ISMS\n 	Learn how to i
 nterpret the ISO/IEC 27001 requirements in the specific context of an orga
 nization\n 	Learn how to support an organization to effectively plan\, imp
 lement\, manage\, monitor and maintain an ISMS\n 	Acquire the expertise to
  advise an organization in implementing Information Security Management Sy
 stem best practices\n\n\n\nWho should attend?\n\n 	Managers or consultants
  involved in Information Security Management\n 	Expert advisors seeking to
  master the implementation of an Information Security Management System\n 
 	Individuals responsible for maintaining conformance with ISMS requirement
 s\n 	ISMS team members\n\n\n\n\nCourse Contents\nDay 1: Introduction to IS
 O/IEC 27001 and initiation of an ISMS\n\n 	Training course objectives and 
 structure\n 	Standards and regulatory frameworks\n 	Information Security M
 anagement System (ISMS)\n 	Fundamental information security concepts and p
 rinciples\n 	Initiation of the ISMS implementation\n 	Understanding the or
 ganization and its context h ISMS scope\n\nDay 2: Planning the implementat
 ion of an ISMS\n\n 	Leadership and project approval\n 	Organizational stru
 cture\n 	Analysis of the existing system\n 	Information security policy\n 
 	Risk management\n 	Statement of Applicability\n\nDay 3: Implementation of
  an ISMS\n\n 	Documented information management\n 	Selection and design of
  controls\n 	Implementation of controls\n 	Trends and technologies\n 	Comm
 unication\n 	Competence and awareness\n 	Security operations management\n\
 nDay 4: ISMS monitoring\, continual improvement\, and preparation for the 
 certification audit\n\n 	Monitoring\, measurement\, analysis\, and evaluat
 ion\n 	Internal audit\n 	Management review\n 	Treatment of nonconformities
 \n 	Continual improvement\n 	Preparing for the certification audit\n 	Cert
 ification process and closing of the training course\n\nDay 5: Certificati
 on Exam\nTraining Info\nDuration:  5 Days\nDate: Mar 16-20\, 2026\nTime:
   9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\
 , Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining F
 ees: 51\,500 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext. 321-323\nE-mail.trai
 ning@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:998@acinfotec.com
DTSTART:20260316T023000Z
DTEND:20260316T050000Z
DTSTAMP:20260213T035042Z
URL:https://www.acinfotec.com/training-event/zero-trust-elearning-and-live
 -online-workshop-new/
SUMMARY:Zero Trust eLearning and Live Online Workshop (New!)
DESCRIPTION:Why E-Learning ??\neLearning + Live Online Zero Trust Workshop 
 ถึงเป็นเหตุผลที่คุณไม่คว
 รพลาด?\n\n✅ e-Learning ให้ความรู้ ขณ
 ะที่ Workshop ช่วยเสริมความเข้า
 ใจเพื่อการนำไปใช้งานจริง\n
 ✅ ลด Trial &amp\; Error ในการนำ Zero Trust ไปใ
 ช้ในองค์กร\n✅ เหมาะทั้งผู้
 บริหารที่ต้องการ Roadmap และที
 มเทคนิคที่ต้องออกแบบระบบ\n
 ✅ ได้มุมมองจากผู้เชี่ยวชา
 ญ มากกว่าการเรียนรู้ด้วยต
 นเองเพียงอย่างเดียว\n\n\n\nหลั
 กสูตร eLearning ที่ออกแบบมาเพื่อ
 ให้ผู้เรียนเข้าใจ Zero Trust อย่
 างครบถ้วนแบบ End-to-End ตั้งแต่แ
 นวคิดเชิงกลยุทธ์ ไปจนถึงก
 ารนำไปปรับใช้งานจริงในระ
 ดับองค์กร\n\n✅ เรียนออนไลน์ 
 เรียนได้ทุกที่ ทุกเวลา\n✅ เ
 นื้อหาอ้างอิง Best Practices และ Framework
  ระดับสากล\n✅ ไม่เน้นเพียงท
 ฤษฎี แต่เชื่อมโยงกับบริบท
 ธุรกิจ และการนำไปปรับใช้ง
 านจริงในองค์กร\n\n\n\n\nWhat is the CCZT?\nThe
  Certificate of Competence in Zero Trust (CCZT) is the authoritative Zero 
 Trust training and certificate that delivers the knowledge needed to under
 stand the core concepts of Zero Trust. Developed by CSA\, the trusted indu
 stry leader for cloud security certificates\, the CCZT builds knowledge to
  drive the definition\, implementation and management of Zero Trust over t
 ime.\nWhy Zero Trust? Why now?\n\n\nEvolving Technology \n\nComputer tech
 nology continues to shift towards an open but untrusted infrastructure\n\n
 \n\nWorkforce Development\n\nSkills gaps are widening with rapidly evolvin
 g cybersecurity threats. Zero Trust provides a strategy for individuals an
 d organizations to develop the necessary skills to keep up\n\n\n\nSecurity
  Gaps\n\nZero Trust can help address gaps in traditional security models a
 nd facilitate a more mature and sustainable approach to security\n\n\n\nEm
 ergence of AI \n\nRapid availability of AI tools makes implementing a Zero
  Trust strategy critical\nWho should earn their CCZT?\nZero Trust is the f
 uture of information security making it essential knowledge for all inform
 ation security professionals. Zero Trust is an inevitable requirement for 
 organizations and a required skill for security professionals looking to r
 emain at the forefront of innovation and keep up with evolving cybersecuri
 ty threats.\n\n 	CISOs\n 	Security Managers\n 	Enterprise Architects\n 	Ri
 sk Officers &amp\; Owners\n 	Managers &amp\; Decision Makers\n 	Compliance
  Officers &amp\; Managers\n 	C-Suite\n 	Security Engineers &amp\; Architec
 ts\n 	System Engineers\n 	Cybersecurity Analysts\n 	Developers\n 	Security
  Administrators\n 	Government Agencies\n 	Federal Partners\n\nCurriculum\n
 Based on CSA’s Zero Trust Training (ZTT)\, the CCZT covers six core area
 s of Zero Trust knowledge:\n\n\n\n 	Zero Trust Foundational Concepts\n 	So
 ftware Defined\n 	\nPerimeter\n 	Industry Best Practices\n 	Zero Trust Arc
 hitecture\n 	Zero Trust Planning\n 	Zero Trust Implementation\n\n&nbsp\;\n
 \n&nbsp\;\n\n&nbsp\;\n\n&nbsp\;\n\nExam Structure\nThe CCZT is an open-boo
 k\, online exam with 60 multiple-choice questions. Testers have two attemp
 ts to complete the exam in the allotted 90-minute timeframe and achieve a 
 minimum passing score of 80%.\n\n\nPrepare\nSelect your Learning Style\n\n
  	Study on your own\n 	Self-paced online training\n 	Instructor-led online
  training\n\nAccess Study Materials\n\n 	Download CCZT Prep-Kit\n 	Include
 s recommended CSA Research artifacts\, authoritative sources and overview 
 guides\n 	Comprehensive study guides are included with the purchase of CCZ
 T exam tokens\n 	Get support from the CSA community on Circle\n\nNo prereq
 uisites required\n\n 	The CCSK and/or ZTT are advised\n\nTraining Info\nDu
 ration:  0.5 Day\nDate: Mar 16\, 2026\nTime:  9.30 am. – 12.00 pm.\nV
 enue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphin
 i Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 29\,900 (Exam Included) 
 Early Bird: Please Call\nTel : 02 670 8980-4 ext. 321-323\nE-mail.training
 @acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 6/02/CCZT-logo-RGB-2.png
END:VEVENT
BEGIN:VEVENT
UID:815@acinfotec.com
DTSTART:20260318T023000Z
DTEND:20260320T093000Z
DTSTAMP:20260107T085719Z
URL:https://www.acinfotec.com/training-event/ec-council-certified-encrypti
 on-specialist-eces-exam-included/
SUMMARY:EC-Council Certified Encryption Specialist (E|CES) (Exam Included)
DESCRIPTION:\nAbout this course\nIf you think that there is only one type o
 f encryption – think again!\n\nSecure organizations employ multiple leve
 ls of encryption – database encryption\, VoIP encryption\, portable stor
 age encryption\, mobile devices encryption\, Wi-Fi encryption\, e-mail enc
 ryption\, file encryption – server/desktop\, network link encryption\, w
 eb server encryption\, tape backup encryption and many more.\n\nSome of th
 e most recent attacks that have had serious consequences share one thing i
 n common – they all had either none or little effective encryption. This
  resulted in thousands of users being affected and hundreds of millions in
  losses. It resulted in serious decline of brand value and public embarras
 sment.\nPrerequisite\nNo prior knowledge of cryptography is assumed\, and 
 no mathematical skills beyond basic algebra are required.\nWho should atte
 nd?\n\n\nPenetration Testers\, Computer Forensics Specialists\, Anyone inv
 olved in selecting\, implementing VPN’s or digital certificates\, Anyone
  involved in information security operation\n\n\nCourse Contents\n\n\nModu
 le 01: Introduction and History of Cryptography\nModule 02: Symmetric Cryp
 tography &amp\; Hashes\nModule 03: Number Theory and Asymmetric Cryptograp
 hy\nModule 04: Applications of Cryptography\nModule 05: Applications of Cr
 yptography\n\n\nTraining Info\nLanguage: Conducted in Thai Language\nDur
 ation: 3 Days\nTraining Date: Mar 18 - 20\, 2026\nVenue: ACinfotec Traini
 ng Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ra
 ma 4 Rd.\nTraining Fees: 39\,000 BAHT (Ex.Vat 7%)\nTel : 02 670 8980-3 ext
 . 321-323\nE-mail: training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/ECES.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:432@acinfotec.com
DTSTART:20260323T023000Z
DTEND:20260325T093000Z
DTSTAMP:20260107T090011Z
URL:https://www.acinfotec.com/training-event/crisc-certified-in-risk-and-i
 nformation-systems-control-5/
SUMMARY:CRISC – Certified in Risk and Information Systems Control (Exam E
 xcluded)
DESCRIPTION:Course Overview\nThe Certified in Risk and Information Systems 
 Control™ certification (CRISC™\, pronounced “see-risk”) is designe
 d for IT professionals who have hands-on experience with risk identificati
 on\, assessment\, and evaluation\; risk response\; risk monitoring\; IS co
 ntrol design and implementation\; and IS control monitoring and maintenanc
 e.\n\nThe CRISC designation will not only certify professionals who have k
 nowledge and experience identifying and evaluating entity-specific risk\, 
 but also aid them in helping enterprises accomplish business objectives by
  designing\, implementing\, monitoring and maintaining risk-based\, effici
 ent and effective IS controls.\nWho Should attend?\nIT professionals inter
 ested in earning Certified in Risk and Information Systems Controls (CRISC
 ) certification. CRISC is for IT professionals\, risk professionals\, busi
 ness analysts\, project manager and/or compliance professionals\, how work
   towards evaluation and mitigation of risk\, and who have  job experien
 ce in the following areas:\n\n* Risk identification\, assessment and evalu
 ation\;\n* Risk response and monitoring and\n* IS control design/monitorin
 g and implementation/maintenance.\nCourse Benefits\nThe CRISC course offer
 s students outstanding benefits\, including:\n\n 	Three full days of inten
 se instruction with no outside distractions\n 	In-person access to the top
  security experts in the industry\n 	Lunch and snacks provided on each day
  of class\n 	Worldwide recognition as a universally accepted information s
 ystems manager\n 	Opportunity to build upon existing certifications/creden
 tials already earned\n 	Provides tangible evidence of career growth\n 	Pot
 ential for a salary increase and/or promotion\n 	Intense Courseware:\n\n 	
 ISACA Authorized Courseware including:\nCRISC Review Manual\nCRISC Review 
 Questions\, Answers &amp\; Explanations Manual\n\n\n 	Excellent Certificat
 ion Preparation (Note that Students are responsible for registering for th
 e exam and transportation to the exam\; InfoSec Institute will not provide
  exam logistics or transportation support)\n\nExamination\nOur CRISC exam 
 preparation course assists IT professionals to accomplish the following bu
 siness objectives in their enterprise:\n\n* Designing\, implementing\, mon
 itoring &amp\; maintaining risk-based\, effective IS controls\n* Complianc
 e with regulatory requirements\n\nAlso covered are the 5 domains as requir
 ed by ISACA:\n\n1. Risk Identification Assessment and Evaluation (RI)\n2. 
 Risk Response (RR)\n3. Risk Monitoring (RM)\n4. IS Control Design and Impl
 ementation (CD)\n5. IS Control Monitoring and Maintenance (MM)\n\n 	Comput
 er-based examination\n 	4 hours\n 	150 multiple-choice question exam\n 	IS
 ACA uses a 200 - 800 point scale with 450 as the passing mark for the exam
 s\n\nCertifications\nInfoSec Institute’s CRISC course extensively prepar
 es students for the CRISC exam\, which consists of 200 multiple-choice que
 stions that cover the five information systems auditing areas. These areas
  have been created from a CRISC job practice analysis and reflect the work
  performed by information systems auditors.\nTraining Info\nDuration : 4 
 Days\nDate : Mar 23 - 25\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfote
 c Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workla
 b) \, Rama 4 Rd.\nTraining Fee : 34\,000 Baht (ex.vat 7%)\nTel. 02 670 89
 80-4 ext.321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/1.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:548@acinfotec.com
DTSTART:20260323T023000Z
DTEND:20260327T093000Z
DTSTAMP:20260107T085949Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-22301-lead
 -implementer-thai-exam-included-2/
SUMMARY:PECB Certified ISO 22301 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nNo two disasters in the world cause equal da
 mage. Between the unpredictability of natural disasters\, information secu
 rity breaches\, and incidents of different nature\, preparedness can make 
 you stand out in the crowd and predict the future of your business. In lig
 ht of this\, proper planning is essential to mitigating risks\, avoiding c
 onsequences\, coping with the negative effects of disasters and incidents\
 , but at the same time\, continuing your daily operations so that customer
  needs do not remain unfulfilled.\n\nOrganizations can make progress towar
 ds understanding and managing disasters\, incidents\, and risks by having 
 a BCMS based on ISO 22301 in place. Therefore\, PECB has designed this tra
 ining course to prepare its participants implement a business continuity m
 anagement system (BCMS) in compliance with the requirements of ISO 22301. 
 Attending this training course allows you to gain a comprehensive understa
 nding of the best practices of the business continuity management system a
 nd to be able to establish a framework that allows the organization to con
 tinue operating efficiently during disruptive events.\n\nAfter attending t
 he training course\, you can sit for the exam and\, if you successfully pa
 ss the exam\, you can apply for the “PECB Certified ISO 22301 Lead Imple
 menter” credential. The internationally recognized “PECB Certified ISO
  22301 Lead Implementer” certificate will prove that you have the profes
 sional capabilities and practical knowledge to implement a BCMS based on t
 he requirements of ISO 22301 in an organization.\nCourse Benefits\n\n 	Gai
 n a comprehensive understanding of the concepts\, approaches\, methods\, a
 nd techniques used for the implementation and effective management of a BC
 MS\n 	Learn how to interpret and implement the requirements of ISO 22301 i
 n the specific context of an organization\n 	Understand the operation of t
 he business continuity management system and its processes based on ISO 22
 301\n 	Acquire the necessary knowledge to support an organization in effec
 tively planning\, implementing\, managing\, monitoring\, and continually i
 mproving a BCMS\n\nWho should Attend?\n\n\n\n 	Project managers and consul
 tants involved in business continuity\n 	Expert advisors seeking to master
  the implementation of the business continuity management system\n 	Indivi
 duals responsible to maintain conformity with BCMS requirements within an 
 organization\n 	Members of the BCMS team\n\nCourse Contents\n\n\nDay 1: In
 troduction to ISO 22301 and initiation of a BCMS\n\n 	Training course obje
 ctives and structure\n 	Management system standards\n 	Fundamental busines
 s continuity principles and concepts\n 	Business continuity management sys
 tem\n 	Initiation of the BCMS implementation\n 	The organization and its c
 ontext\n 	Analysis of the existing system\n 	BCMS scope\n\nDay 2: Implemen
 tation plan of a BCMS\n\n 	Leadership and commitment\n 	Business continuit
 y objectives and planning of changes\n 	Business continuity policy\n 	Orga
 nizational structure\n 	Documented information management\n 	Competence an
 d awareness\n 	Business impact analysis\n\nDay 3: Implementation of a BCMS
 \n\n 	Risk assessment\n 	Business continuity strategies and solutions\n 	B
 usiness continuity plans and procedures\n 	Incident response plan\n 	Emerg
 ency response plan\n 	Crisis management plan\n 	Communication\n\nDay 4: BC
 MS monitoring\, continual improvement\, and preparation for the certificat
 ion audit\n\n 	Exercise programs\n 	Monitoring\, measurement\, analysis\, 
 and evaluation\n 	Internal audit h Management review\n 	Treatment of non c
 onformity\n 	Continual improvement\n 	Preparing for the certification audi
 t\n 	Certification process and closing of the training course\n\nDay 5: Ce
 rtification Exam\nTraining Info\nDuration : 5 Days\nDate :  Mar 23 - 27\
 , 2026\nTime : 9.30 am. - 16.30 pm.\nLanguage : Thai\nVenue : ACinfotec 
 Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab)
  \, Rama 4 Rd.\nPrice : 51\,500 Baht (Ex.vat 7%)\nContact : Tel 02 670 898
 0-3 ext.321-323\nE-mail training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:872@acinfotec.com
DTSTART:20260323T023000Z
DTEND:20260326T093000Z
DTSTAMP:20260107T090023Z
URL:https://www.acinfotec.com/training-event/comptia-casp/
SUMMARY:CompTIA Advanced Security Practitioner (CASP+)(Exam Included)
DESCRIPTION:About this course\nThis course is for students who are preparin
 g for the CompTIA Advanced Security Practitioner (CASP+) certification exa
 m CAS-004. In this course\, students will expand their knowledge of inform
 ation security to apply more advanced principles. Students will apply crit
 ical thinking and judgment across a broad spectrum of security disciplines
  to propose and implement sustainable security solutions that map to organ
 izational strategies\; translate business needs into security requirements
 \; support IT governance and risk management\; architect security for host
 s\, networks\, and software\; respond to security incidents\; and more\n\n
 \nWho should attend?\n\n 	Top CASP+ Job Roles\n 	Security Architect\n 	Sen
 ior Security Engineer\n 	SOC Manager\n 	Security Analyst\n 	IT Cybersecuri
 ty Specialist/INFOSEC Specialist\n 	Cyber Risk Analyst\n\n\n\nCourse Conte
 nt\nSecurity Architecture\n\nAnalyze security requirements in hybrid netwo
 rks to work toward an enterprise-wide\, zero trust security architecture w
 ith advanced secure cloud and virtualization solutions.\n\nSecurity Operat
 ions\n\nAddress advanced threat management\, vulnerability management\, ri
 sk mitigation\, incident response tactics and digital forensics analysis\n
 \nGovernance\, Risk\, and Compliance\n\nProve an organization’s overall 
 cybersecurity resiliency metric and compliance to regulations\, such as CM
 MC\, PCI-DSS\, SOX\, HIPAA\, GDPR\, FISMA\, NIST and CCPA\n\nSecurity Engi
 neering and Cryptography\n\nConfigurations for endpoint security controls\
 , enterprise mobility\, cloud/hybrid environments\, and enterprise-wide PK
 I and cryptographic solutions\nExam Description\nRequired exam: CAS-004\n\
 nNumber of questions: Maximum of 90 questions\n\nTypes of questions: Multi
 ple choice and performance-based\n\nLength of test: 165 Minutes\n\nRecomme
 nded experience      A minimum of ten years of general hands-on IT exp
 erience\, with at least five years of broad hands-on security experience.\
 n\nPassing score: This test has no scaled score\; it’s pass/fail only.\n
 Training info\nDuration:  4 Days\nDate:  Mar 23 - 26\, 2026\nTime:  9
 .30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Gra
 nde Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 
 59\,000 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@a
 cinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:523@acinfotec.com
DTSTART:20260323T023000Z
DTEND:20260327T093000Z
DTSTAMP:20260115T024917Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-27701-
 lead-implementer-thai-exam-included-3/
SUMMARY:PECB Certified ISO/IEC 27701 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nThis training course is designed to prepare 
 its participants implement a Privacy Information Management System (PIMS) 
 in compliance with the requirements and guidance of the ISO/IEC 27701. Mor
 eover\, you will gain a comprehensive understanding of the best practices 
 of privacy information management and learn how to manage and process data
  while complying with various data privacy regimes. After mastering the im
 plementation and management of a Privacy Information Management System (PI
 MS)\, you can sit for the exam and apply for a “PECB Certified ISO/IEC 2
 7701 Lead Implementer” credential. The internationally recognized PECB L
 ead Implementer Certificate proves that you have the practical knowledge a
 nd professional capabilities to implement the ISO/IEC 27701  requirements
  in an organization.\n\n\n\nWho should attend?\n\n 	Managers and consultan
 ts involved in privacy and data management\n 	Expert advisors seeking to m
 aster the implementation of a Privacy Information Management System\n 	Ind
 ividuals responsible and accountable for Personally Identifiable Informati
 on (PII) within organizations\n 	Individuals responsible for maintaining c
 onformance with data privacy regimes requirements\n 	PIMS team members\n\n
 \n\n\nCourse Contents\n\n 	Introduction to ISO/IEC 27701 and initiation of
  a PIMS\n- Training course objectives and structure\n- Standards and regul
 atory frameworks\n- Privacy Information Management System (PIMS)\n- Fundam
 ental concepts and principles of information security and privacy\n- Initi
 ation of the PIMS implementation\n- Analysis of the ISMS scope and Stateme
 nt of Applicability\n- PIMS scope\n- Management approval\n- Privacy policy
 \n- Privacy risk assessment\n 	Planning the implementation of a PIMS\n- Pr
 ivacy impact assessment\n- PIMS Statement of Applicability\n- Documentatio
 n management\n- Selection of controls\n- Implementation of controls\n 	Imp
 lementing a PIMS\n- Implementation of controls (cont’d)\n- Implementatio
 n of controls specific for PII controllers\n- Implementation of controls s
 pecific for PII processors\n 	PIMS monitoring\, continual improvement and 
 preparation for the certification audit\n- Awareness\, training\, and comm
 unication\n- Monitoring\, measurement\, analysis\, evaluation and manageme
 nt review\n- Internal audit\n- Treatment of nonconformities\n- Continual i
 mprovement\n- Preparing for the certification audit\n- Certification proce
 ss and closing of the training course\n 	Certification Exam\n\nTraining In
 fo\n\nDuration:  5 Days\nDate:  Mar 23 - 27\, 2026\nTime:  9.30 am. 
 – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Cent
 re Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 
 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext. 321-323\nE-mail.training@acinfote
 c.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:846@acinfotec.com
DTSTART:20260325T023000Z
DTEND:20260327T093000Z
DTSTAMP:20260107T090032Z
URL:https://www.acinfotec.com/training-event/cdpse-certified-data-privacy-
 solutions-engineer-exam-prep-new-2/
SUMMARY:CDPSE – Certified Data Privacy Solutions Engineer (Exam Prep) New
 **
DESCRIPTION:CDPSE – Certified Data Privacy Solutions Engineer (Exam Prep)
 \nAbout this course\nCertified Data Privacy Solutions Engineer™ (CDPSE
 ®) is focused on validating the technical skills and knowledge it takes t
 o assess\, build and implement comprehensive data privacy measures. CDPSE 
 holders help fill the technical privacy skills gap so that your organizati
 on has competent privacy technologists to build and implement solutions th
 at mitigate risk and enhance efficiency.\nWho should attend?\nIT professio
 nals experienced in the governance\, architecture\, and lifecycle of data 
 privacy at a technical level.\n Course Content\nDomain 1. Privacy Governa
 nce\n\nIdentify issues requiring remediation and opportunities for process
  improvement.\n\n 	Identify the internal and external privacy requirements
  specific to the organization's governance and risk management programs an
 d practices.\n 	Participate in the evaluation of privacy policies\, progra
 ms and policies for their alignment with legal requirements\, regulatory r
 equirements and/or industry best practices.\n 	Coordinate and/or perform p
 rivacy impact assessments (PIA) and other privacy-focused assessments.\n\n
 Domain 2. Privacy Architecture\n\nCollaborate with other practitioners to 
 ensure that privacy programs and practices are followed during the design\
 , development and implementation of systems\, applications and infrastruct
 ure.\n\n 	Coordinate and/or perform privacy impact assessment (PIA) and ot
 her privacy-focused assessments to identify appropriate tracking technolog
 ies and technical privacy controls.\n 	Participate in the development of p
 rivacy control procedures that align with privacy policies and business ne
 eds.\n 	Implement procedures related to privacy architecture that align wi
 th privacy policies.\n\nDomain 3. Data Lifecycle\nParticipate in the devel
 opment of data lifecycle procedures that align with privacy policies and b
 usiness needs.\n\n 	Identify the internal and external privacy requirement
 s relating to the organization's data lifecycle practices.\n 	Coordinate a
 nd/or perform privacy impact assessments (PIA) and other privacy-focused a
 ssessments relating to the organization’s data lifecycle practices.\n 	P
 articipate in the development of data lifecycle procedures that align with
  privacy policies and business needs.\n\nCDPSE Examination Weights\n\n\n\n
 Domains\nAverage Weight\n\n\n1. Privacy Governance\n34%\n\n\n2. Privacy Ar
 chitecture\n36%\n\n\n3. Data Lifecycle\n30%\n\n\nTotal\n100%\n\n\n\nTraini
 ng Info\nLanguage: Conducted in Thai Language\nDuration: 3 Days\nDate: 
 Mar 25 - 27\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, Grande C
 entre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nPrice: 34\,000.- (ex
 .vat)\nTel : 02 670 8980-3 ext. 321-323\nE-mail: training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/07/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-2.png
END:VEVENT
BEGIN:VEVENT
UID:542@acinfotec.com
DTSTART:20260326T023000Z
DTEND:20260327T093000Z
DTSTAMP:20260107T090050Z
URL:https://www.acinfotec.com/training-event/cobit-2019/
SUMMARY:COBIT 2019
DESCRIPTION:About this course \n\nThe heart of the COBIT framework updates 
 COBIT principles while laying out the structure of the overall framework.\
 n\n 	New concepts are introduced and terminology is explained—the COBIT 
 Core Model and its 40 governance and management objectives provide the pla
 tform for establishing your governance program\n 	The performance manageme
 nt system is updated and allows the flexibility to use maturity measuremen
 ts as well as capability measurements\n 	Introductions to design factors a
 nd focus areas offer additional practical guidance on flexible adoption of
  COBIT 2019\, whether for specific projects or full implementation\n\nFrom
  its foundation in the IT audit community\, COBIT has developed into a bro
 ader and more comprehensive information and technology (I&amp\;T) governan
 ce and management framework and continues to establish itself as a general
 ly accepted framework for I&amp\;T governance.\n\nCOBIT is a framework for
  the governance and management of enterprise information and technology\, 
 aimed at the whole enterprise. Enterprise IT means all the technology and 
 information processing the enterprise puts in place to achieve its goals\,
  regardless of where this happens in the enterprise. In other words\, ente
 rprise IT is not limited to the IT department of an organization\, but cer
 tainly includes it.\n\nCOBIT defines the components to build and sustain a
  governance system: processes\, organizational structures\, policies and p
 rocedures\, information flows\, culture and behaviors\, skills\, and infra
 structure.\nWho Should attend? \n\n 	IT Team leaders and Managers\n 	IT pr
 ofessionals responsible for Business Performance/ Quality Professional\n 	
 Risk management Team/ Risk Advisor\n 	IT Security and Privacy technician\n
  	Compliance Professionals\n 	Auditor\n 	Developers\n 	IT practitioner\n 	
 IT consultant\n\nCourse contents\nParticipants will learn more about:\n\n 
 	Key concepts and terminology\n 	Governance and Framework Principles\n 	CO
 BIT Principles\n 	COBIT Governance and Management Objectives\n 	Performanc
 e Management in COBIT\n 	Designing a Tailored Governance System\n 	Busines
 s Case and Implementation\n 	COBIT and Other Standards\n\nThe program incl
 ude 4 core publications.\n\n 	Introduction and Methodology\n 	Governance a
 nd Management Objectives\n 	Designing an Information and Technology Govern
 ance Solution\n 	Implementing and Optimizing an Information and Technology
  Governance Solution\n\nTraining info\nDuration:  2 Days\nDate:  Mar 26
  - 27\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Trainin
 g Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ram
 a 4 Rd.\nTraining Fees: 18\,900 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.32
 1-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/COBIT-Services.jpg
CATEGORIES:Risk Based IT Audit,Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:616@acinfotec.com
DTSTART:20260326T023000Z
DTEND:20260327T093000Z
DTSTAMP:20251219T034711Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -professional-cipp-new-eng/
SUMMARY:Certified Information Privacy Professional/Europe (CIPP/E) (Thai)
DESCRIPTION: \nAbout this course\nThis  training encompasses pan-European 
 and national data protection laws\, key data protection terminology and pr
 actical concepts concerning the protection of personal data and trans-bord
 er data flows.\nThe CIPP/E program was developed by the International Asso
 ciation of Privacy Professionals (IAPP)\, which is the world’s largest c
 omprehensive global information privacy community and resource. The CIPP/E
  certification holds accreditation under ISO 17024: 2012.\nAchieving a CIP
 P/E credential shows you have the comprehensive GDPR knowledge\, perspecti
 ve and understanding to ensure compliance and data protection success in E
 urope—and to take advantage of the career opportunity this sweeping legi
 slation represents. Adding the CIPM to your CIPP/E puts you at the forefro
 nt of ensuring you are ready for the GDPR.\n\nCourse Benefits\n\nIt will s
 how the world that you know privacy laws and regulations and how to apply 
 them\, and that you know how to secure your place in the information econo
 my. When you earn a CIPP credential\, it means you’ve gained a foundatio
 nal understanding of broad global concepts of privacy and data protection 
 law and practice\, including: jurisdictional laws\, regulations and enforc
 ement models\; essential privacy concepts and principals\; legal requireme
 nts for handling and transferring data and more.\n\nWhat you’ll learn\n\
 n 	Introduction to European Data Protection\n 	European Regulatory Institu
 tions\n 	Legislative Framework\n 	Compliance with European Data Protection
  Law and Regulation\n 	International Data Transfers\n\nWho should attend?\
 n\n 	Data Protection Lawyers\n 	Records Managers\n 	Information Officers\n
  	Compliance Officers\n 	Human Resource Officers\n 	Anyone who uses\, proc
 esses and maintains personal data\n\nCourse Contents\n\n 	Module 1: Data 
 protection laws\nIntroduces key European data protection laws and regulato
 ry bodies\, describing the evolution toward a harmonized legislative frame
 work.\n 	Module 2: Personal data\nDefies and differentiates between types
  of data as defied by the GDPR\, including personal\, anonymous\, pseudony
 mous and special categories.\n 	Module 3: Controllers and processors\nDes
 cribes the roles and relationships of controllers and processors as defied
  by the GDPR.\n 	Module 4: Processing personal data\nDefies data processi
 ng and GDPR processing principles\, explains the application of the GDPR a
 nd outlines the legal grounds for processing personal data.\n 	Module 5: 
 Data subject rights\nDescribes data subject rights\, applications of right
 s\, and controller and processor obligations as set out in the GDPR.\n 	Mo
 dule 6: Information provision obligations\nExplains controller obligation
 s for providing information about data processing activities to data subje
 cts and supervisory authorities as set out in the GDPR.\n 	Module 7: Inte
 rnational data transfers\nOutlines options and obligations under the GDPR 
 for transferring data outside the European Economic Area\, including adequ
 acy decisions and appropriate safeguards and derogations.\n 	Module 8: Co
 mpliance considerations\nDiscusses the applications of European data prote
 ction laws\, legal bases and compliance requirements for processing person
 al data in practice\, including employers processing employee data\, surve
 illance\, direct marketing\, and internet technology and communications.\n
  	Module 9: Security of processing\nDiscusses considerations and duties o
 f controllers and processors for ensuring security of personal data and GD
 PR specifications for providing notification of data breaches.\n 	Module 1
 0: Accountability\nInvestigates accountability requirements\, including d
 ata protection management systems\, data protection impact assessments\, d
 ata protection policies and the role of the data protection officer.\n 	Mo
 dule 11: Supervision and enforcement\nDescribes the role\, powers and pro
 cedures of supervisory authorities\; the composition and tasks of the Euro
 pean Data Protection Board\; the role of the European Data Protection Supe
 rvisor\; and remedies\, liabilities and penalties for noncompliance as set
  out in the GDPR.\n\nTraining Info:\n\nLanguage: Conducted in Thai Languag
 e\nDuration: 2 Days\nTraining Date: Mar 26 - 27\, 2026\nVenue: ACinfotec T
 raining Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) 
 \, Rama 4 Rd.\nTraining Fees: 49\,900 (Exam Included)\nTel : 02 670 8980-3
  ext. 321-323\nE-mail: training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 1/03/CIPP_logo.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:877@acinfotec.com
DTSTART:20260401T023000Z
DTEND:20260403T093000Z
DTSTAMP:20260107T090123Z
URL:https://www.acinfotec.com/training-event/comptia-project-exam-included
 /
SUMMARY:CompTIA Project+ (Exam Included)
DESCRIPTION:About this course      \nCompTIA Project+ Opens the Door t
 o Your Project Management Career! CompTIA Project+ covers the methodologie
 s\, frameworks and Agile skills necessary to efficiently manage and delive
 r IT projects while taking new topics like change management and complianc
 e into consideration. CompTIA Project+ is ideal for professionals handling
  less-complex projects while also managing the project life cycle\, ensuri
 ng appropriate communication\, managing resources and maintaining project 
 documentation. CompTIA Project+ is good for life. That means once you are 
 Project+ certified\, you won’t ever need to renew your certification. In
 stead\, you can focus on building your knowledge and advancing your career
 .\n\nCourse Benefits\nCOMPTIA PROJECT+ PROVES CERTIFIED PROFESSIONALS HAVE
  THE SKILLS REQUIRED FOR HIGH-STAKES PROJECT MANAGEMENT\nWhat Skills Will 
 You Learn?\n\nProject Basics\nThe properties of project\, phases\, schedul
 es\, roles and responsibilities\, and cost controls\, as well as the basic
  aspects of Agile methodology.\nProject Constraints\nThe impact of various
  constraint variables and influences throughout the project and the import
 ance of risk strategies and activities.\nCommunication and Change Manageme
 nt\nThe appropriate communication methods of influence and change control 
 processes within the context of a project.\nProject Tools and Documentatio
 n\nVarious project management tools and project and partner-centric docume
 ntation.\nWho should Attend?\n\n 	IT Project Manager\n 	Project Coordinato
 r\n 	IT Support Manager\n 	Business Analyst\n 	IT Manager\n\nCourse Conten
 ts\n1. Preparing for the Project \n1 A Understand Project Management Basi
 cs\n1 B Develop the Business Case\n1 C Identify Project Characteristics\n\
 n2. Selecting the Project Framework \n2A Identify Project Methodologies\n
 2B Compare Agile and Waterfall Project\n\n3. Initiating the Project\n3A Bu
 ild a Project Team\n3B Prepare Project Initiation Documents\n\n4. Facilita
 tion Effective Meetings \n4A Lead Effective Meetings\n4B Use Project mana
 gement Tools\n4C create a Communication Plan\n\n5. Implementing Solution D
 esign\n5A Create a Solution Desing\n5B Evaluate IT Infrastructure Needs\n\
 n6. Managing Resources\n6A Describe the Resource Life Cycle\n6B Conduct a 
 Needs Assessment\n\n7. Managing Risk\n7A Identify and Analyze Risk\n7B Tre
 at and Monitor Risk\n\n8. Creating a Project Schedule\n8A Define Units of 
 Work\n8B Sequence the Activities\n\n9. Creating a Project Plan\n9A Refine 
 the Timeline\n9B Establish Project Baselines\n9C Create a Quality Assuranc
 e Plan\n\n10. Procuring Solutions \n10A Compare Procurement Options\n10B 
 Evaluate and Select Vendors\n\n11 . Managing Project Execution\n11A Docume
 nt Progress\n11B Communicate Progress\n\n12. Managing Issues and Changes\n
 12A Resolve Issues\n12B Control Changes\n\n13. Managing Performance\n13A M
 easure Performance\n13B Maintain the Project Schedule\n\n14. Wrapping Up t
 he Project\n14A Prepare for Project Closure\n14B Close the Project\n\nGuid
 e for CompTIA Project+ Examination\nExam Details\nCompTIA Project+ is idea
 l for IT professionals who need to manage smaller\, less-complex projects 
 as part of their other job duties but still have foundational project mana
 gement skills. Project+ is versatile because it covers essential project m
 anagement concepts beyond the scope of just one methodology or framework.\
 n\n\n\nExam Code\nPK0-005\n\n\nExam Description\nCompTIA Project+ is ideal
  for IT professionals who need to manage smaller\, less-complex projects a
 s part of their other job duties but still have foundational project manag
 ement skills. Project+ is versatile because it covers essential project ma
 nagement concepts beyond the scope of just one methodology or framework.\n
 \n\nNumber of Questions\nMaximum of 90 questions\n\n\nType of Questions\nM
 ultiple-choice (single and multiple response) and performance-based\n\n\nL
 ength of Test\n90 Minutes\n\n\nPassing Score\n710 (on a scale of 100-900)\
 n\n\nRecommended Experience\nEquivalent to at least 6–12 months of hands
 -on experience managing projects in an IT environment\n\n\nLaunch Date\nNo
 vember 8\, 2022\n\n\nRetirement\nUsually three years after launch\n\n\nLan
 guages\nEnglish\, Japanese\, Thai\n\n\n\nTraining Info\n\nLanguage : Condu
 cted in Thai Language\n\nDuration : 3 Days\nDate : Apr 1-3\, 2026\nTime : 
 9.30 - 16.30 pm\nVenue : ACinfotec Training Center\n16th Fl.\, Grande Cent
 re Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact: 02 670 8980-3 
 ext.321-323\nPrice: 39\,000 Baht (Ex.vat 7% )
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:533@acinfotec.com
DTSTART:20260401T023000Z
DTEND:20260403T093000Z
DTSTAMP:20260107T090210Z
URL:https://www.acinfotec.com/training-event/ec-council-certified-incident
 -handler-ecihv2-thai-exam-included/
SUMMARY:EC-Council Certified Incident Handler (ECIHv3) (Exam Included)
DESCRIPTION:About this course\nEC-Council's Certified Incident Handler prog
 ram equips students with the knowledge\, skills\, and abilities to effecti
 vely prepare for\, deal with\, and eradicate threats and threat actors in 
 an incident. This program provides the entire process of incident handling
  and response and hands-on labs that teach the tactical procedures and tec
 hniques required to effectively plan\, record\, triage\, notify and contai
 n. Students will learn the handling of various types of incidents\, risk a
 ssessment methodologies\, as well as laws and policies related to incident
  handling. After attending the course\, students will be able to create IH
 &amp\;R policies and deal with different types of security incidents such 
 as malware\, email security\, network security\, web application security\
 , cloud security\, and insider threat-related incidents.\n\nThe E|CIH (EC-
 Council Certified Incident Handler) also covers post incident activities s
 uch as containment\, eradication\, evidence gathering and forensic analysi
 s\, leading to prosecution or countermeasures to ensure the incident is no
 t repeated. The E|CIH is a method-driven course that provides a holistic a
 pproach covering vast concepts related to organizational IH&amp\;R\, from 
 preparing/planning the incident handling response process to recovering or
 ganizational assets from the impact of security incidents. These concepts 
 are essential for handling and responding to security incidents to protect
  organizations from future threats or attacks.\n\nWith over 95 advanced la
 bs\, 800 tools covered\, and exposure to incident handling activities on m
 any different operating systems\, E|CIH provides a well-rounded\, but tact
 ical approach to planning for and dealing with cyber incidents. The E|CIH 
 program addresses all stages involved in the IH&amp\;R process\, and this 
 attention toward a realistic and futuristic approach makes E|CIH one of th
 e most comprehensive IH&amp\;R-related certifications in the market today\
 nWho should attend?\n\n 	Incident Handler\n 	Incident Responder\n 	Inciden
 t Response Consultant/Associate /Analyst/Engineer/Specialist/ Expert/Manag
 er\n 	CSIRT Analyst/Engineer/Manager\n 	Information Security Associate/Ana
 lyst/Engineer/Specialist/Manager\n 	Cyber Defense Security Consultant/Asso
 ciate/Analyst\n 	IT Security Operations Center Analyst (SOC Analyst/Engine
 er)\n 	Cyber Forensic Investigator/Consultant/Analyst/Manager\n 	Digital F
 orensic Analyst\n 	Cyber Risk Vulnerability Analyst/Manager\n 	Cyber Intel
 ligence Analyst and Cyber Security Threat Analyst/Specialist\n 	Cyber Secu
 rity Incident Response Team Lead\n 	Penetration Tester\n\n\n\n\n\n\nLearn 
 the 9 Stages of Incident Handling &amp\; Response (IH &amp\; R) Process\n\
 n 	Planning\n 	Recording &amp\; Assignment\n 	Triage\n 	Notification\n 	Co
 ntainment\n 	Post Incident Activities\n 	Recovery\n 	Eradication\n 	Eviden
 ce Gathering &amp\; Forensics Analysis\n\nKey Features &amp\; Critical Com
 ponents of E|CIH Program\n\n 	\n1600+ Pages of the comprehensive student m
 anual\n\n 	\n800+ Incident handling and response tools\n\n 	\n780+ Illustr
 ated instructor slides\n\n 	\n125 Incident handling templates\, checklists
 \, and toolkits\n\n 	\n95 Labs environment simulates a real-time environme
 nt (Covered in 22 Scenario-based Labs)\n\n 	\n10+ Incident handling playbo
 oks and runbooks\n\n 	\n100%  Compliance to NICE 2.0 Framework\n\n 	\n100
 % compliance with CREST CCIM\n\n\nBased on a Comprehensive Industry-wide J
 ob Task Analysis (JTA)\nStructured approach for performing incident handli
 ng and response process.\nFocus on developing skills in handling different
  types of cybersecurity incidents\n\n\n\n\n\nCourse Contents\n\n 	Module 0
 1: Introduction to Incident Handling and Response\n 	Module 02: Incident H
 andling and Response Process\n 	Module 03: First Response\n 	Module 04: Ha
 ndling and Responding to Malware Incidents\n 	Module 05: Handling and Resp
 onding to Email Security Incidents\n 	Module 06: Handling and Responding t
 o Network Security Incidents\n 	Module 07: Handling and Responding to Web 
 Application Security Incidents\n 	Module 08: Handling and Responding to Cl
 oud Security Incidents\n 	Module 09: Handling and Responding to Insider Th
 reats\n 	Module 10: Handling and responding to Endpoint Security Incidents
  (New!!)\n\n\nTop: Latest Templates\, Checklists\, and Toolkits:\n\n• Di
 gital Forensics eadiness Policy Document Template\n• Incident Handling a
 nd Response Plan Template\n• Incident Handling and Response Policy and P
 rocedure Document Template\n• Incident Handler Checklist\n• Incident R
 esponder Toolkit Requirements\n• Forensics Investigative Analysis Report
  Recognition / Endorsement / Mapping\nTraining Info\nDuration:  3 Days\nD
 ate:  Apr 1-3\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfote
 c Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workla
 b) \, Rama 4 Rd.\nTraining Fees: 45\,000 Baht (ex.vat7%)\nTel. 02 670 8980
 -3 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nwww.eccouncil.com\n\n
 &nbsp\;\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/hc135990835053.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:494@acinfotec.com
DTSTART:20260402T023000Z
DTEND:20260403T093000Z
DTSTAMP:20260107T090229Z
URL:https://www.acinfotec.com/training-event/exploiting-and-securing-web-a
 pplication-in-house-training/
SUMMARY:Exploiting and Securing Web Application (In-House Training)
DESCRIPTION:About this course\nThe development of Web 2.0\, HTML5 technolog
 y and better internet services allow users to interact\, generate contents
 \, and access information anytime and anywhere. Businesses are moving to o
 nline and running mainly on web application which serves a large amount of
  sensitive information\, especially personal and financial data. All of th
 ese advancements in web applications have also attracted malicious hackers
  and scammers\, who are always coming up with new attack vectors. To make 
 matters worse\, over the past few years\, user information has become more
  profitable to attackers. These all have raised critical concerns for ensu
 ring the privacy of digital communications and rendered the need for robus
 t protection mechanisms over the web. Such demands are pushing web develop
 ers to have a basic knowledge of web application security in order to impl
 ement and deploy their code securely.\n\nWe will wear many hats in this tr
 aining. We will point out numerous exploitations e.g.\, Injection attacks 
 to steal data\, Cross Site Scripting (XSS) vulnerabilities to compromise a
  user’s browser\, break authentication to gain access to data and access
  some secrets. We will also wear Defender Hats. We will discuss various mi
 tigation strategies as well as explore some of code examples and fix the r
 oot cause of these vulnerabilities.\n\nSince we want to make this training
  more practical and applicable to developers\, we will also focus on devel
 oping software using Secure Software Development Life Cycle (Secure SDLC).
  We will detail some of common developers' mistakes in implementations and
  deployments which in turn become security vulnerabilities of their system
 s.\n\nThis training is mainly based on OWASP The Top-10 Project\, WebGoat\
 , an OWASP project designed to teach penetration testing for web applicati
 ons as well as the instructor's web security experience and knowledge. In 
 addition\, we will discuss online resources as well as useful tools to hel
 p developers create a more secure web application.\nCourse Requirement?\n\
 n 	At least 1-2-year programming experience\n 	Interested in security and/
 or wanted to build more secure (web) applications\n\nCourse Contents\nDay1
  : \n\nCyber Security\n\n 	CIA Triad: Confidentiality\, Integrity\, Availa
 bility\n 	"Security" as part of system initial design\n 	Cyber security at
 tacks and trends in 2010s\n 	Overview of resources and tools for this trai
 ning: OWASP WebGoat Project\n\nWeb Application in a nutshell\n\n 	Web 2.0 
 as stateless request-response\n 	Request: GET vs POST\n 	HTTP and HTTPS\n 
 	Authentication: Cookie\, OAuth\n\nUnderstanding Web Application Security\
 n\nExplore common web application vulnerabilities\, selected from OWASP To
 p 10 2013 and 2017.\n\nSensitive Data Exposure [A3: 2017]\n\n 	Why we care
  about data: Data leakage impacts\, PII\, EU GDPR\, user privacy\n 	Attack
  vector examples. Popular attack vectors e.g.\, man-in-the-middle attacks 
 (HTTP\, SSL/TLS striping\, session hijacking\, replay)\n 	Encryption at be
 st (Enforce encryption deployment): HSTS\n 	How to store sensitive data\, 
 or how not to store sensitive data\n\nCross-Site Request Forgery (CSRF) [A
 8: 2013]\n\n 	What is Cross-site Request Forgery\n 	Vulnerable code exampl
 es\n 	DEMO: CSRF in action (e.g.\, on java web application)\n 	Basic testi
 ng and how to prevent CSRF attacks and practical countermeasures (e.g.\, p
 reventing CSRF in java)\n 	DEMO: Testing our measurement deployment\n\nCro
 ss-site Scripting Attacks (XSS) [A7: 2017\, A3: 2013]\n\n 	DOM\, Dynamical
 ly Generating Pages\, and Cross-Site Scripting (XSS)\n 	XSS vulnerabilitie
 s\n 	Dangers of XSS attacks\n 	DEMO: XSS attacks in action\n 	Protection a
 gainst XSS\n 	Patching reflected XSS\n 	DEMO: example of patching an XSS v
 ulnerability\n\nInjection [A1: 2017\, A4: 2017\, A1: 2013]\n\n 	Injection 
 attacks and popular injection attacks\n 	SQL syntax and basics\n 	SQL inje
 ction attacks\n 	Mitigating SQL Injection Using Prepared Statements\, Stor
 ed Procedures\, Whitelisting\n\nBroken Authentication and Session Manageme
 nt [A2: 2017\, A2: 2013]\n\n 	Common authentication weaknesses\n 	Protecti
 ng our user → Protect our system: how to prevent automated\, credential 
 stuffing\, brute force\, and stolen credential reuse attacks\n 	Hey what i
 s your password? It is "password"\n 	Common session management weaknesses\
 n 	DEMO: WebGoat’s Session Management Vulnerability\n\nInsecure Deserial
 ization [A8: 2017]\n\n 	What is serialization and deserialization?\n 	Obje
 ct serialization attack examples e.g.\, untrusted input\n 	Countermeasures
  e.g.\, integrity checks\, hash and signatures\n 	OWASP Deserialization se
 curity risks\n\nBroken Access Control [A5: 2017\, A4: 2013\, A7: 2013]\n\n
  	Access control and authorization\n 	Example scenarios e.g.\, users acces
 s API with missing authorization\n 	Rate limit APIs\n 	OWASP Testing for A
 ccess Control\n\nDay 2\n\nSecure Software Development Life Cycle (Secure S
 DLC)\n\nExplore the Secure SDLC as well as OWASP Top-10 vulnerabilities th
 at are common mistakes from development process.\n\nPlanning and Requireme
 nt\n\n 	Goal\, threat modeling\, security baselines\, mapping assets\n 	Se
 curity training and awareness\n\nArchitecture and design\n\n 	Because secu
 rity is not only at the testing phrase\n 	Security design and peer review\
 n\nDevelopment\n\n 	Security review and peer review\n 	Software version co
 ntrol\n 	Unit testing\n\nSecurity Testing\, Deployment and Beyond\n\nVulne
 rability scanning: Static and dynamic analysis\n\nSecurity Misconfiguratio
 n [A6: 2017\, A5: 2013]\n\n 	Security misconfiguration: Configuration madn
 esses on level of application stacks (web components)\n 	Common misconfigu
 rations e.g.\, develop vs production environment\n 	Example of web securit
 y misconfigurations e.g.\, HTTP headers: HSTS\, CORS\, Content Security Po
 licy\n 	Upgrade and deployment processes\n 	OWASP Testing guidelines\n\n- 
 Using Components with Known Vulnerabilities [A9: 2013\, A9: 2013]\n\n 	Act
 ively monitoring: update\, upgrade\, patch them!\n 	List of vulnerabilitie
 s and testing before and after deployment\n 	Zero-day vulnerabilities\n 	O
 WASP Testing guidelines\n 	Security tools to check vulnerabilities (automa
 ted style!)\n\nInsufficient Logging and Monitoring [A10: 2017]\n\n 	Why lo
 gging and monitoring?\n 	How to store security logs\n 	Penetration testing
 \n 	Real-time logging analysis\, anomaly detection\, and security data sci
 ence\n\nConclusion\n\nReview\, Take away\, Other useful resources\, tools 
 and feature readings\n\nQ&amp\;A\nTraining info\nDuration : 2 Days\nDate :
  Apr 2 - 3\, 2026\nTime : 9.30-16.30 pm.\nVenue : Client's Venue\nTrainin
 g Fee : Please Call\nTel. 02 670 8980-3 ext. 321-323\nEmail. training@acin
 fotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/01/Exploiting-and-Securing-Web-Application.png
CATEGORIES:Web Application
END:VEVENT
BEGIN:VEVENT
UID:560@acinfotec.com
DTSTART:20260402T023000Z
DTEND:20260403T093000Z
DTSTAMP:20251219T034625Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -technology-cipt-new-3/
SUMMARY:Certified Information Privacy Technologist (CIPT) (Thai)
DESCRIPTION: \n&nbsp\;\nAbout this course\nData privacy regulations worldwi
 de require privacy protections be built into products and services. IAPP P
 rivacy in Technology training\, aligned with the ANSI/ISO-accredited CIPT
  certification program\, will provide you with the knowledge to recognize
  privacy threats and skills to apply technical strategies to mitigate priv
 acy risk throughout the software and systems development lifecycles.\n Co
 urse Benefits\nPrivacy in Technology training teaches technology and data 
 professionals how to understand and integrate strategies and techniques to
  minimize privacy threats. The curriculum includes privacy-by-design princ
 iples\; implementing data- and process-oriented strategies to support priv
 acy policies\; and managing threats from AI\, location tracking\, etc.\n 
 Who should attend?\n\n 	Data Scientists/Analysts/Architects\n 	IT Managers
  and Administrators\n 	Records Managers\n 	System Developers\n 	Software E
 ngineers/Designers\n 	Privacy Engineers/Developers\n 	System Administrator
 s\n 	UX Designers\n 	Cybersecurity Professionals\n\n Course Contents\nMod
 ule 1: Foundational Principles in Technology\n\n 	Summarizes the foundatio
 nal elements for embedding privacy in technology through privacy by design
  and value sensitive design\; reviews the data life cycle and common priva
 cy risk models and frameworks.\n\nModule 2: The Tech Pro’s Role in Priva
 cy\n\n 	Reviews the fundamentals of privacy as they relate to the privacy 
 technologist\; describes the privacy technologist’s role in ensuring com
 pliance with privacy requirements and meeting stakeholder privacy expectat
 ions\; explores the relationship between privacy and security.\n\nModule 3
 : Privacy threats and violations\n\n 	Identifies inherent risks throughout
  the stages of the data life cycle and explores how software security help
 s mitigate privacy threats\; examines the impacts that behavioral advertis
 ing\, cyberbullying and social engineering have on privacy within the tech
 nological environment.\n\nModule 4: Technical measures and privacy-enhanci
 ng technologies \n\n 	Outlines the strategies and techniques for enhancing
  privacy throughout the data life cycle\, including: identity and access m
 anagement\; authentication\, encryption\, and\naggregation\; collection an
 d use of personal information.\n\nModule 5: Privacy engineering\n\n 	Explo
 res the role of privacy engineering within an organization\, including the
  objectives of privacy engineering\, privacy design patterns\, and softwar
 e privacy risks.\n\nModule 6: Privacy-by-design methodology\n\n 	Illustrat
 es the process and methodology of the privacy-by-design model\; explores p
 ractices to ensure ongoing vigilance when implementing privacy by design.\
 n\nModule 7: Technology challenges for privacy\n\n\n 	Examines the unique 
 challenges that come from online privacy issues\, including automated deci
 sion making\, tracking and surveillance technologies\, anthropomorphism\, 
 ubiquitous computing and mobile social computing.\n\n\n\n\n 	Privacy in Te
 chnology online training.\n 	One-year IAPP membership.\n 	CIPT sample ques
 tions (digital).\n 	CIPT certification exam.\n 	Two digital textbooks.\n\n
 Training Info:\n\nLanguage: Conducted in Thai Language\nDuration: 2 Days
 \nDate: Apr 2 - 3\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, Gr
 ande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees:
  49\,900 (Exam Included)\nTel : 02 670 8980-3 ext. 321-323\nE-mail: traini
 ng@acinfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/cipt-seal.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:325@acinfotec.com
DTSTART:20260403T023000Z
DTEND:20260403T093000Z
DTSTAMP:20260107T090243Z
URL:https://www.acinfotec.com/training-event/digital-forensics-unlocking-t
 he-secrets-thai/
SUMMARY:Digital Forensics – Unlocking the Secrets (Thai)
DESCRIPTION:About this course\nA one day training course for legal professi
 onals who have to deal with digital evidence. The course will look at the 
 types of digital evidence that is routinely produced for legal proceedings
  and the potential issues surrounding that evidence.\nThe course will prov
 ide an overview of the forensic principles\, techniques and terminology us
 ed by forensic investigators. The aim is to provide the candidate with a l
 evel of understanding so they can interpret forensic reports and assess th
 e authenticity and integrity of the digital evidence. A reference manual w
 ill be provided to each candidate along with a certificate of completion c
 onfirming the number of training hours undertaken.\n\nWho Should attend?\n
 The course is aimed at legal professionals who are required to deal with d
 igital evidence. No previous experience is required. \nCourse Contents\n1
  – Introduction to Digital Forensics\n\n 	Define Digital Forensics\n 	Le
 gal Considerations\n 	Integrity of Digital Evidence\n\n2 - Investigation F
 undamentals\n\n 	Best Practice Guidelines\n 	The Four Principles of Comput
 er Based Evidence\n 	Identifying Electronic Sources of Evidence\n 	The Fou
 r Levels of Computer Data\n 	Types of Data\n\n3 - Forensic Techniques / Te
 rms Explained\n\n 	Forensic Image\n 	Forensic Clone\n 	Hash Values (digita
 l fingerprint)\n 	Forensic Acquisition Reports\n\n4 - What Happens to Del
 eted Data?\n\n 	Live Data\n 	Deleted Data\n\n5 – Types of Digital Eviden
 ce\n\n 	Types of Digital Evidence\n\n6 - Understanding Digital Evidence\n\
 n 	Time and Date Stamps (what you need to know)\n 	File Metadata (the hidd
 en information)\n 	Internet History\n 	Email Headers\n\nTraining Info\nDur
 ation:  1 Day\nDate:  Apr 3\, 2026\nTime:  9.30 am. – 16.30 pm.\nVe
 nue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini
  Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 9\,950 Baht (ex.vat7%)\nT
 el. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/01/image004.png
CATEGORIES:Digital Forensics,ICMS
END:VEVENT
BEGIN:VEVENT
UID:463@acinfotec.com
DTSTART:20260407T023000Z
DTEND:20260410T093000Z
DTSTAMP:20260112T101813Z
URL:https://www.acinfotec.com/training-event/comptia-network-exam-included
 -5/
SUMMARY:CompTIA Network+ (Exam Included)
DESCRIPTION:About this course      \n\nThis CompTIA's Network+ will pr
 oviding proof of your knowledge\, skills\, and ability to manage\, maintai
 n\, troubleshoot\, install\, operate\, and configure basic network infrast
 ructure. CompTIA Network+ Course points you in the right direction\, allo
 wing you to demonstrate the concepts covered on the Network+ in a real-wor
 ld environment.\n\nCourse Benefits\n\nNetwork+ ensures an IT professional 
 has the knowledge and skills to:\n\n 	Design and implement functional netw
 orks\n 	Configure\, manage\, and maintain essential network devices\n 	Use
  devices such as switches and routers to segment network traffic and creat
 e resilient networks\n 	Identify benefits and drawbacks of existing networ
 k configurations\n 	Implement network security\, standards\, and protocols
 \n 	Troubleshoot network problems\n 	Support the creation of virtualized n
 etworks\n\nWho should Attend?\n\n 	Junior Network Administrator\n 	Compute
 r Technician\n 	Network Field Technician\n 	Help Desk Technician\n 	Junior
  System Engineer\n 	System Engineer\n 	IS Consultant\n 	Network Support Sp
 ecialist\n 	Network Field Engineer\n 	Network Analyst\n\nCourse Contents\n
 \n\n1 - Network Theory\n\n 	Networking Terminology\n 	Network Categories\n
  	Standard Network Models\n 	Physical &amp\; Logical Network Topologies\n\
 n2 - Network Media and Hardware\n\n 	Bounded Network Media\n 	Unbounded Ne
 twork Media\n 	Network Connectivity Devices\n\n3 - Network Implementations
 \n\n 	Ethernet Networks\n 	Wireless Networks\n\n4 - Networking Models\n\n 
 	The OSI Model\n 	The TCP/IP Model\n\n5 - TCP/IP Fundamental\n\n 	The TCP/
 IP Protocol Suite\n 	IP Addressing (Version 4 &amp\; Version 6)\n 	Domain 
 Naming Services\n 	Dynamic Host Configuration Protocol Services\n\n6 - LAN
  Infrastructure\n\n 	Switching\n 	Enable Static Routing\n 	Implement Dynam
 ic IP Routing\n 	Virtual LANs\n\n7 - WAN Infrastructure\n\n 	WAN Transmiss
 ion Technologies\n 	WAN Connectivity Methods\n\n8 – Remote Networking &a
 mp\; Management\n\n 	Network Monitoring\n 	Remote Network Architectures\n 
 	Virtual Private Networking\n\n9 - System Security\n\n 	Computer Security 
 Basics\n 	System Security Tools\n 	Authentication Methods\n 	Encryption Me
 thods\n\n10 - Network Security\n\n 	Network Vulnerabilities\n 	Network Per
 imeter Security\n 	Intrusion Detection and Prevention\n\n11 - Network Secu
 rity Threats and Risks\n\n 	Network-Based Security Threats and Attacks\n 	
 Apply Threat Mitigation Techniques\n 	Educating Users / Officers\n\n12 - N
 etwork Troubleshooting\n\n 	Network Troubleshooting Utilities\n 	Hardware 
 Troubleshooting Tools\n 	Common Connectivity Issues\n\nTraining Info\n\nLa
 nguage : Conducted in Thai Language\nDuration : 4 Days\nDate : Apr 7 - 10\
 , 2026\nTime : 9.30 - 16.30 pm\nVenue : ACinfotec Training Center\n1188 Gr
 ande Centre Point Lumphini Building\, 16th Floor\,\nRama 4 Road.\, Thungma
 hamek\, Sathon\, Bangkok\, 10120\nContact: 02 670 8980-3 ext.321-323\nPric
 e: 45\,000 Baht (Ex.vat 7% )
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:480@acinfotec.com
DTSTART:20260407T023000Z
DTEND:20260410T093000Z
DTSTAMP:20260107T090259Z
URL:https://www.acinfotec.com/training-event/ccsp-certified-cloud-security
 -professional-exam-excluded/
SUMMARY:CCSP - Certified Cloud Security Professional (Exam Prep)
DESCRIPTION:Course Overview\nAs powerful as cloud computing is for the orga
 nization\, understanding its information security risks and mitigation str
 ategies is critical. Legacy approaches are inadequate\, and organizations 
 need competent\, experienced professionals equipped with the right cloud s
 ecurity knowledge and skills to be successful. They need CCSPs.\n\nBacked 
 by the two leading non-profits focused on cloud and information security\,
  the Cloud Security Alliance (CSA) and (ISC) ²\, the CCSP credential de
 notes professionals with the deep-seated knowledge and competency derived 
 from hands-on experience with cyber\, information\, software and cloud com
 puting infrastructure security. CCSPs help you achieve the highest standar
 d for cloud security expertise and enable your organization to benefit fro
 m the power of cloud computing while keeping sensitive data secure.\nWho s
 hould Attend?\nCCSP is most appropriate for those whose day-to-day respons
 ibilities involve procuring\, securing and managing cloud environments or 
 purchased cloud services. In other words\, CCSPs are heavily involved with
  the cloud. Many CCSPs will be responsible for cloud security architecture
 \, design\, operations\, and/or service orchestration.\n\nExample job func
 tions include\, but are not limited to:\n\n 	Enterprise Architect\n 	Secur
 ity Administrator\n 	Systems Engineer\n 	Security Architect\n 	Security Co
 nsultant\n 	Security Engineer\n 	Security Manager\n 	Systems Architect\n\n
 Course Contents\nCCSP is a global credential born from the expertise of th
 e two industry-leading stewards of information systems and cloud computing
  security\, (ISC)² and CSA. The CCSP credential is appropriate and applic
 able to cloud security in a global environment. This is especially importa
 nt given the legal\, regulatory and compliance concerns that come with mul
 ti-jurisdictional housing of personally identifiable information (PII).\n\
 nFor those who qualify\, the CCSP exam will test their competence in the 
 six CCSP domains of the (ISC)² Common Body of Knowledge (CBK)\, which cov
 er:\n\n 	Architectural Concepts &amp\; Design Requirements\n 	Cloud Data S
 ecurity\n 	Cloud Platform &amp\; Infrastructure Security\n 	Cloud Applicat
 ion Security\n 	Operations\n 	Legal &amp\; Compliance\n\nTraining Info\nDu
 ration :  4 days\nDate : Apr 7 - 10\, 2026\nVenue : ACinfotec Training Ce
 nter\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 
 Rd.\nContact : 02 670 8980-3 ext.321-323\nEmail : training@acinfotec.com\n
 Price : 49\,000฿ (Exclusive of 7% VAT)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded.png
CATEGORIES:Cloud security,ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:132@acinfotec.com
DTSTART:20260410T023000Z
DTEND:20260410T093000Z
DTSTAMP:20260107T090310Z
URL:https://www.acinfotec.com/training-event/principal-of-it-governance-ri
 sk-and-compliance-thai-4/
SUMMARY:Principal of IT Governance\, Risk and Compliance (Thai)
DESCRIPTION:Course Overview\n\nThis course defines IT Governance broadly as
  a collection of management\, planning and performance reporting and revie
 wing processes\, which establish controls and performance metrics over key
  IT investments\; business/IT alignment decisions\; the effectiveness of I
 T program and project deployment\, the efficiency of IT delivery\, infrast
 ructure and operational services and new or change request authorizations 
 and compliance with regulations\, laws and organizational policies.\n\nThe
  broad definition encompasses how well IT is providing value to and servic
 ing the business as well as doing its part in complying with regulations a
 nd organizational policies and plans. This is a “How to” Course that i
 s Pragmatic and Actionable. This course will enable an organization to mig
 rate from its current state of IT governance to a higher level of IT matur
 ity and impact the bottom line significantly.\n\nWho Should Attend?\n\n 	I
 T professionals working in audit\, compliance\, risk\, security and govern
 ance.\n 	Managers and Executives concerned about the quality of business i
 nformation.\n\nCourse Contents\n\nOverview of IT Governance\n\n 	Why IT go
 vernance? Driving forces and challenges\n 	IT Governance VS Enterprise Gov
 ernance\n 	Executive View of IT governance\n 	Who benefits and what are th
 e value propositions?\n 	The Role of the Board and Executive Management in
  IT Governance\n 	Enterprise Governance of The Securities and Exchange Com
 mission (SEC) and their relationship with IT governance\n\nOverview of Ind
 ustry Best Practice Standards\, Model and Guidelines covering some aspect 
 of IT governance\n\n 	PMBOK\, PRINCE2\, CMMI\, ITIL\, ISO 20000\, ISO 2700
 1\, ISO 22301\, COBIT\, COSO ERM\, SOX\, IIA Guidance on Governance\n 	IT 
 Governance framework\n 	Key Governance Processes- Planning\, Execution\, P
 erformance Management and Balanced Scorecard\, Steering Groups\, Outsourci
 ng etc.\n\nPrinciples of Business/IT Alignment Excellence\n\n 	Business an
 d IT Plans\n 	Investment/Portfolio Management Criteria\n 	IT Engagement Mo
 del\n\nPrinciples of Program/Project Management Excellence\n\n 	PM Life Cy
 cle Phases and Templates\n 	PM Metrics\n 	Project Risk Management\n\nPrinc
 iples of IT Service Management and Delivery Excellence\n\n 	 ITIL (IT Inf
 rastructure Library) and its value\, metrics\, work flows\n 	Overview of I
 SO 20000 service management system\n\nPrinciples of Information Security M
 anagement\n\n 	Security Risk Management\n 	ISO 27001 information security 
 management system\n\nPrinciples of Vendor Management and Outsourcing Excel
 lence\n\n 	Vendor Selection\, Negotiations and Management\n 	IT Governance
  in relations with Outsourcing\n\nUsing COBIT 4.1 as a tool for implementi
 ng IT Governance\n\n 	COBIT 4.1 introduction\n 	COBIT principles and enabl
 ers\n 	Roadmap to Implement IT Governance\n 	Difference between COBIT 4.1 
 and COBIT 5\n 	COBIT 4.1 and SOX\n\nSelected Case Studies and Lessons Lear
 ned\n\nTraining Info\n\nDuration  : 1 Day\nDate  :  Apr 10\, 2026\nTim
 e  : 9.30 am. – 16.30 pm.\nLanguage : Conducted in Thai Language\nConta
 ct   : 02 670 8980 – 3 ext.321-323\nEmail : training@acinfotec.com\nPr
 ice : 9\,000 Bhts (Exclusive of 7% VAT)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/08/it_governance1.png
CATEGORIES:Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:345@acinfotec.com
DTSTART:20260416T023000Z
DTEND:20260417T093000Z
DTSTAMP:20260107T090320Z
URL:https://www.acinfotec.com/training-event/practical-implementation-appr
 oach-to-business-continuity-management-iso-22301-2/
SUMMARY:Practical Implementation Approach to Business Continuity Management
  – ISO 22301
DESCRIPTION:About this course \nIn this two days practical course\, you wi
 ll learn about principle and fundamental knowledge of international method
 ology for implementation of Business Continuity Management (BCM). The cour
 se also includes hands-on workshop on risk assessment and business impact 
 analysis to enhance your knowledge. All delegates will also receive a chec
 klist to help you create a better Business Continuity Plan for your organi
 zation.\n\n&nbsp\;\nWho Should attend?\n\n 	COO\, CIO\, or senior manageme
 nt\n 	BCM Manager\, Coordinators\, Recovery Team Leaders and members\n 	In
 formation security professionals\n 	Risk and compliance manager\n 	Anyone 
 who responsible for establishing BCM or developing BCP for their organizat
 ions\n\nCourse Benefits\n\n 	Gain understanding of international standard 
 methodology for BCM implementation\n 	Learn practical approach of BCM impl
 ementation\n 	Use common consistent framework\, based on international bes
 t practice\, to manage business continuity\n 	Enhance skills required to d
 evelop\, implement and maintain BCP\n 	Obtain necessary knowledge and gain
  confident working with BCM practitioners and making related decisions\n\n
 Course Contents\n\n 	Business Continuity Management Overview\n 	Important 
 Definitions\n 	Business Continuity Management Life Cycle\n 	Business Conti
 nuity Management Organization and Emergency Response Structure\n 	Crisis M
 anagement Plan\, Emergency Response Plan\, Business Resumption Plans and D
 isaster Recovery Plans\n 	Risk Analysis &amp\; Risk Assessment (RA)\n 	Bus
 iness Impact Analysis (BIA)\n 	Developing Business Continuity Strategy\n 	
 Developing the Business Continuity Plan (BCP)\n 	Exercising the Plan\n 	Pr
 actice and Group Workshop\n 	Q &amp\; A\n\nTraining Info\nDuration:  2 D
 ays\nDate:  Apr 16-17\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  
 ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\,
  (Worklab) \, Rama 4 Rd.\nTraining Fees: 18\,900 Baht (ex.vat7%)\nTel. 02 
 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/BCMS1.jpg
CATEGORIES:Business Continuity (ISO 22301/BCM)
END:VEVENT
BEGIN:VEVENT
UID:813@acinfotec.com
DTSTART;VALUE=DATE:20260420
DTEND;VALUE=DATE:20260425
DTSTAMP:20260107T090331Z
URL:https://www.acinfotec.com/training-event/certified-network-defender-cn
 d-exam-included/
SUMMARY:CERTIFIED NETWORK DEFENDER (CND) (Exam Included)
DESCRIPTION:\n\n\nAbout this course\nCertified Network Defender (CND) is a 
 vendor-neutral\, hands-on\, instructor-led comprehensive network security 
 certification training program. It is a skills-based\, lab intensive progr
 am based on a job-task analysis and cybersecurity education framework pres
 ented by the National Initiative of Cybersecurity Education (NICE). The co
 urse has also been mapped to global job roles and responsibilities and the
  Department of Defense (DoD) job roles for system/network administrators. 
 The course is designed and developed after extensive market research and s
 urveys. The program prepares network administrators on network security te
 chnologies and operations to attain Defense-in-Depth network security prep
 aredness. It covers the project\, detect and respond approach to network s
 ecurity. The course contains hands-on labs\, based on major network securi
 ty tools and techniques which will provide network administrators real wor
 ld expertise on current network security technologies and operations. The 
 study-kit provides you with over 10 GB of network security best practices\
 , assessments and protection tools. The kit also contains templates for va
 rious network policies and a large number of white papers for additional l
 earning.\nCourse Benefits\n\n 	Student will learn about various network se
 curity controls\, protocols\, and devices.\n 	Students will able to troubl
 eshoot their network for various network problems.\n 	Student will able id
 entify various threats on organization network.\n 	Student will learn how 
 to design and implement various security policies for their organizations.
 \n 	Student will learn the importance of physical security and able to det
 ermine and implement various physical security controls for their organiza
 tions.\n 	Student will able to harden security of various hosts individual
 ly in the organization’s network.\n 	Student will able to choose appropr
 iate firewall solution\, topology\, and configurations to harden security 
 through firewall.\n 	Student will able to determine appropriate location f
 or IDS/IPS sensors\, tuning IDS for false positives and false negatives\, 
 and configurations to harden security through IDPS technologies.\n 	Studen
 ts will able to implement secure VPN implementation for their organization
 .\n 	Student will able identify various threats to wireless network and le
 arn how to mitigate them.\n 	Student will able to monitor and conduct sign
 ature analysis to detect various types of attacks and policy violation act
 ivities.\n 	Student will able to perform risk assessment\, vulnerability a
 ssessment/scanning through various scanning tools and generate detailed re
 ports on it.\n 	Student will able to identify the critical data\, choose a
 ppropriate back up method\, media and technique to perform successful back
 up of organization data on regular basis.\n 	Student will able to provide 
 first response to the network security incident and assist IRT team and fo
 rensics investigation team in dealing with an incident.\n\n\nWho should at
 tend?\n\n\n 	\nNetwork Administrators\n 	\nNetwork Defense Technicians\n 	
 \nSecurity Operator\n 	\nCND Analyst\n 	\nNetwork Security Administrators
 \n 	\nNetwork Security Engineer\n 	\nSecurity Analyst\n 	\nAnyone who invo
 lves in network operations\n\nCourse Contents\nModule I: Computer Network 
 and Defense Fundamentals\n\n\nModule II: Network Security Threats\, Vulner
 abilities\, and Attacks\n\n\nModule III: Network Security Controls\, Proto
 cols\, and Devices\n\n\nModule IV: Network Security Policy Design and Impl
 ementation\n\n\nModule V: Physical Security\n\n\nModule VI: Host Security\
 n\n\nModule VII: Secure Firewall Configuration and Management\n\n\nModule 
 VIII: Secure IDS Configuration and Management\n\n\nModule IX: Secure VPN C
 onfiguration and Management\n\n\nModule X: Wireless Network Defense\n\n\nM
 odule XI: Network Traffic Monitoring and Analysis\n\n\nModule XII: Network
  Risk and Vulnerability Management\n\n\nModule XIII: Data Backup and Recov
 ery\n\n\nModule XIV: Network Incident Response and Management\n\n\n\n\n\n\
 n\n\n\n\n\n\n\n\nConcept\n"IF YOUR IT CREW IS NOT INTO SECURITY\, YOU JUST
  WON’T HAVE SECURITY"\nPROTECT - DETECT - RESPOND\n\nTraining Info\nLang
 uage: Conducted in Thai Language\nDuration: 5 Days\nTraining Date: Apr 
 20 - 24\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centr
 e Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 50\,000 B
 AHT (Ex.Vat 7%)\nTel : 02 670 8980-3 ext. 321-323\nE-mail: training@acinfo
 tec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/4.-CND-Certified-Network-Defender.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:937@acinfotec.com
DTSTART:20260420T023000Z
DTEND:20260424T093000Z
DTSTAMP:20260107T090404Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-27001-lead
 -auditor-exam-included-5/
SUMMARY:PECB Certified ISO 27001 Lead Auditor (Exam Included)
DESCRIPTION:About this course\nISO/IEC 27001 Lead Auditor training enables 
 you to develop the necessary expertise to perform an Information Security 
 Management System (ISMS) audit by applying widely recognized audit princip
 les\, procedures and techniques. During this training course\, you will ac
 quire the necessary knowledge and skills to plan and carry out internal an
 d external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certifi
 cation process.\n\nBased on practical exercises\, you will be able to mast
 er audit techniques and become competent to manage an audit program\, audi
 t team\, communication with customers\, and conflict resolution.\n\nAfter 
 acquiring the necessary expertise to perform this audit\, you can sit for 
 the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” c
 redential. By holding a PECB Lead Auditor Certificate\, you will demonstra
 te that you have the capabilities and competencies to audit organizations 
 based on best practices.\nWho Should Attend\n\n 	Auditors seeking to perfo
 rm and lead Information Security Management System (ISMS) certification au
 dits\n 	Managers or consultants seeking to master an Information Security 
 Management System audit process\n 	Individuals responsible for maintaining
  conformance with Information Security Management System requirements\n 	T
 echnical experts seeking to prepare for an Information Security Management
  System audit\n 	Expert advisors in Information Security Management\n\nCou
 rse Contents\nDay 1: Introduction to the information security management s
 ystem (ISMS) and ISO/IEC 27001\n\n 	Training course objectives and structu
 re\n 	Standards and regulatory frameworks\n 	Certification process\n 	Fund
 amental concepts and principles of information security\n 	Information sec
 urity management system (ISMS)\n\nDay 2: Audit principles\, preparation\, 
 and initiation of an audit\n\n 	Fundamental audit concepts and principles\
 n 	The impact of trends and technology in auditing\n 	Evidence-based audit
 ing\n 	Risk-based auditing\n 	Initiation of the audit process\n 	Stage 1 a
 udit\n\nDay 3: On-site audit activities\n\n 	Preparing for stage 2 audit\n
  	Stage 2 audit\n 	Communication during the audit\n 	Audit procedures\n 	C
 reating audit test plans\n\nDay 4: Closing the audit\n\n 	Drafting audit f
 indings and nonconformity reports\n 	Audit documentation and quality revie
 w\n 	Closing of the audit\n 	Evaluation of action plans by the auditor\n 	
 Beyond the initial audit\n 	Managing an internal audit program\n 	Closing 
 of the training course\n\nDay 5: Certification Exam\nTraining Info\nDurati
 on:  5 Days\nDate:  Apr 20 - 24\, 2026\nTime:  9.30 am. – 16.30 pm.
 \nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lump
 hini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 Baht (ex.vat7
 %)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nw
 ww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:914@acinfotec.com
DTSTART:20260420T023000Z
DTEND:20260424T093000Z
DTSTAMP:20260107T090346Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-27701-
 lead-auditor-exam-included-2/
SUMMARY:PECB Certified ISO/IEC 27701 Lead Auditor (Exam Included)
DESCRIPTION:About this course\nDuring this training course\, you will obtai
 n the knowledge and skills to plan and carry out audits in compliance with
  ISO 19011 and ISO/IEC 17021-1 certification process.\n\nBased on practica
 l exercises\, you will be able to acquire knowledge on the protection of p
 rivacy in the context of processing personally identifiable information (P
 II)\, as well as master audit techniques and become competent to manage an
  audit program\, audit team\, establish communication with customers and r
 esolve potential conflicts.\n\nAfter completing this training course\, you
  can sit for the exam and\, if you successfully pass the exam\, you can ap
 ply for the “PECB Certified ISO/IEC 27701 Lead Auditor” credential. Th
 e internationally recognized PECB Lead Auditor certificate proves that you
  have the capabilities and competences to audit organizations based on bes
 t practices.\n\nWho should attend?\n\n 	\nAuditors seeking to perform and 
 lead Privacy Information Management System (PIMS) certification audits\n 	
 \nManagers or consultants seeking to master a PIMS audit process\n 	\nIndi
 viduals responsible for maintaining conformance with PIMS requirements\n 	
 \nTechnical experts seeking to prepare for a PIMS audit\n 	\nExpert adviso
 rs in the protection of Personally Identifiable Information (PII)\n\n\nCou
 rse Contents\nDay 1 Introduction to Privacy Information Management System 
 (PIMS) and ISO/IEC 27701\n- Training course objectives and structure\n- St
 andards and regulatory frameworks\n- Certification process\n- Fundamental 
 information security and privacy concepts and principles\n- Privacy inform
 ation management system (PIMS)\n\nDay 2 Audit principles\, preparation\, a
 nd launching of an audit\n- Fundamental audit concepts and principles\n- T
 he impact of trends and technology in auditing\n- Evidence-based auditing\
 n- Risk-based auditing\n- Initiation of the audit process\n- Stage 1 audit
 \n\nDay 3 On-site audit activities\n- Preparations for stage 2 audit (on-s
 ite audit)\n- Stage 2 audit\n- Communication during the audit\n- Audit pro
 cedures\n- Creating audit test plans\n\nDay 4 Closing the audit\n- Draftin
 g audit findings and nonconformity reports\n- Audit documentation and qual
 ity review\n- Closing of the audit\n- Evaluation of action plans by the au
 ditor\n- Beyond the initial audit\n- Managing an internal audit program\n-
  Closing of the training course\n\nDay 5 Certification exam\n\nTraining In
 fo\n\nDuration:  5 Days\nDate:   Apr 20 - 24\, 2026\nTime:  9.30 am.
  – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Cen
 tre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500
  Baht (ex.vat7%)\nTel. 02 670 8980-3 ext. 321-323\nE-mail.training@acinfot
 ec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:680@acinfotec.com
DTSTART:20260422T023000Z
DTEND:20260424T093000Z
DTSTAMP:20260107T090417Z
URL:https://www.acinfotec.com/training-event/certified-soc-analyst-csa-tha
 i-exam-included-2/
SUMMARY:Certified SOC Analyst | CSA (Exam Included)
DESCRIPTION:\nAbout this course\nThe Certified SOC Analyst (CSA) program is
  the first step to joining a security operations center (SOC). It is engin
 eered for current and aspiring Tier I and Tier II SOC analysts to achieve 
 proficiency in performing entry-level and intermediate-level operations.\n
 \nCSA is a training and credentialing program that helps the candidate acq
 uire trending and in-demand technical skills through instruction by some o
 f the most experienced trainers in the industry. The program focuses on cr
 eating new career opportunities through extensive\, meticulous knowledge w
 ith enhanced level capabilities for dynamically contributing to a SOC team
 . Being an intense 3-day program\, it thoroughly covers the fundamentals o
 f SOC operations\, before relaying the knowledge of log management and cor
 relation\, SIEM deployment\, advanced incident detection\, and incident re
 sponse. Additionally\, the candidate will learn to manage various SOC proc
 esses and collaborate with CSIRT at the time of need. To read more about S
 OC and how they are important to many industries\nIndustries That Must Hav
 e a (SOC)\nMany industries are dependent on Security Operations Management
 \, including:\n\nWhy Must Organizations Have Log Management and a SOC Team
 ?\nLog management is an organized approach to deal with large volumes of c
 omputer-generated log data. It allows multiple operations on data like gen
 eration\, collection\, centralization\, parsing\, transmission\, storage\,
  archival\, and disposal.\n\nOrganizations have a Security Operations Cent
 er team and a log management solution in order to:\n\n\n 	Comply with appl
 icable regulatory standards such as PCI-DSS\, HIPAA\, RMiT\, ISO 27001\, a
 nd others.\n 	Protect servers storing sensitive data from internal and ext
 ernal threats.\n 	Secure proprietary information and intellectual property
 .\n\n\nBesides log management\, Security Operations Center analysts can al
 so integrate Security Information and Event Management (SIEM) tools in the
 ir process. These software tools aggregate security data from multiple sou
 rces\, such as network devices\, servers\, and other locations. SIEM tools
  then connect the dots to discover the trends and detect cyber threats so 
 that organizations can act on the alerts.\nHow Does a SOC Help?\n\n 	For t
 he Payment Card Industry (PCI)\, it is mandatory to maintain a Security
  Operations Center. According to the PCI Compliance Security Standard Coun
 cil\, any merchant processing and storing credit card data should be PCI c
 ompliant. PCI compliance helps to ensure secure online transactions and pr
 otection against identity theft.\n 	In such a scenario\, a SOC team helps 
 to:\n 	Monitor firewalls\, their logs\, and any configuration change to id
 entify an irregularity.\n 	Increase the speed of incident remediation.\n 	
 Check firewall and router configuration standards by comparing them  with
  documented services\, ports\, and protocols.\n\n&nbsp\;\n\nAs the healthc
 are industry contains crucial health data\, such as holistic reports of pa
 tients including personalized diagnoses and treatments\, it is an alluring
  target to cybercriminals. Threat actors monetize patient data by selling 
 it to the highest bidder or blackmailing the victim.\n\nFor keeping protec
 ted health information (PHI) secure\, healthcare organizations require a S
 OC 2 audit. SOC 2 compliance ensures:\n\n 	Customer trust\n 	Brand reputat
 ion\n 	Business continuity\n 	Competitive advantage\n\n&nbsp\;\n\n\n\nThe
  manufacturing sector has always been a vulnerable industry as it posses
 ses intellectual property and advanced technologies. Consider a Department
  of Defense (DoD) contractor for example: It is a must to meet the NIST cy
 bersecurity standards to maintain DFARS (Defense Federal Acquisition Regul
 ation Supplement) compliance. The NIST SP 800-171 outlines guidelines for 
 Audit and Accountability\, Configuration Management\, Identification\, and
  Authentication\, with several other criteria.\nSOC analysts are needed in
  the manufacturing industry to:\n\n 	Set up alerts to monitor potential th
 reats.\n 	Promptly remediate ongoing and possible security threats.\n\n&nb
 sp\;\n\n\n\nCybercriminals are eyeing financial services for their bulk 
 transactions and real-time monitoring of activities. Apart from external a
 ttacks\, institutions are also vulnerable to lost employee devices (like p
 hones) and insider threats.\n\nBanking and Financial services should perfo
 rm SOC Type 1 and SOC Type 2 audits along with annual SOC 1 SSAE 18 report
 s. Being in clear nexus with the Internal Control Over Financial Reporting
  (ICFR) concept\, these audits effectively report on internal controls. Th
 ey reveal:\n\n 	Weaknesses in security controls like improperly provisione
 d information systems\, weak authentication parameters\, lack of multiple 
 layers of security\, and others.\n 	Shortcomings in operational controls.\
 n 	Flaws in documentation.\n\n&nbsp\;\n\n\n\nAs government agencies store 
 personal information along with criminal records and religious and politic
 al inclinations\, they are a prized target for cyber attackers.\n\nGovernm
 ent institutions need SOC teams for:\n\n 	Network monitoring in real time.
 \n 	Analyzing activities on servers\, endpoints\, and databases.\n 	Lookin
 g for an incident or signs of a breach.\n\n&nbsp\;\n\n&nbsp\;\n\n\n\nEduca
 tion establishments are easy targets for cybercriminals. They not only car
 ry personal data but also valuable research data and allow access to large
 r networks.\n\nA Security Operations Center can help an educational instit
 ution’s IT staff respond to growing security threats by:\n\n 	Identifyin
 g and monitoring institutional assets and data.\n 	Neutralizing threats.\n
  	Providing cybersecurity metrics to the IT staff.\n\n&nbsp\;\nTarget Audi
 ence\n\n 	SOC Analysts (Tier I and Tier II)\n 	Network and Security Admini
 strators\, Network and Security Engineers\, Network Defense Analyst\, Netw
 ork Defense Technicians\, Network Security Specialist\, Network Security O
 perator\, and any security professional handling network security operatio
 ns\n 	Cybersecurity Analyst\n 	Entry-level cybersecurity professionals\n 	
 Anyone who wants to become a SOC Analyst.\n\nLearning Objectives of CSA\n\
 n 	Gain Knowledge of SOC processes\, procedures\, technologies\, and workf
 lows.\n 	Gain a basic understanding and in-depth knowledge of security thr
 eats\, attacks\, vulnerabilities\, attacker’s behaviors\, cyber killchai
 n\, etc.\n 	Able to recognize attacker tools\, tactics\, and procedures to
  identify indicators of compromise (IOCs) that can be utilized during acti
 ve and future investigations.\n 	Able to monitor and analyze logs and aler
 ts from a variety of different technologies across multiple platforms (IDS
 /IPS\, end-point protection\, servers\, and workstations).\n 	Gain knowled
 ge of the Centralized Log Management (CLM) process.\n 	Able to perform Sec
 urity events and log collection\, monitoring\, and analysis.\n 	Gain exper
 ience and extensive knowledge of Security Information and Event Management
 .\n 	Gain knowledge of administering SIEM solutions (Splunk/AlienVault/OSS
 IM/ELK).\n 	Understand the architecture\, implementation and fine-tuning o
 f SIEM solutions (Splunk/AlienVault/OSSIM/ELK).\n 	Gain hands-on experienc
 e in SIEM use case development process.\n 	Able to develop threat cases (c
 orrelation rules)\, create reports\, etc.\n 	Learn use cases that are wide
 ly used across the SIEM deployment.\n 	Plan\, organize\, and perform threa
 t monitoring and analysis in the enterprise.\n 	Able to monitor emerging t
 hreat patterns and perform security threat analysis.\n 	Gain hands-on expe
 rience in the alert triaging process.\n 	Able to escalate incidents to app
 ropriate teams for additional assistance.\n 	Able to use a Service Desk ti
 cketing system.\n 	Able to prepare briefings and reports of analysis metho
 dology and results.\n 	Gain knowledge of integrating threat intelligence i
 nto SIEM for enhanced incident detection and response.\n 	Able to make use
  of varied\, disparate\, constantly changing threat information.\n 	Gain k
 nowledge of Incident Response Process.\n 	Gain understating of SOC and IRT
  collaboration for better incident response.\n\n\nTraining Info\nDuration:
   3 Days\nDate:  Apr 22 - 24\, 2026\nTime:  9.30 am. – 16.30 pm.\nVe
 nue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini
  Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 39\,000 Baht (ex.vat 7%)\
 nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\nwww.ecco
 uncil.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 1/12/CSA.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:1001@acinfotec.com
DTSTART:20260423T023000Z
DTEND:20260424T093000Z
DTSTAMP:20260323T062016Z
URL:https://www.acinfotec.com/training-event/advanced-in-ai-security-manag
 ement-aaism-exam-prep/
SUMMARY:Advanced in AI Security Management (AAISM) – Exam Prep.
DESCRIPTION:About this course\nWith the significant potential of artificial
  intelligence comes new threats and vulnerabilities. ISACA Advanced in AI 
 Security Management™ (AAISM™) is the first and only AI-centric securit
 y management certification designed to help experienced IT professionals r
 einforce the enterprise’s security posture and protect against AI-specif
 ic threats. You’ll be able to manage the evolving security risk related 
 to AI\, implement policy\, and ensure its responsible and effective use ac
 ross the organization.\nCourse Benefits\n\n 	Proven experience in it audit
 s or its advisory roles\n 	Some expertise auditing\, assessing\, implement
 ing and maintaining AI systems\n 	Holds an active prerequisite certificati
 on\n\nPrerequisite\n\n 	ACTIVE CISM OR CISSP HOLDERS\n 	PROVEN EXPERIENCE 
 IN SECURITY OR ADVISORY ROLES\n 	SOME EXPERTISE ASSESSING\, IMPLEMENTING A
 ND MAINTAINING AI SYSTEMS\n\nWho should attend?\n\n 	Experienced Security 
 Professionals with CISM or CISSP\n 	Individuals in Security or Advisory Ro
 les\n 	Professionals with AI System Experience\n\nCourse Contents\nDOMAIN 
 1 – AI GOVERNANCE AND PROGRAM MANAGEMENT\n\nThis Domain demonstrates you
 r ability to advise stakeholders on implementing AI security solutions thr
 ough appropriate and effective policy\, data governance\, program manageme
 nt and incident response.\n\nA–Stakeholder considerations\, industry fra
 meworks\, and regulatory requirements\n\nB–AI-related strategies\, polic
 ies\, and procedures\n\nC– AI asset and data life cycle management\n\nD
 –AI security program development and management\n\nE–Business continui
 ty and incident response\n\nDOMAIN 2 – AI RISK MANAGEMENT\n\nThis Domain
  confirms your skill at assessing and managing risks\, threats\, vulnerabi
 lities and supply chain issues related to the enterprise-wide adoption of 
 AI.\n\nA–AI risk assessment\, thresholds\, and treatment\n\nB–AI threa
 t and vulnerability management\n\nC–AI vendor and supply chain managemen
 t\n\nDOMAIN 3 – AI TECHNOLOGIES AND CONTROLS\n\nThis Domain focuses on o
 ptimizing AI security and highlights your knowledge of security technologi
 es\, techniques and controls tailored to AI systems.\n\nA–AI security ar
 chitecture and design\n\nB–AI-related strategies\, policies\, and proced
 ures\n\nC–Data management controls\n\nD–Privacy\, ethical\, trust and 
 safety controls\n\nE–Security contr\nTraining info\nDuration : 2 Days\nD
 ate : Apr 23 - 24\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Train
 ing Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, R
 ama 4 Rd.\nTraining Fee : 28\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ex
 t.321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 6/03/AAISM.png
CATEGORIES:AI Intelligent,ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:344@acinfotec.com
DTSTART:20260423T023000Z
DTEND:20260424T093000Z
DTSTAMP:20260107T090600Z
URL:https://www.acinfotec.com/training-event/iso-270012013-foundation-2/
SUMMARY:ISO 27001:2013 Foundation (Thai)
DESCRIPTION:Course Overview\nThis course enables the participants to learn 
 about the best practices for managing an Information Security Management S
 ystem (ISMS) as specified in ISO/IEC 27001:2013\, as well as the best prac
 tices for implementing the information security controls of the eleven dom
 ains of the ISO 27002. This training also helps to understand how ISO 2700
 1 and ISO 27002 are linked with ISO 27003 (Guidelines for the implementati
 on of an ISMS)\, ISO 27004 (Measurement of information security) and ISO 2
 7005 (Risk Management in Information Security).\nPrerequisites\n\n 	No pri
 or knowledge is required\n 	and the management of its inherent risks\n 	Me
 mbers of information security teams\n 	Trainers in information security\n\
 nCourse Benefits\n\n 	Understand the structure of ISO/IEC 27001:2013\n 	Un
 derstand the organization of ISO/IEC 27002:2013\n 	Understand the future r
 ole of ISO/IEC 27003\, ISO/IEC 27004 and ISO/IEC 27005\n\nWho Should atten
 d?\n\n 	IT Management\n 	Information security officers\n 	Internal auditor
 s\n 	Auditors wanting to perform and lead ISMS certification audits\n 	Pr
 oject managers and consultants wanting to master the ISMS audit process\n
  	CIO and senior managers responsible for the governance of an enterprise
 \n\n Course Contents\nDay 1\n\n 	Introduction to the management of an Inf
 ormation Security Management System (ISMS) based on ISO 27001 and launchin
 g an ISMS\n 	Introduction to the ISO 27000 family of standards\n 	Presenta
 tion of the standards ISO 27001\, ISO 27002 and regulatory framework\n 	Fu
 ndamental principles of Information Security\n 	General requirements: pres
 entation of the clauses 4 to 8 of ISO 27001\n 	Writing the business case a
 nd preliminary design of the ISMS\n 	Developing a project plan of complian
 ce to ISO 27001\n 	Certification Process\n\nDay 2\n\n 	ISMS Process and Cr
 ucial Steps for Implementation\n 	Control Objectives &amp\; Controls of IS
 O 27001\n 	5 Security Policies\n 	6 Organization of information security\n
  	7 Human resource security\n 	8 Asset management\n 	9 Access control\n 	1
 0 Cryptography\n 	11 Physical and environmental security\n 	12 Operations 
 security\n 	13 Communications security\n 	14 System acquisition\, developm
 ent and maintenance\n 	15 Supplier relationships\n 	16 Information securit
 y incident management\n 	17 Information security aspects of business conti
 nuity management\n 	18 Compliance\n\nTraining Info\n\nDuration:  2 Days\
 nDate:  Apr 23 - 24\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  AC
 infotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (
 Worklab) \, Rama 4 Rd.\nTraining Fees: 18\,500 Baht (ex.vat7%)\nTel. 02 67
 0 8980-3 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 7/07/Untitled-1.png
CATEGORIES:Information Security (ISO 27001/ISMS)
END:VEVENT
BEGIN:VEVENT
UID:561@acinfotec.com
DTSTART:20260427T023000Z
DTEND:20260428T093000Z
DTSTAMP:20260107T090702Z
URL:https://www.acinfotec.com/training-event/risk-based-it-audit-4/
SUMMARY:Risk-Based IT Audit
DESCRIPTION:\n\nเนื้อหาหลักสูตร\n\nเรื
 ่องการตรวจสอบ Risk-based IT Audit นั้น 
 มีความสำคัญมากในปัจจุบัน 
 เนื่องจาก\n\n 	ระเบียบคณะกรร
 มการตรวจเงินแผ่นดิน ว่าด้
 วยการปฏิบัติหน้าที่ของผู
 ้ตรวจสอบภายใน พ.ศ.2555 ตามแนว
 ทางปฏิบัติที่ 6 ได้ระบุชัด
 เจนว่าหน่วยรับตรวจที่ใช้
 เทคโนโลยีสารสนเทศเป็นส่ว
 นสำคัญในการปฏิบัติงานหรื
 อบริหารงาน ควรจัดให้มีผู้
 ตรวจสอบภายในซึ่งมีความรู
 ้ ความสามารถอย่างเพียงพอท
 ี่จะตรวจสอบระบบเทคโนโลยี
 สารสนเทศ เพื่อให้สามารถปร
 ะเมินและให้คำแนะนำเกี่ยว
 กับการปรับปรุงกระบวนการบ
 ริหารความเสี่ยง การควบคุม
  และการกำกับดูแลได้อย่างเ
 หมาะสมและเกิดประโยชน์\n 	มา
 ตรฐานเกี่ยวกับการตรวจสอบ
 ภายในของกระทรวงพาณิชย์ มา
 ตราที่28 และ 29 ซึ่งต่อมา จะม
 ีการเปลี่ยนแปลงมาตราที่เ
 กี่ยวข้อง ระบุเนื้อหาเกี่
 ยวกับหน่วยงานที่มีคอมพิว
 เตอร์ตั้งแต่ 1 เครื่องขึ้น
 ไป จำเป็นจะต้องมีการตรวจส
 อบทางด้านคอมพิวเตอร์\n\nแนว
 ทางปฏิบัติส่วนใหญ่ของหลา
 ยองค์กร ยังไม่มีการตรวจสอ
 บทางด้าน IT Audit โดยเฉพาะอย่า
 งยิ่ง Risk-based IT Audit อย่างจริงจัง
  ซึ่งมีผลทำให้กระบวนการตร
 วจสอบ และการตรวจสอบทางด้า
 นทั่วไปมีปัญหาค่อนข้างมา
 ก และในยุคปัจจุบันได้มีกา
 รก้าวเข้าไปสู่ การตรวจสอบ
 แบบผสมผสานและบูรณาการ ระห
 ว่าง IT Audit และ Non – IT Audit ที่เรีย
 กว่า Integrated Audit\n\nพื้นฐานของผู้
 อบรม\n\n 	ผู้ที่มีความรู้พื้
 นฐานด้านการจัดการทั่วไป\n 	
 ผู้เข้ารับการอบรมไม่จำเป
 ็นต้องมีพื้นฐานทางด้าน\nInform
 ation Security และ IT Audit หรือ Non-IT มาก่อน\n
 \nวัตถุประสงค์\n\n 	เพื่อให้เก
 ิดความเข้าใจในองค์ประกอบ
 ที่เกี่ยวข้องกับการตรวจส
 อบสามารถนำไปประยุกต์ใช้ก
 ับงานตรวจสอบในภาคปฏิบัติ
 ได้\n 	เพื่อให้ผู้มีผลประโย
 ชน์ร่วมเห็นคุณค่าและประโ
 ยชน์จากการตรวจสอบ IT/IT Audit ที่
 มีผลกระทบต่องานตรวจสอบทา
 งด้าน Non-IT Audit และ การบรรลุเป้
 าประสงค์ขององค์กรอย่างสำ
 คัญ\n 	เพื่อสร้างคุณค่าเพิ่
 ม และความน่าเชื่อถือ และกา
 รรับรองอย่างสมเหตุสมผลว่
 า สารสนเทศที่ได้รับถูกต้อ
 ง มีการปฏิบัติตามกฎเกณฑ์ แ
 ละเป็นนโยบายที่สามารถสร้
 างความมั่นใจให้กับผู้มีผ
 ลประโยชน์ร่วมได้ว่า งบการ
 เงินและรายงานต่างๆ ที่เกี
 ่ยวข้องเชื่อถือได้ พิสูจน
 ์ได้\n 	ผู้ที่ตรวจสอบทั้งทา
 งด้าน IT และ Non – IT รวมทั้งผู้บ
 ริหารจะได้เข้าใจภาพการหล
 อมรวม การตรวจสอบและการบริ
 หารในลักษณะ Integrated Audit / Monitoring ที่
 มีประโยชน์ต่อองค์กรในภาพ
 โดยรวมที่ตรงกับความต้องก
 ารของผู้บริหาร และผู้มีผล
 ประโยชน์ร่วม ทั้งภายในและ
 ภายนอกองค์กร\n\nเนื้อหาการบ
 รรยาย\n\nวันที่ 1\n\n 	ความจำเป็
 น และเหตุผลที่ต้องมี Risk-based IT A
 udit และการกำกับในเรื่องนี้\n 
 	การปฏิบัติตามกฎเกณฑ์ มาตร
 ฐาน แนวทางของผู้กำกับของ ไ
 ทยและสากล เกี่ยวกับการบริ
 หารความเสี่ยง การควบคุม แล
 ะการตรวจสอบทางด้าน IT\n 	หลัก 
 การที่ยอมรับทั่วไปทางด้า
 นการบริหาร การจัดการความเ
 สี่ยงทั่วไป ทั้งด้าน IT Risk แล
 ะ IT-Related Risk ที่มีผลกระทบต่อธุร
 กิจมุมมองต่างๆ\n 	มาตรฐาน หล
 ักการประเมินความเสี่ยง IT Risk
  และ IT-Related Risk กับการควบคุมและ
 ตรวจสอบ รวมทั้งการบริหาร\n\n
 วันที่ 2\n\n 	การ วิเคราะห์ผลก
 ระทบจากช่องโหว่และจุดอ่อ
 นของการจัดการบริหารความเ
 สี่ยงด้าน IT ที่มีผลต่อกระบ
 วนการจัดการบริหารความเสี
 ่ยงด้าน IT ที่มีผลต่อกระบวน
 การจัดการในมุมมองต่างๆ ทั
 ้ง Business &amp\; Information\n 	แนว ทางการตร
 วจสอบ IT Audit &amp\; Integrated Audit เพื่อให้
 บรรลุความต้องการของผู้มี
 ผลประโยชน์ร่วม ทั้งภายในแ
 ละภายนอกองค์กร ตามแนวทางข
 อง GTAG ผสมผสานกับ CobiT และ COSO-ERM\n 	ก
 ารจัดการรายงาน การตรวจสอบ 
 เพื่อตอบสนองความต้องการข
 องผู้มีผลประโยชน์ร่วมที่
 ได้รับความสนใจ ตรงตามการค
 าดหวังตั้งแต่ระดับผู้บริ
 หารไปถึงระดับกรรมการ\n 	วิเ
 คราะห์ – พิจารณ์\n\nข้อมูลหล
 ักสูตร\n\nระยะเวลา        : 2 วัน
 \n\nวันที่                 : Apr 27 - 28\, 202
 6\n\nราคา               : 18\,900 THB (อัตร
 านี้ยังไม่รวม VAT 7%)\n\nเวลา     
            : 9:30 – 16:30 น.\n\nสถานที่   
         :  ACinfotec Training Center\n\nติดต่อ    
          : 02-670-8980 ต่อ 321-323\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/05/AAEAAQAAAAAAAAMMAAAAJDg3MWYxMzhiLWUxMjAtNDc4MS05OGEyLTcxZTYwNGJjZWY5O
 A.jpg
CATEGORIES:Risk Based IT Audit
END:VEVENT
BEGIN:VEVENT
UID:830@acinfotec.com
DTSTART:20260503T170000Z
DTEND:20260506T170000Z
DTSTAMP:20260107T090716Z
URL:https://www.acinfotec.com/training-event/certified-data-management-pro
 fessionals-cdmp-exam-included-new-2/
SUMMARY:Certified Data Management Professionals (CDMP) – Exam Included (N
 ew!!)
DESCRIPTION:Certified Data Management Professionals (CDMP)\nAbout this cour
 se\nCDMP – the gold standard in the data management field\n\nThe Certifi
 ed Data Management Professional (CDMP) credential is a globally recognized
  certification and many organizations are asking for this certification (m
 ore than other certifications) as a mandatory requirement for employment i
 n the data management field. The CDMP certificate shows that you are capab
 le\, knowledgeable and an expert in your field. Surveys show that CDMP-cer
 tified data management professionals earn more\, and advance at a more rap
 id pace than their non-certified colleagues. The 4-day CDMP training is a 
 comprehensive training program to help data-driven professionals prepare 
 for the certification requirements of the official CDMP exam.\n Who shoul
 d attend?\n\n 	Chief Data Officers (CDO’s)\n 	CIO’s\n 	Data Governance
  Managers / Data Quality Managers\n 	Data Scientists / Data Architects / D
 ata Specialists / Data Engineers\n 	Data Administrators\n 	Data Analysts\n
  	Data Modelers\n 	Database Administrators\n 	DWH Analysts\n 	Business Int
 elligence (BI) Professionals\n 	Information/ Application/ Solutions Archit
 ects\n 	Project/Program Managers\n 	Business Analysts\n 	Data Protection O
 fficers (DPO’s)\n 	Many other data professionals\n\nCourse Content\nDay 
 1\n\n 	CDMP Introduction\n 	Data Management Process\n 	Data Governance\n 	
 Data Management Organization and Role Expectations\n 	Data Architecture\n 
 	Data Modeling and Design\n\nDay 2\n\n 	Metadata Management\n 	Data Storag
 e and Operations\n 	Data Security\n 	Data Integration and Interoperability
 \n\nDay 3\n\n 	Document and Content Management\n 	Reference and Master Dat
 a\n 	Data Warehousing and Business Intelligence\n 	Data Quality\n\nDay 4\n
 \n 	Big Data and Data Science\n 	Data Ethics\n 	Data Management Maturity A
 ssessment\n 	Data Management and Organizational Change Management\n 	Exam 
 Preparation (0.5 day)\n\nExamination\nComing soon…\nTraining Info\nLangu
 age : Conducted in Thai Language\nDuration : 4 Days\nDate :  May 4 - 7\
 , 2026\nTime : 9.30 am. – 16.30 pm.\nLocation : ACinfotec Training C
 enter\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4
  Rd.\nContact : T 02 670 8980-3 ext.321-323\nEmail : training@acinfotec.c
 om\nPrice : 59\,500 Baht (Ex.Vat 7%)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/04/Blue-Modern-Digital-Marketing-Agency-Linkedin-Banner.png
CATEGORIES:Data Governance
END:VEVENT
BEGIN:VEVENT
UID:696@acinfotec.com
DTSTART:20260504T023000Z
DTEND:20260508T093000Z
DTSTAMP:20260107T090728Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-20000-lead
 -implementer-thai-exam-included-update-2018/
SUMMARY:PECB Certified ISO 20000:2018 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nThis five-day intensive course enables the p
 articipants to develop the necessary expertise to support an organization 
 in implementing and managing a Service Management System as specified in I
 SO/IEC 20000-1. Also\, the participant will gain a thorough understanding 
 of in best practices for planning and implementing Service Management proc
 esses starting from the six fields of ISO 20000: planning and implementing
  new and changed services\, service delivery process\, relationship manage
 ment processes\, problem resolution process\, control processes and releas
 e processes.\n\nThis training is consistent with the project management pr
 actices established in ISO 10006 (Quality Management Systems – Guideline
 s for Quality Management in Projects). This training is fully compatible w
 ith ISO 20000-2 (Guidelines for the Implementation of an SMS) and ITIL.\nL
 earning Objectives\n• To understand the implementation of an Service Man
 agement System in accordance with ISO 20000\n• To gain a comprehensive u
 nderstanding of the concepts\, approaches\, standards\, methods and techni
 ques allowing an effective management of an Service Management System\n•
  To know the interrelationships between ISO/IEC 20000-1\, ISO/IEC 20000-2 
 and ITIL\n• To acquire expertise to support an organization in implement
 ing\, managing and maintaining an Service Management System (SMS) as speci
 fied in ISO/IEC 20000\n• To acquire the necessary expertise to manage a 
 team in implementing the ISO 20000 standard\n Prerequisite\n• ISO 20000
  Foundation Certification or basic knowledge of ISO 20000 and ITIL is reco
 mmended\n Who Should attend?\n• Project managers or consultants wanting
  to implement of an Service Management System (SMS)\n• ISO 20000 auditor
 s who wish to fully understand the SMS implementation process\n• Persons
  responsible for the SMS conformity in an organization\n• Technical expe
 rts wanting to prepare for an SMS function\nCourse Agenda\n\nDay 1: Introd
 uction to Service Management System (SMS) concepts as required by ISO 2000
 0 Initiating an SMS\n\no Presentation of the ISO 20000 family of standards
  and comparison with ITIL V2 and V3\no Fundamental principles of Service M
 anagement System\no Preliminary analysis and establishment of the maturity
  level of an existing SMS\no Writing a business case and a project plan fo
 r the implementation of an SMS\n\nDay 2: Planning an SMS based on ISO 2000
 0\n\no Definition of the scope of an SMS\no Definition of an SMS policy an
 d objectives\no Documentation of the processes and procedures and SLAs\no 
 Budgeting and accounting for IT services\n\nDay 3: Implementing an SMS bas
 ed on ISO 20000\n\no Change\, configuration\, release\, capacity and avail
 ability management\no Service continuity and security management\no Incide
 nt and problem management\no Operations management of an SMS\n\nDay 4: Con
 trolling\, monitoring\, measuring and improving an SMS certification audit
  of an SMS in accordance with ISO 20000\n\no Controlling and monitoring an
  SMS\no Development of metrics\, performance indicators and dashboards\no 
 ISO 20000 internal Audit and Management review\no Implementation of a cont
 inual improvement program\no Preparing for an ISO 20000 certification audi
 t\n\nDay 5: Certification Exam (3 Hours)\n\nTraining Info\n\nDuration:  
 5 Days\nDate:  May 4 - 8\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:
   ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bld
 g.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 Baht (ex.vat7%)\nTel.
  02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nwww.pecb.
 com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:535@acinfotec.com
DTSTART:20260505T023000Z
DTEND:20260508T093000Z
DTSTAMP:20260107T090744Z
URL:https://www.acinfotec.com/training-event/cism-examination-preparation-
 exam-excluded-2/
SUMMARY:CISM Examination Preparation (Exam Excluded)
DESCRIPTION:About this course\nWhile information has become more easily acc
 essible and readily available\, the associated risks and security threats 
 have not only increased in number\, but also complexity.  As a result\, t
 he importance of ensuring that an enterprise’s information is protected 
 has also increased.  It is now more important than ever for executives to
  ensure that their IT security managers have the expertise needed to reduc
 e risk and protect the enterprise.\n\nDesigned specifically for informatio
 n security professionals who are preparing to sit for the CISM exam\, the 
 course focuses on the four content areas of the Certified Information Secu
 rity Manager (CISM) job practice:  information security governance\, risk
  management and compliance\, information security program development and 
 management\, information security incident management. Sample exam items w
 ill be used throughout the course to reinforce content and familiarize att
 endees with the CISM exam question format.\nCourse Benefits\nThe demand fo
 r skilled information security management professionals is on the rise\, a
 nd the CISM certification is the globally accepted standard of achievement
  in this area.\n\nCISMs understand the business. They know how to manage a
 nd adapt technology to their enterprise and industry.\nWho should Attend?\
 n\n 	Risk managers.\n 	Security professionals with front-line experience.\
 n 	Security auditors.\n 	Information security staff.\n 	Compliance personn
 el.\n 	Information security managers.\n 	CSOs\, CISOs and CIOs.\n 	Informa
 tion security assurance providers\n\nCourse Contents\nDay 1 – Informatio
 n Security Governance\n\nAttendees will understand the broad requirements 
 for effective information security governance\, the elements and actions r
 equired to develop an information security strategy\, and be able to formu
 late a plan of action to implement this strategy.\n\n 	Establish and maint
 ain an information security strategy and align the strategy with corporate
  governance\n 	Establish and maintain an information security governance f
 ramework\n 	Establish and maintain information security policies\n 	Develo
 p a business case\n 	Identify internal and external influences to the orga
 nization\n 	Obtain management commitment\n 	Define roles and responsibilit
 ies\n 	Establish\, monitor\, evaluate and report metrics\n\nDay 2 – Info
 rmation Risk Management and Compliance\n\nAttendees will be able to manage
  information security risks.\n\n 	Establish a process for information asse
 t classification and ownership\n 	Identify legal\, regulatory\, organizati
 onal and other applicable requirements\n 	Ensure that risk assessments\, v
 ulnerability assessments and threat analyses are conducted periodically.\n
  	Determine appropriate risk treatment options.\n 	Evaluate information se
 curity controls\n 	Identify the gap between current and desired risk level
 s\n 	Integrate information risk management into business and IT processes\
 n 	Monitor existing risk.\n 	Report noncompliance and other changes in inf
 ormation risk\n\nDay 3 – Information Security Program Development and Ma
 nagement\n\nAttendees will be able to develop and manage an information se
 curity plan.\n\n 	Establish and maintain the information security program\
 n 	Ensure alignment between the information security program and other bus
 iness functions\n 	Identify\, acquire\, manage and define requirements for
  internal and external resources\n 	Establish and maintain information sec
 urity architectures\n 	Establish\, communicate and maintain organizational
  information security standards\, procedures\, guidelines\n 	Establish and
  maintain a program for information security awareness and training\n 	Int
 egrate information security requirements into organizational processes\n 	
 Integrate information security requirements into contracts and activities 
 of third parties\n 	Establish\, monitor and periodically report program ma
 nagement and operational metrics\n\nDay 4 – Information Security Inciden
 t Management \n\nStudents will effectively manage information security wit
 hin an enterprise and develop policies and procedures to respond to and re
 cover from disruptive and destructive information security events.\n\n 	Es
 tablish and maintain an organizational definition of\, and severity hierar
 chy for\, information security incidents\n 	Establish and maintain an inci
 dent response plan\n 	Develop and implement processes to ensure the timely
  identification of information security incidents\n 	Establish and maintai
 n processes to investigate and document information security incidents\n 	
 Establish and maintain incident escalation and notification processes\n 	O
 rganize\, train and equip teams to effectively respond to information secu
 rity incidents\n 	Test and review the incident response plan periodically\
 n 	Establish and maintain communication plans and processes\n 	Conduct pos
 t-incident reviews\n 	Establish and maintain integration among the inciden
 t response plan\, disaster recovery plan and business continuity plan\n\nC
 ertification and Accreditation\nTo become a CISM\, an applicant must:\n•
  Achieve a passing score on the CISM exam.\n• Submit an application with
  verified evidence of three years of work experience as described below.\n
 • Agree to abide by the ISACA Code of Professional Ethics\, which can be
  viewed at www.isaca.org/ethics.\n• Agree to abide by the CRISC continui
 ng professional education (CPE) policy\, which can be viewed at ISACA CISM
  Maintenance Page.\nExamination\n\n 	Computer-based examination\n 	4 hours
 \n 	150 multiple-choice question exam\n 	ISACA uses a 200 - 800 point scal
 e with 450 as the passing mark for the exams\n\nTraining Info\nLanguage :
  Conducted in Thai Language\nDuration : 4 Days\nDate :  May 5 - 8\, 202
 6\nTime : 9.30 am. – 16.30 pm.\nLocation : ACinfotec Training Center
 \n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\
 nContact : T 02 670 8980-3 Ext. 321-323\nE training@acinfotec.com\nPrice 
 : 34\,000 Bhts (Excluding Vat 7%)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/2.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:1002@acinfotec.com
DTSTART:20260507T023000Z
DTEND:20260508T093000Z
DTSTAMP:20260323T062815Z
URL:https://www.acinfotec.com/training-event/advanced-in-ai-audit-aaia-exa
 m-prep-thai/
SUMMARY:Advanced in AI Audit (AAIA) – Exam Prep. (Thai)
DESCRIPTION:About this course\nBe one of the first experienced IT auditors 
 to embrace AI and level up their careers with the new ISACA Advanced in AI
  Audit™ (AAIA™) certification. Designed exclusively for professionals 
 with CISA® and other qualified high-level audit certifications\, AAIA emp
 owers you to stand up to today’s AI challenges and become an AI audit le
 ader that more organizations demand.\nCourse Benefits\n\n 	Proven experien
 ce in it audits or its advisory roles\n 	Some expertise auditing\, assessi
 ng\, implementing and maintaining AI systems\n 	Holds an active prerequisi
 te certification\n\nPrerequisite\nTo qualify for AAIA\, candidates must ei
 ther hold a CISA certification or one of the following certifications with
  an IT audit or IT advisory role focus: CIA\, CPA\, ACCA\, FFCA\, Canadian
  CPA\, CPA Australia\, FCPA or Japanese CPA.\n\nAll holders qualify:\n\nCI
 SA (Certified Information Systems Auditor from ISACA)\nWho should attend?\
 n\n 	IT Auditor\n 	Senior IT Auditor\n 	Risk Manager\n 	Information Manage
 r\n\nCourse Contents\nDOMAIN 1 – AI GOVERNANCE AND RISK\n\nThis Domain d
 emonstrates your ability to advise stakeholders on implementing AI solutio
 ns through appropriate and effective policy\, risk controls\, data governa
 nce and ethical standards.\n\nA–AI Models\, Considerations\, and Require
 ments\n\nB–AI Governance and Program Management\n\nC–AI Risk Managemen
 t\n\nD–Privacy and Data Governance Programs\n\nE–Leading Practices\, E
 thics\, Regulations\, and Standards for AI\n\nDOMAIN 2 – AI OPERATIONS\n
 \nThis domain confirms your skill in balancing sustainability\, operationa
 l readiness\, and the risk profile with the benefits and innovation AI pro
 mises to support enterprise-wide adoption of this powerful technology.\n\n
 A–Data management specific to AI\n\nB–AI solution development methodol
 ogies and lifecycle\n\nC–Change management specific to AI\n\nD–Supervi
 sion of ai solutions (e.g.\, outputs\, impacts\, and decisions)\n\nE–T
 esting techniques for ai solutions\n\nF–Threats and vulnerabilities spec
 ific to AI\n\nG–Incident response management specific to AI\n\nDOMAIN 3 
 – AI AUDITING TOOLS AND TECHNIQUES\n\nThis domain focuses on optimizing 
 audit outcomes through innovation and highlights your knowledge of audit t
 echniques tailored to AI systems and the use of AI-enabled tools streamlin
 e audit efficiency and provide faster\, quality insight.\n\nA–Audit plan
 ning and design\n\nB–Audit testing and sampling methodologies\n\nC–Aud
 it evidence collection techniques\n\nD–Audit data quality and data analy
 tics\n\nE–AI Audit outputs and reports\nTraining Info\nDuration : 2 Days
 \nDate : May 7-8\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Traini
 ng Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ra
 ma 4 Rd.\nTraining Fee : 28\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext
 .321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 6/03/AAIA.png
CATEGORIES:AI Intelligent,ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:297@acinfotec.com
DTSTART:20260507T023000Z
DTEND:20260508T093000Z
DTSTAMP:20260107T090821Z
URL:https://www.acinfotec.com/training-event/iso-27017-implementing-securi
 ty-controls-for-cloudservices-new/
SUMMARY:ISO 27017: Implementing Security Controls for Cloud Services
DESCRIPTION:About this course\n\nCloud computing has been one of the most i
 mportant innovation in recent years\, providing cost-effective\, agile and
  virtual services. Most organizations are currently using cloud to handle 
 the multitudes of business information and operations.\n\n&nbsp\;\n\nThis 
 course discusses in detail various issues that arise in cloud security wit
 h respect to both customers and service provider's perspective. The conten
 ts follow guideline specified in ISO 27017 cloud security standard. The co
 urse starts by introducing concepts of Cloud Computing\, security implicat
 ions and related regulatory requirements. Then taking the audience to know
  the basics of ISO 27017\, ISO 27002\, CSA Cloud Control Matrix (CCM) and 
 relationship among them. The core of the course\, the security controls an
 d implementation guidance based on ISO 27017 will be presented in details 
 by ACinfotec instructor who have hands-on experience in securing the Cloud
 . Finally\, the course wraps up with Cloud Computing Risk Assessment Works
 hop to ensure that all audiences will have an opportunity to assess risks 
 associated with Cloud services and bring results as they take away informa
 tion for future use.\n\nWho should Attend?\n\n 	Cloud Service User\n 	Clou
 d Service Provider\n 	Security Professional\n 	Anyone who would like to kn
 ow about cloud security risks and controls\n\nCourse Contents\n\n 	Overvie
 w of Cloud Computing\n\n 	Delivery Model\n 	Deployment Model\n 	Essential 
 Characteristics\n 	Relationship between Cloud Service Customer and Cloud S
 ervice Provider\n\n\n 	Security Considerations in the Cloud\n\n 	Threats t
 o Cloud Service Customer\n 	Threats to Cloud Service Provider\n\n\n 	Gover
 nance\, Regulation and Compliance Concerns\n 	Overview of ISO 27017 and Re
 lationship with ISO 27002 / CSA CCM\n 	Security Controls and Implementatio
 n Guidance for Cloud Service Customer and Cloud Service Provider\n 	Cloud 
 Service Extended Control Set\n 	Cloud Computing Risk Assessment Workshop\n
 \nTraining Info\n\nLanguage :  Conducted in Thai Language\nDate: May 7-8\
 , 2026\nDuration :  2 Days\nTime : 9.30-04.30 pm.\nVenue : ACinfotec Trai
 ning Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, 
 Rama 4 Rd.\nContact : 02 670 8980-3 ext.321-323\nE-mail  training@acinfot
 ec.com\nPrice : 28\,000 Bhts (Exclusive of 7% VAT)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 9/06/Capture.jpg
CATEGORIES:Cloud security
END:VEVENT
BEGIN:VEVENT
UID:818@acinfotec.com
DTSTART:20260511T023000Z
DTEND:20260514T093000Z
DTSTAMP:20260107T090835Z
URL:https://www.acinfotec.com/training-event/comptia-security-exam-include
 d-8/
SUMMARY:CompTIA Security+ (Exam Included)
DESCRIPTION:\n\nAbout this course \nCompTIA® Security+® is the primary co
 urse you will need to take if your job responsibilities include securing n
 etwork services\, devices\, and traffic and your organization as a whole i
 ncluding the physical security elements and operational security measures.
  It is also the main course you will take to prepare for the CompTIA Secur
 ity+ Certification examination.\n\nIn this course\, you will build on your
  knowledge and professional experience with security fundamentals\, networ
 ks\, and organizational security as you acquire the specific skills requir
 ed to implement basic security services on any type of computer network. T
 his course can benefit you in two ways. If you intend to pass the CompTIA 
 Security+ (Exam SY0-701) Certification examination\, this course can be a 
 significant part of your preparation. But certification is not the only ke
 y to professional success in the field of computer security.\n\nToday's jo
 b market demands individuals with demonstrable skills\, and the informatio
 n and activities in this course can help you build your computer security 
 skill set so that you can confidently perform your duties in any security-
 related professional role.\n\nWho should attend?\nThis course is targeted 
 toward the information technology (IT) professional who has networking and
  administrative skills in Windows®-based Transmission Control Protocol/In
 ternet Protocol (TCP/IP) networks and familiarity with other operating sys
 tems\, such as Mac OS® X\, Unix\, or Linux\, and who wants to further a c
 areer in IT by acquiring a foundational knowledge of security topics\; pre
 pare for the CompTIA Security+ Certification examination\; or use Security
 + as the foundation for advanced security certifications or career roles.\
 n\n\n\n\n\n\n\nCourse Contents\n\n\n\n\n\nModule 1: General Security Conce
 pts\n\n 	Compare and contrast various types of security controls.\n 	Summa
 rize fundamental security concepts.\n 	Explain the importance of change ma
 nagement processes  and the impact to security.\n 	Explain the importance
  of using appropriate cryptographic solutions.\n\nModule 2: Security Opera
 tions\n\n 	Given a scenario\, apply common security techniques to computin
 g resources.\n 	Explain the security implications of proper hardware\, sof
 tware\, and data asset management.\n 	Explain various activities associate
 d with vulnerability management.\n 	Explain security alerting and monitori
 ng concepts and tools.\n 	Given a scenario\, modify enterprise capabilitie
 s to enhance security.\n 	Given a scenario\, implement and maintain identi
 ty and access management.\n 	Explain the importance of automation and orch
 estration related to secure operations.\n 	Explain appropriate incident re
 sponse activities.\n 	Given a scenario\, use data sources to support an in
 vestigation.\n\nModule 3: Security Architecture\n\n 	Compare and contrast 
 security implications of different architecture models.\n 	Given a scenari
 o\, apply security principles to secure enterprise infrastructure.\n 	Comp
 are and contrast concepts and strategies to protect data.\n 	Explain the i
 mportance of resilience and recovery in security architecture.\n\nModule 4
 : Threats\, Vulnerabilities\, and Mitigations\n\n 	Compare and contrast co
 mmon threat actors and motivations.\n 	Explain common threat vectors and a
 ttack surfaces.\n 	Explain various types of vulnerabilities.\n 	Given a sc
 enario\, analyze indicators of malicious activity.\n 	Explain the purpose 
 of mitigation techniques used to secure the enterprise.\n\nModule 5: Secur
 ity Program Management and Oversight\n\n 	Summarize elements of effective 
 security governance.\n 	Explain elements of the risk management process\n 
 	Explain the processes associated with third-party risk assessment and man
 agement.\n 	Summarize elements of effective security compliance.\n 	Explai
 n types and purposes of audits and assessments.\n 	Given a scenario\, impl
 ement security awareness practices.\n\nAbout the exam\nThe new CompTIA Sec
 urity+ (SY0-701) represents the latest and greatest in cybersecurity\, cov
 ering the most in-demand skills related to current threats\, automation\, 
 zero trust\, IoT\, risk – and more. Once certified\, you’ll understand
  the core skills needed to succeed on the job – and employers will notic
 e too. The Security+ exam verifies you have the knowledge and skills requi
 red to:\n\n 	Assess the security posture of an enterprise environment and 
 recommend and implement appropriate security solutions.\n 	Monitor and sec
 ure hybrid environments\, including cloud\, mobile\, Internet of Things (I
 oT)\, and operational technology.\n 	Operate with an awareness of applicab
 le regulations and policies\, including principles of governance\, risk\, 
 and compliance.\n 	Identify\, analyze\, and respond to security events and
  incidents.\n\nCompTIA Security+ is compliant with ISO 17024 standards and
  approved by the U.S. DoD to meet directive 8140/8570.01-M requirements. R
 egulators and government rely on ANSI accreditation because it provides co
 nfidence and trust in the outputs of an accredited program. Over 2.3 milli
 on CompTIA ISO/ANSI-accredited exams have been delivered since January 1\,
  2011.\nTraining Info\nLanguage : Conducted in Thai Language\nDuration : 4
  Days\nDate : May 11 - 14\, 2026\nTime : 9.30 - 16.30 pm\nVenue : ACinfote
 c Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workla
 b) \, Rama 4 Rd.\nContact: 02 670 8980-3 ext.321-323\nE training@acinfote
 c.com\nPrice: 45\,000 baht (Ex.vat 7%)\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:613@acinfotec.com
DTSTART:20260513T023000Z
DTEND:20260515T093000Z
DTSTAMP:20260107T090849Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-31000-risk
 -manager-thai-exam-included-6/
SUMMARY:PECB Certified ISO 31000 Risk Manager (Exam Included)
DESCRIPTION:About this course\nThe ISO 31000 Risk Manager training course h
 elps participants acquire the knowledge necessary and ability to integrate
  the risk management guidelines of ISO 31000 in an organization. It provid
 es information with regard to the risk management principles and their app
 lication\, as well as the core elements of the risk management framework a
 nd steps for a risk management process. In addition\, it provides the basi
 c approaches\, methods\, and practices for assessing risk in a wide range 
 of situations.\n\nUpon completion of the training course\, you can sit for
  the exam and apply to obtain the “PECB Certified ISO 31000 Risk Manager
 ” credential. The credential demonstrates your knowledge and ability to 
 apply the risk management process in an organization based on the guidelin
 es of ISO 31000 and best practices.\nCourse Benefits\n\n 	Understand the r
 isk management concepts\, approaches\, methods\, and techniques\n 	Learn h
 ow to establish a risk management framework in the context of an organizat
 ion\n 	Learn how to apply the ISO 31000 risk management process in an orga
 nization\n 	Understand the basic approaches\, methods\, and practices used
  to integrate risk management in an organization\n\nWho should attend?\n\n
  	Managers or consultants responsible for the effective management of risk
  in an organization\n 	Individuals seeking to gain knowledge about the ris
 k management principles\, framework\, and process\n 	Individuals responsib
 le for the creation and protection of value in their organizations\n 	Indi
 viduals interested in pursuing a career in risk management\n\nCourse Conte
 nts\nDay 1: Introduction to ISO 31000 and risk management and establishing
  the risk management framework\n\n 	Training course objectives and structu
 re\n 	Standards\n 	Introduction to ISO 31000 concepts\n 	ISO 31000 princip
 les\, framework\, and process\n 	Establishing the framework and defining t
 he governance\n\nDay 2: Initiation of the risk management process and risk
  assessment based on ISO 31000 \n\n 	Scope\, context\, and risk criteria\n
  	Risk identification\n 	Risk analysis\n 	Risk evaluation\n\nDay 3 Risk tr
 eatment\, recording and reporting\, monitoring and review\, and communicat
 ion and consultation according to ISO 31000 \n\n 	Risk treatment\n 	Recor
 ding and reporting\n 	Monitoring and review\n 	Communication and consultat
 ion\n 	Closing of the training course\n 	Exam (2 hours)\n\nTraining Info\n
 Duration : 3 Days\nDate : May 13-15\, 2026\nTime : 9.30-16.30 pm.\nVenue 
 : ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg
 .\, (Worklab) \, Rama 4 Rd.\nTraining Fee : 38\,500 Baht (ex.vat 7%)\nTel.
  02 670 8980-3 ext. 321-323\nwww.pecb.com\nEmail. training@acinfotec.com\n
 \n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:572@acinfotec.com
DTSTART:20260514T023000Z
DTEND:20260515T093000Z
DTSTAMP:20251219T034629Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -manager-cipm-new-2/
SUMMARY:Certified Information Privacy Manager (CIPM) (Thai)
DESCRIPTION: \nAbout this course\nBusiness functions such as marketing\, f
 inance\, human resources and customer service have privacy responsibilitie
 s that can expose their organizations to financial loss and damage to repu
 tation. IAPP Privacy Program Management Training\, the training aligned wi
 th ANSI/ISO-accredited CIPM certification\, gives professionals the skill
 s to operationalize privacy and minimize risks to reputation from improper
  handling of personal data.\n Course Benefits\nCIPM training teaches a pr
 ocess for conceptualizing\, designing\, building and operating a data priv
 acy management program. The curriculum\, available in French\, German and 
 English\, includes creating a company vision\, structuring data protection
  teams\, developing and implementing system frameworks\, and measuring per
 formance.\n Who should attend?\n\n 	Anyone involved with data protection 
 processes and programs\n 	Data Protection Officers\n 	Data Protection Mana
 gers\n 	Auditors\n 	Legal Compliance Officers\n 	Security Managers\n 	Info
 rmation Managers\n\n Course Contents\nModule 1: Introduction to Privacy P
 rogram Management\n\n\n 	Identifies privacy program management responsibil
 ities and describes the role of accountability in privacy program manageme
 nt.\n\nModule 2: Privacy Governance\n\n\n 	Examines considerations for dev
 eloping and implementing a privacy program\, including the position of the
  privacy function within the organization\, role of the\nDPO\, program sco
 pe and charter\, privacy strategy\, support and ongoing involvement of key
  functions and privacy frameworks.\n\nModule 3: Applicable Laws and Regula
 tions\n\n\n 	Discusses the regulatory environment\, common elements across
  jurisdictions and strategies for aligning compliance with organizational 
 strategy.\n\nModule 4: Data Assessments\n\n\n 	Relates practical processes
  for creating and using data inventories/ maps\, gap analyses\, privacy as
 sessments\, privacy impact assessments/data protection impact\nassessments
  and vendor assessments.\n\nModule 5: Policies\n\n\n 	Describes common typ
 es of privacy-related policies\, outlines components and offers strategies
  for implementation.\n\nModule 6: Data Subject Rights\n\n\n 	Discusses ope
 rational considerations for communicating and ensuring data subject rights
 \, including privacy notice\, choice and consent\, access and rectificatio
 n\, data\nportability\, and erasure.\n\nModule 7 : Training and Awareness\
 n\n 	Outlines strategies for developing and implementing privacy training 
 and awareness programs.\n\n\nModule 8 : Protecting Personal Information\n\
 n\n 	Examines a holistic approach to protecting personal information throu
 gh privacy by design.\n\nModule 9 : Data Breach Incident Plans\n\n\n 	Prov
 ides guidance on planning for and responding to a data security incident o
 r breach.\n\nModule 10 : Monitoring and Auditing Program Performance\n\n\n
  	Relates common practices for monitoring\, measuring\, analyzing and audi
 ting privacy program performance.\n\nTraining Info:\n\nLanguage: Conducte
 d in Thai Language\nDuration: 2 Days\nDate: May 16 - 17\, 2026\nVenue: A
 Cinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, 
 (Worklab) \, Rama 4 Rd.\nTraining Fees: 49\,900 (Exam Included)\nTel : 02 
 670 8980-3 ext. 321-323\nE-mail: training@acinfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/10/CIPM_Seal_Final_CMYK-01-1.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:648@acinfotec.com
DTSTART:20260518T023000Z
DTEND:20260522T093000Z
DTSTAMP:20260107T090932Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-20000-lead
 -auditor-thai-exam-included-4/
SUMMARY:PECB Certified ISO 20000 Lead Auditor (Exam Included)
DESCRIPTION:About this course\nISO/IEC 20000 Lead Auditor training enables 
 you to develop the necessary expertise to perform an IT Service Management
  System (ITSMS) audit by applying widely recognized audit principles\, pro
 cedures and techniques. During this training course\, you will acquire the
  knowledge and skills to plan and carry out internal and external audits i
 n compliance with ISO 19011 and ISO/IEC 17021-1 certification process.\n\n
 Based on practical exercises\, you will be able to master audit techniques
  and become competent to manage an audit program\, audit team\, communicat
 ion with customers\, and conflict resolution.\n\nAfter acquiring the neces
 sary expertise to perform this audit\, you can sit for the exam and apply 
 for a “PECB Certified ISO/ IEC 20000 Lead Auditor” credential. By hold
 ing a PECB Lead Auditor Certificate\, you will demonstrate that you have t
 he capabilities and competencies to audit organizations based on best prac
 tices.\nLearning Objectives\n\n 	Understand the operations of an IT Servic
 e Management System (ITSMS) based on ISO/IEC 20000\n 	Acknowledge the corr
 elation between ISO/IEC 20000-1\, ISO/IEC 20000-2 and other standards and 
 regulatory frameworks\n 	Understand an auditor’s role to: plan\, lead an
 d follow-up on a management system audit in accordance with ISO 19011\n 	L
 earn how to lead an audit and audit team\n 	Learn how to interpret the req
 uirements of ISO/IEC 20000-1 in the context of an ITSMS audit\n 	Acquire t
 he competencies of an auditor to: plan an audit\, lead an audit\, draft re
 ports\, and follow-up on an audit in compliance with ISO 19011\n\n Who Sh
 ould Attend?\n\n 	Auditors seeking to perform and lead IT Service Manageme
 nt System (ITSMS) certification audits\n 	Managers or consultants seeking 
 to master an IT Service Management System audit process\n 	Individuals res
 ponsible for maintaining conformance with ITSMS requirements\n 	Technical 
 experts seeking to prepare for an IT Service Management System audit\n 	Ex
 pert advisors in IT Service Management\n\nCourse Agenda\nDay 1: Introducti
 on to IT Service Management Systems (ITSMS) and ISO/IEC 20000\n\n\n 	Cours
 e objectives and structure\n 	Standard and regulatory framework\n 	Certifi
 cation process\n 	Fundamental principles of service management\n 	Service 
 Management System (SMS)\n\nDay 2: Audit principles\, preparation and launc
 hing of an audit\n\n\n 	Fundamental audit concepts and principles\n 	Audit
  approach based on evidence and risk\n 	Initiating the audit\n 	Stage 1 au
 dit\n 	Preparing the stage 2 audit (on-site audit)\n 	Stage 2 audit (Part 
 1)\n\nDay 3: On-site audit activities\n\n\n 	Stage 2 audit (Part 2)\n 	Com
 munication during the audit\n 	Audit procedures\n 	Creating audit test pla
 ns\n 	Drafting audit findings and non-conformity reports\n\nDay 4: Closing
  the audit\n\n\n 	Documentation of the audit and its review\n 	Closing the
  audit\n 	Evaluating action plans by the auditor\n 	Beyond the initial aud
 it\n 	Managing an internal audit programme\n 	Competence and evaluation of
  auditors\n 	Closing the training\n\nDay 5: Certification Exam (3 Hours)\n
 \nTraining Info\nDuration : 5 Days\nDate :  May 18-22\, 2026\nTime : 9.
 30-16.30\nLanguage : Thai Language Class\, Thai Instructor\nVenue : ACin
 fotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Wo
 rklab) \, Rama 4 Rd.\nContact : Tel 02 670 8980-3 ext.321-323\nE-mail tra
 ining@acinfotec.com\nPrice : 51\,500 Baht (Ex.vat 7%)\n\n\n\nwww.pecb.com
 \n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:939@acinfotec.com
DTSTART:20260518T023000Z
DTEND:20260522T093000Z
DTSTAMP:20260107T090919Z
URL:https://www.acinfotec.com/training-event/certified-ethical-hacker-cehv
 13-exam-included-update/
SUMMARY:Certified Ethical Hacker (CEHv13) (Exam Included)
DESCRIPTION:Certified Ethical Hacker (CEHv13) Powered by AI CapabilitiesLE
 ARN | CERTIFY | ENGAGE | COMPETE\nWhat’s New in The CEH v13?\nThe C|EH v
 13 not only provides extensive hands-on coverage but also integrates AI in
 to all fve phases of ethical hacking:\n\nMaster AI to Automate Ethical Hac
 king Tasks\, to hack and defend against AI systems\, and boost your task e
 ffciency by 40% in your job role.\nDevelop a Hacker’s Mindset: Master th
 e 5 Phases of Ethical Hacking and Gain AI Skills to Automate Them1. Reconn
 aissance | Learn to gather essential information about your target 2. Vuln
 erability Scanning | Gain the ability to identify weaknesses in the target
  system 3. Gaining Access | Learn how to actively exploit identifed vulner
 abilities 4. Maintaining Access | Develop skills to maintain continued acc
 ess to the target systems\nLearn AI Tools:\n• ShellGPT• ChatGPT• Fra
 udGPT• WormGPT• DeepExploit• Nebula• Veed.io And many more!\nThe C
 |EH v13 is a specialized\, one-of-a- kind training program that helps you 
 gain expertise in ethical hacking\, AI\, and machine learning. With hands-
 on training labs\, knowledge-based and practical exams\, a mock ethical ha
 cking engagement on live networks\, and a global hacking competition\, thi
 s program ensures you master the most in-demand skills needed to excel and
  stand out in the cybersecurity industry.This learning framework offers no
 t only a comprehensive training program to prepare you for the certifcatio
 n exam but also the industry’s most robust\, in-depth\, hands- on lab an
 d practice range experience.\n\nCourseware Cyber Range Gain Skills\n\nKnow
 ledge-Based Practical ExamGain Recognition \n\nLive Cyber Range Gain Exper
 ience\n\nGlobal EthicalHacking CompetitionGain Respect\nBeat Hackers in th
 eir Own Game with CEH v13! A RevolutionaryWay to Learn Ethical Hacking\n1.
  Learn - 20 modules - 2500+ pages of student manual - 2000 pages of lab ma
 nual - Over 221 hands-on labs to practice attack vectors and hacking tools
  - AI integrated skills in the 5 phases of the ethical hacking framework -
  Hacking AI system\, based on the Top 10 OWASP vulnerabilities - Over 4000
  hacking and security tools - Learn how to hack multiple operating systems
  (Windows 11\, Windows servers\, Linux\, Ubuntu\, Android) - More than 50%
  of training time is dedicated to labs2. Certify - Knowledge-Based Exam (A
 NAB ISO 17024 and US DoD 8140)- 4 hours / 125 multiple-choice questions - 
 Practical Exam (ANAB ISO 17024 and US DoD 8140)- 6 hours / 20 real scenari
 o based questions\n3. Engage - 4000 hacking tools - 550 attack techniques 
 Conduct a real-world ethical hacking assignmentApply the 5 phases\n1. Reco
 nnaissance 2. Scanning 3. Gaining access 4. Maintaining access 5. Covering
  your tracks\n4. Compete\n- New challenges every month - 4-hour CTF compet
 ition - Compete with your peers worldwide Hack your way to the top of the 
 leaderboard Focus on new attack vectorsExploit emerging vulnerabilities Ch
 allenges include:- Ransomware - Web app hardening - Unpatched software - S
 ystem hacking - Service exploitation - Incident response - Forensic analys
 is- Web app hacking and pen testing - Reverse engineering - Cryptography -
  Encryption - Hacking cloud networks - ICS/SCADA\nCourse Outline\n20 Modul
 es that help you master the foundations of Ethical Hacking and prepare to 
 challenge the CEH certification exam.\nModule 1: Introduction to Ethical H
 acking| Learn the fundamentals and key issues in information security\, in
 cluding the basics of ethical hacking\, information security controls\, re
 levant laws\, and standard procedures. Module 2: Foot Printing and Reconna
 issance| Learn how to use the latest techniques and tools for footprinting
  and reconnaissance\, a critical pre-attack phase of ethical hackingModule
  3: Scanning Networks|Learn different network scanning techniques and coun
 termeasures.Module 4: Enumeration|Learn various enumeration techniques\, i
 ncluding Border Gateway Protocol (BGP) and Network File Sharing (NFS) expl
 oits and associated countermeasures. Module 5: Vulnerability Analysis| Le
 arn how to identify security loopholes in a target organization’s networ
 k\, communication infrastructure\, and end systems. Different types of vul
 nerability assessment and vulnerability assessment tools are also included
 . Module 6: System Hacking| Learn about the various system hacking methodo
 logies used to discover system and network vulnerabilities\, including ste
 ganography\, steganalysis attacks\, and how to cover tracks Module 7: Malw
 are Threats| Learn about different types of malware (Trojan\, viruses\, wo
 rms\, etc.)\, APT and fleless malware\, malware analysis procedures\, and 
 malware countermeasures. Module 8: Sniffing| Learn about packet sniffng te
 chniques and their uses for discovering network vulnerabilities\, plus cou
 ntermeasures to defend against sniffng attacks.Module 9: Social Engineerin
 g| Learn social engineering concepts and techniques\, including how to ide
 ntify theft attempts\, audit human-level vulnerabilities\, and suggest soc
 ial engineering countermeasures.Module 10: Denial-of-Service| Learn about 
 different Denial of Service (DoS) and Distributed DoS (DDoS) attack techni
 ques\, plus the tools used to audit a target and devise DoS and DDoS count
 ermeasures and protections.Module 11: Session Highjacking| Learn the vario
 us session-hijacking techniques used to discover network-level session man
 agement\, authentication\, authorization\, and cryptographic weaknesses an
 d associated countermeasures.Module 12: Evading IDS\, Firewalls\, and Hone
 ypots| Learn about frewalls\, intrusion detection systems (IDS)\, and hone
 ypot evasion techniques\; the tools used to audit a network perimeter for 
 weaknesses\; and countermeasures. Module 13: Hacking Web Servers| Learn a
 bout web server attacks\, including a comprehensive attack methodology use
 d to audit vulnerabilities in web server infrastructures and countermeasur
 es.Module 14: Hacking Web Applications| Learn about web application attack
 s\, including a comprehensive hacking methodology for auditing vulnerabili
 ties in web applications and countermeasures.Module 15: SQL Injection| Lea
 rn about SQL injection attack techniques\, evasion techniques\, and SQL in
 jection countermeasures.Module 16: Hacking Wireless Networks| Learn about 
 different types of encryption\, threats\, hacking methodologies\, hacking 
 tools\, security tools\, and countermeasures for wireless networks.Module 
 17: Hacking Mobile Platforms| Learn mobile platform attack vectors\, Andro
 id and iOS hacking\, mobile device management\, mobile security guidelines
 \, and security tools. Module 18: IoT and OT Hacking| Learn different type
 s of Internet of Things (IoT) and operational technology (OT) attacks\, ha
 cking methodologies\, hacking tools\, and countermeasures. Module 19: Clo
 ud Computing| Learn different cloud computing concepts\, such as container
  technologies and serverless computing\, various cloud computing threats\,
  attacks\, hacking methodologies\, and cloud security techniques and tools
 . Module 20: Cryptography| Learn about encryption algorithms\, cryptograp
 hy tools\, Public Key Infrastructure (PKI)\, email encryption\, disk encry
 ption\, cryptography attacks\, and cryptanalysis tools\n\nTraining Info\n\
 n\n\nDuration : 5 Days Language: Conduct in Thai Time : 09.00-05.00 pm.Tr
 aining Date: May 18 - 22\, 2026Tel. 02 670 8980-3 ext. 321-323Price: Pleas
 e Call Email. training@acinfotec.com https://www.eccouncil.org/  
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/CEH-300x233.jpg
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:924@acinfotec.com
DTSTART:20260518T023000Z
DTEND:20260522T093000Z
DTSTAMP:20260107T090902Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-42001-
 lead-implementer-artificial-intelligence-management-system-exam-included-n
 ew-2/
SUMMARY:PECB Certified ISO/IEC 42001 Lead Implementer (Artificial Intellige
 nce Management System) (Exam Included)
DESCRIPTION:PECB Certified ISO/IEC 42001 Artificial Intelligence Management
  System Lead Implementer\nThe ISO/IEC 42001 Lead Implementer training cour
 se provides the participants with the essential competencies needed to eff
 ectively plan\, implement\, manage\, monitor\, maintain\, and continually 
 improve an artificial intelligence management system (AIMS).\nAbout this c
 ourse\nArtificial intelligence (AI) is becoming a driving force in today
 ’s technology landscape. Its application has spanned across numerous sec
 tors. Its rapid expansion brought unique challenges and considerations tha
 t demand specific expertise to ensure its effective implementation and res
 ponsible management. The PECB ISO/IEC 42001 Lead Implementer training cour
 se is your gateway to mastering the practical implementation and responsib
 le management of AI management system.\n\nThe PECB ISO/IEC 42001 Lead Impl
 ementer training course is designed to prepare you to implement AI managem
 ent system in accordance with ISO/IEC 42001. It provides you with the nece
 ssary competencies to effectively translate AI strategies into actionable 
 solutions. It aims to provide a comprehensive understanding of AI implemen
 tation best practices and a framework for its successful integration withi
 n organizations\, equipping you with the hands-on expertise to drive AIMS 
 implementation projects.\n\nAfter successfully completing the course and p
 assing the exam\, you can apply for the “PECB Certified ISO/IEC 42001 Le
 ad Implementer” credential that demonstrates your ability to effectively
  implement AI strategies.\nWho Should Attend?\nThis training course is int
 ended for:\n\n 	Professionals responsible for overseeing and managing AI p
 rojects\n 	Consultants advising on AI implementation strategies\n 	Expert 
 advisors and specialists aiming to master the practical implementation of 
 AIMS in accordance with ISO/IEC 42001\n 	Individuals tasked with ensuring 
 that AI projects adhere to AI requirements within an organization\n 	Membe
 rs of AIMS implementation teams involved in the implementation of AI syste
 ms\n 	Executives and managers seeking to make informed decisions regarding
  AI implementation and its alignment with ISO/IEC 42001\n\n Objectives\nA
 fter successfully completing the training course\, you will be able to:\n\
 n 	Explain the fundamental concepts and principles of an AIMS based on ISO
 /IEC 42001\n 	Interpret the ISO/IEC 42001 requirements for an AIMS from th
 e perspective of an implementer\n 	Initiate and plan the implementation of
  an AIMS based on ISO/IEC 42001 by utilizing PECB’s IMS2 Methodology and
  other best practices\n 	Support an organization in operating\, maintainin
 g\, and continually improving an AIMS based on ISO/IEC 42001\n 	Prepare an
  organization to undergo a third party certification audit\n\nCourse Conte
 nts\nDay 1 Introduction to ISO/IEC 42001 and the initiation of an AIMS imp
 lementation\n• Training course objectives and structure\n• Standards a
 nd regulatory frameworks\n• Artificial intelligence management system (A
 IMS)\n• Fundamental concepts and principles of artificial intelligence\n
 • AIMS implementation approaches\n• Leadership and project approval\n
 • Roles and responsibilities\n\nDay 2 Implementation plan of an AIMS\n
 • The organization and its context\n• AIMS scope\n• Analysis of the 
 existing system\n• AI policy\n• AI risk management\n• Statement of A
 pplicability\n\nDay 3 Implementation of an AIMS\n• Selection and design 
 of controls\n• Implementation of controls\n• Management of documented 
 information\n• Communication\n• Competence and awareness\n• Manageme
 nt of AI operations\n\nDay 4 AIMS monitoring\, continual improvement\, and
  preparation for the certification audit\n• Monitoring\, measurement\, a
 nalysis and evaluation\n• Internal audit\n• Management review\n• Tre
 atment of nonconformities\n• Continual improvement\n• Preparation for 
 the certification audit\n• Closing of the training course\n\nDay 5 Certi
 fication Exam\nTraining Info\nDuration:  5 Days\nDate: May 18-22\, 2026\
 nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16t
 h Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTrai
 ning Fees: 51\,500 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail
 .training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:AI Intelligent,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:996@acinfotec.com
DTSTART:20260519T120000Z
DTEND:20260528T140000Z
DTSTAMP:20260225T065313Z
URL:https://www.acinfotec.com/training-event/aigp-thai-new/
SUMMARY:Certified Artificial Intelligence Governance Professional (AIGP) (T
 hai) - New!
DESCRIPTION:\n\n\n\nWith the expansion of AI technology\, there is a need f
 or professionals in all industries to understand and execute responsible A
 I governance. The AIGP credential demonstrates that an individual can ensu
 re safety and trust in the development and deployment of ethical AI and on
 going management of AI systems.\n\nAbout this course\nThis training teache
 s critical artificial intelligence governance concepts that are also integ
 ral to the AIGP certification exam. While not purely a “test prep” cou
 rse\, this training is appropriate for professionals who plan to certify\,
  as well as for those who want to deepen their AI governance knowledge. Bo
 th the training and the exam are based on the same body of knowledge.\nCou
 rse Benefits\nIt teaches AI’s technological foundations and development 
 cycle\, existing and emerging laws\, risk management strategies and much m
 ore. It is excellent preparation for anyone pursuing IAPP Artificial Intel
 ligence Governance Professional certification.\nWho should attend?\nAny pr
 ofessionals tasked with developing AI governance and risk management in th
 eir operations\, and anyone pursuing IAPP Artificial Intelligence Governan
 ce Professional certification.\nCourse Contents\n\n\nModule 1: Foundations
  of artificial intelligence\nDefines AI and machine learning\, presents an
  overview of the different types of AI systems and their use cases\, and p
 ositions AI models in the broader socio-cultural context.\nModule 2: AI im
 pacts on people and responsible AI principles\nOutlines the core risks and
  harms posed by AI systems\, the characteristics of trustworthy AI systems
 \, and the principles essential to responsible and ethical AI.\nModule 3: 
 AI development life cycle\nDescribes the AI development life cycle and the
  broad context in which AI risks are managed.\nModule 4: Implementing resp
 onsible AI governance and risk management\nExplains how major AI stakehold
 ers collaborate in a layered approach to manage AI risks while acknowledgi
 ng AI systems’ potential societal benefits.\nModule 5: Implementing AI p
 rojects and systems\nOutlines mapping\, planning and scoping AI projects\,
  testing and validating AI systems during development\, and managing and m
 onitoring AI systems after deployment.\nModule 6: Current laws that apply 
 to AI systems\nSurveys the existing laws that govern the use of AI\, outli
 nes key GDPR intersections\, and provides awareness of liability reform.\n
 Module 7: Existing and emerging AI laws and standards\nDescribes global AI
 -specific laws and the major frameworks and standards that exemplify how A
 I systems can be responsibly governed.\nModule 8: Ongoing AI issues and co
 ncerns\nPresents current discussions and ideas about AI governance\, inclu
 ding awareness of legal issues\, user concerns\, and AI auditing and accou
 ntability issues.\n\n\nTraining info\n\nLanguage: Conducted in Thai Lang
 uage\nDuration: Every Tue and Thur 2 hours / Sessions\nDate: May 19\, 21\
 , 26\, and 28\, 2026\nTime: 19.00 - 21.00 PM\nVenue: Live Online Training\
 nTraining Fees: 38\,000 (Exam Included)\nEarly Bird: Please call Limited S
 eat!!\nTel : 02 670 8980-3 ext. 321-323\nEmail : training@acinfotec.com\n\
 n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/03/AIGP_Seal_color.png
CATEGORIES:AI Intelligent,IAPP
END:VEVENT
BEGIN:VEVENT
UID:944@acinfotec.com
DTSTART:20260521T023000Z
DTEND:20260522T093000Z
DTSTAMP:20260107T090945Z
URL:https://www.acinfotec.com/training-event/pecb-certified-gdpr-foundatio
 nexam-included-6/
SUMMARY:PECB Certified GDPR Foundation(Exam Included)
DESCRIPTION:About this course\n\nGDPR Foundation training enables you to le
 arn the basic elements to implement and manage a compliance framework with
  regard to the protection of personal data. During this training course\, 
 you will be able to understand the fundamental privacy principles and beco
 me familiar with the role of the Data Protection Officer.\n\nAfter complet
 ing this course\, you can sit for the exam and apply for a “PECB Certifi
 ed GDPR Foundation” credential. A PECB Foundation Certificate shows that
  you have understood the fundamental methodologies\, requirements\, framew
 ork and management approach.\nWho should attend?\n\n 	Individuals involved
  in Personal Data Protection and Information Security\n 	Individuals seeki
 ng to gain knowledge about the main privacy principles\n 	Individuals inte
 rested to pursue a career in Data Protection\n\nLearning objectives\n\n 	U
 nderstand the General Data Protection Regulation  requirements and the fu
 ndamental principles of privacy\n 	Understand the obligations\, roles and 
 responsibilities of the Data Protection Officer\n 	Understand the concepts
 \, approaches\, methods and techniques to effectively align a compliance f
 ramework with regard to the protection of personal data\n\nCourse agenda\n
 Day 1: Introduction to GDPR and Data Protection Principles\nDay 2: The Gen
 eral Data Protection Regulation requirements and Certification Exam\nGener
 al information\n\n 	Certification fees are included on the exam price.\n 	
 Training material containing over 200 pages of information and practical e
 xamples will be distributed\n 	A participation certificate of 14 CPD (Cont
 inuing Professional Development) credits will be issued\n 	In case of exam
  failure\, you can retake the exam within 12 months for free\n\n Training 
 info\nDuration:  2 Days\nDate:  May 21 - 22\, 2026\nTime:  9.30 am. 
 – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Cent
 re Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 32\,000 
 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec
 .com\n\n\n\nwww.pecb.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:537@acinfotec.com
DTSTART:20260525T023000Z
DTEND:20260529T093000Z
DTSTAMP:20260107T091015Z
URL:https://www.acinfotec.com/training-event/cissp-exam-preparation-exam-e
 xcluded-8/
SUMMARY:CISSP Exam Preparation (Exam Excluded)
DESCRIPTION:\nAbout This Course\nThe CISSP has clearly emerged as THE key c
 ertification for security professionals. In fact\, in an informal survey o
 f information security jobs on a major employment Web site\, over 70 perce
 nt of the positions required CISSP certification! Corporations are demandi
 ng experienced information security professionals with the certifications 
 to prove it to protect their information and assets.\n\nThe CISSP Prep cla
 ss was developed to meet current demands and the growing needs of the comp
 uter industry. This class provides the student with the level of knowledge
  needed as part of the (ISC)2 certification requirements for the Certified
  Information System Security Professional (CISSP) Certification. This cert
 ification is rapidly becoming a requirement for employment with security t
 asks. Students gain a solid background on security concerns\, communicatio
 ns\, infrastructure\, basic cryptography\, and operational\nWho should att
 end?\n\nThe CISSP is ideal for experienced security practitioners\, manage
 rs and executives interested in proving their knowledge across a wide arra
 y of security practices and principles\, including those in the following 
 positions:\n\n 	Security Manager\n 	Security Auditor\n 	Security Architect
 \n 	Security Consultant\n 	Network Architect\n 	Chief Information Security
  Officer\n 	Chief Information Officer\n 	Director of Security\n 	IT Direct
 or/Manager\n 	Security Systems Engineer\n 	Security Analyst\n\nCourse Cont
 ents\n\nThe CISSP exam evaluates your expertise across eight security doma
 ins. Think of the domains as topics you need to master based on your profe
 ssional experience and education.\n\n\nDomain 1 : Security and Risk Manage
 ment (Security\, Risk\,Compliance\, Law\, Regulations\, and Business Conti
 nuity)\n\n 	Confidentiality\, integrity\, and availability concepts\n 	Sec
 urity governance principles\n 	Compliance\n 	Legal and regulatory issues\n
  	Professional ethics\n 	Security policies\, standards\, procedures and gu
 idelines\n 	Business continuity requirements\n 	Personnel security policie
 s\n 	Risk management concepts\n 	Threat modeling\n 	Risk considerations\n 
 	Security education\, training\, and awareness\n\nDomain 2 : Asset Securit
 y (Protecting Security of Assets)\n\n 	Information and asset classificatio
 n\n 	Ownership (e.g. data owners\, system owners)\n 	Protect privacy\n 	Ap
 propriate retention\n 	Data security controls\n 	Handling requirements (e.
 g. markings\, labels\,storage)\n\nDomain 3 : Security Engineering (Enginee
 ring and Management of Security)\n\n 	Engineering processes using secure d
 esign principles\n 	Security models fundamental concepts\n 	Security evalu
 ation models\n 	Security capabilities of information systems\n 	Security a
 rchitectures\, designs\, and solution elements vulnerabilities\n 	Web-base
 d systems vulnerabilities\n 	Mobile systems vulnerabilities\n 	Embedded de
 vices and cyber-physical systems vulnerabilities\n 	Cryptography\n 	Site a
 nd facility design secure principles\n 	Physical security\n\nDomain 4 : Co
 mmunication and Network Security (Designing and Protecting Network Securit
 y)\n\n 	Secure network architecture design (e.g. IP &amp\; non-IP protocol
 s\, segmentation)\n 	Secure network components\n 	Secure communication cha
 nnels\n 	Network attacks\n\nDomain 5 : Identity and Access Management (Con
 trolling Access and Managing Identity)\n\n 	Physical and logical assets co
 ntrol\n 	Identification and authentication of people and devices\n 	Identi
 ty as a service (e.g. cloud identity)\n 	Third-par ty identity services (e
 .g. on-premise)\n 	Access control attacks\n 	Identity and access provision
 ing lifecycle (e.g. provisioning review)\n\nDomain 6 : Security Assessment
  and Testing (Designing\, Performing\, and Analyzing Security Testing)\n\n
  	Assessment and test strategies\n 	Security process data (e.g. management
  and operational controls)\n 	Security control testing\n 	Test outputs (e.
 g. automated\, manual)\n 	Security architectures vulnerabilities\n\nDomain
  7 : Security Operations (Foundational Concepts\, Investigations\, Inciden
 t Management\, and Disaster Recovery)\n\n 	Investigations support and requ
 irements\n 	Logging and monitoring activities\n 	Provisioning of resources
 \n 	Foundational security operations concepts\n 	Resource protection techn
 iques\n 	Incident management\n 	Preventative measures\n 	Patch and vulnera
 bility management\n 	Change management processes\n 	Recovery strategies\n 
 	Disaster recovery processes and plans\n 	Business continuity planning and
  exercises\n 	Physical security\n 	Personnel safety concerns\n\nDomain 8 :
  Software Development Security (Understanding\,Applying\, and Enforcing So
 ftware Security)\n\n 	Security in the software development life cycle\n 	D
 evelopment environment security controls\n 	Software security effectivenes
 s\n 	Acquired software security impact\n\nCISSP Changes To Computerized Ad
 aptive Testing\n(ISC)² has introduced Computerized Adaptive Testing (CAT)
  for all English CISSP exams worldwide. Based on the same exam content out
 line as the linear\, fixed-form exam\, CISSP CAT is a more precise and eff
 icient evaluation of your competency. CISSP CAT enables you to prove your 
 knowledge by answering fewer items and completing the exam in half the tim
 e.\nHow Does it Work?\nEach candidate taking the CISSP CAT exam will start
  with an item that is well below the passing standard. Following a candida
 te’s response to an item\, the scoring algorithm re-estimates the candid
 ate’s ability based on the difficulty of all items presented and answers
  provided. With each additional item answered\, the computer's estimate of
  the candidate’s ability becomes more precise – gathering as much info
 rmation as possible about a candidate’s true ability level more efficien
 tly than traditional\, linear exams.\n\nThis more precise evaluation enabl
 es us to reduce the maximum exam administration time from 6 hours to 3 hou
 rs\, and it reduces the items necessary to accurately assess a candidate
 ’s ability from 250 items on a linear\, fixed-form exam to as little as 
 100 items on the CISSP CAT exam.\n\nThe exam content outline and passing s
 tandard for both versions of the examination are exactly the same. Each ca
 ndidate will be assessed on the same content and must demonstrate the same
  level of competency regardless of the exam format.\n\nCISSP exams in all 
 other languages\, as well as all CISSP concentration exams are delivered a
 s linear\, fixed-form exams.\nTraining Info\nDuration : 5 Days\nDate : Ma
 y 25-29\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Training Center
 \n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\
 nTraining Fee : 38\,000 Baht (ex.vat 7%)\nExam Fee : Please call\nTel. 02 
 670 8980-3 ext.321-323\nEmail. training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-1.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:859@acinfotec.com
DTSTART:20260525T023000Z
DTEND:20260529T093000Z
DTSTAMP:20260107T091030Z
URL:https://www.acinfotec.com/training-event/certified-penetration-testing
 -professional-cpentexam-included-3/
SUMMARY:Certified Penetration Testing Professional (CPENT)(Exam Included)
DESCRIPTION:\nAbout this course\nEC-Council’s Certified Penetration Teste
 r (CPENT) program teaches you how to perform an effective penetration test
  in an enterprise network environment that must be attacked\, exploited\, 
 evaded\, and defended. If you have only been working in flat networks\, CP
 ENT’s live practice range will teach you to take your skills to the next
  level by teaching you how to pen test IoT systems\, OT systems\, how to w
 rite your own exploits\, build your own tools\, conduct advanced binaries 
 exploitation\, double pivot to access hidden networks\, and also customize
  scripts/exploits to get into the innermost segments of the network.\nCPEN
 T Benefits\n\n\n\n\n\n 	100% mapped with the NICE framework.\n 	100% metho
 dology-based penetration testing program.\n 	Blends both manual and automa
 ted penetration testing approaches.\n 	Designed with the most common penet
 ration testing practices offered by the best service providers.\n 	Maps to
  all major Job Portals. Role Title: Penetration Tester and Security Analys
 t.\n 	Provides strong reporting writing guidance.\n 	Gives a real-world ex
 perience through an Advanced Penetration Testing Range.\n 	Provides candid
 ates with standard Pen test for use in the field.\n\nCPENT... No other Pen
  Test Course like it!\n\n\n\nAdvanced Windows Attacks\nThis zone contains 
 a complete forest that you first have to gain access to and then use Power
 Shell and any other means to execute Silver and Gold Ticket and Kerberoast
 ing. The machines will be configured with defenses in place meaning you to
  have to use PowerShell bypass techniques and other advanced methods to sc
 ore points within the zone.\n\n\n\nAttacking IOT Systems\nCPENT is the fir
 st certification that requires you to locate IOT devices and then gain acc
 ess to the network. Once on the network\, you must identify the firmware o
 f the IOT device\, extract it\, and then reverse engineer it.\n\n\n\nWriti
 ng Exploits: Advanced Binary Exploitation\nFinding flawed code is a skill 
 competent pen testers need. In this zone you will be required to find the 
 flawed binaries then reverse engineer them to write exploits to take contr
 ol of the program execution. The task is complicated by the requirement of
  penetrating from the perimeter to gain access then discover the binaries.
  Once that is done you have to reverse engineer the code. Unlike other cer
 tifications\, CPENT includes 32 and 64 bit code challenges and some of the
  code will be compiled with basic protections of non-executable stacks. Yo
 u must be able to write a driver program to exploit these binaries\, then 
 discover a method to escalate privileges. This will require advanced skill
 s in binary exploitation to include the latest debugging concepts and egg 
 hunting techniques. You are required to craft input code to first take con
 trol of program execution and second\, map an area in memory to get your s
 hell code to work and bypass system protections.\n\n\n\nBypassing a Filter
 ed Network\nThe CPENT certification provides web zone challenges that exis
 t within a segmentation architecture\, so you have to identify the filteri
 ng of the architecture then leverage this knowledge to gain access to web 
 applications. The next challenge is to compromise and then extract the req
 uired data from the web apps to achieve points.\n\n\n\nPentesting Operatio
 nal Technology (OT)\nThe CPENT range contains a zone that is dedicated to 
 ICS SCADA networks that the candidate will have to penetrate from the IT n
 etwork side and gain access to the OT network. Once there\, you will have 
 to identify the Programmable Logic Controller (PLC) and then modify the da
 ta to impact the OT network. You must be able to intercept the Mod Bus Com
 munication protocol and communication between the PLC and other nodes.\n\n
 \n\n\n\n\n\nAccess Hidden Networks with Pivoting\nBased on our beta testin
 g\, pen testers struggle to identify the rules that are in place when they
  encounter a layered network. Therefore\, in this zone you will have to id
 entify the filtering rules then penetrate the direct network. From there\,
  candidates have to attempt pivots into hidden networks using single pivot
 ing methods\, but through a filter. Most certifications do not have a true
  pivot across disparate networks and few (if any) have the requirement int
 o and out of a filtering device.\n\n\n\nDouble Pivoting\nOnce you have bra
 ved and mastered the challenges of the pivot\, the next challenge is the d
 ouble pivot. This is not something that you can use a tool for\; in most c
 ases the pivot has to be set up manually. CPENT is the first certification
  in the world that requires you to access hidden networks using double piv
 oting.\n\n\n\nPrivilege Escalation\nIn this challenge\, the latest methods
  of privilege escalation reverse engineering code to take control of execu
 tion then break out of the limited shell are required to gain root/admin.\
 n\n\n\nEvading Defense Mechanisms\nThe range requires your exploits be tes
 ted by different defenses you are likely to see in the wild. Candidates ar
 e required to get their exploits past the defenses by weaponizing them.\n\
 n\n\nAttack Automation with Scripts\nPrepare for advanced penetration test
 ing techniques and scripting with seven self-study appendices: Penetration
  testing with Ruby\, Python\, PowerShell\, Perl\, BASH\, Fuzzing\, and Met
 asploit.\n\n\n\nWeaponize Your Exploits\nCustomize your own tools and buil
 d your armory with your coding expertise to hack the challenges presented 
 to you as you would in real life.\n\n\n\nWrite Professional Reports\nExper
 ience how a pen tester can mitigate risks and validate the report presente
 d to the client to really make an impact. Great pen testing doesn’t mean
  much to clients without a clearly written report!\n\n\n\n\n\n\n\n\n\n\nCP
 ENT- Is this course for you?\n\n\n\nCPENT Candidates will be:\n\n\n 	Ethic
 al Hackers\n 	Penetration Testers\n 	Network server administrators\n 	Fire
 wall Administrators\n 	Security Testers\n 	System Administrators and Risk 
 Assessment professionals\n\n\nCPENT Maps to the following Industry Job Rol
 es:\n\n\n\n\n\n\n\n 	Cyber Security Forensic Analyst\n 	Cyber Threat Analy
 st Tier 2\n 	Cyber Threat Intelligence Analyst\n 	Information Security Ana
 lyst\n 	Cyber Security Engineer\n 	Application Security Analyst\n 	Cyber S
 ecurity Assurance Engineer\n 	Senior Information Assurance/ Security Speci
 alist\n 	Security Systems Analyst\n 	Security Operations Center (SOC) Anal
 yst\n\n\n\n\n\n\n\n\n 	Penetration Tester\n 	Technical Operations Network 
 Engineer\n 	IT Security Administrator\n 	Security Engineer\n 	Information 
 Security Engineer\n 	Network Security Information Analyst\n 	Mid Level Pen
 etration Tester\n 	IT Security Analyst III\n 	Junior Security Operations C
 enter (SOC) Analyst\n\n\n\n\n\nCPENT Course Outline\n\n\n\n\n\n\n\nModule 
 01: Introduction to Penetration Testing\n\n\nModule 02: Penetration Test
 ing Scoping and Engagement\n\n\nModule 03: Open Source Intelligence (OSIN
 T)\n\n\nModule 04: Social Engineering Penetration Testing\n\n\nModule 05:
  Network Penetration Testing – External\n\n\nModule 06: Network Penetr
 ation Testing– Internal\n\n\nModule 07: Network Penetration Testing –
  Perimeter Devices\n\n\nModule 08: Web Application Penetration Testing\n\
 n\nModule 09: Wireless Penetration Testing\n\n\nModule 10: IoT Penetrati
 on Testing\n\n\nModule 11: OT/SCADA Penetration Testing\n\n\nModule 12: 
 Cloud Penetration Testing\n\n\nModule 13: Binary Analysis and Exploitatio
 n\n\n\nModule 14: Report Writing and Post Testing Actions\n\n\n\n\n&nbsp\
 ;\n\n\n\n\n\n\n\nA Hands-On Exam Like No Other.\n24 Hours will define your
  Pen Testing career\n\nCPENT is a fully online\, remotely proctored practi
 cal exam that challenges you through a grueling 24-hour performance-based\
 , hands-on exam. The exam is broken into two practical exams of 12-hours e
 ach that will test your perseverance and focus by forcing you to outdo you
 rself with each new challenge. You have the option to choose either two 12
 -hour exams or one 24-hour exam.\n\n\n\n\n\n\n\n\n\nCandidates who score m
 ore than 70% will earn the CPENT certification. Candidates who score more 
 than 90% attain the prestigious LPT (Master) credential!\n\nExam features:
 \n\n 	Choose your challenge! Either two 12-hour sessions or a single 24-ho
 ur exam!\n 	EC-Council specialists proctor the entire exam\; cheating is n
 ot an option.\n 	Score at least 70% and become a CPENT.\n 	Score at least 
 90% and earn the highly regarded LPT (Master) designation!\n\n\n\n\n\n\n\n
 \n\nAn Exciting Career Awaits A CPENT\n\n\n\n\n\n\n\n\n\n\n\nTime of Compl
 etion\n40-hour course\n + 24-hour exam\n\n\n\n\n\n\n\n\n\n\n\n\n\nJobs Av
 ailable\n8\,000+ on LinkedIn alone for Pen Testers\n\n\n\n\n\n\n\n\n\n\n\n
   \n\n\nAverage Salary\n\n\n$84\,000 in the U.S.\n\n\n&nbsp\;\n\n\n\n\n\n
 \n\n\n\n\nSpend just 40-hours and align your career to the growing demand 
 for Penetration Testers. With CPENT\, you will cover advanced penetration 
 testing tools\, techniques\, and methodologies most needed right now.\n\n\
 n\n\n\n\nTraining Info\nDuration:  5 Days\nDate:  May 25-29\, 2026\nTime
 :  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.
 \, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining 
 Fees: Please Call\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfot
 ec.com\n\n\n\nwww.eccouncil.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/cover-cpent.jpg
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:876@acinfotec.com
DTSTART:20260525T023000Z
DTEND:20260529T093000Z
DTSTAMP:20260107T091003Z
URL:https://www.acinfotec.com/training-event/comptia-pentest-exam-included
 -5/
SUMMARY:CompTIA Pentest+ (Exam Included)
DESCRIPTION:About this course\nCompTIA Pentest+ has been designed to help y
 ou learn both knowledges and hands-on of penetration testing. This course 
 also includes management skills used to plan\, scope\, and manage weakness
 es\, not just only exploit them. Additional\, CompTIA Pentest+ certificati
 on meets the ISO 17024 standard. Regulators and government rely on ANSI ac
 creditation because it provides confidence and trust in the outputs of an 
 accredited program.\nCourse Benefits\n        The CompTIA Pentest+ 
 course will prepare you to both knowledges and hands-on experience of Comp
 TIA Pentest+ by providing coverage of the objectives and content examples 
 listed on the syllabus\, including how to:\n\n 	Plan and scope penetration
  tests\n 	Conduct passive reconnaissance\n 	Perform non-technical tests to
  gather information\n 	Conduct active reconnaissance\n 	Analyze vulnerabil
 ities\n 	Penetrate networks\n 	Exploit host-based vulnerabilities\n 	Test 
 applications\n 	Complete post-exploit tasks\n 	Analyze and report penetrat
 ion test results\n\nWho should attend?\n\n 	Penetration Tester\n 	Vulnerab
 ility Tester\n 	Security Analyst (II)\n 	Vulnerability Assessment Analyst\
 n 	Network Security Operations\n 	Application Security Vulnerability\n\nCo
 urse Contents\n\n 	Planning and Scoping\n\n 	Explain the importance of pla
 nning for an engagement.\n 	Explain key legal concepts.\n 	Explain the imp
 ortance of scoping an engagement properly.\n 	Explain the key aspects of c
 ompliance-based assessments.\n\n\n 	Information Gathering and Identificati
 on\n\n 	Conduct information gathering using appropriate techniques.\n 	Per
 form a vulnerability scan.\n 	Analyze vulnerability scan results.\n 	Expla
 in the process of leveraging information to prepare for exploitation.\n 	E
 xplain weaknesses related to specialized systems.\n 	Hands-on experience p
 erforming information gathering.\n\n\n 	Attacks and Exploits\n\n 	Compare 
 and contrast social engineering attacks.\n 	Exploit network-based vulnerab
 ilities.\n 	Exploit wireless vulnerabilities.\n 	Exploit application-based
  vulnerabilities.\n 	Exploit local host vulnerabilities.\n 	Perform post-e
 xploitation techniques.\n 	Hands-on experience performing vulnerability as
 sessments.\n\n\n 	Penetration Testing Tools\n\n 	Use Tools: Scanning Tools
 \, Credential Testing\, Password Cracking\, OSINT\, Social Engineering Too
 ls\, Web Proxies\, Miscellaneous.\n 	Compare and contrast various use case
 s of tools.\n 	Analyze tool output or data related to a penetration test.\
 n 	Hands-on experience performing penetration tests.\n\n\n 	Reporting and 
 Communication\n\n 	Use report writing and handling best practices.\n 	Expl
 ain post-report delivery activities.\n 	Recommend mitigation strategies fo
 r discovered vulnerabilities.\n 	Explain the importance of communication d
 uring the penetration testing process.\n\n\n\n\nTraining Info\nDuration: 
  4 Days\nDate: May 26-29\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue: 
  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.
 \, (Worklab) \, Rama 4 Rd.\nTraining Fees: 47\,000 Baht (ex.vat7%)\nTel. 0
 2 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:946@acinfotec.com
DTSTART:20260525T023000Z
DTEND:20260529T093000Z
DTSTAMP:20260107T091041Z
URL:https://www.acinfotec.com/training-event/pecb-certified-data-protectio
 n-officer-cdpo-exam-included-5/
SUMMARY:PECB Certified Data Protection Officer (CDPO) (Exam Included)
DESCRIPTION:Why should you attend?\nAs data protection is becoming more and
  more valuable\, the need for organizations to protect these data is also 
 constantly increasing. Besides violating the fundamental rights and freedo
 ms of persons\, not complying with the data protection regulations can lea
 d to risky situations that could harm an organization’s credibility\, re
 putation\, and financial status. This is where your skills as a data prote
 ction officers come to place.\n\nThe PECB Certified Data Protection Office
 r training course will help you acquire the knowledge and skills to serve 
 as a Data Protection Officer (DPO) so as to help organizations ensure comp
 liance with the General Data Protection Regulation (GDPR) requirements.\n\
 nBased on practical exercises\, you will be able to master the role of the
  DPO and become competent to inform\, advise\, and monitor compliance with
  the GDPR and cooperate with the supervisory authority.\n\nAfter attending
  the training course\, you can sit for the exam\, and if you successfully 
 pass the exam\, you can apply for the “PECB Certified Data Protection Of
 ficer” credential. The internationally recognized “PECB Certified Data
  Protection Officer” certificate will prove that you have the profession
 al capabilities and practical knowledge to advise the controller and the p
 rocessor on how to meet their obligations regarding the GDPR compliance.\n
 Who should attend?\n\n 	Managers or consultants seeking to prepare and sup
 port an organization in planning\, implementing\, and maintaining a compli
 ance program based on the GDPR\n 	DPOs and individuals responsible for mai
 ntaining conformance with the GDPR requirements\n 	Members of information 
 security\, incident management\, and business continuity teams\n 	Technica
 l and compliance experts seeking to prepare for a data protection officer 
 role\n 	Expert advisors involved in the security of personal data\n\nCours
 e agenda \nDay 1: Introduction to the GDPR concepts and principles\n\n 	Tr
 aining course objectives and structure\n 	General Data Protection Regulati
 on (GDPR)\n 	Core considerations for the GDPR\n\nDay 2: Designation of the
  DPO and analysis of the GDPR compliance program\n\n 	Designation of the D
 PO\n 	Analysis of the GDPR compliance program\n 	Relationship with the top
  management\n 	Data protection policy\n 	Register of processing activities
 \n 	Risk management process\n\nDay 3: DPO operations\n\n 	Data protection 
 impact assessment\n 	Documentation management\n 	Evaluation of the data pr
 otection controls\n 	Data protection and technology\n 	Awareness\, trainin
 g\, and communication\n\nDay 4: Monitoring and continual improvement of GD
 PR compliance\n\n 	Incident management and personal data breaches\n 	Monit
 oring and measuring compliance\n 	Data protection internal audit\n 	Treatm
 ent of non conformity\n 	Continual improvement\n 	Closing the training cou
 rse\n\nDay 5: Certification Exam\n\nTraining Info\n\n\n\nLanguage : Condu
 cted in Thai Language\nDuration : 5 Days\nDate :  May 25-29\, 2026\nTime
  : 9.30 am. – 16.30 pm.\nVenue : ACinfotec Training Center\n16th Fl.\,
  Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nPrice : 51\
 ,500 Baht (Ex.vat 7%)\nContact : T 02 670 8980-3 ext.321-323\nE training@
 acinfotec.com\n\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:770@acinfotec.com
DTSTART:20260603T023000Z
DTEND:20260605T093000Z
DTSTAMP:20260107T091050Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-38500-it-c
 orporate-governance-manager-exam-included/
SUMMARY:PECB Certified ISO 38500 IT Corporate Governance Manager (Exam Incl
 uded)
DESCRIPTION:About this course\nThis three day intensive course enables the 
 participants to develop the necessary expertise to support an organization
  in implementing corporate governance of Information Technology as specifi
 ed in ISO/IEC 38500. Participants will also gain a thorough understanding 
 of best practices used to implement guidance for Corporate Governance of I
 T from all areas of ISO 38500. ISO/ IEC 38500 applies to the governance of
  management processes (and decisions) relating to the information and comm
 unication services used by an organization. These processes could be contr
 olled by IT specialists within the organization or external service provid
 ers\, or by business units within the organization.\nCourse Benefits\n\n 	
 To understand the implementation of guidance for the corporate governance 
 of IT in accordance with ISO/IEC 38500\n 	To gain a comprehensive understa
 nding of the concepts\, approaches\, standards\, methods and techniques re
 quired for the effective management of an corporate governance of IT\n 	To
  understand the relationship between the components of a corporate governa
 nce of IT\, including responsibility\, strategy\, acquisition\, performanc
 e\, conformance\, human behavior\n 	To acquire necessary expertise to mana
 ge a team implementing ISO/IEC 38500\n\nWho should attend?\n\n 	Project ma
 nagers or consultants wanting to prepare and to support an organization in
  the implementation of corporate governance of Information Technology\n 	I
 SO 38500 auditors who wish to fully understand the corporate governance of
  IT implementation process\n 	Senior Managers responsible for the IT gover
 nance of an enterprise and the management of its risks\n 	Members of group
 s monitoring the resources within the organization\n 	External business or
  technical specialists\, such as legal or accounting specialists\, retail 
 associations\, or professional bodies\n 	Vendors of hardware\, software\, 
 communications and other IT products\n 	Internal and external service prov
 iders (including consultants)\n\nCourse Contents\nDay 1: Introduction to C
 orporate Governance of Information Technology as required by ISO/IEC 38500
 \n\n 	Introduction to corporate governance of IT\n 	Fundamental principles
  of corporate governance of IT\n 	Initiation process of corporate governan
 ce of IT\n 	Definition of the scope\n 	Corporate governance application\n 
 	Objectives of ISO/IEC 38500\n 	Benefits of using this standard\n 	Referen
 ced documents\n 	Definitions\n\nDay 2: Framework and Guidance for Good Co
 rporate Governance of IT\n\n 	Principles\n 	Model\n 	Responsibility of dir
 ectors for corporate governance of IT\n 	Strategy of IT development\n 	Acq
 uisition\n 	Performance of corporate governance of IT\n 	Conformance\n 	Hu
 man Behavior\n\nDay 3: Certification Exam\n Training Info\nDuration:  3
  Days\nDate: Jun 3 - 5\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  
 ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\,
  (Worklab) \, Rama 4 Rd.\nTraining Fees: 38\,500 Baht (ex.vat7%)\nTel. 02 
 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course),Risk Management &amp; Governance
 (GRC)
END:VEVENT
BEGIN:VEVENT
UID:543@acinfotec.com
DTSTART:20260604T023000Z
DTEND:20260605T093000Z
DTSTAMP:20260107T091101Z
URL:https://www.acinfotec.com/training-event/cobit-2019-2/
SUMMARY:COBIT 2019
DESCRIPTION:About this course \n\nThe heart of the COBIT framework updates 
 COBIT principles while laying out the structure of the overall framework.\
 n\n 	New concepts are introduced and terminology is explained—the COBIT 
 Core Model and its 40 governance and management objectives provide the pla
 tform for establishing your governance program\n 	The performance manageme
 nt system is updated and allows the flexibility to use maturity measuremen
 ts as well as capability measurements\n 	Introductions to design factors a
 nd focus areas offer additional practical guidance on flexible adoption of
  COBIT 2019\, whether for specific projects or full implementation\n\nFrom
  its foundation in the IT audit community\, COBIT has developed into a bro
 ader and more comprehensive information and technology (I&amp\;T) governan
 ce and management framework and continues to establish itself as a general
 ly accepted framework for I&amp\;T governance.\n\nCOBIT is a framework for
  the governance and management of enterprise information and technology\, 
 aimed at the whole enterprise. Enterprise IT means all the technology and 
 information processing the enterprise puts in place to achieve its goals\,
  regardless of where this happens in the enterprise. In other words\, ente
 rprise IT is not limited to the IT department of an organization\, but cer
 tainly includes it.\n\nCOBIT defines the components to build and sustain a
  governance system: processes\, organizational structures\, policies and p
 rocedures\, information flows\, culture and behaviors\, skills\, and infra
 structure.\nWho Should attend? \n\n 	IT Team leaders and Managers\n 	IT pr
 ofessionals responsible for Business Performance/ Quality Professional\n 	
 Risk management Team/ Risk Advisor\n 	IT Security and Privacy technician\n
  	Compliance Professionals\n 	Auditor\n 	Developers\n 	IT practitioner\n 	
 IT consultant\n\nCourse contents\nParticipants will learn more about:\n\n 
 	Key concepts and terminology\n 	Governance and Framework Principles\n 	CO
 BIT Principles\n 	COBIT Governance and Management Objectives\n 	Performanc
 e Management in COBIT\n 	Designing a Tailored Governance System\n 	Busines
 s Case and Implementation\n 	COBIT and Other Standards\n\nThe program incl
 ude 4 core publications.\n\n 	Introduction and Methodology\n 	Governance a
 nd Management Objectives\n 	Designing an Information and Technology Govern
 ance Solution\n 	Implementing and Optimizing an Information and Technology
  Governance Solution\n\nTraining info\nDuration:  2 Days\nDate:  Jun 4 
 - 5\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training 
 Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 
 4 Rd.\nTraining Fees: 18\,900 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-
 323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/COBIT-Services.jpg
CATEGORIES:Risk Based IT Audit,Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:551@acinfotec.com
DTSTART:20260605T023000Z
DTEND:20260605T093000Z
DTSTAMP:20260107T091115Z
URL:https://www.acinfotec.com/training-event/it-risk-management-based-on-i
 so-27005-and-iso-31000-4/
SUMMARY:IT Risk Management Based on ISO 27005 and ISO 31000
DESCRIPTION:About this course\nDuring this 1-day course\, you will learn a 
 variety of topics regarding IT risks. Risks related to information systems
  and computer networks require different approaches to deal with and also 
 new types of controls and countermeasures. This course covers various topi
 cs that IT professionals need to know in order to prepare themselves again
 st various kinds of risks related to information systems. This course will
  provide knowledge for audience to understand IT risks and how to manage r
 isks based on global risk management standards such as ISO27005 and ISO310
 00 so that they will be prompted and defended against possible risks and a
 ttacks.\nCourse Benefits\n\n 	Gain understanding of IT risks\n 	Learn and 
 understand how to manage risks based on ISO 27005 and ISO 31000 standards\
 n 	Enhance skills required for implementing security controls against iden
 tified risks\n 	Be prompted to apply knowledge given from the course to re
 al-world scenarios\n\nWho should attend?\n\n 	IT Professionals\n 	Informat
 ion security professionals\n 	Risk management professionals\n 	Anyone who 
 is responsible for and interested in managing IT risks\n\nCourse Contents\
 n\n 	Fundamental of IT risks in relations with other types of risks\n 	Var
 ious types of IT risks\, e.g. systems\, networks\, applications\, web appl
 ications\, cloud computing\, etc.\n 	Risk management framework based on IS
 O 27005\n 	Risk identification\, evaluation\, treatment\, acceptance\, com
 munications and surveillance\, Risk assessment methodologies\n 	Risk manag
 ement framework based on ISO 31000\n 	Risk identification\, evaluation\, t
 reatment\, acceptance\, communications and surveillance\, Risk assessment 
 methodologies\n 	Risk management case studies\n\n&nbsp\;\n\nTraining Info\
 n\nDuration:  1 Day\nDate:  Jun  5\, 2026\nTime:  9.30 am. – 16.30
  pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point 
 Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 9\,000 Baht (ex.v
 at7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n&n
 bsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-3.png
CATEGORIES:Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:744@acinfotec.com
DTSTART:20260608T023000Z
DTEND:20260612T093000Z
DTSTAMP:20260107T091130Z
URL:https://www.acinfotec.com/training-event/certified-cybersecurity-techn
 ician-cct-new/
SUMMARY:Certified Cybersecurity Technician (C|CT) New! (Exam Included)
DESCRIPTION:\n\n\n\nEC-Council has developed the Certified Cybersecurity Te
 chnician certification\n\n\n 	The Certified Cybersecurity Technician (C|CT
 ) is an entry-level cybersecurity program created by EC-Council\, the crea
 tor of the Certified Ethical Hacker (C|EH) certification\, to address the 
 global demand for a qualified cybersecurity workforce.\n 	EC-Council devel
 oped the C|CT to provide individuals starting their careers in IT and cybe
 rsecurity with a certification that validates their hands-on technical ski
 lls.\n 	To equip individuals with the skills they need to pursue and devel
 op their careers as cybersecurity specialists\, consultants\, network engi
 neers\, IT administrators\, and more.\n___________________________________
 _____________________________________________________________\n\n\n\nWhat 
 is Unique About the C|CT Program?\n\n\n\n\n\n\n\n\n_______________________
 __________________________________________________\nC|CT’s Key Offerings
 :\n\n Strong Foundational Coverage\nThe C|CT certification provides total
  foundational cybersecurity domain coverage with key concepts in each doma
 in combined with practical hands-on labs and critical thinking challenges 
 producing world-class cyber security technologists.\n\n Live Range Experi
 ence\nOther popular programs rely on simulation and interactivity as pract
 ical-based assessment\, the C|CT program is delivered on a live Cyber Rang
 e utilizing live targets and real attack systems for a truly immersive\, r
 eal-life practice and assessment platform.\n\n Capture the Flag\nThe C|CT
  certification offers capture the flag (CTF) style critical thinking chall
 enges to accompany each lab exercise putting knowledge into practice and p
 roviding a proven record of skill demonstration. Candidates completing the
  C|CT program will earn the C|CT certification and have a proven track rec
 ord of performing the tasks required in a live Cyber Range\, proving to em
 ployers their ability to perform critical job duties.\n\n Multiple Certif
 ications\nThe course outline of the C|CT program goes above and beyond som
 e of the more common entry-level cybersecurity programs\, such as the Secu
 rity+\, in a completely hands-on cyber range environment instead of simula
 tions to ensure cybersecurity skills development. We believe that candidat
 es who successfully attain the C|CT certification will attain other leadin
 g cybersecurity certifications\, including Security+\, without further tra
 ining\n\n Most Affordable\nDespite the unique design of the heavily hands
 -on course and its uses of real-world cyber range capability\, the certifi
 cation is one of the most affordable in the world!\n\n\nWhat Are the Benef
 its of the C|CT Credential?\n\n 	 Paves the way for a promising career in
  the realm of cybersecurity\n 	 Teaches the fundamental knowledge that cy
 bersecurity professionals need:\n\n 	Information security\n 	Network secur
 ity\n 	Computer forensics\n 	Risk management\n 	Incident handling\n 	Indus
 try best practices\n\n\n 	 Improves employability by validating certifica
 tion holders’ skills as cybersecurity specialists who can strengthen org
 anizational security\n 	 Provides extensive opportunities to practice the
  hands-on skills necessary for any technical role involving administrative
  privileges and cybersecurity considerations\n\nCourse Contents\n\n\n\n\n\
 n\n\n\nModule 01: Information Security Threats and Vulnerabilities\n\n\nM
 odule 02: Information Security Attacks\n\n\nModule 03: Network Security 
 Fundamentals\n\n\nModule 04: Identification\, Authentication\, and Author
 ization\n\n\nModule 05: Network Security Controls – Administrative Cont
 rols\n\n\nModule 06: Network Security Controls – Physical Controls\n\n\
 nModule 07: Network Security Controls – Technical Controls\n\n\nModule 
 08: Network Security Assessment Techniques and Tools\n\n\nModule 09: App
 lication Security\n\n\nModule 10: Virtualization and Cloud Computing\n\n\
 nModule 11: Wireless Network Security\n\n\n\n\n\n\n\n\n\n\n\n\nModule 12:
  Mobile Device Security\n\n\nModule 13: IoT and OT Security\n\n\nModule 
 14: Cryptography\n\n\nModule 15: Data Security\n\n\nModule 16: Network 
 Troubleshooting\n\n\nModule 17: Network Traffic Monitoring\n\n\nModule 18
 : Network Logs Monitoring and Analysis\n\n\nModule 19: Incident Response
 \n\n\nModule 20: Computer Forensics\n\n\nModule 21: Business Continuity 
 and Disaster Recovery\n\n\nModule 22: Risk Management\n\n\n\n\n\n\n\n Wh
 o Can Attend This Course?_________________________________________________
 ________________________\n\n\n\n\n\n\nThe C|CT course can be taken by stud
 ents\, IT professionals\, IT managers\, career changers\, and any individu
 al seeking a career in cybersecurity\, or aspiring to advance their existi
 ng role. This course is ideal for those entering the cybersecurity workfor
 ce\, providing foundational technician level\, hands-on skills to solve th
 e most common security issues organizations face today.\n\n\n\n\n\n\n\n\nW
 hat Are the Prerequisites for the C|CT Program?___________________________
 ______________________________________________\n\n\n\n\n\n\nThere are no s
 pecific prerequisites to take the C|CT course and attempt the C|CT certifi
 cation exam. Although this is an entry-level course\, a working knowledge 
 of IT networking and basic cybersecurity concepts will be an advantage to 
 anyone taking this course.\n\n\nTraining Info\n\nDuration : 5 Days\nLangua
 ge: Conduct in Thai language\nTime : 09.30-04.30 pm.\nTraining Date: Jun 
 8-12\, 2026\nTel. 02 670 8980-3 ext. 321-323\nPrice: 50\,000 THB (Excl. va
 t7%)\nEmail. training@acinfotec.com\n\nhttps://www.eccouncil.org/\n\n\n\n
 \n\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 2/11/CCTLogo_540x.webp
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:768@acinfotec.com
DTSTART:20260608T023000Z
DTEND:20260612T093000Z
DTSTAMP:20260107T091358Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-22301-lead
 -implementer-exam-included-2/
SUMMARY:PECB Certified ISO 22301 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nNo two disasters in the world cause equal da
 mage. Between the unpredictability of natural disasters\, information secu
 rity breaches\, and incidents of different nature\, preparedness can make 
 you stand out in the crowd and predict the future of your business. In lig
 ht of this\, proper planning is essential to mitigating risks\, avoiding c
 onsequences\, coping with the negative effects of disasters and incidents\
 , but at the same time\, continuing your daily operations so that customer
  needs do not remain unfulfilled.\n\nOrganizations can make progress towar
 ds understanding and managing disasters\, incidents\, and risks by having 
 a BCMS based on ISO 22301 in place. Therefore\, PECB has designed this tra
 ining course to prepare its participants implement a business continuity m
 anagement system (BCMS) in compliance with the requirements of ISO 22301. 
 Attending this training course allows you to gain a comprehensive understa
 nding of the best practices of the business continuity management system a
 nd to be able to establish a framework that allows the organization to con
 tinue operating efficiently during disruptive events.\n\nAfter attending t
 he training course\, you can sit for the exam and\, if you successfully pa
 ss the exam\, you can apply for the “PECB Certified ISO 22301 Lead Imple
 menter” credential. The internationally recognized “PECB Certified ISO
  22301 Lead Implementer” certificate will prove that you have the profes
 sional capabilities and practical knowledge to implement a BCMS based on t
 he requirements of ISO 22301 in an organization.\nCourse Benefits\n\n 	Gai
 n a comprehensive understanding of the concepts\, approaches\, methods\, a
 nd techniques used for the implementation and effective management of a BC
 MS\n 	Learn how to interpret and implement the requirements of ISO 22301 i
 n the specific context of an organization\n 	Understand the operation of t
 he business continuity management system and its processes based on ISO 22
 301\n 	Acquire the necessary knowledge to support an organization in effec
 tively planning\, implementing\, managing\, monitoring\, and continually i
 mproving a BCMS\n\nWho should Attend?\n\n\n\n 	Project managers and consul
 tants involved in business continuity\n 	Expert advisors seeking to master
  the implementation of the business continuity management system\n 	Indivi
 duals responsible to maintain conformity with BCMS requirements within an 
 organization\n 	Members of the BCMS team\n\nCourse Contents\n\n\nDay 1: In
 troduction to ISO 22301 and initiation of a BCMS\n\n 	Training course obje
 ctives and structure\n 	Management system standards\n 	Fundamental busines
 s continuity principles and concepts\n 	Business continuity management sys
 tem\n 	Initiation of the BCMS implementation\n 	The organization and its c
 ontext\n 	Analysis of the existing system\n 	BCMS scope\n\nDay 2: Implemen
 tation plan of a BCMS\n\n 	Leadership and commitment\n 	Business continuit
 y objectives and planning of changes\n 	Business continuity policy\n 	Orga
 nizational structure\n 	Documented information management\n 	Competence an
 d awareness\n 	Business impact analysis\n\nDay 3: Implementation of a BCMS
 \n\n 	Risk assessment\n 	Business continuity strategies and solutions\n 	B
 usiness continuity plans and procedures\n 	Incident response plan\n 	Emerg
 ency response plan\n 	Crisis management plan\n 	Communication\n\nDay 4: BC
 MS monitoring\, continual improvement\, and preparation for the certificat
 ion audit\n\n 	Exercise programs\n 	Monitoring\, measurement\, analysis\, 
 and evaluation\n 	Internal audit h Management review\n 	Treatment of non c
 onformity\n 	Continual improvement\n 	Preparing for the certification audi
 t\n 	Certification process and closing of the training course\n\nDay 5: Ce
 rtification Exam\nTraining Info\nDuration : 5 Days\nDate :  Jun 8 - 12\,
  2026\nTime : 9.30 am. - 16.30 pm.\nLanguage : Thai\nVenue : ACinfotec T
 raining Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) 
 \, Rama 4 Rd.\nPrice : 51\,500 Baht (Ex.vat 7%)\nContact : Tel 02 670 8980
 -3 ext.321-323\nE-mail training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:717@acinfotec.com
DTSTART:20260608T023000Z
DTEND:20260611T093000Z
DTSTAMP:20260107T091411Z
URL:https://www.acinfotec.com/training-event/digital-forensics-foundation-
 english-3/
SUMMARY:Digital Forensics Foundation (English)
DESCRIPTION:About this course\nA 4 day practical training course for people
  who are responsible for digital forensic investigations or are wishing to
  become a digital forensic investigator. The course will provide a solid f
 oundation in the understanding of digital forensics principles and techniq
 ues. Each subject is covered in depth and supported by practical scenario 
 based exercises to reinforce the learning points. The candidate will use a
  range of free and open source forensic tools. This allows the candidate t
 he opportunity to practice what they have learnt on the course without the
  need to invest in expensive forensic software / hardware. The course has 
 been designed by experienced forensic investigators with many years’ exp
 erience ensuring the course content is both relevant and practical.\nWho S
 hould attend?\nThe course is aimed at people who are responsible for digit
 al forensic investigations or are wishing to become digital forensic inves
 tigators\, including: IT security professionals and law enforcement office
 rs.\n\nCourse Contents\n\n1 – Introduction to Digital Forensics\n• Def
 ine Digital Forensics\n• Define the types of Forensic Investigations\n
 • Legal Considerations 7 – File Systems &amp\; Data Storage\n• Intro
 duction to File Systems\n• Data Storage\n• File System Metadata\n• L
 ive\, Deleted and Unallocated Data\n• File Slack and Ram Slack\n• NTFS
  Compression and Encryption\n\n2 – Investigation Fundamentals\n• Best 
 Practice Guidelines\n• The Four Principles of Computer Based Evidence\n
 • The basics of information gathering 8 – File Information\n• Date a
 nd Time Stamps\n• File Metadata\n\n3 – Identification and seizure of d
 igital equipment\n• Evidence Handling &amp\; Chain of Custody\n• Ident
 ifying Electronic Sources of Evidence\n• Seizure of Electronic Devices 9
  – Forensic Analysis Techniques\n• Analysis Environments\n• Case Pre
 paration\n• Folder / File Recovery\n• File Signatures and Data Carving
 \n• Data Reduction and Hash Analysis\n• Keyword Searching\n• Evidenc
 e Corroboration\n\n4 – Forensic Acquisitions\n• Forensic Acquisitions\
 n• Forensic Image\n• Forensic Clone\n• Forensic Image vs. Forensic C
 lone\n• FTK Imager\n• Mounting a Forensic Image\n• Hash Values 10 
 – Windows OS Artefacts\n• The Windows Registry\n• Internet History\n
 • Link Files\n• Previously connected USB Devices\n• Log Files\n• P
 refetch Files\n\n5 – Understanding Digital Data\n• Binary Digits\n• 
 Binary Conversion\n• Storage Devices\n• Understanding Electronic Data 
 11 – Forensic Challenges\n• Encryption and Passwords\n• Data Wiping\
 n• Malicious Activity\n\n6 – Understanding Hard Drive Terminology\n•
  Physical Drives\n• Understanding Hard Drive Terminology\n• Unified Ex
 tensible Firmware Interface (UEFI)\n• GUID Partition Table (GPT)\n\n7 
 – File Systems &amp\; Data Storage\n• Introduction to File Systems\n
 • Data Storage\n• File System Metadata\n• Live\, Deleted and Unalloc
 ated Data\n• File Slack and Ram Slack\n• NTFS Compression and Encrypti
 on\n\n8 – File Information\n• Date and Time Stamps\n• File Metadata\
 n\n9 – Forensic Analysis Techniques\n• Analysis Environments\n• Case
  Preparation\n• Folder / File Recovery\n• File Signatures and Data Car
 ving\n• Data Reduction and Hash Analysis\n• Keyword Searching\n• Evi
 dence Corroboration\n\n10 – Windows OS Artefacts\n• The Windows Regist
 ry\n• Internet History\n• Link Files\n• Previously connected USB Dev
 ices\n• Log Files\n• Prefetch Files\n\n11 – Forensic Challenges\n•
  Encryption and Passwords\n• Data Wiping\n• Malicious Activity\n\n12 
 – Reporting\n• Purpose and layout of Report\n• Content of Report\nTr
 aining Info\nDuration:  4 Days\nDate:  Jun 8 - 11\, 2026\nTime:  9.30
  am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande
  Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 39\
 ,800 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acin
 fotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/01/image004.png
CATEGORIES:Digital Forensics,ICMS
END:VEVENT
BEGIN:VEVENT
UID:900@acinfotec.com
DTSTART:20260611T023000Z
DTEND:20260612T093000Z
DTSTAMP:20251219T034544Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -professional-europe-cipp-e-thai-3/
SUMMARY:Certified Information Privacy Professional/Europe (CIPP/E) (Thai)
DESCRIPTION: \nAbout this course\nThis  training encompasses pan-European 
 and national data protection laws\, key data protection terminology and pr
 actical concepts concerning the protection of personal data and trans-bord
 er data flows.\nThe CIPP/E program was developed by the International Asso
 ciation of Privacy Professionals (IAPP)\, which is the world’s largest c
 omprehensive global information privacy community and resource. The CIPP/E
  certification holds accreditation under ISO 17024: 2012.\nAchieving a CIP
 P/E credential shows you have the comprehensive GDPR knowledge\, perspecti
 ve and understanding to ensure compliance and data protection success in E
 urope—and to take advantage of the career opportunity this sweeping legi
 slation represents. Adding the CIPM to your CIPP/E puts you at the forefro
 nt of ensuring you are ready for the GDPR.\n\nCourse Benefits\n\nIt will s
 how the world that you know privacy laws and regulations and how to apply 
 them\, and that you know how to secure your place in the information econo
 my. When you earn a CIPP credential\, it means you’ve gained a foundatio
 nal understanding of broad global concepts of privacy and data protection 
 law and practice\, including: jurisdictional laws\, regulations and enforc
 ement models\; essential privacy concepts and principals\; legal requireme
 nts for handling and transferring data and more.\n\nWhat you’ll learn\n\
 n 	Introduction to European Data Protection\n 	European Regulatory Institu
 tions\n 	Legislative Framework\n 	Compliance with European Data Protection
  Law and Regulation\n 	International Data Transfers\n\nWho should attend?\
 n\n 	Data Protection Lawyers\n 	Records Managers\n 	Information Officers\n
  	Compliance Officers\n 	Human Resource Officers\n 	Anyone who uses\, proc
 esses and maintains personal data\n\nCourse Contents\n\n 	Module 1: Data 
 protection laws\nIntroduces key European data protection laws and regulato
 ry bodies\, describing the evolution toward a harmonized legislative frame
 work.\n 	Module 2: Personal data\nDefies and differentiates between types
  of data as defied by the GDPR\, including personal\, anonymous\, pseudony
 mous and special categories.\n 	Module 3: Controllers and processors\nDes
 cribes the roles and relationships of controllers and processors as defied
  by the GDPR.\n 	Module 4: Processing personal data\nDefies data processi
 ng and GDPR processing principles\, explains the application of the GDPR a
 nd outlines the legal grounds for processing personal data.\n 	Module 5: 
 Data subject rights\nDescribes data subject rights\, applications of right
 s\, and controller and processor obligations as set out in the GDPR.\n 	Mo
 dule 6: Information provision obligations\nExplains controller obligation
 s for providing information about data processing activities to data subje
 cts and supervisory authorities as set out in the GDPR.\n 	Module 7: Inte
 rnational data transfers\nOutlines options and obligations under the GDPR 
 for transferring data outside the European Economic Area\, including adequ
 acy decisions and appropriate safeguards and derogations.\n 	Module 8: Co
 mpliance considerations\nDiscusses the applications of European data prote
 ction laws\, legal bases and compliance requirements for processing person
 al data in practice\, including employers processing employee data\, surve
 illance\, direct marketing\, and internet technology and communications.\n
  	Module 9: Security of processing\nDiscusses considerations and duties o
 f controllers and processors for ensuring security of personal data and GD
 PR specifications for providing notification of data breaches.\n 	Module 1
 0: Accountability\nInvestigates accountability requirements\, including d
 ata protection management systems\, data protection impact assessments\, d
 ata protection policies and the role of the data protection officer.\n 	Mo
 dule 11: Supervision and enforcement\nDescribes the role\, powers and pro
 cedures of supervisory authorities\; the composition and tasks of the Euro
 pean Data Protection Board\; the role of the European Data Protection Supe
 rvisor\; and remedies\, liabilities and penalties for noncompliance as set
  out in the GDPR.\n\nTraining Info:\n\nLanguage: Conducted in Thai Languag
 e\nDuration: 2 Days\nTraining Date: Jun 11 - 12\, 2026\nVenue: ACinfotec T
 raining Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) 
 \, Rama 4 Rd.\nTraining Fees: 49\,900 (Exam Included)\nTel : 02 670 8980-3
  ext. 321-323\nE-mail: training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 1/03/CIPP_logo.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:724@acinfotec.com
DTSTART:20260612T023000Z
DTEND:20260612T093000Z
DTSTAMP:20260107T091425Z
URL:https://www.acinfotec.com/training-event/computer-forensics-awareness-
 and-incident-response-thai-8/
SUMMARY:Computer Forensics Awareness and Incident Response (Thai)
DESCRIPTION:About this course\nCompanies are faced with cyber security thre
 ats on a daily basis. Many are external threats but many of the threats co
 me from within the networks resulting in both financial loss and loss of c
 onfidential company data. During an investigation\, IT staff will often be
  asked to collect electronic data. It is vital that any electronic data t
 hat may be used in future legal proceedings is collected following corre
 ct forensic procedures to maintain the integrity of the data and to ensur
 e the evidence can be used in court.\n\nWho Should attend?\nIT professiona
 ls who may be required to collect and preserve electronic data that could
  later be used as evidence in legal proceedings. IT managers who may be 
 responsible for overseeing the collection and preservation of electronic d
 ata.\nAim of the Course: \n\n\nThis is a one day course aimed at IT staff
  that may have to deal with cyber security threats. The candidate will be 
 trained in basic forensic procedures and how to respond to cyber security 
 threats.\nCourse Contents\n\nThe course will cover the following subjects:
 \n\n\n 	Introduction\n 	Cyber Threats 2020\n 	Economic Crime Thailand\n 	D
 efine Digital Forensics\n 	Legal Consideration\n 	Evidence Handling &amp\;
  Chain of Custody\n 	Exercise 1: Identifying Sources of Electronic Devices
 \n 	Why is Digital Forensics Important to your Organization?\n 	Good Pract
 ice Guidelines for Digital Evidence\n 	The Four Principles of Computer Bas
 ed Evidence\n 	Forensic Acquisitions\n 	Forensic Acquisition Tools\n 	Exer
 cise 2: Creating a Forensic Image\n 	Exercise 3 – Creating a Custom Cont
 ent Forensic Image\n 	Exercise 4 – Mounting a Forensic Image\n 	Hash Val
 ues (Digital Fingerprint)\n 	Exercise 5 – Identifying Hash Values of Fil
 es\n 	Persistent Vs Volatile Data\n 	Dealing with Live Systems\n 	Dealing 
 with Servers\n 	Exercise 6 – Capturing Volatile Data\n 	Capturing RAM Me
 mory\n 	Exercise 7 – Capturing RAM Memory\n 	How to Perform Bulk Forensi
 c Imaging?\n 	Exercise 8 – Creating a Easy2Boot Bootable hard drive\n 	P
 reparing an Incident Response Plan\n\nTraining Info\n\nDuration:  1 Day\
 nDate:  Jun 12\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfot
 ec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workl
 ab) \, Rama 4 Rd.\nTraining Fees: 9\,950 Baht (ex.vat7%)\nTel. 02 670 8980
 -3 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/01/image004.png
CATEGORIES:Digital Forensics,ICMS
END:VEVENT
BEGIN:VEVENT
UID:248@acinfotec.com
DTSTART:20260615T023000Z
DTEND:20260619T093000Z
DTSTAMP:20260107T091438Z
URL:https://www.acinfotec.com/training-event/pecb-certified-isoiec-27032-l
 ead-cybersecurity/
SUMMARY:PECB Certified ISO/IEC 27032 Lead Cybersecurity (Exam Included)
DESCRIPTION:About this course \nThis five day intensive course enables the 
 participants to develop the knowledge and competence needed to support an 
 organization in implementing and managing a Cybersecurity program based on
  ISO/IEC 27032 and NIST Cybersecurity Framework. This training will enable
  participants to have an overview of Cybersecurity\, to understand the rel
 ationship between Cybersecurity and other types of security\, and stakehol
 ders’ role in Cybersecurity. This course can be used as guidance for add
 ressing common Cybersecurity issues\, and it presents a framework that ena
 bles stakeholders to collaborate on resolving Cybersecurity issues.\nCours
 e Benefits\n\n 	To understand and acquire comprehensive knowledge on the c
 omponents and operations of a Cybersecurity program in conformance with IS
 O/IEC 27032 and NIST Cybersecurity Framework\n 	To explain the goal\, cont
 ent and correlation between ISO 27032 and NIST Cybersecurity Framework as 
 well as with other standards and operating frameworks\n 	To master concept
 s\, approaches\, standards\, methods and techniques to set up\, implement\
 , and effectively manage a Cybersecurity program within an organization\n 
 	To be able to interpret the guidelines of ISO/IEC 27032 in the specific c
 ontext of an organization\n 	To acquire the necessary expertise to plan\, 
 implement\, manage\, control and maintain a Cybersecurity program as speci
 fied in ISO/IEC 27032 and NIST Cybersecurity Framework\n 	To develop the e
 xpertise to advise an organization about the best practices for managing C
 ybersecurity\n 	To strengthen personal skills that are necessary for the e
 stablishment and maintenance of a Cybersecurity program\n\nWho should atte
 nd?\n\n 	Cybersecurity professionals\n 	Information security experts\n 	Pr
 oject managers wanting to manage the Cybersecurity program\n 	Technical ex
 perts wanting to prepare themselves  for Cybersecurity  functions\n 	Per
 sons responsible  to develop the Cybersecurity program\n 	Security and Bu
 siness Process consultants\n\n Course Contents\nDay 1: Introduction to Cy
 bersecurity and related concepts as recommended by ISO/IEC 27032\n\n 	Cour
 se Objectives and Structure\n 	Standard and Regulatory Framework\n 	Fundam
 ental Concepts in Cybersecurity\n 	Cybersecurity Program\n 	Initiating a C
 ybersecurity Program\n 	Analyzing the Organization\n 	Leadership\n\nDay 2:
  Cybersecurity Policy and Risk management\n\n 	Cybersecurity Policies\n 	C
 ybersecurity Risk Management\n 	Attack Mechanisms\n\nDay 3: Cybersecurity 
 Controls\, Information Sharing and Coordination\n\n 	Cybersecurity Control
 s\n 	Information Sharing and Coordination\n 	Training and Awareness Progra
 m\n\nDay 4: Incident management\, Monitoring and Continuous Improvement\n\
 n 	Business Continuity\n 	Cybersecurity Incident Management\n 	Testing in 
 Cybersecurity\n 	Performance Measurement\n 	Cybersecurity Incident Respons
 e and Recovery\n 	Continual Improvement\n 	Lead Manager Certification Sche
 me\n 	Closing the Training\n\nDay 5: Certification Exam\n\n 	Prerequisites
 \n 	Knowledge about information security and related concepts is preferred
 .\n 	Educational approach\n 	This training is based on both theory and pra
 ctice:\n 	Sessions of lectures illustrated with examples based on real cas
 es\n 	Practical exercises based\n 	Review exercises to assist the exam pre
 paration\n 	Practice test similar to the certification exam\n 	To benefit 
 from the practical exercises\, the number of training participants is limi
 ted\n 	Exam\n\n Training Info\nDuration : 5 Days\nDate : June 15-19\, 20
 26\nTime : 9.30-04.30 pm.\nVenue : ACinfotec Training Center\n16th Fl.\, 
 Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fee
  : 51\,500 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext. 321-323\nEmail. train
 ing@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:773@acinfotec.com
DTSTART:20260615T023000Z
DTEND:20260619T093000Z
DTSTAMP:20260107T091506Z
URL:https://www.acinfotec.com/training-event/pecb-iso-29100-certified-lead
 -privacy-implementer-clpi-exam-included/
SUMMARY:PECB ISO 29100 Certified Lead Privacy Implementer – CLPI (Exam In
 cluded)
DESCRIPTION:\nCourse Overview\nThis five-day intensive course enables parti
 cipants to develop the necessary expertise to support an organization in 
 implementing and managing a Privacy Framework based on ISO 29100. Partici
 pants will gain a thorough understanding of how to design\, build and lead
  organizations privacy programs in all processes of ICT systems and servi
 ces\, through the use of best practices.\n\nThe training provides a privac
 y framework which specifies a common privacy terminology\, defines the ac
 tors and their roles in processing personally identifiable information (PI
 I)\, describes privacy safeguarding considerations and provides reference
 s to known privacy principles for information\ntechnology.\nWho Should Att
 end\n\n 	Project managers or consultants wanting to prepare and to support
  organizations on implementing and managing a Privacy\nFramework\n 	Securi
 ty auditors who wish to fully understand the Privacy Framework implementat
 ion process\n 	Experienced IT security management professionals\n 	IT secu
 rity professionals interested in earning Privacy Management Framework cert
 ification\n 	Privacy Officers\, Data Protection Officers\, and Compliance 
 professionals with an interest in privacy legislation and risk\n 	Security
  professionals with front-line experience\n 	Information security staff\n 
 	Expert advisors in information technology\n 	Persons and organizations in
 volved in tasks where privacy controls are required for the processing of 
 PII\n\nLearning Objectives\n\n 	To understand the core competences on Priv
 acy Framework\n 	To gain a comprehensive understanding of the concepts\, a
 pproaches\, standards\, methods and techniques required for the\neffective
  protection of personally identifiable information (PII)\n 	To define priv
 acy safeguarding requirements related to PII within an ICT environment\n 	
 To understand the relationship between the components of Privacy Framework
  with existing security standards and various\napplicable laws\n 	To acqui
 re necessary expertise in privacy governance\, specifically in personally 
 identifiable information governance\n 	To acquire necessary expertise in p
 rivacy risk management compliance connected with personally identifiable i
 nformation\n 	To develop knowledge and skills required to advise for impro
 ve organizations’ privacy programs through the use of best\npractices\n 
 	To improve the capacity for analysis of privacy incident management\n\nCo
 urse Contents \n\nIntroduction to Privacy Framework concepts as recommend
 ed by ISO 29100\n\n▶ Privacy Framework based on ISO 29100 and regulatory
  framework\n▶ Fundamental Principles of Privacy\n▶ Privacy Legislation
  US &amp\; Europe\n▶ Writing a business case and a project plan for the 
 implementation of a Privacy Framework\n▶ Initiating the Privacy Framewor
 k implementation\n\nPlanning the implementation of the Privacy Framework\n
 \n▶ Preliminary analysis of Existing Controls\n▶ Leadership and approv
 al of the Privacy Framework project\n▶ Defining the scope of a Privacy F
 ramework\n▶ Development of a Privacy policy\n▶ Selection of the approa
 ch and methodology for risk assessment\n▶ Control Statement and manageme
 nt decision to implement the Privacy Framework\n▶ Definition of the orga
 nizational structure of Privacy\n\nImplementing a Privacy Framework\n\n▶
  Implementation of a document management framework\n▶ Design of controls
  and writing procedures and specific policies\n▶ Implementation of priva
 cy controls\n▶ Development of a training &amp\; awareness program and co
 mmunicating about the privacy\n▶ Incident management\n▶ Operations Man
 agement\n\nPrivacy Framework measurement and continuous improvement\n\n▶
  Monitoring\, Measurement\, Analysis and Evaluation\n▶ Internal Audit\n
 ▶ Management Review\n▶ Treatment of problems and points of concern\n
 ▶ Continual improvement\n▶ Competence and evaluation of implementers\n
 \nCertification Exam\n\n Training Info\n\n\n\n\nLanguage : Conducted in 
 Thai Language\nDuration : 5 Days\nDate :  Jun 15-19\, 2026\nTime : 9.30
  am. – 16.30 pm.\nVenue : ACinfotec Training Center\n16th Fl.\, Grande 
 Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nPrice : THB 51\,50
 0 (Excluding 7% VAT)\nContact : T 02 670 8980-3 ext.321-323\nE training@a
 cinfotec.com\n\n\n\nwww.pecb.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:999@acinfotec.com
DTSTART:20260615T023000Z
DTEND:20260615T050000Z
DTSTAMP:20260213T035656Z
URL:https://www.acinfotec.com/training-event/zero-trust-elearning-and-live
 -online-workshop-new-2/
SUMMARY:Zero Trust eLearning and Live Online Workshop (New!)
DESCRIPTION:Why E-Learning ??\neLearning + Live Online Zero Trust Workshop 
 ถึงเป็นเหตุผลที่คุณไม่คว
 รพลาด?\n\n✅ e-Learning ให้ความรู้ ขณ
 ะที่ Workshop ช่วยเสริมความเข้า
 ใจเพื่อการนำไปใช้งานจริง\n
 ✅ ลด Trial &amp\; Error ในการนำ Zero Trust ไปใ
 ช้ในองค์กร\n✅ เหมาะทั้งผู้
 บริหารที่ต้องการ Roadmap และที
 มเทคนิคที่ต้องออกแบบระบบ\n
 ✅ ได้มุมมองจากผู้เชี่ยวชา
 ญ มากกว่าการเรียนรู้ด้วยต
 นเองเพียงอย่างเดียว\n\n\n\nหลั
 กสูตร eLearning ที่ออกแบบมาเพื่อ
 ให้ผู้เรียนเข้าใจ Zero Trust อย่
 างครบถ้วนแบบ End-to-End ตั้งแต่แ
 นวคิดเชิงกลยุทธ์ ไปจนถึงก
 ารนำไปปรับใช้งานจริงในระ
 ดับองค์กร\n✅ เรียนออนไลน์ เ
 รียนได้ทุกที่ ทุกเวลา\n✅ เน
 ื้อหาอ้างอิง Best Practices และ Framework 
 ระดับสากล\n✅ ไม่เน้นเพียงท
 ฤษฎี แต่เชื่อมโยงกับบริบท
 ธุรกิจ และการนำไปปรับใช้ง
 านจริงในองค์กร\n\n\n\n\nWhat is the CCZT?\nThe
  Certificate of Competence in Zero Trust (CCZT) is the authoritative Zero 
 Trust training and certificate that delivers the knowledge needed to under
 stand the core concepts of Zero Trust. Developed by CSA\, the trusted indu
 stry leader for cloud security certificates\, the CCZT builds knowledge to
  drive the definition\, implementation and management of Zero Trust over t
 ime.\nWhy Zero Trust? Why now?\n\n\nEvolving Technology \n\nComputer tech
 nology continues to shift towards an open but untrusted infrastructure\n\n
 \n\nWorkforce Development\n\nSkills gaps are widening with rapidly evolvin
 g cybersecurity threats. Zero Trust provides a strategy for individuals an
 d organizations to develop the necessary skills to keep up\n\n\n\nSecurity
  Gaps\n\nZero Trust can help address gaps in traditional security models a
 nd facilitate a more mature and sustainable approach to security\n\n\n\nEm
 ergence of AI \n\nRapid availability of AI tools makes implementing a Zero
  Trust strategy critical\nWho should earn their CCZT?\nZero Trust is the f
 uture of information security making it essential knowledge for all inform
 ation security professionals. Zero Trust is an inevitable requirement for 
 organizations and a required skill for security professionals looking to r
 emain at the forefront of innovation and keep up with evolving cybersecuri
 ty threats.\n\n 	CISOs\n 	Security Managers\n 	Enterprise Architects\n 	Ri
 sk Officers &amp\; Owners\n 	Managers &amp\; Decision Makers\n 	Compliance
  Officers &amp\; Managers\n 	C-Suite\n 	Security Engineers &amp\; Architec
 ts\n 	System Engineers\n 	Cybersecurity Analysts\n 	Developers\n 	Security
  Administrators\n 	Government Agencies\n 	Federal Partners\n\nCurriculum\n
 Based on CSA’s Zero Trust Training (ZTT)\, the CCZT covers six core area
 s of Zero Trust knowledge:\n\n\n\n 	Zero Trust Foundational Concepts\n 	So
 ftware Defined\n 	Perimeter\n 	Industry Best Practices\n 	Zero Trust Archi
 tecture\n 	Zero Trust Planning\n 	Zero Trust Implementation\n\n&nbsp\;\n\n
 &nbsp\;\n\n&nbsp\;\n\n&nbsp\;\n\nExam Structure\nThe CCZT is an open-book\
 , online exam with 60 multiple-choice questions. Testers have two attempts
  to complete the exam in the allotted 90-minute timeframe and achieve a mi
 nimum passing score of 80%.\n\n\nPrepare\nSelect your Learning Style\n\n 	
 Study on your own\n 	Self-paced online training\n 	Instructor-led online t
 raining\n\nAccess Study Materials\n\n 	Download CCZT Prep-Kit\n 	Includes 
 recommended CSA Research artifacts\, authoritative sources and overview gu
 ides\n 	Comprehensive study guides are included with the purchase of CCZT 
 exam tokens\n 	Get support from the CSA community on Circle\n\nNo prerequi
 sites required\n\n 	The CCSK and/or ZTT are advised\n\nTraining Info\nDura
 tion:  0.5 Day\nDate: Jun 15\, 2026\nTime:  9.30 am. – 12.00 pm.\nVen
 ue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini 
 Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 29\,900 (Exam Included) Ea
 rly Bird: Please Call\nTel : 02 670 8980-4 ext. 321-323\nE-mail.training@a
 cinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 6/02/CCZT-logo-RGB-2.png
END:VEVENT
BEGIN:VEVENT
UID:938@acinfotec.com
DTSTART:20260616T023000Z
DTEND:20260619T093000Z
DTSTAMP:20260107T091527Z
URL:https://www.acinfotec.com/training-event/csslp-certified-secure-softwa
 re-lifecycle-professional-exam-prep-new-5/
SUMMARY:CSSLP - Certified Secure Software Lifecycle Professional (Exam Prep
 )
DESCRIPTION:CSSLP - Certified Secure Software Lifecycle Professional (Exam 
 Prep)\nAbout this course\nEarning the globally recognized CSSLP secure sof
 tware development certification is a proven way to build your career and b
 etter incorporate security practices into each phase of the software devel
 opment lifecycle (SDLC).\n\nCSSLP certification recognizes leading applica
 tion security skills. It shows employers and peers you have the advanced t
 echnical skills and knowledge necessary for authentication\, authorization
  and auditing throughout the SDLC using best practices\, policies and proc
 edures established by the cybersecurity experts at ISC2. Prove your skills
 \, advance your career\, and gain support from a community of cybersecurit
 y leaders here to help you throughout your professional journey.\nWho shou
 ld attend?\n\n 	Software developers\n 	Software architects\n 	Software eng
 ineers\n 	Application security specialists\n 	Penetration testers\n 	Proje
 ct managers\n 	Anyone involved in the software development lifecycle (SDLC
 )\n\nCourse Contents\nDomain 1. Secure Software Concepts\n\nDomain 2. Secu
 re Software Lifecycle Management\n\nDomain 3. Secure Software Requirements
 \n\nDomain 4. Secure Software Architecture and Design\n\nDomain 5. Secure 
 Software Implementation\n\nDomain 6. Secure Software Testing\n\nDomain 7. 
 Secure Software Deployment\, Operations\, Maintenance\n\nDomain 8. Secure 
 Software Supply Chain\n\n&nbsp\;\nCSSLP Examination Information\n\n\n\nLen
 gth of exam\n3 hours\n\n\nNumber of items\n125\n\n\nItem format\nMultiple 
 choice\n\n\nPassing grade\n700 out of 1000 points\n\n\nLanguage availabili
 ty\nEnglish\n\n\nTesting center\nPearson VUE Testing Center\n\n\n\n\nCSSLP
  Examination Weights\n\n\n\nDomains\nAverage Weight\n\n\n1. Secure Softwar
 e Concepts\n12%\n\n\n2. Secure Software Lifecycle Management\n11%\n\n\n3. 
 Secure Software Requirements\n13%\n\n\n4. Secure Software Architecture and
  Design\n15%\n\n\n5. Secure Software Implementation\n14%\n\n\n6. Secure So
 ftware Testing\n14%\n\n\n7. Secure Software Deployment\, Operations\, Main
 tenance\n11%\n\n\n8. Secure Software Supply Chain\n10%\n\n\nTotal\n100%\n\
 n\n\nTraining Info\nLanguage: Conducted in Thai Language\nDuration: 4 
 Days\nDate: Jun 16 - 19\, 2026\nPrice: 38\,000.- (ex.vat)\nVenue: ACinfote
 c Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workla
 b) \, Rama 4 Rd.\nTel : 02 670 8980-3 ext. 321-323\nE-mail: training@acin
 fotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/07/images.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:873@acinfotec.com
DTSTART:20260616T023000Z
DTEND:20260619T093000Z
DTSTAMP:20260107T091515Z
URL:https://www.acinfotec.com/training-event/comptia-advanced-security-pra
 ctitioner-caspexam-included/
SUMMARY:CompTIA Advanced Security Practitioner (CASP+)(Exam Included)
DESCRIPTION:About this course\nThis course is for students who are preparin
 g for the CompTIA Advanced Security Practitioner (CASP+) certification exa
 m CAS-004. In this course\, students will expand their knowledge of inform
 ation security to apply more advanced principles. Students will apply crit
 ical thinking and judgment across a broad spectrum of security disciplines
  to propose and implement sustainable security solutions that map to organ
 izational strategies\; translate business needs into security requirements
 \; support IT governance and risk management\; architect security for host
 s\, networks\, and software\; respond to security incidents\; and more\n\n
 \nWho should attend?\n\n 	Top CASP+ Job Roles\n 	Security Architect\n 	Sen
 ior Security Engineer\n 	SOC Manager\n 	Security Analyst\n 	IT Cybersecuri
 ty Specialist/INFOSEC Specialist\n 	Cyber Risk Analyst\n\n\n\nCourse Conte
 nt\nSecurity Architecture\n\nAnalyze security requirements in hybrid netwo
 rks to work toward an enterprise-wide\, zero trust security architecture w
 ith advanced secure cloud and virtualization solutions.\n\nSecurity Operat
 ions\n\nAddress advanced threat management\, vulnerability management\, ri
 sk mitigation\, incident response tactics and digital forensics analysis\n
 \nGovernance\, Risk\, and Compliance\n\nProve an organization’s overall 
 cybersecurity resiliency metric and compliance to regulations\, such as CM
 MC\, PCI-DSS\, SOX\, HIPAA\, GDPR\, FISMA\, NIST and CCPA\n\nSecurity Engi
 neering and Cryptography\n\nConfigurations for endpoint security controls\
 , enterprise mobility\, cloud/hybrid environments\, and enterprise-wide PK
 I and cryptographic solutions\nExam Description\nRequired exam: CAS-004\n\
 nNumber of questions: Maximum of 90 questions\n\nTypes of questions: Multi
 ple choice and performance-based\n\nLength of test: 165 Minutes\n\nRecomme
 nded experience      A minimum of ten years of general hands-on IT exp
 erience\, with at least five years of broad hands-on security experience.\
 n\nPassing score: This test has no scaled score\; it’s pass/fail only.\n
 Training info\nDuration:  4 Days\nDate:  Jun 16 - 19\, 2026\nTime:  9
 .30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Gra
 nde Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 
 59\,000 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@a
 cinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:865@acinfotec.com
DTSTART:20260617T023000Z
DTEND:20260619T093000Z
DTSTAMP:20260107T091622Z
URL:https://www.acinfotec.com/training-event/ec-council-certified-encrypti
 on-specialist-eces-exam-included-4/
SUMMARY:EC-Council Certified Encryption Specialist (E|CES) (Exam Included)
DESCRIPTION:\nAbout this course\nIf you think that there is only one type o
 f encryption – think again!\n\nSecure organizations employ multiple leve
 ls of encryption – database encryption\, VoIP encryption\, portable stor
 age encryption\, mobile devices encryption\, Wi-Fi encryption\, e-mail enc
 ryption\, file encryption – server/desktop\, network link encryption\, w
 eb server encryption\, tape backup encryption and many more.\n\nSome of th
 e most recent attacks that have had serious consequences share one thing i
 n common – they all had either none or little effective encryption. This
  resulted in thousands of users being affected and hundreds of millions in
  losses. It resulted in serious decline of brand value and public embarras
 sment.\nPrerequisite\nNo prior knowledge of cryptography is assumed\, and 
 no mathematical skills beyond basic algebra are required.\nWho should atte
 nd?\n\n\nPenetration Testers\, Computer Forensics Specialists\, Anyone inv
 olved in selecting\, implementing VPN’s or digital certificates\, Anyone
  involved in information security operation\n\n\nCourse Contents\n\n\nModu
 le 01: Introduction and History of Cryptography\nModule 02: Symmetric Cryp
 tography &amp\; Hashes\nModule 03: Number Theory and Asymmetric Cryptograp
 hy\nModule 04: Applications of Cryptography\nModule 05: Applications of Cr
 yptography\n\n\nTraining Info\nLanguage: Conducted in Thai Language\nDur
 ation: 3 Days\nTraining Date: Jun 17 - 19\, 2026\nVenue: ACinfotec Traini
 ng Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ra
 ma 4 Rd.\nTraining Fees: 39\,000 BAHT (Ex.Vat 7%)\nTel : 02 670 8980-3 ext
 . 321-323\nE-mail: training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/ECES.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:671@acinfotec.com
DTSTART:20260617T023000Z
DTEND:20260619T093000Z
DTSTAMP:20260107T091604Z
URL:https://www.acinfotec.com/training-event/crisc-certified-in-risk-and-i
 nformation-systems-control-8/
SUMMARY:CRISC – Certified in Risk and Information Systems Control (Exam E
 xcluded)
DESCRIPTION:Course Overview\nThe Certified in Risk and Information Systems 
 Control™ certification (CRISC™\, pronounced “see-risk”) is designe
 d for IT professionals who have hands-on experience with risk identificati
 on\, assessment\, and evaluation\; risk response\; risk monitoring\; IS co
 ntrol design and implementation\; and IS control monitoring and maintenanc
 e.\n\nThe CRISC designation will not only certify professionals who have k
 nowledge and experience identifying and evaluating entity-specific risk\, 
 but also aid them in helping enterprises accomplish business objectives by
  designing\, implementing\, monitoring and maintaining risk-based\, effici
 ent and effective IS controls.\nWho Should attend?\nIT professionals inter
 ested in earning Certified in Risk and Information Systems Controls (CRISC
 ) certification. CRISC is for IT professionals\, risk professionals\, busi
 ness analysts\, project manager and/or compliance professionals\, how work
   towards evaluation and mitigation of risk\, and who have  job experien
 ce in the following areas:\n\n* Risk identification\, assessment and evalu
 ation\;\n* Risk response and monitoring and\n* IS control design/monitorin
 g and implementation/maintenance.\nCourse Benefits\nThe CRISC course offer
 s students outstanding benefits\, including:\n\n 	Three full days of inten
 se instruction with no outside distractions\n 	In-person access to the top
  security experts in the industry\n 	Lunch and snacks provided on each day
  of class\n 	Worldwide recognition as a universally accepted information s
 ystems manager\n 	Opportunity to build upon existing certifications/creden
 tials already earned\n 	Provides tangible evidence of career growth\n 	Pot
 ential for a salary increase and/or promotion\n 	Intense Courseware:\n\n 	
 ISACA Authorized Courseware including:\nCRISC Review Manual\nCRISC Review 
 Questions\, Answers &amp\; Explanations Manual\n\n\n 	Excellent Certificat
 ion Preparation (Note that Students are responsible for registering for th
 e exam and transportation to the exam\; InfoSec Institute will not provide
  exam logistics or transportation support)\n\nExamination\nOur CRISC exam 
 preparation course assists IT professionals to accomplish the following bu
 siness objectives in their enterprise:\n\n* Designing\, implementing\, mon
 itoring &amp\; maintaining risk-based\, effective IS controls\n* Complianc
 e with regulatory requirements\n\nAlso covered are the 5 domains as requir
 ed by ISACA:\n\n1. Risk Identification Assessment and Evaluation (RI)\n2. 
 Risk Response (RR)\n3. Risk Monitoring (RM)\n4. IS Control Design and Impl
 ementation (CD)\n5. IS Control Monitoring and Maintenance (MM)\n\n 	Comput
 er-based examination\n 	4 hours\n 	150 multiple-choice question exam\n 	IS
 ACA uses a 200 – 800 point scale with 450 as the passing mark for the ex
 ams\n\nCertifications\nInfoSec Institute’s CRISC course extensively prep
 ares students for the CRISC exam\, which consists of 200 multiple-choice q
 uestions that cover the five information systems auditing areas. These are
 as have been created from a CRISC job practice analysis and reflect the wo
 rk performed by information systems auditors.\nTraining Info\nDuration : 3
  Days\nDate : Jun 17 - 19\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfot
 ec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workl
 ab) \, Rama 4 Rd.\nTraining Fee : 34\,000 Baht (ex.vat 7%)\nTel. 02 670 89
 80-3 ext.321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/1.png
CATEGORIES:ISC2 &amp; ISACA,Risk Based IT Audit,Risk Management &amp;
 Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:556@acinfotec.com
DTSTART:20260617T023000Z
DTEND:20260619T093000Z
DTSTAMP:20260107T091538Z
URL:https://www.acinfotec.com/training-event/itil-4-foundation-thai-exam-b
 undle-8/
SUMMARY:IT Service Management based on Best Practice
DESCRIPTION:About this course\nExtensive research has consistently shown th
 at ITSM is fundamental to businesses\, enables transformation and helps or
 ganizations realize value. Many organizations invest heavily in adopting a
 nd adapting ITSM Best Practice into their business practices and upskillin
 g their workforce with ITSM Best Practice  qualifications.\n\nITSM Best P
 ractice will help businesses navigate the new technological era\, commonl
 y known as the Fourth Industrial Revolution. The speed of current breakthr
 oughs is disrupting almost every industry on a global scale. The Fourth In
 dustrial Revolution is marked by emerging technology in fields including r
 obotics\, artificial intelligence\, nanotechnology\, quantum computing\, b
 iotechnology\, the Internet of Things (IoT)\, 3D printing\, autonomous veh
 icles and much more.\n\nITSM Best Practice provides a practical and flexib
 le basis to support organizations on their journey into the new world of d
 igital transformation by helping them align their human\, digital and phys
 ical resources\, adopt emerging technologies into their IT operations to c
 ompete within the complex modern landscape.\n\n&nbsp\;\n\n\n\n&nbsp\;\nWho
  should attend?\nThe target audience for this course and qualification are
 :\n\n 	Individuals at the start of their journey in Service Management\n 	
 ITSM Managers and aspiring ITSM Managers\n 	Individuals working in other p
 arts of IT (digital\, product development) with strong interface with serv
 ice delivery\n 	Existing ITSM Best Practice qualification holders wishing 
 to update their knowledge\n\nCourse Benefits\nOn completion of this course
 \, the following learning outcomes will be achieved\n\n 	Understand key se
 rvice management concepts\n 	Understand how the ITSM Best Practice guiding
  principles can help an organization adopt and adapt service management Un
 derstand the four dimensions of service management\n 	Understand the purpo
 se and components of the ITSM Best Practice service value system Understan
 d the activities of the service value chain\, and how they interconnect\n 
 	Know the purpose and key terms of selected ITSM Best Practice practices w
 ith focus on key\nselected practices\n\n\nCourse Contents\n Understand Ke
 y Concepts of Service Management\n• Service Management\n• Service and 
 relationship with Value\, Outcome\, Cost and Risks\n• Service Consumers\
 , Service Providers\, Users\, Customer\n• Understanding Nature and Compo
 nents of Value\n• Value Co-Creation\n• Understanding Service Relations
 hips\n\nITSM Best Practice Guiding Principles\n• Focus on Value\n• Sta
 rt Where You Are\n• Progress Iteratively With Feedback\n• Collaborate 
 and Promote Visibility\n• Think and Work Holistically\n• Keep It Simpl
 e and Practical\n• Optimize and Automate\n\nITSM Best Practice Service V
 alue System\n• Four Dimensions of Service Management\n• Components of 
 the Service Value System including Value Chain\, Governance and Practices\
 n• Value Chain Activities within the Value System\n\nITSM Practices\n•
  3 Categories of ITSM Practices\n• Purpose and detailed look at selected
  Practices (including):\n• Incident Management\n• Problem Management\n
 • Change Control\n• Service Level Management\n• Continual Improvemen
 t\n• Service Request Management\n• Service Desk\n• Information Secur
 ity Management\n• Relationship Management\n• Service Configuration Man
 agement\n• Supplier Management\n\n\n\nTraining info\nDuration:  3 Days\
 nLanguage: Conduct in Thai\nDate:  Jun 17 - 19\, 2026\nTime:  9.30 am.
  – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Cen
 tre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: Please 
 call\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 9/02/สีน้ำเงินเข้ม-สีฟ้าอมเข
 ยว-สีแดง-ทันสมัย-เทคโนโลยี-
 ข่าว-ทั่วไป-ท่อนเริ่มyoutube.png
CATEGORIES:ITIL
END:VEVENT
BEGIN:VEVENT
UID:949@acinfotec.com
DTSTART:20260622T023000Z
DTEND:20260626T093000Z
DTSTAMP:20260107T091638Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-270012022-
 lead-implementer-thai-exam-included-2/
SUMMARY:PECB Certified ISO 27001:2022 Lead Implementer (Thai) Exam Included
DESCRIPTION:About this course\nInformation security threats and attacks gro
 w and improve constantly. As such\, organizations are increasingly concern
 ed about\nhow their valuable information is handled and protected. The bes
 t form of defense against them is the proper implementation\nand managemen
 t of information security controls and best practices. Information securit
 y is the globally accepted benchmark\nand also a key expectation and requi
 rement of customers\, legislators\, and other interested parties.\n\nThis 
 training course is designed to prepare you to implement an information sec
 urity management system (ISMS) based on\nthe requirements of ISO/IEC 27001
 . It aims to provide a comprehensive understanding of the best practices o
 f an ISMS and a\nframework for its continual management and improvement.\n
 \nThe training content is packed with practical exercises and case studies
  which will help you get equipped with real-world\nexpertise that you can 
 apply to your day-to-day operations and activities. Our training courses a
 re all-inclusive\, meaning that\nthey cover everything you need to get the
  certifiate\n\nCourse Benefits\n\n\n\n 	Acknowledge the correlation betwee
 n ISO/IEC 27001\, ISO/IEC 27002 and other standards and regulatory frame
 works\n 	Master the concepts\, approaches\, methods and techniques used fo
 r the implementation and effective management of an ISMS\n 	Learn how to i
 nterpret the ISO/IEC 27001 requirements in the specific context of an orga
 nization\n 	Learn how to support an organization to effectively plan\, imp
 lement\, manage\, monitor and maintain an ISMS\n 	Acquire the expertise to
  advise an organization in implementing Information Security Management Sy
 stem best practices\n\n\n\nWho should attend?\n\n 	Managers or consultants
  involved in Information Security Management\n 	Expert advisors seeking to
  master the implementation of an Information Security Management System\n 
 	Individuals responsible for maintaining conformance with ISMS requirement
 s\n 	ISMS team members\n\n\n\n\nCourse Contents\nDay 1: Introduction to IS
 O/IEC 27001 and initiation of an ISMS\n\n 	Training course objectives and 
 structure\n 	Standards and regulatory frameworks\n 	Information Security M
 anagement System (ISMS)\n 	Fundamental information security concepts and p
 rinciples\n 	Initiation of the ISMS implementation\n 	Understanding the or
 ganization and its context h ISMS scope\n\nDay 2: Planning the implementat
 ion of an ISMS\n\n 	Leadership and project approval\n 	Organizational stru
 cture\n 	Analysis of the existing system\n 	Information security policy\n 
 	Risk management\n 	Statement of Applicability\n\nDay 3: Implementation of
  an ISMS\n\n 	Documented information management\n 	Selection and design of
  controls\n 	Implementation of controls\n 	Trends and technologies\n 	Comm
 unication\n 	Competence and awareness\n 	Security operations management\n\
 nDay 4: ISMS monitoring\, continual improvement\, and preparation for the 
 certification audit\n\n 	Monitoring\, measurement\, analysis\, and evaluat
 ion\n 	Internal audit\n 	Management review\n 	Treatment of nonconformities
 \n 	Continual improvement\n 	Preparing for the certification audit\n 	Cert
 ification process and closing of the training course\n\nDay 5: Certificati
 on Exam\nTraining Info\nDuration:  5 Days\nDate: Jun 22-26\, 2026\nTime:
   9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\
 , Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining F
 ees: 51\,500 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext. 321-323\nE-mail.trai
 ning@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:870@acinfotec.com
DTSTART:20260622T023000Z
DTEND:20260625T093000Z
DTSTAMP:20260107T091651Z
URL:https://www.acinfotec.com/training-event/comptia-cloud-exam-included-4
 /
SUMMARY:CompTIA Cloud+ (Exam Included)
DESCRIPTION:About this course\nCompTIA Cloud+ is a global certification tha
 t validates the skills needed to deploy and automate secure cloud environm
 ents that support the high availability of business systems and data. It i
 s the only performance-based IT certification that views cloud-based infra
 structure services in the context of broader IT systems operations regardl
 ess of the platform. Migrating to the cloud presents opportunities to depl
 oy\, optimize\, and protect mission critical applications and data storage
 . It validates the technical skills needed to secure these valuable assets
 . The reality of operating multi-cloud environments poses new challenges. 
 It is ideal for cloud engineers who need to have expertise across multiple
  products and systems and is the only cloud focused certification approved
  for DoD 8570.01-M\, offering an infrastructure option for individuals who
  need to certify in IAM Level I\, CSSP Analyst and CSSP Infrastructure Sup
 port roles. \nWho should attend?\n\n 	Systems Administrator\n 	Systems En
 gineer\n 	Network Engineer\n 	Cloud Project Manager\n 	Cloud Engineer\n 	N
 etwork Administrator\n 	Cloud Specialist\n\nCourse Contents\n\n\n\n\n\n\nC
 loud Architecture &amp\; Design\nAnalyze the different cloud models to des
 ign the best solution to support business requirements.\n\n\n\n\n\n\n\nClo
 ud Security\nManage and maintain servers\, including OS configurations\, a
 ccess control and virtualization.\n\n\n\n\n\n\n\nCloud Deployment\nAnalyze
  system requirements to successfully execute workload migrations to the cl
 oud.\n\n\n\n\n\n\n\n\n\nOperations &amp\; Support\nMaintain and optimize c
 loud environments\, including proper automation and orchestration procedur
 es\, backup and restore operations\, and disaster recovery tasks.\n\n\n\n\
 n\n\n\nTroubleshooting\nTroubleshoot capacity\, automation\, connectivity 
 and security issues related to cloud implementations.\n\n\n\n\n\n\nTrainin
 g Info\nDuration:  4 Days\nDate: Jun 22-25\, 2026\nTime:  9.30 am. – 
 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre P
 oint Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 45\,000 Baht
  (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com
 \n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:809@acinfotec.com
DTSTART:20260701T023000Z
DTEND:20260703T093000Z
DTSTAMP:20260107T091701Z
URL:https://www.acinfotec.com/training-event/ec-council-certified-incident
 -handler-ecihv2-exam-included/
SUMMARY:EC-Council Certified Incident Handler (ECIHv3) (Exam Included)
DESCRIPTION:About this course\nEC-Council's Certified Incident Handler prog
 ram equips students with the knowledge\, skills\, and abilities to effecti
 vely prepare for\, deal with\, and eradicate threats and threat actors in 
 an incident. This program provides the entire process of incident handling
  and response and hands-on labs that teach the tactical procedures and tec
 hniques required to effectively plan\, record\, triage\, notify and contai
 n. Students will learn the handling of various types of incidents\, risk a
 ssessment methodologies\, as well as laws and policies related to incident
  handling. After attending the course\, students will be able to create IH
 &amp\;R policies and deal with different types of security incidents such 
 as malware\, email security\, network security\, web application security\
 , cloud security\, and insider threat-related incidents.\n\nThe E|CIH (EC-
 Council Certified Incident Handler) also covers post incident activities s
 uch as containment\, eradication\, evidence gathering and forensic analysi
 s\, leading to prosecution or countermeasures to ensure the incident is no
 t repeated. The E|CIH is a method-driven course that provides a holistic a
 pproach covering vast concepts related to organizational IH&amp\;R\, from 
 preparing/planning the incident handling response process to recovering or
 ganizational assets from the impact of security incidents. These concepts 
 are essential for handling and responding to security incidents to protect
  organizations from future threats or attacks.\n\nWith over 95 advanced la
 bs\, 800 tools covered\, and exposure to incident handling activities on m
 any different operating systems\, E|CIH provides a well-rounded\, but tact
 ical approach to planning for and dealing with cyber incidents. The E|CIH 
 program addresses all stages involved in the IH&amp\;R process\, and this 
 attention toward a realistic and futuristic approach makes E|CIH one of th
 e most comprehensive IH&amp\;R-related certifications in the market today\
 nWho should attend?\n\n 	Incident Handler\n 	Incident Responder\n 	Inciden
 t Response Consultant/Associate /Analyst/Engineer/Specialist/ Expert/Manag
 er\n 	CSIRT Analyst/Engineer/Manager\n 	Information Security Associate/Ana
 lyst/Engineer/Specialist/Manager\n 	Cyber Defense Security Consultant/Asso
 ciate/Analyst\n 	IT Security Operations Center Analyst (SOC Analyst/Engine
 er)\n 	Cyber Forensic Investigator/Consultant/Analyst/Manager\n 	Digital F
 orensic Analyst\n 	Cyber Risk Vulnerability Analyst/Manager\n 	Cyber Intel
 ligence Analyst and Cyber Security Threat Analyst/Specialist\n 	Cyber Secu
 rity Incident Response Team Lead\n 	Penetration Tester\n\n\n\n\n\n\nLearn 
 the 9 Stages of Incident Handling &amp\; Response (IH &amp\; R) Process\n\
 n 	Planning\n 	Recording &amp\; Assignment\n 	Triage\n 	Notification\n 	Co
 ntainment\n 	Post Incident Activities\n 	Recovery\n 	Eradication\n 	Eviden
 ce Gathering &amp\; Forensics Analysis\n\nKey Features &amp\; Critical Com
 ponents of E|CIH Program\n\n 	\n1600+ Pages of the comprehensive student m
 anual\n\n 	\n800+ Incident handling and response tools\n\n 	\n780+ Illustr
 ated instructor slides\n\n 	\n125 Incident handling templates\, checklists
 \, and toolkits\n\n 	\n95 Labs environment simulates a real-time environme
 nt (Covered in 22 Scenario-based Labs)\n\n 	\n10+ Incident handling playbo
 oks and runbooks\n\n 	\n100%  Compliance to NICE 2.0 Framework\n\n 	\n100
 % compliance with CREST CCIM\n\n\nBased on a Comprehensive Industry-wide J
 ob Task Analysis (JTA)\nStructured approach for performing incident handli
 ng and response process.\nFocus on developing skills in handling different
  types of cybersecurity incidents\n\n\n\n\n\nCourse Contents\n\n 	Module 0
 1: Introduction to Incident Handling and Response\n 	Module 02: Incident H
 andling and Response Process\n 	Module 03: First Response\n 	Module 04: Ha
 ndling and Responding to Malware Incidents\n 	Module 05: Handling and Resp
 onding to Email Security Incidents\n 	Module 06: Handling and Responding t
 o Network Security Incidents\n 	Module 07: Handling and Responding to Web 
 Application Security Incidents\n 	Module 08: Handling and Responding to Cl
 oud Security Incidents\n 	Module 09: Handling and Responding to Insider Th
 reats\n 	Module 10: Handling and responding to Endpoint Security Incidents
  (New!!)\n\n\nTop: Latest Templates\, Checklists\, and Toolkits:\n\n• Di
 gital Forensics eadiness Policy Document Template\n• Incident Handling a
 nd Response Plan Template\n• Incident Handling and Response Policy and P
 rocedure Document Template\n• Incident Handler Checklist\n• Incident R
 esponder Toolkit Requirements\n• Forensics Investigative Analysis Report
  Recognition / Endorsement / Mapping\n\nDuration:  3 Days\nDate:  Jul 1-
 3\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Ce
 nter\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 
 Rd.\nTraining Fees: 45\,000 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-32
 3\nE-mail.training@acinfotec.com\n\n\n\nwww.eccouncil.com\n\n&nbsp\;\n\n&n
 bsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/hc135990835053.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:722@acinfotec.com
DTSTART:20260702T023000Z
DTEND:20260703T093000Z
DTSTAMP:20260107T091709Z
URL:https://www.acinfotec.com/training-event/pcip-pci-professional-thai-ex
 am-excluded-4/
SUMMARY:PCIP (PCI Professional) (Exam Excluded)
DESCRIPTION:\nAbout this course\nThis course will cover PCI DSS in detail i
 ncluding: Scoping &amp\; Segmentation\, 12 main requirements\, appendix A1
 -A3\, and compensating control. Overview of PA-DSS\, PCI PTS\, P2PE will a
 lso be provided. Furthermore\, other core knowledge including: basic of pa
 yment card transaction\, determining assessment type and level\, SAQ selec
 tion and description\, and Attestation of Compliance\, Report of Complianc
 e\, Certification of Compliance will also be covered. The course is design
 ed to prepare attendee to be ready for PCIP examination.\n Who Should att
 end?\n\n 	Prospect PCI DSS Auditor/Assessor\n 	PCI DSS Project Manager / C
 oordinator / Implementer / Technical Leader\n 	Security/Technology\, Compl
 iance/Risk/Governance\n 	Audit/Finance\n 	e-Commerce\n 	Product Developmen
 t\, Marketing or Sales (develop or sell payments-oriented products)\n 	En
 thusiast pursuing PCIP certification examination\n\nHow to Prepare?\nPrior
  to taking the PCIP training and/or exam\, candidates should familiarize t
 hemselves with information regarding the PCI Standards and supporting docu
 ments. These materials along with the current version of the PCI DSS may b
 e found in the  Document Library.\nCourse Contents\n\n 	Overview of PCIP 
 qualification\n 	Introduction to PCI DSS\n 	Introduction to other PCI SSC 
 standards: PA-DSS\, PCI PTS\, P2PE\n 	Basic of Payment Card Transaction\n 
 	Determining Assessment Type and Level\n 	Scoping and Segmentation\n 	PCI 
 DSS: 12 main requirements\n 	PCI DSS: Appendix A1-A3\n 	Compensating Contr
 ol\n 	Self-Assessment Questionnaire (SAQ)\n 	AoC\, RoC\, CoC Explanation\n
  	Practice Question\n\nHow to become a PCIP?\nThe qualification exam is ad
 ministered at a Pearson VUE Test Center. You will have 90 minutes to compl
 ete 60 multiple-choice questions. No electronic devices may be used during
  the closed-book exam.\nScheduling the exam\n\n 	All scheduling/rescheduli
 ng is done via Pearson VUE’s online scheduling system – you select the
  test location\, date and time most convenient for you.\n 	You will receiv
 e an email containing Instructions and a voucher to schedule your exam wit
 hin 2-3 business days of payment processing.\n\n\n 	If you choose the Exam
 -only or instructor-led class option\, the exam must be completed within a
  30 day test window.\n 	If you choose the eLearning Course\, the exam must
  be completed within a 90 days test window.\n\nExam Results and Next Steps
 \n\n 	Pass/Fail results are provided immediately following the conclusion 
 of your exam.\n 	Passing candidates will receive a Certificate of Qualific
 ation via email within 2-3 business days.\n 	If a passing score is not ach
 ieved\, a total of three (3) attempts are permitted (a retake fee will app
 ly). After three failed attempts a six month waiting period must be observ
 ed before you can re-apply to the program as a new candidate.\n\nTraining 
 Info\nDuration:  2 Days\nDate:  Jul 2 - 3\, 2026\nTime:  9.30 am. –
  04.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre 
 Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 32\,000 Bah
 t (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.co
 m\n\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/02/PCI.jpg
CATEGORIES:PCI
END:VEVENT
BEGIN:VEVENT
UID:930@acinfotec.com
DTSTART:20260706T023000Z
DTEND:20260710T093000Z
DTSTAMP:20260107T091722Z
URL:https://www.acinfotec.com/training-event/cissp-exam-preparation-exam-e
 xcluded-11/
SUMMARY:CISSP Exam Preparation (Exam Excluded)
DESCRIPTION:\nAbout This Course\nThe CISSP has clearly emerged as THE key c
 ertification for security professionals. In fact\, in an informal survey o
 f information security jobs on a major employment Web site\, over 70 perce
 nt of the positions required CISSP certification! Corporations are demandi
 ng experienced information security professionals with the certifications 
 to prove it to protect their information and assets.\n\nThe CISSP Prep cla
 ss was developed to meet current demands and the growing needs of the comp
 uter industry. This class provides the student with the level of knowledge
  needed as part of the (ISC)2 certification requirements for the Certified
  Information System Security Professional (CISSP) Certification. This cert
 ification is rapidly becoming a requirement for employment with security t
 asks. Students gain a solid background on security concerns\, communicatio
 ns\, infrastructure\, basic cryptography\, and operational\nWho should att
 end?\n\nThe CISSP is ideal for experienced security practitioners\, manage
 rs and executives interested in proving their knowledge across a wide arra
 y of security practices and principles\, including those in the following 
 positions:\n\n 	Security Manager\n 	Security Auditor\n 	Security Architect
 \n 	Security Consultant\n 	Network Architect\n 	Chief Information Security
  Officer\n 	Chief Information Officer\n 	Director of Security\n 	IT Direct
 or/Manager\n 	Security Systems Engineer\n 	Security Analyst\n\nCourse Cont
 ents\n\nThe CISSP exam evaluates your expertise across eight security doma
 ins. Think of the domains as topics you need to master based on your profe
 ssional experience and education.\n\n\nDomain 1 : Security and Risk Manage
 ment (Security\, Risk\,Compliance\, Law\, Regulations\, and Business Conti
 nuity)\n\n 	Confidentiality\, integrity\, and availability concepts\n 	Sec
 urity governance principles\n 	Compliance\n 	Legal and regulatory issues\n
  	Professional ethics\n 	Security policies\, standards\, procedures and gu
 idelines\n 	Business continuity requirements\n 	Personnel security policie
 s\n 	Risk management concepts\n 	Threat modeling\n 	Risk considerations\n 
 	Security education\, training\, and awareness\n\nDomain 2 : Asset Securit
 y (Protecting Security of Assets)\n\n 	Information and asset classificatio
 n\n 	Ownership (e.g. data owners\, system owners)\n 	Protect privacy\n 	Ap
 propriate retention\n 	Data security controls\n 	Handling requirements (e.
 g. markings\, labels\,storage)\n\nDomain 3 : Security Engineering (Enginee
 ring and Management of Security)\n\n 	Engineering processes using secure d
 esign principles\n 	Security models fundamental concepts\n 	Security evalu
 ation models\n 	Security capabilities of information systems\n 	Security a
 rchitectures\, designs\, and solution elements vulnerabilities\n 	Web-base
 d systems vulnerabilities\n 	Mobile systems vulnerabilities\n 	Embedded de
 vices and cyber-physical systems vulnerabilities\n 	Cryptography\n 	Site a
 nd facility design secure principles\n 	Physical security\n\nDomain 4 : Co
 mmunication and Network Security (Designing and Protecting Network Securit
 y)\n\n 	Secure network architecture design (e.g. IP &amp\; non-IP protocol
 s\, segmentation)\n 	Secure network components\n 	Secure communication cha
 nnels\n 	Network attacks\n\nDomain 5 : Identity and Access Management (Con
 trolling Access and Managing Identity)\n\n 	Physical and logical assets co
 ntrol\n 	Identification and authentication of people and devices\n 	Identi
 ty as a service (e.g. cloud identity)\n 	Third-par ty identity services (e
 .g. on-premise)\n 	Access control attacks\n 	Identity and access provision
 ing lifecycle (e.g. provisioning review)\n\nDomain 6 : Security Assessment
  and Testing (Designing\, Performing\, and Analyzing Security Testing)\n\n
  	Assessment and test strategies\n 	Security process data (e.g. management
  and operational controls)\n 	Security control testing\n 	Test outputs (e.
 g. automated\, manual)\n 	Security architectures vulnerabilities\n\nDomain
  7 : Security Operations (Foundational Concepts\, Investigations\, Inciden
 t Management\, and Disaster Recovery)\n\n 	Investigations support and requ
 irements\n 	Logging and monitoring activities\n 	Provisioning of resources
 \n 	Foundational security operations concepts\n 	Resource protection techn
 iques\n 	Incident management\n 	Preventative measures\n 	Patch and vulnera
 bility management\n 	Change management processes\n 	Recovery strategies\n 
 	Disaster recovery processes and plans\n 	Business continuity planning and
  exercises\n 	Physical security\n 	Personnel safety concerns\n\nDomain 8 :
  Software Development Security (Understanding\,Applying\, and Enforcing So
 ftware Security)\n\n 	Security in the software development life cycle\n 	D
 evelopment environment security controls\n 	Software security effectivenes
 s\n 	Acquired software security impact\n\nCISSP Changes To Computerized Ad
 aptive Testing\n(ISC)² has introduced Computerized Adaptive Testing (CAT)
  for all English CISSP exams worldwide. Based on the same exam content out
 line as the linear\, fixed-form exam\, CISSP CAT is a more precise and eff
 icient evaluation of your competency. CISSP CAT enables you to prove your 
 knowledge by answering fewer items and completing the exam in half the tim
 e.\nHow Does it Work?\nEach candidate taking the CISSP CAT exam will start
  with an item that is well below the passing standard. Following a candida
 te’s response to an item\, the scoring algorithm re-estimates the candid
 ate’s ability based on the difficulty of all items presented and answers
  provided. With each additional item answered\, the computer's estimate of
  the candidate’s ability becomes more precise – gathering as much info
 rmation as possible about a candidate’s true ability level more efficien
 tly than traditional\, linear exams.\n\nThis more precise evaluation enabl
 es us to reduce the maximum exam administration time from 6 hours to 3 hou
 rs\, and it reduces the items necessary to accurately assess a candidate
 ’s ability from 250 items on a linear\, fixed-form exam to as little as 
 100 items on the CISSP CAT exam.\n\nThe exam content outline and passing s
 tandard for both versions of the examination are exactly the same. Each ca
 ndidate will be assessed on the same content and must demonstrate the same
  level of competency regardless of the exam format.\n\nCISSP exams in all 
 other languages\, as well as all CISSP concentration exams are delivered a
 s linear\, fixed-form exams.\nTraining Info\nDuration : 5 Days\nDate : Ju
 l 6-10\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Training Center\
 n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\n
 Training Fee : 38\,000 Baht (ex.vat 7%)\nExam Fee : Please call\nTel. 02 6
 70 8980-3 ext.321-323\nEmail. training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-1.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:915@acinfotec.com
DTSTART:20260706T023000Z
DTEND:20260710T093000Z
DTSTAMP:20260107T091734Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-27701-
 lead-auditor-exam-included-3/
SUMMARY:PECB Certified ISO/IEC 27701 Lead Auditor (Exam Included)
DESCRIPTION:About this course\nDuring this training course\, you will obtai
 n the knowledge and skills to plan and carry out audits in compliance with
  ISO 19011 and ISO/IEC 17021-1 certification process.\n\nBased on practica
 l exercises\, you will be able to acquire knowledge on the protection of p
 rivacy in the context of processing personally identifiable information (P
 II)\, as well as master audit techniques and become competent to manage an
  audit program\, audit team\, establish communication with customers and r
 esolve potential conflicts.\n\nAfter completing this training course\, you
  can sit for the exam and\, if you successfully pass the exam\, you can ap
 ply for the “PECB Certified ISO/IEC 27701 Lead Auditor” credential. Th
 e internationally recognized PECB Lead Auditor certificate proves that you
  have the capabilities and competences to audit organizations based on bes
 t practices.\n\nWho should attend?\n\n 	\nAuditors seeking to perform and 
 lead Privacy Information Management System (PIMS) certification audits\n 	
 \nManagers or consultants seeking to master a PIMS audit process\n 	\nIndi
 viduals responsible for maintaining conformance with PIMS requirements\n 	
 \nTechnical experts seeking to prepare for a PIMS audit\n 	\nExpert adviso
 rs in the protection of Personally Identifiable Information (PII)\n\n\nCou
 rse Contents\nDay 1 Introduction to Privacy Information Management System 
 (PIMS) and ISO/IEC 27701\n- Training course objectives and structure\n- St
 andards and regulatory frameworks\n- Certification process\n- Fundamental 
 information security and privacy concepts and principles\n- Privacy inform
 ation management system (PIMS)\n\nDay 2 Audit principles\, preparation\, a
 nd launching of an audit\n- Fundamental audit concepts and principles\n- T
 he impact of trends and technology in auditing\n- Evidence-based auditing\
 n- Risk-based auditing\n- Initiation of the audit process\n- Stage 1 audit
 \n\nDay 3 On-site audit activities\n- Preparations for stage 2 audit (on-s
 ite audit)\n- Stage 2 audit\n- Communication during the audit\n- Audit pro
 cedures\n- Creating audit test plans\n\nDay 4 Closing the audit\n- Draftin
 g audit findings and nonconformity reports\n- Audit documentation and qual
 ity review\n- Closing of the audit\n- Evaluation of action plans by the au
 ditor\n- Beyond the initial audit\n- Managing an internal audit program\n-
  Closing of the training course\n\nDay 5 Certification exam\n\nTraining In
 fo\n\nDuration:  5 Days\nDate:   Jul 6-10\, 2026\nTime:  9.30 am. 
 – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Cent
 re Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 
 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext. 321-323\nE-mail.training@acinfote
 c.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:534@acinfotec.com
DTSTART:20260706T023000Z
DTEND:20260709T093000Z
DTSTAMP:20260107T091743Z
URL:https://www.acinfotec.com/training-event/cisa-examination-preparation-
 thai-exam-excluded-3/
SUMMARY:CISA Examination Preparation (Exam Excluded)
DESCRIPTION:About this course\nCertified Information Systems Auditor (CISA)
 ® is one of the world’s most popular information security/information t
 echnology auditing certifications for professionals worldwide. CISA certif
 ication course is developed by ISACA and ideal for anybody looking to forg
 e their career in the IT Security/Cybersecurity domain. This 4-day Certifi
 ed Information Systems Auditor (CISA) certification course validates your 
 auditing\, control\, and security skills among the best in the industry.\n
 Course Benefits\n\n 	 A thorough understanding of knowledge and skills re
 quired for an IS Auditor\n 	Insights into the level of knowledge required 
 to meet the complexities of a digital business landscape\n 	An in-depth un
 derstanding of auditing information systems\n 	Knowledge of management and
  governance of IT processes and systems\n 	Understanding of acquisition\, 
 development\, test\, and implementation of critical business information s
 ystems\n 	Thorough knowledge of managing\, maintaining\, and securing info
 rmation assets\n 	Proper understanding of the CISA course material to clea
 r your CISA exam on the first attempt\n\nWho should attend?\nThis course i
 s suitable for\;\n\n 	IT Managers\n 	Network Architects\n 	Security Consul
 tants\n 	Auditing Professionals\n 	Security Architects\n 	Security Auditor
 s\n 	Security Managers\n 	Security Analysts\n 	Security Systems Engineers\
 n 	Anybody who wants to gain knowledge of globally-recognized CISA informa
 tion systems auditing process\n 	Anybody who is looking create a career in
  information systems auditing\n\nCourse Contents\nDOMAIN 1 – INFORMATION
  SYSTEMS AUDITING PROCESS\n\n 	Planning\n 	IS Audit Standards\, Guidelines
 \, and Codes of Ethics\n 	Business Processes\n 	Types of Controls\n 	Risk-
 Based Audit Planning\n 	Types of Audits and Assessments\n 	Execution\n 	Au
 dit Project Management\n 	Sampling Methodology\n 	Audit Evidence Collectio
 n Techniques\n 	Data Analytics\n 	Reporting and Communication Techniques\n
 \nDOMAIN 2 – GOVERNANCE &amp\; MANAGEMENT OF IT\n\n 	IT Governance\n 	IT
  Governance and IT Strategy\n 	IT-Related Frameworks\n 	IT Standards\, Pol
 icies\, and Procedures\n 	Organizational Structure\n 	Enterprise Architect
 ure\n 	Enterprise Risk Management\n 	Maturity Models\n 	Laws\, Regulations
 \, and Industry Standards affecting the Organization\n 	IT Management\n 	I
 T Resource Management\n 	IT Service Provider Acquisition and Management\n 
 	IT Performance Monitoring and Reporting\n 	Quality Assurance and Quality 
 Management of IT\n\nDOMAIN 3 – INFORMATION SYSTEMS ACQUISITION\, DEVELOP
 MENT &amp\; IMPLEMENTATION\n\n 	Information Systems Acquisition and Develo
 pment\n 	Project Governance and Management\n 	Business Case and Feasibilit
 y Analysis\n 	System Development Methodologies\n 	Control Identification a
 nd Design\n 	Information Systems Implementation\n 	Testing Methodologies\n
  	Configuration and Release Management\n 	System Migration\, Infrastructur
 e Deployment\, and Data Conversion\n 	Post-implementation Review\n\nDOMAIN
  4 – INFORMATION SYSTEMS OPERATIONS &amp\; BUSINESS RESILIENCE\n\n 	Info
 rmation Systems Operations\n 	Common Technology Components\n 	IT Asset Man
 agement\n 	Job Scheduling and Production Process Automation\n 	System Inte
 rfaces\n 	End-User Computing\n 	Data Governance\n 	Systems Performance Man
 agement\n 	Problem and Incident Management\n 	Change\, Configuration\, Rel
 ease\, and Patch Management\n 	IT Service Level Management\n 	Database Man
 agement\n 	Business Resilience\n 	Business Impact Analysis (BIA)\n 	System
  Resiliency\n 	Data Backup\, Storage\, and Restoration\n 	Business Continu
 ity Plan (BCP)\n 	Disaster Recovery Plans (DRP)\n\nDOMAIN 5 – PROTECTION
  OF INFORMATION ASSETS\n\n 	Information Asset Security and Control\n 	Info
 rmation Asset Security Frameworks\, Standards\, and Guidelines\n 	Privacy 
 Principles\n 	Physical Access and Environmental Controls\n 	Identity and A
 ccess Management\n 	Network and End-Point Security\n 	Data Classification\
 n 	Data Encryption and Encryption-Related Techniques\n 	Public Key Infrast
 ructure (PKI)\n 	Web-Based Communication Techniques\n 	Virtualized Environ
 ments\n 	Mobile\, Wireless\, and Internet-of-Things (IoT) Devices\n 	Secur
 ity Event Management\n 	Security Awareness Training and Programs\n 	Inform
 ation System Attack Methods and Techniques\n 	Security Testing Tools and T
 echniques\n 	Security Monitoring Tools and Techniques\n 	Incident Response
  Management\n 	Evidence Collection and Forensics\n 	Supporting Tasks\n\nEx
 amination\n• Paper-based Examination\n• 4 Hours\n• 200 MCQ Questions
 \n• Minimum score of 450 out of a possible maximum of 800\nTraining Info
 \nDuration:  4 Days\nDate:  Jul 6-9\, 2026\nTime:  9.30 am. – 16.30
  pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point 
 Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 34\,000 Baht (ex.
 vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n&
 nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/3.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:878@acinfotec.com
DTSTART:20260708T023000Z
DTEND:20260710T093000Z
DTSTAMP:20260107T091804Z
URL:https://www.acinfotec.com/training-event/comptia-project-exam-included
 -3/
SUMMARY:CompTIA Project+ (Exam Included)
DESCRIPTION:About this course      \nCompTIA Project+ Opens the Door t
 o Your Project Management Career! CompTIA Project+ covers the methodologie
 s\, frameworks and Agile skills necessary to efficiently manage and delive
 r IT projects while taking new topics like change management and complianc
 e into consideration. CompTIA Project+ is ideal for professionals handling
  less-complex projects while also managing the project life cycle\, ensuri
 ng appropriate communication\, managing resources and maintaining project 
 documentation. CompTIA Project+ is good for life. That means once you are 
 Project+ certified\, you won’t ever need to renew your certification. In
 stead\, you can focus on building your knowledge and advancing your career
 .\n\nCourse Benefits\nCOMPTIA PROJECT+ PROVES CERTIFIED PROFESSIONALS HAVE
  THE SKILLS REQUIRED FOR HIGH-STAKES PROJECT MANAGEMENT\nWhat Skills Will 
 You Learn?\n\nProject Basics\nThe properties of project\, phases\, schedul
 es\, roles and responsibilities\, and cost controls\, as well as the basic
  aspects of Agile methodology.\nProject Constraints\nThe impact of various
  constraint variables and influences throughout the project and the import
 ance of risk strategies and activities.\nCommunication and Change Manageme
 nt\nThe appropriate communication methods of influence and change control 
 processes within the context of a project.\nProject Tools and Documentatio
 n\nVarious project management tools and project and partner-centric docume
 ntation.\nWho should Attend?\n\n 	IT Project Manager\n 	Project Coordinato
 r\n 	IT Support Manager\n 	Business Analyst\n 	IT Manager\n\nCourse Conten
 ts\n1. Preparing for the Project \n1 A Understand Project Management Basi
 cs\n1 B Develop the Business Case\n1 C Identify Project Characteristics\n\
 n2. Selecting the Project Framework \n2A Identify Project Methodologies\n
 2B Compare Agile and Waterfall Project\n\n3. Initiating the Project\n3A Bu
 ild a Project Team\n3B Prepare Project Initiation Documents\n\n4. Facilita
 tion Effective Meetings \n4A Lead Effective Meetings\n4B Use Project mana
 gement Tools\n4C create a Communication Plan\n\n5. Implementing Solution D
 esign\n5A Create a Solution Desing\n5B Evaluate IT Infrastructure Needs\n\
 n6. Managing Resources\n6A Describe the Resource Life Cycle\n6B Conduct a 
 Needs Assessment\n\n7. Managing Risk\n7A Identify and Analyze Risk\n7B Tre
 at and Monitor Risk\n\n8. Creating a Project Schedule\n8A Define Units of 
 Work\n8B Sequence the Activities\n\n9. Creating a Project Plan\n9A Refine 
 the Timeline\n9B Establish Project Baselines\n9C Create a Quality Assuranc
 e Plan\n\n10. Procuring Solutions \n10A Compare Procurement Options\n10B 
 Evaluate and Select Vendors\n\n11 . Managing Project Execution\n11A Docume
 nt Progress\n11B Communicate Progress\n\n12. Managing Issues and Changes\n
 12A Resolve Issues\n12B Control Changes\n\n13. Managing Performance\n13A M
 easure Performance\n13B Maintain the Project Schedule\n\n14. Wrapping Up t
 he Project\n14A Prepare for Project Closure\n14B Close the Project\n\nGuid
 e for CompTIA Project+ Examination\nExam Details\nCompTIA Project+ is idea
 l for IT professionals who need to manage smaller\, less-complex projects 
 as part of their other job duties but still have foundational project mana
 gement skills. Project+ is versatile because it covers essential project m
 anagement concepts beyond the scope of just one methodology or framework.\
 n\n\n\nExam Code\nPK0-005\n\n\nExam Description\nCompTIA Project+ is ideal
  for IT professionals who need to manage smaller\, less-complex projects a
 s part of their other job duties but still have foundational project manag
 ement skills. Project+ is versatile because it covers essential project ma
 nagement concepts beyond the scope of just one methodology or framework.\n
 \n\nNumber of Questions\nMaximum of 90 questions\n\n\nType of Questions\nM
 ultiple-choice (single and multiple response) and performance-based\n\n\nL
 ength of Test\n90 Minutes\n\n\nPassing Score\n710 (on a scale of 100-900)\
 n\n\nRecommended Experience\nEquivalent to at least 6–12 months of hands
 -on experience managing projects in an IT environment\n\n\nLaunch Date\nNo
 vember 8\, 2022\n\n\nRetirement\nUsually three years after launch\n\n\nLan
 guages\nEnglish\, Japanese\, Thai\n\n\n\nTraining Info\n\nLanguage : Condu
 cted in Thai Language\n\nDuration : 3 Days\n\nDate : Jul 8-10\, 2026\n\nTi
 me : 9.30 - 16.30 pm\n\nVenue : ACinfotec Training Center 16th Fl.\, Grand
 e Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\n\nContact: 02 670
  8980-3 ext.321-323\n\nPrice: 39\,000 Baht (Ex.vat 7% )
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:794@acinfotec.com
DTSTART:20260709T023000Z
DTEND:20260710T093000Z
DTSTAMP:20251219T034532Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -technologist-cipt-thai/
SUMMARY:Certified Information Privacy Technologist (CIPT) (Thai)
DESCRIPTION: \n&nbsp\;\nAbout this course\nData privacy regulations worldwi
 de require privacy protections be built into products and services. IAPP P
 rivacy in Technology training\, aligned with the ANSI/ISO-accredited CIPT
  certification program\, will provide you with the knowledge to recognize
  privacy threats and skills to apply technical strategies to mitigate priv
 acy risk throughout the software and systems development lifecycles.\n Co
 urse Benefits\nPrivacy in Technology training teaches technology and data 
 professionals how to understand and integrate strategies and techniques to
  minimize privacy threats. The curriculum includes privacy-by-design princ
 iples\; implementing data- and process-oriented strategies to support priv
 acy policies\; and managing threats from AI\, location tracking\, etc.\n 
 Who should attend?\n\n 	Data Scientists/Analysts/Architects\n 	IT Managers
  and Administrators\n 	Records Managers\n 	System Developers\n 	Software E
 ngineers/Designers\n 	Privacy Engineers/Developers\n 	System Administrator
 s\n 	UX Designers\n 	Cybersecurity Professionals\n\n Course Contents\nMod
 ule 1: Foundational Principles in Technology\n\n 	Summarizes the foundatio
 nal elements for embedding privacy in technology through privacy by design
  and value sensitive design\; reviews the data life cycle and common priva
 cy risk models and frameworks.\n\nModule 2: The Tech Pro’s Role in Priva
 cy\n\n 	Reviews the fundamentals of privacy as they relate to the privacy 
 technologist\; describes the privacy technologist’s role in ensuring com
 pliance with privacy requirements and meeting stakeholder privacy expectat
 ions\; explores the relationship between privacy and security.\n\nModule 3
 : Privacy threats and violations\n\n 	Identifies inherent risks throughout
  the stages of the data life cycle and explores how software security help
 s mitigate privacy threats\; examines the impacts that behavioral advertis
 ing\, cyberbullying and social engineering have on privacy within the tech
 nological environment.\n\nModule 4: Technical measures and privacy-enhanci
 ng technologies \n\n 	Outlines the strategies and techniques for enhancing
  privacy throughout the data life cycle\, including: identity and access m
 anagement\; authentication\, encryption\, and\naggregation\; collection an
 d use of personal information.\n\nModule 5: Privacy engineering\n\n 	Explo
 res the role of privacy engineering within an organization\, including the
  objectives of privacy engineering\, privacy design patterns\, and softwar
 e privacy risks.\n\nModule 6: Privacy-by-design methodology\n\n 	Illustrat
 es the process and methodology of the privacy-by-design model\; explores p
 ractices to ensure ongoing vigilance when implementing privacy by design.\
 n\nModule 7: Technology challenges for privacy\n\n\n 	Examines the unique 
 challenges that come from online privacy issues\, including automated deci
 sion making\, tracking and surveillance technologies\, anthropomorphism\, 
 ubiquitous computing and mobile social computing.\n\n\n\n\n 	Privacy in Te
 chnology online training.\n 	One-year IAPP membership.\n 	CIPT sample ques
 tions (digital).\n 	CIPT certification exam.\n 	Two digital textbooks.\n\n
 Training Info:\n\nLanguage: Conducted in Thai Language\nDuration: 2 Days
 \nDate: Jul 9 - 10\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, G
 rande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees
 : 49\,900 (Exam Included)\nTel : 02 670 8980-3 ext. 321-323\nE-mail: train
 ing@acinfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/cipt-seal.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:821@acinfotec.com
DTSTART:20260713T023000Z
DTEND:20260716T093000Z
DTSTAMP:20260107T092025Z
URL:https://www.acinfotec.com/training-event/comptia-network-exam-included
 -6/
SUMMARY:CompTIA Network+ (Exam Included)
DESCRIPTION:About this course      \n\nThis CompTIA's Network+ will pr
 oviding proof of your knowledge\, skills\, and ability to manage\, maintai
 n\, troubleshoot\, install\, operate\, and configure basic network infrast
 ructure. CompTIA Network+ Course points you in the right direction\, allo
 wing you to demonstrate the concepts covered on the Network+ in a real-wor
 ld environment.\n\nCourse Benefits\n\nNetwork+ ensures an IT professional 
 has the knowledge and skills to:\n\n 	Design and implement functional netw
 orks\n 	Configure\, manage\, and maintain essential network devices\n 	Use
  devices such as switches and routers to segment network traffic and creat
 e resilient networks\n 	Identify benefits and drawbacks of existing networ
 k configurations\n 	Implement network security\, standards\, and protocols
 \n 	Troubleshoot network problems\n 	Support the creation of virtualized n
 etworks\n\nWho should Attend?\n\n 	Junior Network Administrator\n 	Compute
 r Technician\n 	Network Field Technician\n 	Help Desk Technician\n 	Junior
  System Engineer\n 	System Engineer\n 	IS Consultant\n 	Network Support Sp
 ecialist\n 	Network Field Engineer\n 	Network Analyst\n\nCourse Contents\n
 \n\n1 - Network Theory\n\n 	Networking Terminology\n 	Network Categories\n
  	Standard Network Models\n 	Physical &amp\; Logical Network Topologies\n\
 n2 - Network Media and Hardware\n\n 	Bounded Network Media\n 	Unbounded Ne
 twork Media\n 	Network Connectivity Devices\n\n3 - Network Implementations
 \n\n 	Ethernet Networks\n 	Wireless Networks\n\n4 - Networking Models\n\n 
 	The OSI Model\n 	The TCP/IP Model\n\n5 - TCP/IP Fundamental\n\n 	The TCP/
 IP Protocol Suite\n 	IP Addressing (Version 4 &amp\; Version 6)\n 	Domain 
 Naming Services\n 	Dynamic Host Configuration Protocol Services\n\n6 - LAN
  Infrastructure\n\n 	Switching\n 	Enable Static Routing\n 	Implement Dynam
 ic IP Routing\n 	Virtual LANs\n\n7 - WAN Infrastructure\n\n 	WAN Transmiss
 ion Technologies\n 	WAN Connectivity Methods\n\n8 – Remote Networking &a
 mp\; Management\n\n 	Network Monitoring\n 	Remote Network Architectures\n 
 	Virtual Private Networking\n\n9 - System Security\n\n 	Computer Security 
 Basics\n 	System Security Tools\n 	Authentication Methods\n 	Encryption Me
 thods\n\n10 - Network Security\n\n 	Network Vulnerabilities\n 	Network Per
 imeter Security\n 	Intrusion Detection and Prevention\n\n11 - Network Secu
 rity Threats and Risks\n\n 	Network-Based Security Threats and Attacks\n 	
 Apply Threat Mitigation Techniques\n 	Educating Users / Officers\n\n12 - N
 etwork Troubleshooting\n\n 	Network Troubleshooting Utilities\n 	Hardware 
 Troubleshooting Tools\n 	Common Connectivity Issues\n\nTraining Info\n\nLa
 nguage : Conducted in Thai Language\n\nDuration : 4 Days\n\nDate : Jul 13 
 - 16\, 2026\n\nTime : 9.30 - 16.30 pm\n\nVenue : ACinfotec Training Center
  16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\n
 \nContact: 02 670 8980-3 ext.321-323\n\nPrice: 45\,000 Baht (Ex.vat 7% )
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:800@acinfotec.com
DTSTART:20260713T023000Z
DTEND:20260713T093000Z
DTSTAMP:20260107T092008Z
URL:https://www.acinfotec.com/training-event/principal-of-it-governance-ri
 sk-and-compliance-thai-5/
SUMMARY:Principal of IT Governance\, Risk and Compliance (Thai)
DESCRIPTION:Course Overview\n\nThis course defines IT Governance broadly as
  a collection of management\, planning and performance reporting and revie
 wing processes\, which establish controls and performance metrics over key
  IT investments\; business/IT alignment decisions\; the effectiveness of I
 T program and project deployment\, the efficiency of IT delivery\, infrast
 ructure and operational services and new or change request authorizations 
 and compliance with regulations\, laws and organizational policies.\n\nThe
  broad definition encompasses how well IT is providing value to and servic
 ing the business as well as doing its part in complying with regulations a
 nd organizational policies and plans. This is a “How to” Course that i
 s Pragmatic and Actionable. This course will enable an organization to mig
 rate from its current state of IT governance to a higher level of IT matur
 ity and impact the bottom line significantly.\n\nWho Should Attend?\n\n 	I
 T professionals working in audit\, compliance\, risk\, security and govern
 ance.\n 	Managers and Executives concerned about the quality of business i
 nformation.\n\nCourse Contents\n\nOverview of IT Governance\n\n 	Why IT go
 vernance? Driving forces and challenges\n 	IT Governance VS Enterprise Gov
 ernance\n 	Executive View of IT governance\n 	Who benefits and what are th
 e value propositions?\n 	The Role of the Board and Executive Management in
  IT Governance\n 	Enterprise Governance of The Securities and Exchange Com
 mission (SEC) and their relationship with IT governance\n\nOverview of Ind
 ustry Best Practice Standards\, Model and Guidelines covering some aspect 
 of IT governance\n\n 	PMBOK\, PRINCE2\, CMMI\, ITIL\, ISO 20000\, ISO 2700
 1\, ISO 22301\, COBIT\, COSO ERM\, SOX\, IIA Guidance on Governance\n 	IT 
 Governance framework\n 	Key Governance Processes- Planning\, Execution\, P
 erformance Management and Balanced Scorecard\, Steering Groups\, Outsourci
 ng etc.\n\nPrinciples of Business/IT Alignment Excellence\n\n 	Business an
 d IT Plans\n 	Investment/Portfolio Management Criteria\n 	IT Engagement Mo
 del\n\nPrinciples of Program/Project Management Excellence\n\n 	PM Life Cy
 cle Phases and Templates\n 	PM Metrics\n 	Project Risk Management\n\nPrinc
 iples of IT Service Management and Delivery Excellence\n\n 	 ITIL (IT Inf
 rastructure Library) and its value\, metrics\, work flows\n 	Overview of I
 SO 20000 service management system\n\nPrinciples of Information Security M
 anagement\n\n 	Security Risk Management\n 	ISO 27001 information security 
 management system\n\nPrinciples of Vendor Management and Outsourcing Excel
 lence\n\n 	Vendor Selection\, Negotiations and Management\n 	IT Governance
  in relations with Outsourcing\n\nUsing COBIT 4.1 as a tool for implementi
 ng IT Governance\n\n 	COBIT 4.1 introduction\n 	COBIT principles and enabl
 ers\n 	Roadmap to Implement IT Governance\n 	Difference between COBIT 4.1 
 and COBIT 5\n 	COBIT 4.1 and SOX\n\nSelected Case Studies and Lessons Lear
 ned\n\nTraining Info\n\nDuration  : 1 Day\nDate  :  Jul 13\, 2026\nTim
 e  : 9.30 am. – 16.30 pm.\nLanguage : Conducted in Thai Language\nConta
 ct   : 02 670 8980 – 3 ext.321-323\nEmail : training@acinfotec.com\nPr
 ice : 9\,000 Bhts (Exclusive of 7% VAT)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/08/it_governance1.png
CATEGORIES:Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:803@acinfotec.com
DTSTART:20260716T023000Z
DTEND:20260717T093000Z
DTSTAMP:20260107T092049Z
URL:https://www.acinfotec.com/training-event/risk-based-it-audit-8/
SUMMARY:Risk-Based IT Audit
DESCRIPTION:\n\nเนื้อหาหลักสูตร\n\nเรื
 ่องการตรวจสอบ Risk-based IT Audit นั้น 
 มีความสำคัญมากในปัจจุบัน 
 เนื่องจาก\n\n 	ระเบียบคณะกรร
 มการตรวจเงินแผ่นดิน ว่าด้
 วยการปฏิบัติหน้าที่ของผู
 ้ตรวจสอบภายใน พ.ศ.2555 ตามแนว
 ทางปฏิบัติที่ 6 ได้ระบุชัด
 เจนว่าหน่วยรับตรวจที่ใช้
 เทคโนโลยีสารสนเทศเป็นส่ว
 นสำคัญในการปฏิบัติงานหรื
 อบริหารงาน ควรจัดให้มีผู้
 ตรวจสอบภายในซึ่งมีความรู
 ้ ความสามารถอย่างเพียงพอท
 ี่จะตรวจสอบระบบเทคโนโลยี
 สารสนเทศ เพื่อให้สามารถปร
 ะเมินและให้คำแนะนำเกี่ยว
 กับการปรับปรุงกระบวนการบ
 ริหารความเสี่ยง การควบคุม
  และการกำกับดูแลได้อย่างเ
 หมาะสมและเกิดประโยชน์\n 	มา
 ตรฐานเกี่ยวกับการตรวจสอบ
 ภายในของกระทรวงพาณิชย์ มา
 ตราที่28 และ 29 ซึ่งต่อมา จะม
 ีการเปลี่ยนแปลงมาตราที่เ
 กี่ยวข้อง ระบุเนื้อหาเกี่
 ยวกับหน่วยงานที่มีคอมพิว
 เตอร์ตั้งแต่ 1 เครื่องขึ้น
 ไป จำเป็นจะต้องมีการตรวจส
 อบทางด้านคอมพิวเตอร์\n\nแนว
 ทางปฏิบัติส่วนใหญ่ของหลา
 ยองค์กร ยังไม่มีการตรวจสอ
 บทางด้าน IT Audit โดยเฉพาะอย่า
 งยิ่ง Risk-based IT Audit อย่างจริงจัง
  ซึ่งมีผลทำให้กระบวนการตร
 วจสอบ และการตรวจสอบทางด้า
 นทั่วไปมีปัญหาค่อนข้างมา
 ก และในยุคปัจจุบันได้มีกา
 รก้าวเข้าไปสู่ การตรวจสอบ
 แบบผสมผสานและบูรณาการ ระห
 ว่าง IT Audit และ Non – IT Audit ที่เรีย
 กว่า Integrated Audit\n\nพื้นฐานของผู้
 อบรม\n\n 	ผู้ที่มีความรู้พื้
 นฐานด้านการจัดการทั่วไป\n 	
 ผู้เข้ารับการอบรมไม่จำเป
 ็นต้องมีพื้นฐานทางด้าน\nInform
 ation Security และ IT Audit หรือ Non-IT มาก่อน\n
 \nวัตถุประสงค์\n\n 	เพื่อให้เก
 ิดความเข้าใจในองค์ประกอบ
 ที่เกี่ยวข้องกับการตรวจส
 อบสามารถนำไปประยุกต์ใช้ก
 ับงานตรวจสอบในภาคปฏิบัติ
 ได้\n 	เพื่อให้ผู้มีผลประโย
 ชน์ร่วมเห็นคุณค่าและประโ
 ยชน์จากการตรวจสอบ IT/IT Audit ที่
 มีผลกระทบต่องานตรวจสอบทา
 งด้าน Non-IT Audit และ การบรรลุเป้
 าประสงค์ขององค์กรอย่างสำ
 คัญ\n 	เพื่อสร้างคุณค่าเพิ่
 ม และความน่าเชื่อถือ และกา
 รรับรองอย่างสมเหตุสมผลว่
 า สารสนเทศที่ได้รับถูกต้อ
 ง มีการปฏิบัติตามกฎเกณฑ์ แ
 ละเป็นนโยบายที่สามารถสร้
 างความมั่นใจให้กับผู้มีผ
 ลประโยชน์ร่วมได้ว่า งบการ
 เงินและรายงานต่างๆ ที่เกี
 ่ยวข้องเชื่อถือได้ พิสูจน
 ์ได้\n 	ผู้ที่ตรวจสอบทั้งทา
 งด้าน IT และ Non – IT รวมทั้งผู้บ
 ริหารจะได้เข้าใจภาพการหล
 อมรวม การตรวจสอบและการบริ
 หารในลักษณะ Integrated Audit / Monitoring ที่
 มีประโยชน์ต่อองค์กรในภาพ
 โดยรวมที่ตรงกับความต้องก
 ารของผู้บริหาร และผู้มีผล
 ประโยชน์ร่วม ทั้งภายในและ
 ภายนอกองค์กร\n\nเนื้อหาการบ
 รรยาย\n\nวันที่ 1\n\n 	ความจำเป็
 น และเหตุผลที่ต้องมี Risk-based IT A
 udit และการกำกับในเรื่องนี้\n 
 	การปฏิบัติตามกฎเกณฑ์ มาตร
 ฐาน แนวทางของผู้กำกับของ ไ
 ทยและสากล เกี่ยวกับการบริ
 หารความเสี่ยง การควบคุม แล
 ะการตรวจสอบทางด้าน IT\n 	หลัก 
 การที่ยอมรับทั่วไปทางด้า
 นการบริหาร การจัดการความเ
 สี่ยงทั่วไป ทั้งด้าน IT Risk แล
 ะ IT-Related Risk ที่มีผลกระทบต่อธุร
 กิจมุมมองต่างๆ\n 	มาตรฐาน หล
 ักการประเมินความเสี่ยง IT Risk
  และ IT-Related Risk กับการควบคุมและ
 ตรวจสอบ รวมทั้งการบริหาร\n\n
 วันที่ 2\n\n 	การ วิเคราะห์ผลก
 ระทบจากช่องโหว่และจุดอ่อ
 นของการจัดการบริหารความเ
 สี่ยงด้าน IT ที่มีผลต่อกระบ
 วนการจัดการบริหารความเสี
 ่ยงด้าน IT ที่มีผลต่อกระบวน
 การจัดการในมุมมองต่างๆ ทั
 ้ง Business &amp\; Information\n 	แนว ทางการตร
 วจสอบ IT Audit &amp\; Integrated Audit เพื่อให้
 บรรลุความต้องการของผู้มี
 ผลประโยชน์ร่วม ทั้งภายในแ
 ละภายนอกองค์กร ตามแนวทางข
 อง GTAG ผสมผสานกับ CobiT และ COSO-ERM\n 	ก
 ารจัดการรายงาน การตรวจสอบ 
 เพื่อตอบสนองความต้องการข
 องผู้มีผลประโยชน์ร่วมที่
 ได้รับความสนใจ ตรงตามการค
 าดหวังตั้งแต่ระดับผู้บริ
 หารไปถึงระดับกรรมการ\n 	วิเ
 คราะห์ – พิจารณ์\n\nข้อมูลหล
 ักสูตร\n\nระยะเวลา        : 2 วัน
 \n\nวันที่                 : Jul 16 - 17\, 202
 6\n\nราคา               : 18\,900 THB (อัตร
 านี้ยังไม่รวม VAT 7%)\n\nเวลา     
            : 9:30 – 16:30 น.\n\nสถานที่   
         :  ACinfotec Training Center\n\nติดต่อ    
          : 02-670-8980 ต่อ 321-323\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/05/AAEAAQAAAAAAAAMMAAAAJDg3MWYxMzhiLWUxMjAtNDc4MS05OGEyLTcxZTYwNGJjZWY5O
 A.jpg
CATEGORIES:Risk Based IT Audit
END:VEVENT
BEGIN:VEVENT
UID:858@acinfotec.com
DTSTART:20260720T023000Z
DTEND:20260724T093000Z
DTSTAMP:20260107T092126Z
URL:https://www.acinfotec.com/training-event/computer-hacking-forensic-inv
 estigator-chfiv10exam-included-2/
SUMMARY:Computer Hacking Forensic Investigator (CHFIv11)(Exam Included)
DESCRIPTION:COMPUTER HACKING FORENSIC INVESTIGATOR V11\nBuild Ultimate Inve
 stigative Skills And Organizational Forensic Readiness With Advanced Strat
 egies\nAbout this course\nEC-Council's CHFI program enabled cybersecurity 
 professionals with the knowledge and skills to perform effective digital f
 orensics investigations and accomplish forensic readiness. Master the meth
 odological approach of forensics process\, evidence handling procedures\, 
 chain-of-custody\, acquisition\, preservation\, analysis\, and reporting o
 f digital evidence\, legal procedures to ensure it is admissible in court.
  Build skills beyond tradional hardware and memory forensics and with clou
 d forensics\, mobile and loT\, investigating web application attacks\, and
  malware forensics. CHFI equips you with skills to validate/triage inciden
 ts and guide the incident response teams.\n\nㆍ Build job ready skills on
  immersive 68 forensic labs\n\nㆍ Earn globally recognized and demanded b
 y employers\n\nㆍ Flexible learning options without quitting your current
  jobs\nCourse Benefits\n\n 	Master a methodological forensics framework ap
 proach for performing digital forensics investigation.\n 	Build skills for
  investigating diverse types of digital forensic investigations.\n 	70+ GB
  of craftd evidence files for investigating purposes:\n 	Gain in-depth kno
 wledge in volatie and non-volatile data acquisitin and examinatin of Mac o
 perating systems and also RAM forensics\, Tor forensics.\n 	Become profici
 ent in malware forensics process and malware analysis\, including the late
 st analysis: BlackCat (ALPHV)\n 	Learn social media forensics and wireless
  network forensics.\n 	Learn electron application and web browser forensic
 s.\n 	Gain in-depth skills in mobile forensics analysis.\n 	Learn how to p
 erform digital forensics investigating through Python scripting.\n 	Master
  a unique skill set with C|HFI - the first certifcation to offer dark web
  &amp\; IoT forensics.\n 	Become skilled in forensic methodologies for
  cloud infrastructure (AWS\, Azure and GCP).\n 	Learn techniques such as d
 efeating anti-forensic techniques\, Windows ShellBags\, etc.\n 	Learn the 
 latest digital forensics tools/platforms and frameworks.\n 	40% of trainin
 g time is dedicated to lab training that simulates real-life networks and 
 platforms.\n 	The C|HFI is designed by SMEs and digital forensics practiti
 oners worldwide aftr a rigorous JTA of the job roles involved in the field
  of digital. forensics\, increasing your employability\n\n\n\nWho should a
 ttend?\n\n\n\n\n\n\n\n\n\n 	Cybersecurity professionals Drive your cyberse
 curity career forward with CHFI.\n 	Teams and organizations Turbocharge yo
 u teams knowledge with certified.\n 	Government and military CHFI is trust
 ed and highly valued globally by government departments and defense bodies
 .\n 	Educators Create and grow your own cybersecurity courses and programs
 .\n\n\n\n\n\n\n\n\n\nCourse Content\n\n\n\n\n\n\n\n\n\n\n 	Computer Forens
 ics in Today’s World\n 	Computer Forensics Investigation Process\n 	Unde
 rstanding Hard Disks and File Systems\n 	Data Acquisition and Duplication\
 n 	Defeating Anti-Forensics Techniques\n 	Windows Forensic\n 	Linux and Ma
 c Forensics\n 	Network Forensics\n 	Malware Forensics\n 	Investigating Web
  Attacks\n 	Dark Web Forensics\n 	Cloud Forensics\n 	Email and Social Medi
 a Forensics\n 	Mobile Forensics\n 	IoT Forensics\n\nTraining Info\nDuratio
 n : 5 Days\nDate : Jul 20 - 24\, 2026\nTime : 9.30-16.30 pm.\nTraining F
 ee : 50\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext. 321-323\nEmail. tra
 ining@acinfotec.com\n\n\nwww.eccouncil.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/12/CHFI-certi.jpg
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:823@acinfotec.com
DTSTART:20260720T023000Z
DTEND:20260723T093000Z
DTSTAMP:20260107T092212Z
URL:https://www.acinfotec.com/training-event/comptia-cybersecurity-analyst
 -cysaexam-included/
SUMMARY:CompTIA Cybersecurity Analyst (CySA+)(Exam Included)
DESCRIPTION:About this course\nThe CSA+ certification acronym has changed t
 o CySA+. CompTIA and its partners will make the change by June 29th\, 2018
 . The exam code will remain the same.\n\nAs attackers have learned to evad
 e traditional signature-based solutions such as firewalls\, an analytics-b
 ased approach within the IT security industry is increasingly important fo
 r most organizations. The behavioral analytics skills covered by CySA+ ide
 ntify and combat malware\, and advanced persistent threats (APTs)\, result
 ing in enhanced threat visibility across a broad attack surface. CompTIA C
 ySA+ is for IT professionals looking to gain the following security analys
 t skills:\n\n 	Configure and use threat detection tools.\n 	Perform data a
 nalysis.\n 	Interpret the results to identify vulnerabilities\, threats an
 d risks to an organization.\n\n\n\nCourse Objectives\nAfter completing the
  CompTIA CySA+ course\, delegates will have the skills and knowledge to:\n
 \n 	Assess information security risk in computing and network environments
 \n 	Analyse the cybersecurity threat landscape\n 	Analyse reconnaissance t
 hreats to computing and network environments\n 	Analyse attacks on computi
 ng and network environments\n 	Analyse post-attack techniques on computing
  and network environments\n 	Implement a vulnerability management program\
 n 	Evaluate the organization's security through penetration testing\n 	Col
 lect cybersecurity intelligence\n 	Analyse data collected from security an
 d event logs\n 	Perform active analysis on assets and networks\n 	Respond 
 to cyber security incidents\n 	Investigate cyber security incidents\n 	Add
 ress security issues with the organization's technology architecture\n\n\n
 \nCourse Content\n\n\nLesson 1: Assessing Information Security Risk \n\n 	
 Topic A: Identify the Importance of Risk Management\n 	Topic B: Assess Ris
 k\n 	Topic C: Mitigate Risk\n 	Topic D: Integrate Documentation into Risk 
 Management\n\n\n\n\nLesson 2: Analysing the Threat Landscape \n\n 	Topic A
 : Classify Threats and Threat Profiles\n 	Topic B: Perform Ongoing Threat 
 Research\n\n\nLesson 3: Analysing Reconnaissance Threats to Computing and 
 Network Environments \n\n 	Topic A: Implement Threat Modeling\n 	Topic B: 
 Assess the Impact of Reconnaissance Incidents\n 	Topic C: Assess the Impac
 t of Social Engineering\n\nLesson 4: Analysing Attacks on Computing and Ne
 twork Environments \n\n 	Topic A: Assess the Impact of System Hacking Atta
 cks\n 	Topic B: Assess the Impact of Web-Based Attacks\n 	Topic C: Assess 
 the Impact of Malware\n 	Topic D: Assess the Impact of Hijacking and Imper
 sonation Attacks\n 	Topic E: Assess the Impact of DoS Incidents\n 	Topic F
 : Assess the Impact of Threats to Mobile Security\n 	Topic G: Assess the I
 mpact of Threats to Cloud Security\n\nLesson 5: Analysing Post-Attack Tech
 niques \n\n 	Topic A: Assess Command and Control Techniques\n 	Topic B: As
 sess Persistence Techniques\n 	Topic C: Assess Lateral Movement and Pivoti
 ng Techniques\n 	Topic D: Assess Data Exfiltration Techniques\n 	Topic E: 
 Assess Anti-Forensics Techniques\n\nLesson 6: Managing Vulnerabilities in 
 the Organization \n\n 	Topic A: Implement a Vulnerability Management Plan\
 n 	Topic B: Assess Common Vulnerabilities\n 	Topic C: Conduct Vulnerabilit
 y Scans\n\nLesson 7: Implementing Penetration Testing to Evaluate Security
  \n\n 	Topic A: Conduct Penetration Tests on Network Assets\n 	Topic B: Fo
 llow Up on Penetration Testing\n\nLesson 8: Collecting Cybersecurity Intel
 ligence \n\n 	Topic A: Deploy a Security Intelligence Collection and Analy
 sis Platform\n 	Topic B: Collect Data from Network-Based Intelligence Sour
 ces\n 	Topic C: Collect Data from Host-Based Intelligence Sources\n\nLesso
 n 9: Analysing Log Data \n\n 	Topic A: Use Common Tools to Analyse Logs\n 
 	Topic B: Use SIEM Tools for Analysis\n 	Topic C: Parse Log Files with Reg
 ular Expressions\n\nLesson 10: Performing Active Asset and Network Analysi
 s \n\n 	Topic A: Analyse Incidents with Windows-Based Tools\n 	Topic B: An
 alyse Incidents with Linux-Based Tools\n 	Topic C: Analyse Malware\n 	Topi
 c D: Analyse Indicators of Compromise\n\nLesson 11: Responding to Cybersec
 urity Incidents \n\n 	Topic A: Deploy an Incident Handling and Response Ar
 chitecture\n 	Topic B: Mitigate Incidents\n 	Topic C: Prepare for Forensic
  Investigation as a CSIRT\n\nLesson 12: Investigating Cybersecurity Incide
 nts \n\n 	Topic A: Apply a Forensic Investigation Plan\n 	Topic B: Securel
 y Collect and Analyse Electronic Evidence\n 	Topic C: Follow Up on the Res
 ults of an Investigation\n\nLesson 13: Addressing Security Architecture Is
 sues \n\n\n 	Topic A: Remediate Identity and Access Management Issues\n 	T
 opic B: Implement Security During the SDLC\n\n\nExam Description\nThe Comp
 TIA Cybersecurity Analyst (CySA+) certification verifies that successful c
 andidates have the knowledge and skills required to configure and use thre
 at detection tools\, perform data analysis and interpret the results to id
 entify vulnerabilities\, threats and risks to an organization\, with the e
 nd goal of securing and protecting applications and systems within an orga
 nization.\n\nNumber of Questions : Maximum of 85 questions (Multiple choic
 e and performance-based)\n\nLength of Test: 165 minutes\n\nPassing Score: 
 750 (on a scale of 100-900)\nTraining info\nDuration:  4 Days\nDate:  
 Jul 20-23\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Tra
 ining Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \,
  Rama 4 Rd.\nTraining Fees: 47\,000 Baht (ex.vat7%)\nTel. 02 670 8980-3 ex
 t.321-323\nE-mail.training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:774@acinfotec.com
DTSTART:20260720T023000Z
DTEND:20260724T093000Z
DTSTAMP:20260107T092156Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-27701-
 lead-implementer-exam-included/
SUMMARY:PECB Certified ISO/IEC 27701 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nThis training course is designed to prepare 
 its participants implement a Privacy Information Management System (PIMS) 
 in compliance with the requirements and guidance of the ISO/IEC 27701. Mor
 eover\, you will gain a comprehensive understanding of the best practices 
 of privacy information management and learn how to manage and process data
  while complying with various data privacy regimes. After mastering the im
 plementation and management of a Privacy Information Management System (PI
 MS)\, you can sit for the exam and apply for a “PECB Certified ISO/IEC 2
 7701 Lead Implementer” credential. The internationally recognized PECB L
 ead Implementer Certificate proves that you have the practical knowledge a
 nd professional capabilities to implement the ISO/IEC 27701  requirements
  in an organization.\n\n\n\nWho should attend?\n\n 	Managers and consultan
 ts involved in privacy and data management\n 	Expert advisors seeking to m
 aster the implementation of a Privacy Information Management System\n 	Ind
 ividuals responsible and accountable for Personally Identifiable Informati
 on (PII) within organizations\n 	Individuals responsible for maintaining c
 onformance with data privacy regimes requirements\n 	PIMS team members\n\n
 \n\n\nCourse Contents\n\n 	Introduction to ISO/IEC 27701 and initiation of
  a PIMS\n- Training course objectives and structure\n- Standards and regul
 atory frameworks\n- Privacy Information Management System (PIMS)\n- Fundam
 ental concepts and principles of information security and privacy\n- Initi
 ation of the PIMS implementation\n- Analysis of the ISMS scope and Stateme
 nt of Applicability\n- PIMS scope\n- Management approval\n- Privacy policy
 \n- Privacy risk assessment\n 	Planning the implementation of a PIMS\n- Pr
 ivacy impact assessment\n- PIMS Statement of Applicability\n- Documentatio
 n management\n- Selection of controls\n- Implementation of controls\n 	Imp
 lementing a PIMS\n- Implementation of controls (cont’d)\n- Implementatio
 n of controls specific for PII controllers\n- Implementation of controls s
 pecific for PII processors\n 	PIMS monitoring\, continual improvement and 
 preparation for the certification audit\n- Awareness\, training\, and comm
 unication\n- Monitoring\, measurement\, analysis\, evaluation and manageme
 nt review\n- Internal audit\n- Treatment of nonconformities\n- Continual i
 mprovement\n- Preparing for the certification audit\n- Certification proce
 ss and closing of the training course\n 	Certification Exam\n\nTraining In
 fo\n\nDuration:  5 Days\nDate:  Jul 20 - 24\, 2026\nTime:  9.30 am. 
 – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Cent
 re Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 
 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec
 .com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:528@acinfotec.com
DTSTART:20260720T023000Z
DTEND:20260724T093000Z
DTSTAMP:20260107T092146Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-27001-lead
 -auditor-thai-exam-included-5/
SUMMARY:PECB Certified ISO 27001 Lead Auditor (Exam Included)
DESCRIPTION:About this course\nISO/IEC 27001 Lead Auditor training enables 
 you to develop the necessary expertise to perform an Information Security 
 Management System (ISMS) audit by applying widely recognized audit princip
 les\, procedures and techniques. During this training course\, you will ac
 quire the necessary knowledge and skills to plan and carry out internal an
 d external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certifi
 cation process.\n\nBased on practical exercises\, you will be able to mast
 er audit techniques and become competent to manage an audit program\, audi
 t team\, communication with customers\, and conflict resolution.\n\nAfter 
 acquiring the necessary expertise to perform this audit\, you can sit for 
 the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” c
 redential. By holding a PECB Lead Auditor Certificate\, you will demonstra
 te that you have the capabilities and competencies to audit organizations 
 based on best practices.\nWho Should Attend\n\n 	Auditors seeking to perfo
 rm and lead Information Security Management System (ISMS) certification au
 dits\n 	Managers or consultants seeking to master an Information Security 
 Management System audit process\n 	Individuals responsible for maintaining
  conformance with Information Security Management System requirements\n 	T
 echnical experts seeking to prepare for an Information Security Management
  System audit\n 	Expert advisors in Information Security Management\n\nCou
 rse Contents\nDay 1: Introduction to the information security management s
 ystem (ISMS) and ISO/IEC 27001\n\n 	Training course objectives and structu
 re\n 	Standards and regulatory frameworks\n 	Certification process\n 	Fund
 amental concepts and principles of information security\n 	Information sec
 urity management system (ISMS)\n\nDay 2: Audit principles\, preparation\, 
 and initiation of an audit\n\n 	Fundamental audit concepts and principles\
 n 	The impact of trends and technology in auditing\n 	Evidence-based audit
 ing\n 	Risk-based auditing\n 	Initiation of the audit process\n 	Stage 1 a
 udit\n\nDay 3: On-site audit activities\n\n 	Preparing for stage 2 audit\n
  	Stage 2 audit\n 	Communication during the audit\n 	Audit procedures\n 	C
 reating audit test plans\n\nDay 4: Closing the audit\n\n 	Drafting audit f
 indings and nonconformity reports\n 	Audit documentation and quality revie
 w\n 	Closing of the audit\n 	Evaluation of action plans by the auditor\n 	
 Beyond the initial audit\n 	Managing an internal audit program\n 	Closing 
 of the training course\n\nDay 5: Certification Exam\nTraining Info\nDurati
 on:  5 Days\nDate:  May 20 - 24\, 2026\nTime:  9.30 am. – 16.30 pm.
 \nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lump
 hini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 Baht (ex.vat7
 %)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nw
 ww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:566@acinfotec.com
DTSTART:20260720T023000Z
DTEND:20260724T093000Z
DTSTAMP:20260107T092138Z
URL:https://www.acinfotec.com/training-event/irca-iso-270012013-isms-lead-
 auditor-5/
SUMMARY:IRCA ISO 27001:2013 ISMS Lead Auditor
DESCRIPTION:About this course\nISO/IEC 27001:2013 – Information security 
 management system lead auditor teaches students the fundamentals of auditi
 ng information security management systems to ISO/IEC 27001. This five day
  intensive course trains students on how to conduct audits for certificati
 on bodies and facilitate the ISO/IEC 27001 registration process.\n\nThe au
 diting exercises and lectures are based on ISO 19011:2011\, “Guidelines 
 for Quality and/or Environmental Management Systems Auditing.” The cours
 e is designed specifically for those people who wish to conduct external a
 ssessments or internal audits to ISO/IEC 27001\, although students will al
 so gain the knowledge and understanding necessary to give practical help a
 nd information to other individuals and organizations working toward confo
 rmance to the standard.\nPrerequisites\n\n 	A prior knowledge of the requi
 rements of ISO 27001 would be beneficial.\n\nLearning Objective\n\n 	Revie
 w the requirements of ISO/IEC 27001\n 	Understand the relationship between
  ISO/IEC 27001 and ISO/IEC 27002\n 	Learn how to assess security threats a
 nd vulnerabilities\n 	Understand security controls and countermeasures\n 	
 Understand the roles and responsibilities of the auditor\n 	Learn how to\,
  plan\, execute\, report\, and follow-up on an information security manage
 ment system audit\n\nCourse Contents\nDay 1 :\n\no  Course Introduction\n
 \n– Housekeeping\n\n– Course and learner objectives\n\n– Course stru
 cture and methods\n\n– Delegate assessment\n\no  What is an Information
  Security Management System?\n\n– Information security\n\n– Management
  systems\n\n– Purpose and benefits of ISO 27001\n\n– Related standards
 \n\no  Process Approach\n\n– PDCA model\n\n– Process model\n\no  Ove
 rview of ISO 27001 contents\n\no  ISO 27001 Mandatory clauses 4 – 8\n\n
 Day 2 :\n\no  Course Recap day 1. Questions and Answers\n\no  Controls\n
 \no  Overview of the audit process\n\no  Auditing the SOA\n\no  Audit a
 nd Auditors\n\n– Definitions\n\n– 1st\, 2nd and 3rd party audits\n\n
 – Roles and responsibilities of auditors and lead auditors\n\n– Skills
  and characteristics of effective auditors\n\no  Audit Planning\n\n– In
 formation needed to plan the audit\, and things to consider\n\n– Prelimi
 nary visits\n\n– Preparation of an audit plan\n\no  Audit communication
 s and meetings\n\n– Good practice for communication during the audit\n\n
 – Formal meetings\n\n– Opening meeting – what to cover and how\n\no
   Checklists\n\n– Benefits and drawbacks\n\n– Content – what to inc
 lude\n\n– Developing a checklist for a specific audit\n\nDay 3 :\n\no  
 Process Audits\n\no  Case studies\n\no  Conducting the audit\n\n– inte
 rviewing\n\n– sampling\n\n– note taking\n\n– interacting with the au
 ditee\n\n– who’s involved and general points\n\no  Nonconformities\n\
 n– definition of nonconformity\n\n– linking to requirements of ISO 270
 01\n\n– grading nonconformity reports\n\n– structure and content of no
 nconformity reports\n\nDay 4 :\n\no  Case studies\n\n– including interv
 iewing.\n\n– developing and following audit trails\n\n– identifying no
 n conformities\n\no  Specimen Examination\n\n– Review of answers\n\n–
  Layout and marking scheme of the papers\n\no  Closing Meeting\n\n– Out
 comes\n\n– Content\n\n– Identifying possible issues and how to prevent
  or deal with these\n\no  Corrective Actions\n\n– Corrective action pro
 cess\n\n– Evaluating corrective actions\n\no  Reporting the audit\n\n
 – Purpose and content of the written audit report\n\no  Next steps\n\n
 – action planning\n\n– further development\n\n– auditor registration
 \n\nDay 5 :\n\no  Course Evaluations\n\no  Examination Rules\n\no  Writ
 ten Examination\n\no  End of the Course\nTraining Info\nDuration:  5 Da
 ys\nDate:  Jul 20-24\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  A
 Cinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, 
 (Worklab) \, Rama 4 Rd.\nTraining Fees: 38\,000 Baht (ex.vat7%)\nTel. 02 6
 70 8980-3 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/irca_logo-e1441254509693.jpg
CATEGORIES:IRCA (Official IRCA course)
END:VEVENT
BEGIN:VEVENT
UID:847@acinfotec.com
DTSTART:20260722T023000Z
DTEND:20260724T093000Z
DTSTAMP:20260107T092220Z
URL:https://www.acinfotec.com/training-event/cdpse-certified-data-privacy-
 solutions-engineer-exam-prep-new-3/
SUMMARY:CDPSE – Certified Data Privacy Solutions Engineer (Exam Prep) New
 **
DESCRIPTION:CDPSE – Certified Data Privacy Solutions Engineer (Exam Prep)
 \nAbout this course\nCertified Data Privacy Solutions Engineer™ (CDPSE
 ®) is focused on validating the technical skills and knowledge it takes t
 o assess\, build and implement comprehensive data privacy measures. CDPSE 
 holders help fill the technical privacy skills gap so that your organizati
 on has competent privacy technologists to build and implement solutions th
 at mitigate risk and enhance efficiency.\nWho should attend?\nIT professio
 nals experienced in the governance\, architecture\, and lifecycle of data 
 privacy at a technical level.\n Course Content\nDomain 1. Privacy Governa
 nce\n\nIdentify issues requiring remediation and opportunities for process
  improvement.\n\n 	Identify the internal and external privacy requirements
  specific to the organization's governance and risk management programs an
 d practices.\n 	Participate in the evaluation of privacy policies\, progra
 ms and policies for their alignment with legal requirements\, regulatory r
 equirements and/or industry best practices.\n 	Coordinate and/or perform p
 rivacy impact assessments (PIA) and other privacy-focused assessments.\n\n
 Domain 2. Privacy Architecture\n\nCollaborate with other practitioners to 
 ensure that privacy programs and practices are followed during the design\
 , development and implementation of systems\, applications and infrastruct
 ure.\n\n 	Coordinate and/or perform privacy impact assessment (PIA) and ot
 her privacy-focused assessments to identify appropriate tracking technolog
 ies and technical privacy controls.\n 	Participate in the development of p
 rivacy control procedures that align with privacy policies and business ne
 eds.\n 	Implement procedures related to privacy architecture that align wi
 th privacy policies.\n\nDomain 3. Data Lifecycle\nParticipate in the devel
 opment of data lifecycle procedures that align with privacy policies and b
 usiness needs.\n\n 	Identify the internal and external privacy requirement
 s relating to the organization's data lifecycle practices.\n 	Coordinate a
 nd/or perform privacy impact assessments (PIA) and other privacy-focused a
 ssessments relating to the organization’s data lifecycle practices.\n 	P
 articipate in the development of data lifecycle procedures that align with
  privacy policies and business needs.\n\nCDPSE Examination Weights\n\n\n\n
 Domains\nAverage Weight\n\n\n1. Privacy Governance\n34%\n\n\n2. Privacy Ar
 chitecture\n36%\n\n\n3. Data Lifecycle\n30%\n\n\nTotal\n100%\n\n\n\nTraini
 ng Info\nLanguage: Conducted in Thai Language\nDuration: 3 Days\nDate: 
 Jul 22 - 24\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, Grande C
 entre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nPrice: 34\,000.- (ex
 .vat)\nTel : 02 670 8980-3 ext. 321-323\nE-mail: training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/07/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-2.png
END:VEVENT
BEGIN:VEVENT
UID:750@acinfotec.com
DTSTART:20260723T023000Z
DTEND:20260724T093000Z
DTSTAMP:20260107T092231Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-270012
 022-transition-exam-included/
SUMMARY:PECB Certified ISO/IEC 27001:2022 Transition (Exam Included)
DESCRIPTION:About this course\n\nThe ISO/IEC 27001 Transition training cour
 se enables participants to thoroughly understand the differences between I
 SO/IEC 27001:2013 and ISO/IEC 27001:2022. In addition\, participants will 
 acquire knowledge on the new concepts presented by ISO/IEC 27001:2022.\n\n
 The new version of ISO/IEC 27001 has been recently published and is now al
 igned with the new version of ISO/IEC 27002\, which was published in Febru
 ary\, 2022. The major changes between ISO/IEC 27001:2022 and ISO/IEC 27001
 :2013 are noticed in the information security controls of Annex A\, wherea
 s a few other minor changes are present in the clauses of the standard too
 . Furthermore\, the title of ISO/IEC 27001:2022 differs from the title of 
 ISO/IEC 27001:2013\, as now the standard is titled Information security\,
  cybersecurity and privacy protection — Information security management 
 systems — Requirements.\n\nThe “PECB ISO/IEC 27001 Transition” train
 ing course provides detailed information on the revised clauses\, the new 
 terminology\, and the differences in the controls of Annex A. Additionally
 \, this training course provides participants with the necessary knowledge
  to support organizations in planning and implementing the changes in thei
 r ISMS to ensure conformity with ISO/IEC 27001:2022. As such\, you will be
  able to participate in projects to transition from an ISMS based on ISO/I
 EC 27001:2013 to an ISMS based on ISO/IEC 27001:2022.\nWho should attend?\
 n\n 	This training course is intended for:\n\n 	Individuals seeking to rem
 ain up-to-date with ISO/IEC 27001 requirements for an ISMS\n 	Individuals 
 seeking to understand the differences between ISO/IEC 27001:2013 and ISO/I
 EC 27001:2022 requirements\n 	Individuals responsible for transitioning an
  ISMS from ISO/IEC 27001:2013 to ISO/IEC 27001:2022\n 	Managers\, trainers
 \, and consultants involved in maintaining an ISMS\n 	Professionals wishin
 g to update their ISO/IEC 27001 certificates\n\n\n\nLearning objectives\nU
 pon successfully completing the training course\, participants will be abl
 e to:\n\n 	Explain the differences between ISO/IEC 27001:2013 and ISO/IEC 
 27001:2022\n 	Interpret the new concepts and requirements of ISO/IEC 27001
 :2022\n 	Plan and implement the necessary changes to an existing ISMS in a
 ccordance with ISO/IEC 27001:2022\n\nCourse agenda\n\n 	Day 1: Introducti
 on to ISO/IEC 27001:2022 and comparison to ISO/IEC 27001:2013\n 	Day 2: C
 omparison between Annex A controls of ISO/IEC 27001:2013 and ISO/IEC 27001
 :2022\n\nEducational approach\n\n 	This training course is based on theory
 \, and best practices used in the process of transitioning an ISMS from IS
 O/IEC 27001:2013 to ISO/IEC 27001:2022\n 	Lecture sessions are illustrated
  with quizzes\n 	Quizzes have a similar structure to the certification exa
 m\n\n Training info\nDuration:  2 Days\nDate:  Jul 23-24\, 2026\nTime:
   9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\
 , Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining F
 ees: 27\,000 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.train
 ing@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,Information Security (ISO 27001/ISMS),PECB (Official
 PECB course)
END:VEVENT
BEGIN:VEVENT
UID:757@acinfotec.com
DTSTART:20260723T023000Z
DTEND:20260724T093000Z
DTSTAMP:20260107T092243Z
URL:https://www.acinfotec.com/training-event/practical-implementation-appr
 oach-to-business-continuity-management-iso-22301-8/
SUMMARY:Practical Implementation Approach to Business Continuity Management
  – ISO 22301
DESCRIPTION:About this course \nIn this two days practical course\, you wi
 ll learn about principle and fundamental knowledge of international method
 ology for implementation of Business Continuity Management (BCM). The cour
 se also includes hands-on workshop on risk assessment and business impact 
 analysis to enhance your knowledge. All delegates will also receive a chec
 klist to help you create a better Business Continuity Plan for your organi
 zation.\n\n&nbsp\;\nWho Should attend?\n\n 	COO\, CIO\, or senior manageme
 nt\n 	BCM Manager\, Coordinators\, Recovery Team Leaders and members\n 	In
 formation security professionals\n 	Risk and compliance manager\n 	Anyone 
 who responsible for establishing BCM or developing BCP for their organizat
 ions\n\nCourse Benefits\n\n 	Gain understanding of international standard 
 methodology for BCM implementation\n 	Learn practical approach of BCM impl
 ementation\n 	Use common consistent framework\, based on international bes
 t practice\, to manage business continuity\n 	Enhance skills required to d
 evelop\, implement and maintain BCP\n 	Obtain necessary knowledge and gain
  confident working with BCM practitioners and making related decisions\n\n
 Course Contents\n\n 	Business Continuity Management Overview\n 	Important 
 Definitions\n 	Business Continuity Management Life Cycle\n 	Business Conti
 nuity Management Organization and Emergency Response Structure\n 	Crisis M
 anagement Plan\, Emergency Response Plan\, Business Resumption Plans and D
 isaster Recovery Plans\n 	Risk Analysis &amp\; Risk Assessment (RA)\n 	Bus
 iness Impact Analysis (BIA)\n 	Developing Business Continuity Strategy\n 	
 Developing the Business Continuity Plan (BCP)\n 	Exercising the Plan\n 	Pr
 actice and Group Workshop\n 	Q &amp\; A\n\nTraining Info\nDuration:  2 D
 ays\nDate:  Jul 23 - 24\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue: 
  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.
 \, (Worklab) \, Rama 4 Rd.\nTraining Fees: 18\,900 Baht (ex.vat7%)\nTel. 0
 2 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/BCMS1.jpg
CATEGORIES:Business Continuity (ISO 22301/BCM)
END:VEVENT
BEGIN:VEVENT
UID:908@acinfotec.com
DTSTART:20260729T023000Z
DTEND:20260731T093000Z
DTSTAMP:20260107T092255Z
URL:https://www.acinfotec.com/training-event/ccsk-plus-lectures-lab-exam-4
 /
SUMMARY:CCSK PLUS (Lectures + Lab + Exam)
DESCRIPTION:About this course\nThe CCSK Plus builds on the foundation clas
 s with expanded material and offers extensive hands-on activities that re
 inforce classroom instruction. Students engage in a scenario of bringing a
  fictional organization securely into the cloud\, which gives them the opp
 ortunity to apply their knowledge by performing a series of activities tha
 t would be required in a real-world environment. Students will come away r
 eady to earn their Certificate of Cloud Security Knowledge (CCSK).\n\nCou
 rse Benefits\n\n 	Get hands-on experience securing an organization in the 
 cloud.\n 	Prepare to earn the widely recognized standard of expertise for 
 cloud security\, the Certificate of Cloud Security Knowledge (CCSK).\n 	Le
 arn and practice applying the knowledge from all 14 domains of the CSA Sec
 urity Guidance v4.\n\n Who should attend?\n\n 	\n\n 	IT Professionals\n 	
 Developers\n 	IT Operations\n 	Audit/Compliance Managers\n\nThe CCSK is de
 signed for any IT professional working in cloud computing. It is an essent
 ial credential for all security professionals to show proof of skills to c
 urrent and future employers. Because the CCSK is designed to deliver a wel
 l rounded view of cloud security\, professionals with less experience or n
 on-security backgrounds also find significant value in the training and ce
 rtificate\, particularly developers\, IT operations\, and audit/compliance
  professionals.\n\nCourse Contents\n\n 	Domain 1: Cloud Computing Concepts
  and Architecture\n 	Domain 2: Cloud Governance\n 	Domain 3: Risk\, Audit 
 &amp\; Compliance\n 	Domain 4: Organization Management\n 	Domain 5: Identi
 ty and Access Management\n 	Domain 6: Security Monitoring\n 	Domain 7: Inf
 rastructure and Networking\n 	Domain 8: Cloud Workload Security\n 	Domain 
 9: Data Security\n 	Domain 10: Application Security\n 	Domain 11: Insident
  Response &amp\; Resilience\n 	Domain 12: Related Technologies\n\n\n\nWhat
 ’s New in CCSK v5\n\n 	Latest in cloud architecture\, cloud native secur
 ity\, workload\, virtual networking\, data protection\, DevSecOps\, Zero T
 rust\, Generative AI and more.\n 	Vital information about managing risks\,
  achieving compliance\, and understanding the shared responsibility betwee
 n cloud provide and cloud user\n 	Organization management content\, includ
 ing governance\n 	Permanent access to CCSK Orb\, CSA’s revolutionary CCS
 K chatbot designed to help you master the body of knowledge\n\n\n\n\nCCSK 
 Plus Course - Additional Lab Content\n\n\n\n\nCore Account Security\nLearn
  what to configure in the first 5 minutes of opening a new cloud account a
 nd enable security controls such as MFA\, basic monitoring\, and IAM.\n\n\
 n\n\n\n\n\nIAM and Monitoring In-Depth\nExpand on your work in the first l
 ab and implement more-complex identity management and monitoring. This inc
 ludes expanding IAM with Attribute Based Access Controls\, implementing se
 curity alerting\, and understanding how to structure enterprise-scale IAM 
 and monitoring.\n\n\n\n\n\n\n\nNetwork and Instance Security\nCreate a vir
 tual network (VPC) and implement a baseline security configuration. You wi
 ll also learn how to securely select and launch a virtual machine (instanc
 e)\, run a vulnerability assessment in the cloud\, and connect to the inst
 ance.\n\n\n\n\n\n\n\n\n\nEncryption and Storage Security\nExpand your depl
 oyment by adding a storage volume encrypted with a customer managed key. Y
 ou will also learn how to secure snapshots and other data.\n\n\n\n\n\n\n\n
 Application Security and Federation\nFinish the technical labs by complete
 ly building out a 2-tier application and implementing federated identity u
 sing OpenID.\n\n\n\n\n\n\n\nRisk and Provider Assessment\nPractice using t
 he CSA Cloud Controls Matrix and STAR registry to evaluate risk and select
  a cloud provider.\n\n\n\n\n\n\n\n\n\nTraining Info\nDuration : 3 Days\nDa
 te : Jul 29 - 31\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Traini
 ng Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ra
 ma 4 Rd.\nTraining Fee : 69\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext.
 321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/CCSK_logo.png
CATEGORIES:Cloud Computing,Cloud security,Cloud Security
END:VEVENT
BEGIN:VEVENT
UID:896@acinfotec.com
DTSTART:20260730T023000Z
DTEND:20260731T093000Z
DTSTAMP:20260107T092325Z
URL:https://www.acinfotec.com/training-event/digital-governance-for-se-am-
 iso-38500-cobit-2019-new-2/
SUMMARY:Digital Governance for SE-AM : ISO 38500 & COBIT 2019 (New!!)
DESCRIPTION:Digital Governance for SE-AM: ISO 38500 &amp\; COBIT 2019\nเ
 กี่ยวกับหลักสูตร\nการกำกับ
 ดูแลที่ดี เป็นหลักเกณฑ์ใน
 การขับเคลื่อนให้ฝ่ายจัดก
 ารสามารถปฏิบัติงานให้บรร
 ลุผลสำเร็จตามกรอบนโยบายภ
 ารกิจหน้าที่ ยุทธศาสตร์ หร
 ือแผนงาน กำหนดโดยการดําเน
 ินงานดังกล่าวต้องสามารถส
 ะท้อนได้ทั้งมิติกระบวนกา
 รทำงานที่มีประสิทธิภาพ มี
 คุณภาพ และได้มาตรฐาน รวมถึ
 งต้องสอดคล้องตามแนวทาง แล
 ะประยุกต์ใช้กับ SE-AM ด้วย ร่ว
 มกับมิติด้านผลลัพธ์ที่เป
 ็นเลิศที่สามารถสร้างการเ
 ติบโตอย่างยั่งยืนให้แก่ร
 ัฐวิสาหกิจ ควบคู่กับการสร
 ้างผลกระทบเชิงบวกต่อสังค
 ม และสิ่งแวดล้อมได้อย่างส
 มดุล ซึ่งการจะดำเนินการให
 ้เกิดความครบถ้วนตามหลักก
 ารข้างต้น มีความจําเป็นที
 ่องค์กรต้องสามารถประยุกต
 ์ใช้หลักการบริหารจัดการน
 วัตกรรม (Innovation Management) ร่วมกับหล
 ักมาตรฐานการพัฒนาความยั่
 งยืนในระดับองค์กร (Organizational Sustai
 nable Development) ได้อย่างมีประสิทธิ
 ผลในเชิงยุทธศาสตร์ ดังนั้
 น การกำกับดูแลด้านดิจิทัล 
 หรือธรรมภิบาลด้านดิจิทัล (
 Digital Governance) จะช่วยให้การดำเนิน
 งานบนระบบดิจิทัลของหลาย ๆ 
 องค์กรในปัจจุบัน มีความโป
 ร่งใส เป็นระบบ สามารถตรวจส
 อบย้อนหลัง รวมถึงสามารถสร
 ้างความน่าเชื่อถือของระบ
 บดิจิทัลขององค์กร สอดรับก
 ับกฎหมาย ระเบียบ ข้อบังคับ
  มาตรฐานระดับสากล แนวปฏิบั
 ติที่ดีที่เกี่ยวข้อง\nวัตถ
 ุประสงค์\n\n 	เพื่อให้ผู้เข้
 าอบรมได้เข้าใจถึงความสำค
 ัญ และวัตถุประสงค์ของการก
 ำกับดูแลด้านดิจิทัลที่เพ
 ียงพอและสอดรับกับกฎหมาย ร
 ะเบียบ ข้อบังคับ มาตรฐานระ
 ดับสากล แนวปฏิบัติที่ดีที
 ่เกี่ยวข้อง\n 	เพื่อให้ผู้เ
 ข้าอบรมได้เรียนรู้แนวทาง
 การนำ State Enterprise Assessment Model (SE-AM)\, ISO 38500 แ
 ละ COBIT 2019 ตลอดจนกฎหมาย ระเบีย
 บ ข้อบังคับ มาตรฐานระดับสา
 กล แนวปฏิบัติที่ดีที่เกี่
 ยวข้องมาประยุกต์ใช้ในองค
 ์กรอย่างมีประสิทธิภาพ\n 	เพ
 ื่อให้ผู้เข้าอบรมมีแนวทา
 งการดําเนินงานด้านพัฒนาค
 วามยั่งยืนที่ชัดเจน รวมถึ
 งมีองค์ประกอบ และสาระสำคั
 ญ/กรอบการดําเนินงานตามมาต
 รฐาน/แนวปฏิบัติที่ดีที่เก
 ี่ยวกับการกำกับดูแลด้านด
 ิจิทัลที่เป็นที่ยอมรับโด
 ยทั่วไx\n\nหลักสูตรนี้เหมาะก
 ับใคร\n\n 	ผู้บริหารระดับสูง (
 Executives\, Board of Directors)\n 	ผู้บริหารสาย
 งาน IT / Digital Transformation\n 	Enterprise Architect / IT Governa
 nce / Risk &amp\; Compliance Officer\n 	ที่ปรึกษา (Consu
 ltants) และผู้วางกลยุทธ์ด้านดิ
 จิทัล\n\nรายละเอียดหลักสูตร\
 n\n 	State Enterprise Assessment Model (SE-AM)\n\n 	Corporate Governance &
 amp\; Leadership\n 	Strategic Planning\n 	Risk Management &amp\; Internal 
 Control\n 	Stakeholder and Customer Management\n 	Digital Technology\n 	Hu
 man Capital Management\n 	Knowledge Management &amp\; Innovation Managemen
 t\n 	Internal Audit\n\n\n 	SE-AM: Digital Governance and Roadmap\n 	ISO 38
 500 and other related standards\n 	ISO 38500 SE-AM\n 	6 principles\n 	Esta
 blish responsibilities\n 	Plan to best support the organization\n 	Make ac
 quisitions for valid reasons\n 	Ensure necessary levels of performance\n 	
 Ensure conformance with rules\n 	Ensure respect for human factors\n 	Enter
 prise Architecture (EA)\n 	Model for Corporate Governance of ICT\n 	COBIT 
 2019 Principles\n 	COBIT 2019: 40 Governance Objectives\n 	Workshop เร
 ื่อง COBIT 2019 Implementation\n 	Applying Specific COBIT 2019 for
  ISO 38500\n 	Applying Specific COBIT 2019 for SE-AM\n\nTraining info:\nDu
 ration:  2 Days\nDate: Jul 30-31\, 2026\nTime:  9.30 am. – 16.30 pm.\
 nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumph
 ini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 21\,900 Baht (ex.vat7%
 )\nFor Onsite training: Please Call\nTel. 02 670 8980-3 ext.321-323\nE-mai
 l.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/05/Yellow-and-Black-Modern-Medical-LinkedIn-Article-Cover-Image.png
CATEGORIES:Data Governance,Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:911@acinfotec.com
DTSTART:20260730T023000Z
DTEND:20260731T093000Z
DTSTAMP:20260107T092311Z
URL:https://www.acinfotec.com/training-event/certificate-of-cloud-security
 -knowledge-ccsk-lectures-exam-included-2/
SUMMARY:Certificate of Cloud Security Knowledge (CCSK) - Lectures (Exam Inc
 luded)
DESCRIPTION:About this course\nThe CCSK Foundation course starts with the f
 undamentals\, then increases in complexity as it works through all 16 doma
 ins of the CSA Security Guidance\, recommendations from the European Union
  Agency for Network &amp\; Information Security (ENISA)\, and an overview 
 of the Cloud Controls Matrix.\nCourse Benefits\n\n 	Prove your competency
  in key cloud security issues through an organization that specializes in 
 cloud research.\n 	Increase employment opportunities by filling the skill
 s-gap for cloud-certified professionals.\n 	Demonstrate your technical kn
 owledge\, skills\, and abilities to effectively use controls tailored to t
 he cloud.\n 	Learn to establish a baseline of security best practices whe
 n dealing with a broad array of responsibilities\, from cloud governance t
 o configuring technical security controls.\n 	Complement other credential
 s such as the CISA\, CISSP and CCSP.\n\n Who should attend?\n\n 	Informat
 ion Security\n 	Senior Consultant Manager\n 	Security Architecture\n 	Solu
 tion Architecture\n 	SR Cloud\n 	Security Analyst\n 	Specialist\n 	Lead Co
 mpliances\n 	Director\n\nCourse Contents\n\n 	Domain 1 : Cloud Computing C
 oncepts and Architecture\n 	Domain 2 : Governance and Enterprise Risk Mana
 gement\n 	Domain 3 : Legal Issues\, Contracts\, and Electronic Discovery\n
  	Domain 4 : Compliance and Audit Management\n 	Domain 5 : Information Gov
 ernance\n 	Domain 6 : Management Plane and Business Continuity\n 	Domain 7
  : Infrastructure Security\n 	Domain 8 : Virtualization and Containers\n 	
 Domain 9 : Incident Response\n 	Domain 10 : Application Security\n 	Domain
  11 : Data Security and Encryption\n 	Domain 12 : Identity\, Entitlement a
 nd Access Management\n 	Domain 13 : Security as a Service\n 	Domain 14 : R
 elated Technologies\n 	Extra Domain : Cloud Controls Matrix\n 	Extra Domai
 n : ENISA Recommendations\n\nTraining Info\nDuration : 2 Days\nDate : Jul
  30 - 31\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Training Cente
 r\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.
 \nTraining Fee : 45\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext.321-323\
 nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/CCSK_logo.png
CATEGORIES:Cloud Computing,Cloud Security,Cloud security
END:VEVENT
BEGIN:VEVENT
UID:940@acinfotec.com
DTSTART;VALUE=DATE:20260803
DTEND;VALUE=DATE:20260808
DTSTAMP:20260107T092334Z
URL:https://www.acinfotec.com/training-event/pecb-certified-artificial-int
 elligence-professional-caip-new/
SUMMARY:PECB Certified Artificial Intelligence Professional (CAIP) - NEW!
DESCRIPTION:PECB Certifed Artifcial Intelligence Professional (CAIP) - New!
 \nGain expertise in designing\, implementing\, and managing AI systems\nAb
 out this course\nIn today’s AI-driven world\, the demand for skilled pro
 fessionals who can effectively implement and manage artifcial intelligence
  systems is higher than ever. The Certifed Artifcial Intelligence Professi
 onal course is your gateway to mastering the essential skills and knowledg
 e needed to succeed in this fast changing feld. This program goes beyond t
 heoretical learning by equipping you with practical tools and real-world i
 nsights to design\, deploy\, and manage AI solutions effectively.\n\nBy at
 tending this course\, you will gain hands-on experience with advanced AI m
 ethodologies\, including machine learning\, deep learning and natural lang
 uage processing. You will also explore a range of cutting-edge areas\, whi
 le developing strategies for risk management and maintaining ethical stand
 ards. This unique combination of technical\, strategic\, and ethical exper
 tise will make you a valuable asset to any organization pursuing AI initia
 tives.\n\nAttaining the Certifed Artifcial Intelligence Professional crede
 ntial demonstrates your commitment to staying at the forefront of AI advan
 cements. It validates your ability to integrate AI into business strategie
 s\, solve complex problems\, and manage AI projects responsibly. This cert
 ifcation not only enhances your credibility but also opens doors to exciti
 ng career opportunities in AI and related felds.\n\n 	Whether you are an A
 I practitioner\, a data scientist\, or a decision-maker\, this course will
  empower you to:\n 	Understand and navigate the latest AI trends and techn
 ologies.\n 	Build and optimize AI systems that drive innovation.\n 	Addres
 s critical challenges such as AI bias\, privacy concerns\, and compliance.
 \n 	Strategically align AI solutions with organizational goals to maximize
  value.\n\nBy joining this course\, you are taking a signifcant step towar
 d becoming a leader in AI implementation and ensuring your skills remain r
 elevant in a technology-driven future.\nLearning objectives\nBy the end of
  this training course\, the participants will be able to:\n\n 	Explain the
  foundational principles of AI and its various applications.\n 	Conduct da
 ta analysis and create meaningful visualizations to support AI projects.\n
  	Apply machine learning techniques to real-world problems\, including sup
 ervised\, unsupervised\, and reinforcement learning.\n 	Implement simple n
 eural network and advanced deep learning architectures such as CNNs.\n 	Un
 derstand NLP systems and Computer Vision methodologies.\n 	Understand robo
 tics and expert systems for AI-driven automation.\n 	Identify and mitigate
  AI risks while ensuring compliance with regulations.\n 	Develop ethical A
 I strategies aligned with organizational values and societal needs.\n\nWho
  should attend?\nThis course is particularly advantageous and intended for
 :\n\n 	AI Professionals actively involved in the development and implement
 ation of AI technologies\n 	Experienced AI Practitioners seeking to enhanc
 e their knowledge\, stay updated with the latest trends\, and refne their 
 leadership skills\n 	Data Scientists responsible for developing and optimi
 zing AI models\n 	IT Managers overseeing AI projects and initiatives withi
 n their organizations\n 	AI Enthusiasts who aspire to advance into leaders
 hip roles\, such as AI project managers or AI strategists\n 	Risk and Comp
 liance Ofcers responsible for managing AI-related risks and ensuring compl
 iance with regulations\n 	Executives\, including CIOs\, CEOs\, and COOs\, 
 who play a crucial role in decision-making processes related to AI\n 	Prof
 essionals aiming for executive-level AI roles who need a comprehensive und
 erstanding of AI technologies\nand their applications\n\nCourse agenda\nDa
 y 1 Foundations of AI and Data Analysis\nDay 2 Machine Learning\nDay 3 Dee
 p Learning and Natural Language Processing\nDay 4 Computer Vision\, Roboti
 cs\, AI Strategy\, Governance\, and Risk Management\nDay 5 Certification e
 xam\nTraining Info\nDuration:  5 Days\nDate: Aug 3-7\, 2026\nTime:  9.
 30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Gran
 de Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 5
 1\,500 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@ac
 infotec.com\n\n\n\nwww.pecb.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:AI Intelligent,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:829@acinfotec.com
DTSTART:20260803T023000Z
DTEND:20260806T093000Z
DTSTAMP:20260107T092347Z
URL:https://www.acinfotec.com/training-event/certified-data-management-pro
 fessionals-cdmp-exam-included-new/
SUMMARY:Certified Data Management Professionals (CDMP) – Exam Included (N
 ew!!)
DESCRIPTION:Certified Data Management Professionals (CDMP)\nAbout this cour
 se\nCDMP – the gold standard in the data management field\n\nThe Certifi
 ed Data Management Professional (CDMP) credential is a globally recognized
  certification and many organizations are asking for this certification (m
 ore than other certifications) as a mandatory requirement for employment i
 n the data management field. The CDMP certificate shows that you are capab
 le\, knowledgeable and an expert in your field. Surveys show that CDMP-cer
 tified data management professionals earn more\, and advance at a more rap
 id pace than their non-certified colleagues. The 4-day CDMP training is a 
 comprehensive training program to help data-driven professionals prepare 
 for the certification requirements of the official CDMP exam.\n Who shoul
 d attend?\n\n 	Chief Data Officers (CDO’s)\n 	CIO’s\n 	Data Governance
  Managers / Data Quality Managers\n 	Data Scientists / Data Architects / D
 ata Specialists / Data Engineers\n 	Data Administrators\n 	Data Analysts\n
  	Data Modelers\n 	Database Administrators\n 	DWH Analysts\n 	Business Int
 elligence (BI) Professionals\n 	Information/ Application/ Solutions Archit
 ects\n 	Project/Program Managers\n 	Business Analysts\n 	Data Protection O
 fficers (DPO’s)\n 	Many other data professionals\n\nCourse Content\nDay 
 1\n\n 	CDMP Introduction\n 	Data Management Process\n 	Data Governance\n 	
 Data Management Organization and Role Expectations\n 	Data Architecture\n 
 	Data Modeling and Design\n\nDay 2\n\n 	Metadata Management\n 	Data Storag
 e and Operations\n 	Data Security\n 	Data Integration and Interoperability
 \n\nDay 3\n\n 	Document and Content Management\n 	Reference and Master Dat
 a\n 	Data Warehousing and Business Intelligence\n 	Data Quality\n\nDay 4\n
 \n 	Big Data and Data Science\n 	Data Ethics\n 	Data Management Maturity A
 ssessment\n 	Data Management and Organizational Change Management\n 	Exam 
 Preparation (0.5 day)\n\nExamination\nComing soon…\nTraining Info\nLangu
 age : Conducted in Thai Language\nDuration : 4 Days\nDate :  Aug 3-6\, 
 2026\nTime : 9.30 am. – 16.30 pm.\nLocation : ACinfotec Training Cen
 ter\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 R
 d.\nContact : T 02 670 8980-3 ext.321-323\nEmail : training@acinfotec.com
 \nPrice : 59\,500 Baht (Ex.Vat 7%)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/04/Blue-Modern-Digital-Marketing-Agency-Linkedin-Banner.png
CATEGORIES:Data Governance
END:VEVENT
BEGIN:VEVENT
UID:918@acinfotec.com
DTSTART:20260803T023000Z
DTEND:20260807T093000Z
DTSTAMP:20260107T092356Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-27035-
 lead-incident-manager-exam-included-2/
SUMMARY:PECB Certified ISO/IEC 27035 Lead Incident Manager (Exam Included)
DESCRIPTION:Course Overview\nIn this five-day intensive course participants
  develop the competence to master a model for implementing an incident man
 agement process throughout their organization using the ISO/IEC 27035 stan
 dard as a reference framework. Based on practical exercises\, participants
  acquire the necessary knowledge and skills to manage information security
  incidents in time by being familiar with their life cycle. During this tr
 aining\, we will present the ISO/IEC 27035 information security incident m
 anagement standard\, a process model for designing and developing an organ
 izational incident management process\, and how companies may use the stan
 dard. This training is also fully compatible with ISO/IEC 27035 which supp
 orts ISO/IEC 27001 by providing guidance for incident management.\nWho Sho
 uld attend?\n\n 	Incident managers\n 	Business Process Owners\n 	Informati
 on Security Risk Managers\n 	Regulatory Compliance Managers\n 	Members of 
 Incident Response Team\n 	Persons responsible for information security or 
 conformity within an organization\n\nCourse Objectives\nTo understand the 
 concepts\, approaches\, methods\, tools and techniques allowing an effecti
 ve information security incident management according to ISO/IEC 27035\n\n
  	To understand\, interpret and provide guidance on how to implement and m
 anage incident management processes based on best practices of ISO/IEC 270
 35 and other relevant standards\n 	To acquire the competence to implement\
 , maintain and manage an ongoing information security incident management 
 program according to ISO/IEC 27035\n 	To acquire the competence to effecti
 vely advise organizations on the best practices in information security ma
 nagement\n\nCourse Contents\nDay 1: Introduction\, incident management fra
 mework according to ISO/IEC 27035\n\n 	Concepts and definitions related to
  information security and incident management\n 	Incident management stand
 ards\, and best practices\n 	Choosing an incident management framework\n 	
 Understanding an organization and its context\n\nDay 2 : Planning the impl
 ementation of an Organizational Incident Management Process based on ISO/I
 EC 27035\n\n 	Incident management strategy and project management\n 	Plann
 ing the implementation of an effective incident management process\n 	Prel
 iminary analysis and selection of an approach and methodology\n 	Design an
 d document an incident detection\, reporting and management process\n 	Def
 ining roles and responsibilities in the context of the implementation and 
 management of an Incident Management Process\n\nDay 3: Implementing an Inc
 ident Management Process\n\n 	Define the document and record management pr
 ocesses\n 	Incident Management policies &amp\; procedures\n 	Implementatio
 n of security processes and controls related to incident management\n 	Cha
 nge management process\n 	Incident analysis processes\n 	Effective communi
 cation and the communication strategies\n 	Establish the Information Secur
 ity Incident Response Team\n\nDay 4: Monitoring\, measuring and improving 
 an Incident Management Process\n\n 	Monitoring and evaluating the effectiv
 eness of incident management process in operations\n 	Development of metri
 cs\, performance indicators and dashboards\n 	Management reviews\n 	Implem
 entation of a continual improvement program\n 	Develop and propose the bes
 t corrective and preventive action plans\n\nDay 5: Certification Exam\nTra
 ining Info\nDuration:  5 Days\nDate:  Aug 3-7\, 2026\nTime:  9.30 am. 
 – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Cent
 re Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 
 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec
 .com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:769@acinfotec.com
DTSTART:20260805T023000Z
DTEND:20260807T093000Z
DTSTAMP:20260107T092406Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-31000-risk
 -manager-exam-included/
SUMMARY:PECB Certified ISO 31000 Risk Manager (Exam Included)
DESCRIPTION:About this course\nThe ISO 31000 Risk Manager training course h
 elps participants acquire the knowledge necessary and ability to integrate
  the risk management guidelines of ISO 31000 in an organization. It provid
 es information with regard to the risk management principles and their app
 lication\, as well as the core elements of the risk management framework a
 nd steps for a risk management process. In addition\, it provides the basi
 c approaches\, methods\, and practices for assessing risk in a wide range 
 of situations.\n\nUpon completion of the training course\, you can sit for
  the exam and apply to obtain the “PECB Certified ISO 31000 Risk Manager
 ” credential. The credential demonstrates your knowledge and ability to 
 apply the risk management process in an organization based on the guidelin
 es of ISO 31000 and best practices.\nCourse Benefits\n\n 	Understand the r
 isk management concepts\, approaches\, methods\, and techniques\n 	Learn h
 ow to establish a risk management framework in the context of an organizat
 ion\n 	Learn how to apply the ISO 31000 risk management process in an orga
 nization\n 	Understand the basic approaches\, methods\, and practices used
  to integrate risk management in an organization\n\nWho should attend?\n\n
  	Managers or consultants responsible for the effective management of risk
  in an organization\n 	Individuals seeking to gain knowledge about the ris
 k management principles\, framework\, and process\n 	Individuals responsib
 le for the creation and protection of value in their organizations\n 	Indi
 viduals interested in pursuing a career in risk management\n\nCourse Conte
 nts\nDay 1: Introduction to ISO 31000 and risk management and establishing
  the risk management framework\n\n 	Training course objectives and structu
 re\n 	Standards\n 	Introduction to ISO 31000 concepts\n 	ISO 31000 princip
 les\, framework\, and process\n 	Establishing the framework and defining t
 he governance\n\nDay 2: Initiation of the risk management process and risk
  assessment based on ISO 31000 \n\n 	Scope\, context\, and risk criteria\n
  	Risk identification\n 	Risk analysis\n 	Risk evaluation\n\nDay 3 Risk tr
 eatment\, recording and reporting\, monitoring and review\, and communicat
 ion and consultation according to ISO 31000 \n\n 	Risk treatment\n 	Recor
 ding and reporting\n 	Monitoring and review\n 	Communication and consultat
 ion\n 	Closing of the training course\n 	Exam (2 hours)\n\nTraining Info\n
 Duration : 3 Days\nDate : Aug 5-7\, 2026\nTime : 9.30-16.30 pm.\nVenue :
  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.
 \, (Worklab) \, Rama 4 Rd.\nTraining Fee : 38\,500 Baht (ex.vat 7%)\nTel. 
 02 670 8980-3 ext .321-323\nwww.pecb.com\nEmail. training@acinfotec.com\n\
 n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:1003@acinfotec.com
DTSTART:20260806T023000Z
DTEND:20260807T093000Z
DTSTAMP:20260323T063130Z
URL:https://www.acinfotec.com/training-event/advanced-in-ai-audit-aaia-exa
 m-prep-thai-2/
SUMMARY:Advanced in AI Audit (AAIA) – Exam Prep. (Thai)
DESCRIPTION:About this course\nBe one of the first experienced IT auditors 
 to embrace AI and level up their careers with the new ISACA Advanced in AI
  Audit™ (AAIA™) certification. Designed exclusively for professionals 
 with CISA® and other qualified high-level audit certifications\, AAIA emp
 owers you to stand up to today’s AI challenges and become an AI audit le
 ader that more organizations demand.\nCourse Benefits\n\n 	Proven experien
 ce in it audits or its advisory roles\n 	Some expertise auditing\, assessi
 ng\, implementing and maintaining AI systems\n 	Holds an active prerequisi
 te certification\n\nPrerequisite\nTo qualify for AAIA\, candidates must ei
 ther hold a CISA certification or one of the following certifications with
  an IT audit or IT advisory role focus: CIA\, CPA\, ACCA\, FFCA\, Canadian
  CPA\, CPA Australia\, FCPA or Japanese CPA.\n\nAll holders qualify:\n\nCI
 SA (Certified Information Systems Auditor from ISACA)\nWho should attend?\
 n\n 	IT Auditor\n 	Senior IT Auditor\n 	Risk Manager\n 	Information Manage
 r\n\nCourse Contents\nDOMAIN 1 – AI GOVERNANCE AND RISK\n\nThis Domain d
 emonstrates your ability to advise stakeholders on implementing AI solutio
 ns through appropriate and effective policy\, risk controls\, data governa
 nce and ethical standards.\n\nA–AI Models\, Considerations\, and Require
 ments\n\nB–AI Governance and Program Management\n\nC–AI Risk Managemen
 t\n\nD–Privacy and Data Governance Programs\n\nE–Leading Practices\, E
 thics\, Regulations\, and Standards for AI\n\nDOMAIN 2 – AI OPERATIONS\n
 \nThis domain confirms your skill in balancing sustainability\, operationa
 l readiness\, and the risk profile with the benefits and innovation AI pro
 mises to support enterprise-wide adoption of this powerful technology.\n\n
 A–Data management specific to AI\n\nB–AI solution development methodol
 ogies and lifecycle\n\nC–Change management specific to AI\n\nD–Supervi
 sion of ai solutions (e.g.\, outputs\, impacts\, and decisions)\n\nE–T
 esting techniques for ai solutions\n\nF–Threats and vulnerabilities spec
 ific to AI\n\nG–Incident response management specific to AI\n\nDOMAIN 3 
 – AI AUDITING TOOLS AND TECHNIQUES\n\nThis domain focuses on optimizing 
 audit outcomes through innovation and highlights your knowledge of audit t
 echniques tailored to AI systems and the use of AI-enabled tools streamlin
 e audit efficiency and provide faster\, quality insight.\n\nA–Audit plan
 ning and design\n\nB–Audit testing and sampling methodologies\n\nC–Aud
 it evidence collection techniques\n\nD–Audit data quality and data analy
 tics\n\nE–AI Audit outputs and reports\nTraining Info\nDuration : 2 Days
 \nDate : Aug 6-7\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Traini
 ng Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ra
 ma 4 Rd.\nTraining Fee : 28\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext
 .321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 6/03/AAIA.png
CATEGORIES:AI Intelligent,ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:796@acinfotec.com
DTSTART:20260806T023000Z
DTEND:20260807T093000Z
DTSTAMP:20251219T033914Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -manager-cipm-thai/
SUMMARY:Certified Information Privacy Manager (CIPM) (Thai)
DESCRIPTION: \nAbout this course\nBusiness functions such as marketing\, f
 inance\, human resources and customer service have privacy responsibilitie
 s that can expose their organizations to financial loss and damage to repu
 tation. IAPP Privacy Program Management Training\, the training aligned wi
 th ANSI/ISO-accredited CIPM certification\, gives professionals the skill
 s to operationalize privacy and minimize risks to reputation from improper
  handling of personal data.\n Course Benefits\nCIPM training teaches a pr
 ocess for conceptualizing\, designing\, building and operating a data priv
 acy management program. The curriculum\, available in French\, German and 
 English\, includes creating a company vision\, structuring data protection
  teams\, developing and implementing system frameworks\, and measuring per
 formance.\n Who should attend?\n\n 	Anyone involved with data protection 
 processes and programs\n 	Data Protection Officers\n 	Data Protection Mana
 gers\n 	Auditors\n 	Legal Compliance Officers\n 	Security Managers\n 	Info
 rmation Managers\n\n Course Contents\nModule 1: Introduction to Privacy P
 rogram Management\n\n\n 	Identifies privacy program management responsibil
 ities and describes the role of accountability in privacy program manageme
 nt.\n\nModule 2: Privacy Governance\n\n\n 	Examines considerations for dev
 eloping and implementing a privacy program\, including the position of the
  privacy function within the organization\, role of the\nDPO\, program sco
 pe and charter\, privacy strategy\, support and ongoing involvement of key
  functions and privacy frameworks.\n\nModule 3: Applicable Laws and Regula
 tions\n\n\n 	Discusses the regulatory environment\, common elements across
  jurisdictions and strategies for aligning compliance with organizational 
 strategy.\n\nModule 4: Data Assessments\n\n\n 	Relates practical processes
  for creating and using data inventories/ maps\, gap analyses\, privacy as
 sessments\, privacy impact assessments/data protection impact\nassessments
  and vendor assessments.\n\nModule 5: Policies\n\n\n 	Describes common typ
 es of privacy-related policies\, outlines components and offers strategies
  for implementation.\n\nModule 6: Data Subject Rights\n\n\n 	Discusses ope
 rational considerations for communicating and ensuring data subject rights
 \, including privacy notice\, choice and consent\, access and rectificatio
 n\, data\nportability\, and erasure.\n\nModule 7 : Training and Awareness\
 n\n 	Outlines strategies for developing and implementing privacy training 
 and awareness programs.\n\n\nModule 8 : Protecting Personal Information\n\
 n\n 	Examines a holistic approach to protecting personal information throu
 gh privacy by design.\n\nModule 9 : Data Breach Incident Plans\n\n\n 	Prov
 ides guidance on planning for and responding to a data security incident o
 r breach.\n\nModule 10 : Monitoring and Auditing Program Performance\n\n\n
  	Relates common practices for monitoring\, measuring\, analyzing and audi
 ting privacy program performance.\n\nTraining Info:\n\nLanguage: Conducte
 d in Thai Language\nDuration: 2 Days\nDate: Aug 6 - 7\, 2026\nVenue: ACi
 nfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (W
 orklab) \, Rama 4 Rd.\nTraining Fees: 49\,900 (Exam Included)\nTel : 02 67
 0 8980-3 ext. 321-323\nE-mail: training@acinfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/10/CIPM_Seal_Final_CMYK-01-1.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:1005@acinfotec.com
DTSTART:20260817T023000Z
DTEND:20260818T093000Z
DTSTAMP:20260323T062939Z
URL:https://www.acinfotec.com/training-event/advanced-in-ai-security-manag
 ement-aaism-exam-prep-2/
SUMMARY:Advanced in AI Security Management (AAISM) – Exam Prep.
DESCRIPTION:About this course\nWith the significant potential of artificial
  intelligence comes new threats and vulnerabilities. ISACA Advanced in AI 
 Security Management™ (AAISM™) is the first and only AI-centric securit
 y management certification designed to help experienced IT professionals r
 einforce the enterprise’s security posture and protect against AI-specif
 ic threats. You’ll be able to manage the evolving security risk related 
 to AI\, implement policy\, and ensure its responsible and effective use ac
 ross the organization.\nCourse Benefits\n\n 	Proven experience in it audit
 s or its advisory roles\n 	Some expertise auditing\, assessing\, implement
 ing and maintaining AI systems\n 	Holds an active prerequisite certificati
 on\n\nPrerequisite\n\n 	ACTIVE CISM OR CISSP HOLDERS\n 	PROVEN EXPERIENCE 
 IN SECURITY OR ADVISORY ROLES\n 	SOME EXPERTISE ASSESSING\, IMPLEMENTING A
 ND MAINTAINING AI SYSTEMS\n\nWho should attend?\n\n 	Experienced Security 
 Professionals with CISM or CISSP\n 	Individuals in Security or Advisory Ro
 les\n 	Professionals with AI System Experience\n\nCourse Contents\nDOMAIN 
 1 – AI GOVERNANCE AND PROGRAM MANAGEMENT\n\nThis Domain demonstrates you
 r ability to advise stakeholders on implementing AI security solutions thr
 ough appropriate and effective policy\, data governance\, program manageme
 nt and incident response.\n\nA–Stakeholder considerations\, industry fra
 meworks\, and regulatory requirements\n\nB–AI-related strategies\, polic
 ies\, and procedures\n\nC– AI asset and data life cycle management\n\nD
 –AI security program development and management\n\nE–Business continui
 ty and incident response\n\nDOMAIN 2 – AI RISK MANAGEMENT\n\nThis Domain
  confirms your skill at assessing and managing risks\, threats\, vulnerabi
 lities and supply chain issues related to the enterprise-wide adoption of 
 AI.\n\nA–AI risk assessment\, thresholds\, and treatment\n\nB–AI threa
 t and vulnerability management\n\nC–AI vendor and supply chain managemen
 t\n\nDOMAIN 3 – AI TECHNOLOGIES AND CONTROLS\n\nThis Domain focuses on o
 ptimizing AI security and highlights your knowledge of security technologi
 es\, techniques and controls tailored to AI systems.\n\nA–AI security ar
 chitecture and design\n\nB–AI-related strategies\, policies\, and proced
 ures\n\nC–Data management controls\n\nD–Privacy\, ethical\, trust and 
 safety controls\n\nE–Security contr\nTraining info\nDuration : 2 Days\nD
 ate : Aug 17-18\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Trainin
 g Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ram
 a 4 Rd.\nTraining Fee : 28\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext.
 321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 6/03/AAISM.png
CATEGORIES:AI Intelligent,ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:783@acinfotec.com
DTSTART:20260817T023000Z
DTEND:20260820T093000Z
DTSTAMP:20260107T092659Z
URL:https://www.acinfotec.com/training-event/ccsp-certified-cloud-security
 -professional-exam-excluded-8/
SUMMARY:CCSP - Certified Cloud Security Professional (Exam Prep)
DESCRIPTION:Course Overview\nAs powerful as cloud computing is for the orga
 nization\, understanding its information security risks and mitigation str
 ategies is critical. Legacy approaches are inadequate\, and organizations 
 need competent\, experienced professionals equipped with the right cloud s
 ecurity knowledge and skills to be successful. They need CCSPs.\n\nBacked 
 by the two leading non-profits focused on cloud and information security\,
  the Cloud Security Alliance (CSA) and (ISC) ²\, the CCSP credential de
 notes professionals with the deep-seated knowledge and competency derived 
 from hands-on experience with cyber\, information\, software and cloud com
 puting infrastructure security. CCSPs help you achieve the highest standar
 d for cloud security expertise and enable your organization to benefit fro
 m the power of cloud computing while keeping sensitive data secure.\nWho s
 hould Attend?\nCCSP is most appropriate for those whose day-to-day respons
 ibilities involve procuring\, securing and managing cloud environments or 
 purchased cloud services. In other words\, CCSPs are heavily involved with
  the cloud. Many CCSPs will be responsible for cloud security architecture
 \, design\, operations\, and/or service orchestration.\n\nExample job func
 tions include\, but are not limited to:\n\n 	Enterprise Architect\n 	Secur
 ity Administrator\n 	Systems Engineer\n 	Security Architect\n 	Security Co
 nsultant\n 	Security Engineer\n 	Security Manager\n 	Systems Architect\n\n
 Course Contents\nCCSP is a global credential born from the expertise of th
 e two industry-leading stewards of information systems and cloud computing
  security\, (ISC)² and CSA. The CCSP credential is appropriate and applic
 able to cloud security in a global environment. This is especially importa
 nt given the legal\, regulatory and compliance concerns that come with mul
 ti-jurisdictional housing of personally identifiable information (PII).\n\
 nFor those who qualify\, the CCSP exam will test their competence in the 
 six CCSP domains of the (ISC)² Common Body of Knowledge (CBK)\, which cov
 er:\n\n 	Architectural Concepts &amp\; Design Requirements\n 	Cloud Data S
 ecurity\n 	Cloud Platform &amp\; Infrastructure Security\n 	Cloud Applicat
 ion Security\n 	Operations\n 	Legal &amp\; Compliance\n\nTraining Info\nDu
 ration :  4 days\nDate : Aug 17 - 20\, 2026\nVenue : ACinfotec Training C
 enter\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4
  Rd.\nContact : 02 670 8980-3 ext.321-323\nEmail : training@acinfotec.com\
 nPrice : 49\,000฿ (Exclusive of 7% VAT)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded.png
CATEGORIES:Cloud security,ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:947@acinfotec.com
DTSTART:20260817T023000Z
DTEND:20260821T093000Z
DTSTAMP:20260107T092538Z
URL:https://www.acinfotec.com/training-event/pecb-certified-data-protectio
 n-officer-cdpo-exam-included-6/
SUMMARY:PECB Certified Data Protection Officer (CDPO) (Exam Included)
DESCRIPTION:Why should you attend?\nAs data protection is becoming more and
  more valuable\, the need for organizations to protect these data is also 
 constantly increasing. Besides violating the fundamental rights and freedo
 ms of persons\, not complying with the data protection regulations can lea
 d to risky situations that could harm an organization’s credibility\, re
 putation\, and financial status. This is where your skills as a data prote
 ction officers come to place.\n\nThe PECB Certified Data Protection Office
 r training course will help you acquire the knowledge and skills to serve 
 as a Data Protection Officer (DPO) so as to help organizations ensure comp
 liance with the General Data Protection Regulation (GDPR) requirements.\n\
 nBased on practical exercises\, you will be able to master the role of the
  DPO and become competent to inform\, advise\, and monitor compliance with
  the GDPR and cooperate with the supervisory authority.\n\nAfter attending
  the training course\, you can sit for the exam\, and if you successfully 
 pass the exam\, you can apply for the “PECB Certified Data Protection Of
 ficer” credential. The internationally recognized “PECB Certified Data
  Protection Officer” certificate will prove that you have the profession
 al capabilities and practical knowledge to advise the controller and the p
 rocessor on how to meet their obligations regarding the GDPR compliance.\n
 Who should attend?\n\n 	Managers or consultants seeking to prepare and sup
 port an organization in planning\, implementing\, and maintaining a compli
 ance program based on the GDPR\n 	DPOs and individuals responsible for mai
 ntaining conformance with the GDPR requirements\n 	Members of information 
 security\, incident management\, and business continuity teams\n 	Technica
 l and compliance experts seeking to prepare for a data protection officer 
 role\n 	Expert advisors involved in the security of personal data\n\nCours
 e agenda \nDay 1: Introduction to the GDPR concepts and principles\n\n 	Tr
 aining course objectives and structure\n 	General Data Protection Regulati
 on (GDPR)\n 	Core considerations for the GDPR\n\nDay 2: Designation of the
  DPO and analysis of the GDPR compliance program\n\n 	Designation of the D
 PO\n 	Analysis of the GDPR compliance program\n 	Relationship with the top
  management\n 	Data protection policy\n 	Register of processing activities
 \n 	Risk management process\n\nDay 3: DPO operations\n\n 	Data protection 
 impact assessment\n 	Documentation management\n 	Evaluation of the data pr
 otection controls\n 	Data protection and technology\n 	Awareness\, trainin
 g\, and communication\n\nDay 4: Monitoring and continual improvement of GD
 PR compliance\n\n 	Incident management and personal data breaches\n 	Monit
 oring and measuring compliance\n 	Data protection internal audit\n 	Treatm
 ent of non conformity\n 	Continual improvement\n 	Closing the training cou
 rse\n\nDay 5: Certification Exam\n\nTraining Info\n\n\n\nLanguage : Condu
 cted in Thai Language\nDuration : 5 Days\nDate :  Aug 17-21\, 2026\nTime
  : 9.30 am. – 16.30 pm.\nVenue : ACinfotec Training Center\n16th Fl.\,
  Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nPrice : 51\
 ,500 Baht (Ex.vat 7%)\nContact : T 02 670 8980-3 ext.321-323\nE training@
 acinfotec.com\n\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:945@acinfotec.com
DTSTART:20260818T023000Z
DTEND:20260821T093000Z
DTSTAMP:20260107T092713Z
URL:https://www.acinfotec.com/training-event/comptia-security-exam-include
 d-17/
SUMMARY:CompTIA Security+ (Exam Included)
DESCRIPTION:\n\nAbout this course \nCompTIA® Security+® is the primary co
 urse you will need to take if your job responsibilities include securing n
 etwork services\, devices\, and traffic and your organization as a whole i
 ncluding the physical security elements and operational security measures.
  It is also the main course you will take to prepare for the CompTIA Secur
 ity+ Certification examination.\n\nIn this course\, you will build on your
  knowledge and professional experience with security fundamentals\, networ
 ks\, and organizational security as you acquire the specific skills requir
 ed to implement basic security services on any type of computer network. T
 his course can benefit you in two ways. If you intend to pass the CompTIA 
 Security+ (Exam SY0-701) Certification examination\, this course can be a 
 significant part of your preparation. But certification is not the only ke
 y to professional success in the field of computer security.\n\nToday's jo
 b market demands individuals with demonstrable skills\, and the informatio
 n and activities in this course can help you build your computer security 
 skill set so that you can confidently perform your duties in any security-
 related professional role.\n\nWho should attend?\nThis course is targeted 
 toward the information technology (IT) professional who has networking and
  administrative skills in Windows®-based Transmission Control Protocol/In
 ternet Protocol (TCP/IP) networks and familiarity with other operating sys
 tems\, such as Mac OS® X\, Unix\, or Linux\, and who wants to further a c
 areer in IT by acquiring a foundational knowledge of security topics\; pre
 pare for the CompTIA Security+ Certification examination\; or use Security
 + as the foundation for advanced security certifications or career roles.\
 n\n\n\n\n\n\n\nCourse Contents\n\n\n\n\n\nModule 1: General Security Conce
 pts\n\n 	Compare and contrast various types of security controls.\n 	Summa
 rize fundamental security concepts.\n 	Explain the importance of change ma
 nagement processes  and the impact to security.\n 	Explain the importance
  of using appropriate cryptographic solutions.\n\nModule 2: Security Opera
 tions\n\n 	Given a scenario\, apply common security techniques to computin
 g resources.\n 	Explain the security implications of proper hardware\, sof
 tware\, and data asset management.\n 	Explain various activities associate
 d with vulnerability management.\n 	Explain security alerting and monitori
 ng concepts and tools.\n 	Given a scenario\, modify enterprise capabilitie
 s to enhance security.\n 	Given a scenario\, implement and maintain identi
 ty and access management.\n 	Explain the importance of automation and orch
 estration related to secure operations.\n 	Explain appropriate incident re
 sponse activities.\n 	Given a scenario\, use data sources to support an in
 vestigation.\n\nModule 3: Security Architecture\n\n 	Compare and contrast 
 security implications of different architecture models.\n 	Given a scenari
 o\, apply security principles to secure enterprise infrastructure.\n 	Comp
 are and contrast concepts and strategies to protect data.\n 	Explain the i
 mportance of resilience and recovery in security architecture.\n\nModule 4
 : Threats\, Vulnerabilities\, and Mitigations\n\n 	Compare and contrast co
 mmon threat actors and motivations.\n 	Explain common threat vectors and a
 ttack surfaces.\n 	Explain various types of vulnerabilities.\n 	Given a sc
 enario\, analyze indicators of malicious activity.\n 	Explain the purpose 
 of mitigation techniques used to secure the enterprise.\n\nModule 5: Secur
 ity Program Management and Oversight\n\n 	Summarize elements of effective 
 security governance.\n 	Explain elements of the risk management process\n 
 	Explain the processes associated with third-party risk assessment and man
 agement.\n 	Summarize elements of effective security compliance.\n 	Explai
 n types and purposes of audits and assessments.\n 	Given a scenario\, impl
 ement security awareness practices.\n\nAbout the exam\nThe new CompTIA Sec
 urity+ (SY0-701) represents the latest and greatest in cybersecurity\, cov
 ering the most in-demand skills related to current threats\, automation\, 
 zero trust\, IoT\, risk – and more. Once certified\, you’ll understand
  the core skills needed to succeed on the job – and employers will notic
 e too. The Security+ exam verifies you have the knowledge and skills requi
 red to:\n\n 	Assess the security posture of an enterprise environment and 
 recommend and implement appropriate security solutions.\n 	Monitor and sec
 ure hybrid environments\, including cloud\, mobile\, Internet of Things (I
 oT)\, and operational technology.\n 	Operate with an awareness of applicab
 le regulations and policies\, including principles of governance\, risk\, 
 and compliance.\n 	Identify\, analyze\, and respond to security events and
  incidents.\n\nCompTIA Security+ is compliant with ISO 17024 standards and
  approved by the U.S. DoD to meet directive 8140/8570.01-M requirements. R
 egulators and government rely on ANSI accreditation because it provides co
 nfidence and trust in the outputs of an accredited program. Over 2.3 milli
 on CompTIA ISO/ANSI-accredited exams have been delivered since January 1\,
  2011.\nTraining Info\nLanguage : Conducted in Thai Language\nDuration : 4
  Days\nDate : Aug 18 - 21\, 2026\nTime : 9.30 - 16.30 pm\nVenue : ACinfote
 c Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workla
 b) \, Rama 4 Rd.\nContact: 02 670 8980-3 ext.321-323\nE training@acinfote
 c.com\nPrice: 45\,000 baht (Ex.vat 7%)\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:863@acinfotec.com
DTSTART:20260819T023000Z
DTEND:20260821T093000Z
DTSTAMP:20260107T092732Z
URL:https://www.acinfotec.com/training-event/certified-soc-analyst-csa-exa
 m-included-2/
SUMMARY:Certified SOC Analyst | CSA (Exam Included)
DESCRIPTION:\nAbout this course\nThe Certified SOC Analyst (CSA) program is
  the first step to joining a security operations center (SOC). It is engin
 eered for current and aspiring Tier I and Tier II SOC analysts to achieve 
 proficiency in performing entry-level and intermediate-level operations.\n
 \nCSA is a training and credentialing program that helps the candidate acq
 uire trending and in-demand technical skills through instruction by some o
 f the most experienced trainers in the industry. The program focuses on cr
 eating new career opportunities through extensive\, meticulous knowledge w
 ith enhanced level capabilities for dynamically contributing to a SOC team
 . Being an intense 3-day program\, it thoroughly covers the fundamentals o
 f SOC operations\, before relaying the knowledge of log management and cor
 relation\, SIEM deployment\, advanced incident detection\, and incident re
 sponse. Additionally\, the candidate will learn to manage various SOC proc
 esses and collaborate with CSIRT at the time of need. To read more about S
 OC and how they are important to many industries\nIndustries That Must Hav
 e a (SOC)\nMany industries are dependent on Security Operations Management
 \, including:\n\nWhy Must Organizations Have Log Management and a SOC Team
 ?\nLog management is an organized approach to deal with large volumes of c
 omputer-generated log data. It allows multiple operations on data like gen
 eration\, collection\, centralization\, parsing\, transmission\, storage\,
  archival\, and disposal.\n\nOrganizations have a Security Operations Cent
 er team and a log management solution in order to:\n\n\n 	Comply with appl
 icable regulatory standards such as PCI-DSS\, HIPAA\, RMiT\, ISO 27001\, a
 nd others.\n 	Protect servers storing sensitive data from internal and ext
 ernal threats.\n 	Secure proprietary information and intellectual property
 .\n\n\nBesides log management\, Security Operations Center analysts can al
 so integrate Security Information and Event Management (SIEM) tools in the
 ir process. These software tools aggregate security data from multiple sou
 rces\, such as network devices\, servers\, and other locations. SIEM tools
  then connect the dots to discover the trends and detect cyber threats so 
 that organizations can act on the alerts.\nHow Does a SOC Help?\n\n 	For t
 he Payment Card Industry (PCI)\, it is mandatory to maintain a Security
  Operations Center. According to the PCI Compliance Security Standard Coun
 cil\, any merchant processing and storing credit card data should be PCI c
 ompliant. PCI compliance helps to ensure secure online transactions and pr
 otection against identity theft.\n 	In such a scenario\, a SOC team helps 
 to:\n 	Monitor firewalls\, their logs\, and any configuration change to id
 entify an irregularity.\n 	Increase the speed of incident remediation.\n 	
 Check firewall and router configuration standards by comparing them  with
  documented services\, ports\, and protocols.\n\n&nbsp\;\n\nAs the healthc
 are industry contains crucial health data\, such as holistic reports of pa
 tients including personalized diagnoses and treatments\, it is an alluring
  target to cybercriminals. Threat actors monetize patient data by selling 
 it to the highest bidder or blackmailing the victim.\n\nFor keeping protec
 ted health information (PHI) secure\, healthcare organizations require a S
 OC 2 audit. SOC 2 compliance ensures:\n\n 	Customer trust\n 	Brand reputat
 ion\n 	Business continuity\n 	Competitive advantage\n\n&nbsp\;\n\n\n\nThe
  manufacturing sector has always been a vulnerable industry as it posses
 ses intellectual property and advanced technologies. Consider a Department
  of Defense (DoD) contractor for example: It is a must to meet the NIST cy
 bersecurity standards to maintain DFARS (Defense Federal Acquisition Regul
 ation Supplement) compliance. The NIST SP 800-171 outlines guidelines for 
 Audit and Accountability\, Configuration Management\, Identification\, and
  Authentication\, with several other criteria.\nSOC analysts are needed in
  the manufacturing industry to:\n\n 	Set up alerts to monitor potential th
 reats.\n 	Promptly remediate ongoing and possible security threats.\n\n&nb
 sp\;\n\n\n\nCybercriminals are eyeing financial services for their bulk 
 transactions and real-time monitoring of activities. Apart from external a
 ttacks\, institutions are also vulnerable to lost employee devices (like p
 hones) and insider threats.\n\nBanking and Financial services should perfo
 rm SOC Type 1 and SOC Type 2 audits along with annual SOC 1 SSAE 18 report
 s. Being in clear nexus with the Internal Control Over Financial Reporting
  (ICFR) concept\, these audits effectively report on internal controls. Th
 ey reveal:\n\n 	Weaknesses in security controls like improperly provisione
 d information systems\, weak authentication parameters\, lack of multiple 
 layers of security\, and others.\n 	Shortcomings in operational controls.\
 n 	Flaws in documentation.\n\n&nbsp\;\n\n\n\nAs government agencies store 
 personal information along with criminal records and religious and politic
 al inclinations\, they are a prized target for cyber attackers.\n\nGovernm
 ent institutions need SOC teams for:\n\n 	Network monitoring in real time.
 \n 	Analyzing activities on servers\, endpoints\, and databases.\n 	Lookin
 g for an incident or signs of a breach.\n\n&nbsp\;\n\n&nbsp\;\n\n\n\nEduca
 tion establishments are easy targets for cybercriminals. They not only car
 ry personal data but also valuable research data and allow access to large
 r networks.\n\nA Security Operations Center can help an educational instit
 ution’s IT staff respond to growing security threats by:\n\n 	Identifyin
 g and monitoring institutional assets and data.\n 	Neutralizing threats.\n
  	Providing cybersecurity metrics to the IT staff.\n\n&nbsp\;\nTarget Audi
 ence\n\n 	SOC Analysts (Tier I and Tier II)\n 	Network and Security Admini
 strators\, Network and Security Engineers\, Network Defense Analyst\, Netw
 ork Defense Technicians\, Network Security Specialist\, Network Security O
 perator\, and any security professional handling network security operatio
 ns\n 	Cybersecurity Analyst\n 	Entry-level cybersecurity professionals\n 	
 Anyone who wants to become a SOC Analyst.\n\nLearning Objectives of CSA\n\
 n 	Gain Knowledge of SOC processes\, procedures\, technologies\, and workf
 lows.\n 	Gain a basic understanding and in-depth knowledge of security thr
 eats\, attacks\, vulnerabilities\, attacker’s behaviors\, cyber killchai
 n\, etc.\n 	Able to recognize attacker tools\, tactics\, and procedures to
  identify indicators of compromise (IOCs) that can be utilized during acti
 ve and future investigations.\n 	Able to monitor and analyze logs and aler
 ts from a variety of different technologies across multiple platforms (IDS
 /IPS\, end-point protection\, servers\, and workstations).\n 	Gain knowled
 ge of the Centralized Log Management (CLM) process.\n 	Able to perform Sec
 urity events and log collection\, monitoring\, and analysis.\n 	Gain exper
 ience and extensive knowledge of Security Information and Event Management
 .\n 	Gain knowledge of administering SIEM solutions (Splunk/AlienVault/OSS
 IM/ELK).\n 	Understand the architecture\, implementation and fine-tuning o
 f SIEM solutions (Splunk/AlienVault/OSSIM/ELK).\n 	Gain hands-on experienc
 e in SIEM use case development process.\n 	Able to develop threat cases (c
 orrelation rules)\, create reports\, etc.\n 	Learn use cases that are wide
 ly used across the SIEM deployment.\n 	Plan\, organize\, and perform threa
 t monitoring and analysis in the enterprise.\n 	Able to monitor emerging t
 hreat patterns and perform security threat analysis.\n 	Gain hands-on expe
 rience in the alert triaging process.\n 	Able to escalate incidents to app
 ropriate teams for additional assistance.\n 	Able to use a Service Desk ti
 cketing system.\n 	Able to prepare briefings and reports of analysis metho
 dology and results.\n 	Gain knowledge of integrating threat intelligence i
 nto SIEM for enhanced incident detection and response.\n 	Able to make use
  of varied\, disparate\, constantly changing threat information.\n 	Gain k
 nowledge of Incident Response Process.\n 	Gain understating of SOC and IRT
  collaboration for better incident response.\n\n\nTraining Info\nDuration:
   3 Days\nDate:  Aug 19 - 21\, 2026\nTime:  9.30 am. – 16.30 pm.\nVe
 nue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini
  Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 39\,000 Baht (ex.vat 7%)\
 nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\nwww.ecco
 uncil.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 1/12/CSA.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:860@acinfotec.com
DTSTART:20260824T023000Z
DTEND:20260828T093000Z
DTSTAMP:20260107T092802Z
URL:https://www.acinfotec.com/training-event/certified-penetration-testing
 -professional-cpentexam-included-4/
SUMMARY:Certified Penetration Testing Professional (CPENT)(Exam Included)
DESCRIPTION:\nAbout this course\nEC-Council’s Certified Penetration Teste
 r (CPENT) program teaches you how to perform an effective penetration test
  in an enterprise network environment that must be attacked\, exploited\, 
 evaded\, and defended. If you have only been working in flat networks\, CP
 ENT’s live practice range will teach you to take your skills to the next
  level by teaching you how to pen test IoT systems\, OT systems\, how to w
 rite your own exploits\, build your own tools\, conduct advanced binaries 
 exploitation\, double pivot to access hidden networks\, and also customize
  scripts/exploits to get into the innermost segments of the network.\nCPEN
 T Benefits\n\n\n\n\n\n 	100% mapped with the NICE framework.\n 	100% metho
 dology-based penetration testing program.\n 	Blends both manual and automa
 ted penetration testing approaches.\n 	Designed with the most common penet
 ration testing practices offered by the best service providers.\n 	Maps to
  all major Job Portals. Role Title: Penetration Tester and Security Analys
 t.\n 	Provides strong reporting writing guidance.\n 	Gives a real-world ex
 perience through an Advanced Penetration Testing Range.\n 	Provides candid
 ates with standard Pen test for use in the field.\n\nCPENT... No other Pen
  Test Course like it!\n\n\n\nAdvanced Windows Attacks\nThis zone contains 
 a complete forest that you first have to gain access to and then use Power
 Shell and any other means to execute Silver and Gold Ticket and Kerberoast
 ing. The machines will be configured with defenses in place meaning you to
  have to use PowerShell bypass techniques and other advanced methods to sc
 ore points within the zone.\n\n\n\nAttacking IOT Systems\nCPENT is the fir
 st certification that requires you to locate IOT devices and then gain acc
 ess to the network. Once on the network\, you must identify the firmware o
 f the IOT device\, extract it\, and then reverse engineer it.\n\n\n\nWriti
 ng Exploits: Advanced Binary Exploitation\nFinding flawed code is a skill 
 competent pen testers need. In this zone you will be required to find the 
 flawed binaries then reverse engineer them to write exploits to take contr
 ol of the program execution. The task is complicated by the requirement of
  penetrating from the perimeter to gain access then discover the binaries.
  Once that is done you have to reverse engineer the code. Unlike other cer
 tifications\, CPENT includes 32 and 64 bit code challenges and some of the
  code will be compiled with basic protections of non-executable stacks. Yo
 u must be able to write a driver program to exploit these binaries\, then 
 discover a method to escalate privileges. This will require advanced skill
 s in binary exploitation to include the latest debugging concepts and egg 
 hunting techniques. You are required to craft input code to first take con
 trol of program execution and second\, map an area in memory to get your s
 hell code to work and bypass system protections.\n\n\n\nBypassing a Filter
 ed Network\nThe CPENT certification provides web zone challenges that exis
 t within a segmentation architecture\, so you have to identify the filteri
 ng of the architecture then leverage this knowledge to gain access to web 
 applications. The next challenge is to compromise and then extract the req
 uired data from the web apps to achieve points.\n\n\n\nPentesting Operatio
 nal Technology (OT)\nThe CPENT range contains a zone that is dedicated to 
 ICS SCADA networks that the candidate will have to penetrate from the IT n
 etwork side and gain access to the OT network. Once there\, you will have 
 to identify the Programmable Logic Controller (PLC) and then modify the da
 ta to impact the OT network. You must be able to intercept the Mod Bus Com
 munication protocol and communication between the PLC and other nodes.\n\n
 \n\n\n\n\n\nAccess Hidden Networks with Pivoting\nBased on our beta testin
 g\, pen testers struggle to identify the rules that are in place when they
  encounter a layered network. Therefore\, in this zone you will have to id
 entify the filtering rules then penetrate the direct network. From there\,
  candidates have to attempt pivots into hidden networks using single pivot
 ing methods\, but through a filter. Most certifications do not have a true
  pivot across disparate networks and few (if any) have the requirement int
 o and out of a filtering device.\n\n\n\nDouble Pivoting\nOnce you have bra
 ved and mastered the challenges of the pivot\, the next challenge is the d
 ouble pivot. This is not something that you can use a tool for\; in most c
 ases the pivot has to be set up manually. CPENT is the first certification
  in the world that requires you to access hidden networks using double piv
 oting.\n\n\n\nPrivilege Escalation\nIn this challenge\, the latest methods
  of privilege escalation reverse engineering code to take control of execu
 tion then break out of the limited shell are required to gain root/admin.\
 n\n\n\nEvading Defense Mechanisms\nThe range requires your exploits be tes
 ted by different defenses you are likely to see in the wild. Candidates ar
 e required to get their exploits past the defenses by weaponizing them.\n\
 n\n\nAttack Automation with Scripts\nPrepare for advanced penetration test
 ing techniques and scripting with seven self-study appendices: Penetration
  testing with Ruby\, Python\, PowerShell\, Perl\, BASH\, Fuzzing\, and Met
 asploit.\n\n\n\nWeaponize Your Exploits\nCustomize your own tools and buil
 d your armory with your coding expertise to hack the challenges presented 
 to you as you would in real life.\n\n\n\nWrite Professional Reports\nExper
 ience how a pen tester can mitigate risks and validate the report presente
 d to the client to really make an impact. Great pen testing doesn’t mean
  much to clients without a clearly written report!\n\n\n\n\n\n\n\n\n\n\nCP
 ENT- Is this course for you?\n\n\n\nCPENT Candidates will be:\n\n\n 	Ethic
 al Hackers\n 	Penetration Testers\n 	Network server administrators\n 	Fire
 wall Administrators\n 	Security Testers\n 	System Administrators and Risk 
 Assessment professionals\n\n\nCPENT Maps to the following Industry Job Rol
 es:\n\n\n\n\n\n\n\n 	Cyber Security Forensic Analyst\n 	Cyber Threat Analy
 st Tier 2\n 	Cyber Threat Intelligence Analyst\n 	Information Security Ana
 lyst\n 	Cyber Security Engineer\n 	Application Security Analyst\n 	Cyber S
 ecurity Assurance Engineer\n 	Senior Information Assurance/ Security Speci
 alist\n 	Security Systems Analyst\n 	Security Operations Center (SOC) Anal
 yst\n\n\n\n\n\n\n\n\n 	Penetration Tester\n 	Technical Operations Network 
 Engineer\n 	IT Security Administrator\n 	Security Engineer\n 	Information 
 Security Engineer\n 	Network Security Information Analyst\n 	Mid Level Pen
 etration Tester\n 	IT Security Analyst III\n 	Junior Security Operations C
 enter (SOC) Analyst\n\n\n\n\n\nCPENT Course Outline\n\n\n\n\n\n\n\nModule 
 01: Introduction to Penetration Testing\n\n\nModule 02: Penetration Test
 ing Scoping and Engagement\n\n\nModule 03: Open Source Intelligence (OSIN
 T)\n\n\nModule 04: Social Engineering Penetration Testing\n\n\nModule 05:
  Network Penetration Testing – External\n\n\nModule 06: Network Penetr
 ation Testing– Internal\n\n\nModule 07: Network Penetration Testing –
  Perimeter Devices\n\n\nModule 08: Web Application Penetration Testing\n\
 n\nModule 09: Wireless Penetration Testing\n\n\nModule 10: IoT Penetrati
 on Testing\n\n\nModule 11: OT/SCADA Penetration Testing\n\n\nModule 12: 
 Cloud Penetration Testing\n\n\nModule 13: Binary Analysis and Exploitatio
 n\n\n\nModule 14: Report Writing and Post Testing Actions\n\n\n\n\n&nbsp\
 ;\n\n\n\n\n\n\n\nA Hands-On Exam Like No Other.\n24 Hours will define your
  Pen Testing career\n\nCPENT is a fully online\, remotely proctored practi
 cal exam that challenges you through a grueling 24-hour performance-based\
 , hands-on exam. The exam is broken into two practical exams of 12-hours e
 ach that will test your perseverance and focus by forcing you to outdo you
 rself with each new challenge. You have the option to choose either two 12
 -hour exams or one 24-hour exam.\n\n\n\n\n\n\n\n\n\nCandidates who score m
 ore than 70% will earn the CPENT certification. Candidates who score more 
 than 90% attain the prestigious LPT (Master) credential!\n\nExam features:
 \n\n 	Choose your challenge! Either two 12-hour sessions or a single 24-ho
 ur exam!\n 	EC-Council specialists proctor the entire exam\; cheating is n
 ot an option.\n 	Score at least 70% and become a CPENT.\n 	Score at least 
 90% and earn the highly regarded LPT (Master) designation!\n\n\n\n\n\n\n\n
 \n\nAn Exciting Career Awaits A CPENT\n\n\n\n\n\n\n\n\n\n\n\nTime of Compl
 etion\n40-hour course\n + 24-hour exam\n\n\n\n\n\n\n\n\n\n\n\n\n\nJobs Av
 ailable\n8\,000+ on LinkedIn alone for Pen Testers\n\n\n\n\n\n\n\n\n\n\n\n
   \n\n\nAverage Salary\n\n\n$84\,000 in the U.S.\n\n\n&nbsp\;\n\n\n\n\n\n
 \n\n\n\n\nSpend just 40-hours and align your career to the growing demand 
 for Penetration Testers. With CPENT\, you will cover advanced penetration 
 testing tools\, techniques\, and methodologies most needed right now.\n\n\
 n\n\n\n\nTraining Info\nDuration:  5 Days\nDate:  Aug 24-28\, 2026\nTime
 :  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.
 \, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining 
 Fees: Please Call\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfot
 ec.com\n\n\n\nwww.eccouncil.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/cover-cpent.jpg
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:925@acinfotec.com
DTSTART:20260824T023000Z
DTEND:20260828T093000Z
DTSTAMP:20260107T092740Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-42001-
 lead-implementer-artificial-intelligence-management-system-exam-included-n
 ew-3/
SUMMARY:PECB Certified ISO/IEC 42001 Lead Implementer (Artificial Intellige
 nce Management System) (Exam Included)
DESCRIPTION:PECB Certified ISO/IEC 42001 Artificial Intelligence Management
  System Lead Implementer\nThe ISO/IEC 42001 Lead Implementer training cour
 se provides the participants with the essential competencies needed to eff
 ectively plan\, implement\, manage\, monitor\, maintain\, and continually 
 improve an artificial intelligence management system (AIMS).\nAbout this c
 ourse\nArtificial intelligence (AI) is becoming a driving force in today
 ’s technology landscape. Its application has spanned across numerous sec
 tors. Its rapid expansion brought unique challenges and considerations tha
 t demand specific expertise to ensure its effective implementation and res
 ponsible management. The PECB ISO/IEC 42001 Lead Implementer training cour
 se is your gateway to mastering the practical implementation and responsib
 le management of AI management system.\n\nThe PECB ISO/IEC 42001 Lead Impl
 ementer training course is designed to prepare you to implement AI managem
 ent system in accordance with ISO/IEC 42001. It provides you with the nece
 ssary competencies to effectively translate AI strategies into actionable 
 solutions. It aims to provide a comprehensive understanding of AI implemen
 tation best practices and a framework for its successful integration withi
 n organizations\, equipping you with the hands-on expertise to drive AIMS 
 implementation projects.\n\nAfter successfully completing the course and p
 assing the exam\, you can apply for the “PECB Certified ISO/IEC 42001 Le
 ad Implementer” credential that demonstrates your ability to effectively
  implement AI strategies.\nWho Should Attend?\nThis training course is int
 ended for:\n\n 	Professionals responsible for overseeing and managing AI p
 rojects\n 	Consultants advising on AI implementation strategies\n 	Expert 
 advisors and specialists aiming to master the practical implementation of 
 AIMS in accordance with ISO/IEC 42001\n 	Individuals tasked with ensuring 
 that AI projects adhere to AI requirements within an organization\n 	Membe
 rs of AIMS implementation teams involved in the implementation of AI syste
 ms\n 	Executives and managers seeking to make informed decisions regarding
  AI implementation and its alignment with ISO/IEC 42001\n\n Objectives\nA
 fter successfully completing the training course\, you will be able to:\n\
 n 	Explain the fundamental concepts and principles of an AIMS based on ISO
 /IEC 42001\n 	Interpret the ISO/IEC 42001 requirements for an AIMS from th
 e perspective of an implementer\n 	Initiate and plan the implementation of
  an AIMS based on ISO/IEC 42001 by utilizing PECB’s IMS2 Methodology and
  other best practices\n 	Support an organization in operating\, maintainin
 g\, and continually improving an AIMS based on ISO/IEC 42001\n 	Prepare an
  organization to undergo a third party certification audit\n\nCourse Conte
 nts\nDay 1 Introduction to ISO/IEC 42001 and the initiation of an AIMS imp
 lementation\n• Training course objectives and structure\n• Standards a
 nd regulatory frameworks\n• Artificial intelligence management system (A
 IMS)\n• Fundamental concepts and principles of artificial intelligence\n
 • AIMS implementation approaches\n• Leadership and project approval\n
 • Roles and responsibilities\n\nDay 2 Implementation plan of an AIMS\n
 • The organization and its context\n• AIMS scope\n• Analysis of the 
 existing system\n• AI policy\n• AI risk management\n• Statement of A
 pplicability\n\nDay 3 Implementation of an AIMS\n• Selection and design 
 of controls\n• Implementation of controls\n• Management of documented 
 information\n• Communication\n• Competence and awareness\n• Manageme
 nt of AI operations\n\nDay 4 AIMS monitoring\, continual improvement\, and
  preparation for the certification audit\n• Monitoring\, measurement\, a
 nalysis and evaluation\n• Internal audit\n• Management review\n• Tre
 atment of nonconformities\n• Continual improvement\n• Preparation for 
 the certification audit\n• Closing of the training course\n\nDay 5 Certi
 fication Exam\nTraining Info\nDuration:  5 Days\nDate: Aug 24-28\, 2026\
 nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16t
 h Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTrai
 ning Fees: 51\,500 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail
 .training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:AI Intelligent,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:967@acinfotec.com
DTSTART:20260831T023000Z
DTEND:20260904T093000Z
DTSTAMP:20260107T102056Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-20000-lead
 -auditor-exam-included-3/
SUMMARY:PECB Certified ISO 20000 Lead Auditor (Exam Included)
DESCRIPTION:About this course\nISO/IEC 20000 Lead Auditor training enables 
 you to develop the necessary expertise to perform an IT Service Management
  System (ITSMS) audit by applying widely recognized audit principles\, pro
 cedures and techniques. During this training course\, you will acquire the
  knowledge and skills to plan and carry out internal and external audits i
 n compliance with ISO 19011 and ISO/IEC 17021-1 certification process.\n\n
 Based on practical exercises\, you will be able to master audit techniques
  and become competent to manage an audit program\, audit team\, communicat
 ion with customers\, and conflict resolution.\n\nAfter acquiring the neces
 sary expertise to perform this audit\, you can sit for the exam and apply 
 for a “PECB Certified ISO/ IEC 20000 Lead Auditor” credential. By hold
 ing a PECB Lead Auditor Certificate\, you will demonstrate that you have t
 he capabilities and competencies to audit organizations based on best prac
 tices.\nLearning Objectives\n\n 	Understand the operations of an IT Servic
 e Management System (ITSMS) based on ISO/IEC 20000\n 	Acknowledge the corr
 elation between ISO/IEC 20000-1\, ISO/IEC 20000-2 and other standards and 
 regulatory frameworks\n 	Understand an auditor’s role to: plan\, lead an
 d follow-up on a management system audit in accordance with ISO 19011\n 	L
 earn how to lead an audit and audit team\n 	Learn how to interpret the req
 uirements of ISO/IEC 20000-1 in the context of an ITSMS audit\n 	Acquire t
 he competencies of an auditor to: plan an audit\, lead an audit\, draft re
 ports\, and follow-up on an audit in compliance with ISO 19011\n\n Who Sh
 ould Attend?\n\n 	Auditors seeking to perform and lead IT Service Manageme
 nt System (ITSMS) certification audits\n 	Managers or consultants seeking 
 to master an IT Service Management System audit process\n 	Individuals res
 ponsible for maintaining conformance with ITSMS requirements\n 	Technical 
 experts seeking to prepare for an IT Service Management System audit\n 	Ex
 pert advisors in IT Service Management\n\nCourse Agenda\nDay 1: Introducti
 on to IT Service Management Systems (ITSMS) and ISO/IEC 20000\n\n\n 	Cours
 e objectives and structure\n 	Standard and regulatory framework\n 	Certifi
 cation process\n 	Fundamental principles of service management\n 	Service 
 Management System (SMS)\n\nDay 2: Audit principles\, preparation and launc
 hing of an audit\n\n\n 	Fundamental audit concepts and principles\n 	Audit
  approach based on evidence and risk\n 	Initiating the audit\n 	Stage 1 au
 dit\n 	Preparing the stage 2 audit (on-site audit)\n 	Stage 2 audit (Part 
 1)\n\nDay 3: On-site audit activities\n\n\n 	Stage 2 audit (Part 2)\n 	Com
 munication during the audit\n 	Audit procedures\n 	Creating audit test pla
 ns\n 	Drafting audit findings and non-conformity reports\n\nDay 4: Closing
  the audit\n\n\n 	Documentation of the audit and its review\n 	Closing the
  audit\n 	Evaluating action plans by the auditor\n 	Beyond the initial aud
 it\n 	Managing an internal audit programme\n 	Competence and evaluation of
  auditors\n 	Closing the training\n\nDay 5: Certification Exam (3 Hours)\n
 \nTraining Info\nDuration : 5 Days\nDate : Oct 31 - Sept 4\, 2026\nTime :
  9.30-16.30\nLanguage : Thai Language Class\, Thai Instructor\nVenue : 
 ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\,
  (Worklab) \, Rama 4 Rd.\nContact : Tel 02 670 8980-3 ext.321-323\nE-mail
  training@acinfotec.com\nPrice : 51\,500 Baht (Ex.vat 7%)\n\n\n\nwww.pec
 b.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:994@acinfotec.com
DTSTART:20260901T023000Z
DTEND:20260904T093000Z
DTSTAMP:20260107T102042Z
URL:https://www.acinfotec.com/training-event/digital-forensics-foundation-
 english-8/
SUMMARY:Digital Forensics Foundation (English)
DESCRIPTION:About this course\nA 4 day practical training course for people
  who are responsible for digital forensic investigations or are wishing to
  become a digital forensic investigator. The course will provide a solid f
 oundation in the understanding of digital forensics principles and techniq
 ues. Each subject is covered in depth and supported by practical scenario 
 based exercises to reinforce the learning points. The candidate will use a
  range of free and open source forensic tools. This allows the candidate t
 he opportunity to practice what they have learnt on the course without the
  need to invest in expensive forensic software / hardware. The course has 
 been designed by experienced forensic investigators with many years’ exp
 erience ensuring the course content is both relevant and practical.\nWho S
 hould attend?\nThe course is aimed at people who are responsible for digit
 al forensic investigations or are wishing to become digital forensic inves
 tigators\, including: IT security professionals and law enforcement office
 rs.\n\nCourse Contents\n\n1 – Introduction to Digital Forensics\n• Def
 ine Digital Forensics\n• Define the types of Forensic Investigations\n
 • Legal Considerations 7 – File Systems &amp\; Data Storage\n• Intro
 duction to File Systems\n• Data Storage\n• File System Metadata\n• L
 ive\, Deleted and Unallocated Data\n• File Slack and Ram Slack\n• NTFS
  Compression and Encryption\n\n2 – Investigation Fundamentals\n• Best 
 Practice Guidelines\n• The Four Principles of Computer Based Evidence\n
 • The basics of information gathering 8 – File Information\n• Date a
 nd Time Stamps\n• File Metadata\n\n3 – Identification and seizure of d
 igital equipment\n• Evidence Handling &amp\; Chain of Custody\n• Ident
 ifying Electronic Sources of Evidence\n• Seizure of Electronic Devices 9
  – Forensic Analysis Techniques\n• Analysis Environments\n• Case Pre
 paration\n• Folder / File Recovery\n• File Signatures and Data Carving
 \n• Data Reduction and Hash Analysis\n• Keyword Searching\n• Evidenc
 e Corroboration\n\n4 – Forensic Acquisitions\n• Forensic Acquisitions\
 n• Forensic Image\n• Forensic Clone\n• Forensic Image vs. Forensic C
 lone\n• FTK Imager\n• Mounting a Forensic Image\n• Hash Values 10 
 – Windows OS Artefacts\n• The Windows Registry\n• Internet History\n
 • Link Files\n• Previously connected USB Devices\n• Log Files\n• P
 refetch Files\n\n5 – Understanding Digital Data\n• Binary Digits\n• 
 Binary Conversion\n• Storage Devices\n• Understanding Electronic Data 
 11 – Forensic Challenges\n• Encryption and Passwords\n• Data Wiping\
 n• Malicious Activity\n\n6 – Understanding Hard Drive Terminology\n•
  Physical Drives\n• Understanding Hard Drive Terminology\n• Unified Ex
 tensible Firmware Interface (UEFI)\n• GUID Partition Table (GPT)\n\n7 
 – File Systems &amp\; Data Storage\n• Introduction to File Systems\n
 • Data Storage\n• File System Metadata\n• Live\, Deleted and Unalloc
 ated Data\n• File Slack and Ram Slack\n• NTFS Compression and Encrypti
 on\n\n8 – File Information\n• Date and Time Stamps\n• File Metadata\
 n\n9 – Forensic Analysis Techniques\n• Analysis Environments\n• Case
  Preparation\n• Folder / File Recovery\n• File Signatures and Data Car
 ving\n• Data Reduction and Hash Analysis\n• Keyword Searching\n• Evi
 dence Corroboration\n\n10 – Windows OS Artefacts\n• The Windows Regist
 ry\n• Internet History\n• Link Files\n• Previously connected USB Dev
 ices\n• Log Files\n• Prefetch Files\n\n11 – Forensic Challenges\n•
  Encryption and Passwords\n• Data Wiping\n• Malicious Activity\n\n12 
 – Reporting\n• Purpose and layout of Report\n• Content of Report\nTr
 aining Info\nDuration:  4 Days\nDate:  Seot 1-4\, 2026\nTime:  9.30 a
 m. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande C
 entre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 39\,8
 00 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfo
 tec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/01/image004.png
CATEGORIES:Digital Forensics,ICMS
END:VEVENT
BEGIN:VEVENT
UID:889@acinfotec.com
DTSTART:20260903T023000Z
DTEND:20260904T093000Z
DTSTAMP:20260107T102028Z
URL:https://www.acinfotec.com/training-event/iso-27017-implementing-securi
 ty-controls-for-cloud-services-3/
SUMMARY:ISO 27017: Implementing Security Controls for Cloud Services
DESCRIPTION:About this course\n\nCloud computing has been one of the most i
 mportant innovation in recent years\, providing cost-effective\, agile and
  virtual services. Most organizations are currently using cloud to handle 
 the multitudes of business information and operations.\n\n&nbsp\;\n\nThis 
 course discusses in detail various issues that arise in cloud security wit
 h respect to both customers and service provider's perspective. The conten
 ts follow guideline specified in ISO 27017 cloud security standard. The co
 urse starts by introducing concepts of Cloud Computing\, security implicat
 ions and related regulatory requirements. Then taking the audience to know
  the basics of ISO 27017\, ISO 27002\, CSA Cloud Control Matrix (CCM) and 
 relationship among them. The core of the course\, the security controls an
 d implementation guidance based on ISO 27017 will be presented in details 
 by ACinfotec instructor who have hands-on experience in securing the Cloud
 . Finally\, the course wraps up with Cloud Computing Risk Assessment Works
 hop to ensure that all audiences will have an opportunity to assess risks 
 associated with Cloud services and bring results as they take away informa
 tion for future use.\n\nWho should Attend?\n\n 	Cloud Service User\n 	Clou
 d Service Provider\n 	Security Professional\n 	Anyone who would like to kn
 ow about cloud security risks and controls\n\nCourse Contents\n\n 	Overvie
 w of Cloud Computing\n\n 	Delivery Model\n 	Deployment Model\n 	Essential 
 Characteristics\n 	Relationship between Cloud Service Customer and Cloud S
 ervice Provider\n\n\n 	Security Considerations in the Cloud\n\n 	Threats t
 o Cloud Service Customer\n 	Threats to Cloud Service Provider\n\n\n 	Gover
 nance\, Regulation and Compliance Concerns\n 	Overview of ISO 27017 and Re
 lationship with ISO 27002 / CSA CCM\n 	Security Controls and Implementatio
 n Guidance for Cloud Service Customer and Cloud Service Provider\n 	Cloud 
 Service Extended Control Set\n 	Cloud Computing Risk Assessment Workshop\n
 \nTraining Info\n\nLanguage :  Conducted in Thai Language\n\nDate: Sept 3
 -4\, 2026\n\nDuration :  2 Days\n\nTime : 9.30-04.30 pm.\n\nVenue : ACinf
 otec Training Center\n\nContact : 02 670 8980-3 ext.321-323\n\nE-mail  tr
 aining@acinfotec.com\n\nPrice : 28\,000 Bhts (Exclusive of 7% VAT)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 9/06/Capture.jpg
CATEGORIES:Cloud security
END:VEVENT
BEGIN:VEVENT
UID:950@acinfotec.com
DTSTART:20260907T023000Z
DTEND:20260911T093000Z
DTSTAMP:20260107T101951Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-270012022-
 lead-implementer-thai-exam-included-3/
SUMMARY:PECB Certified ISO 27001:2022 Lead Implementer (Thai) Exam Included
DESCRIPTION:About this course\nInformation security threats and attacks gro
 w and improve constantly. As such\, organizations are increasingly concern
 ed about\nhow their valuable information is handled and protected. The bes
 t form of defense against them is the proper implementation\nand managemen
 t of information security controls and best practices. Information securit
 y is the globally accepted benchmark\nand also a key expectation and requi
 rement of customers\, legislators\, and other interested parties.\n\nThis 
 training course is designed to prepare you to implement an information sec
 urity management system (ISMS) based on\nthe requirements of ISO/IEC 27001
 . It aims to provide a comprehensive understanding of the best practices o
 f an ISMS and a\nframework for its continual management and improvement.\n
 \nThe training content is packed with practical exercises and case studies
  which will help you get equipped with real-world\nexpertise that you can 
 apply to your day-to-day operations and activities. Our training courses a
 re all-inclusive\, meaning that\nthey cover everything you need to get the
  certifiate\n\nCourse Benefits\n\n\n\n 	Acknowledge the correlation betwee
 n ISO/IEC 27001\, ISO/IEC 27002 and other standards and regulatory frame
 works\n 	Master the concepts\, approaches\, methods and techniques used fo
 r the implementation and effective management of an ISMS\n 	Learn how to i
 nterpret the ISO/IEC 27001 requirements in the specific context of an orga
 nization\n 	Learn how to support an organization to effectively plan\, imp
 lement\, manage\, monitor and maintain an ISMS\n 	Acquire the expertise to
  advise an organization in implementing Information Security Management Sy
 stem best practices\n\n\n\nWho should attend?\n\n 	Managers or consultants
  involved in Information Security Management\n 	Expert advisors seeking to
  master the implementation of an Information Security Management System\n 
 	Individuals responsible for maintaining conformance with ISMS requirement
 s\n 	ISMS team members\n\n\n\n\nCourse Contents\nDay 1: Introduction to IS
 O/IEC 27001 and initiation of an ISMS\n\n 	Training course objectives and 
 structure\n 	Standards and regulatory frameworks\n 	Information Security M
 anagement System (ISMS)\n 	Fundamental information security concepts and p
 rinciples\n 	Initiation of the ISMS implementation\n 	Understanding the or
 ganization and its context h ISMS scope\n\nDay 2: Planning the implementat
 ion of an ISMS\n\n 	Leadership and project approval\n 	Organizational stru
 cture\n 	Analysis of the existing system\n 	Information security policy\n 
 	Risk management\n 	Statement of Applicability\n\nDay 3: Implementation of
  an ISMS\n\n 	Documented information management\n 	Selection and design of
  controls\n 	Implementation of controls\n 	Trends and technologies\n 	Comm
 unication\n 	Competence and awareness\n 	Security operations management\n\
 nDay 4: ISMS monitoring\, continual improvement\, and preparation for the 
 certification audit\n\n 	Monitoring\, measurement\, analysis\, and evaluat
 ion\n 	Internal audit\n 	Management review\n 	Treatment of nonconformities
 \n 	Continual improvement\n 	Preparing for the certification audit\n 	Cert
 ification process and closing of the training course\n\nDay 5: Certificati
 on Exam\nTraining Info\nDuration:  5 Days\nDate: Sept 7-11\, 2026\nTime:
   9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\
 , Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining F
 ees: 51\,500 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext. 321-323\nE-mail.trai
 ning@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:936@acinfotec.com
DTSTART:20260907T023000Z
DTEND:20260907T093000Z
DTSTAMP:20260107T102018Z
URL:https://www.acinfotec.com/training-event/computer-forensics-awareness-
 and-incident-response-thai-11/
SUMMARY:Computer Forensics Awareness and Incident Response (Thai)
DESCRIPTION:About this course\nCompanies are faced with cyber security thre
 ats on a daily basis. Many are external threats but many of the threats co
 me from within the networks resulting in both financial loss and loss of c
 onfidential company data. During an investigation\, IT staff will often be
  asked to collect electronic data. It is vital that any electronic data t
 hat may be used in future legal proceedings is collected following corre
 ct forensic procedures to maintain the integrity of the data and to ensur
 e the evidence can be used in court.\n\nWho Should attend?\nIT professiona
 ls who may be required to collect and preserve electronic data that could
  later be used as evidence in legal proceedings. IT managers who may be 
 responsible for overseeing the collection and preservation of electronic d
 ata.\nAim of the Course: \n\n\nThis is a one day course aimed at IT staff
  that may have to deal with cyber security threats. The candidate will be 
 trained in basic forensic procedures and how to respond to cyber security 
 threats.\nCourse Contents\n\nThe course will cover the following subjects:
 \n\n\n 	Introduction\n 	Cyber Threats 2020\n 	Economic Crime Thailand\n 	D
 efine Digital Forensics\n 	Legal Consideration\n 	Evidence Handling &amp\;
  Chain of Custody\n 	Exercise 1: Identifying Sources of Electronic Devices
 \n 	Why is Digital Forensics Important to your Organization?\n 	Good Pract
 ice Guidelines for Digital Evidence\n 	The Four Principles of Computer Bas
 ed Evidence\n 	Forensic Acquisitions\n 	Forensic Acquisition Tools\n 	Exer
 cise 2: Creating a Forensic Image\n 	Exercise 3 – Creating a Custom Cont
 ent Forensic Image\n 	Exercise 4 – Mounting a Forensic Image\n 	Hash Val
 ues (Digital Fingerprint)\n 	Exercise 5 – Identifying Hash Values of Fil
 es\n 	Persistent Vs Volatile Data\n 	Dealing with Live Systems\n 	Dealing 
 with Servers\n 	Exercise 6 – Capturing Volatile Data\n 	Capturing RAM Me
 mory\n 	Exercise 7 – Capturing RAM Memory\n 	How to Perform Bulk Forensi
 c Imaging?\n 	Exercise 8 – Creating a Easy2Boot Bootable hard drive\n 	P
 reparing an Incident Response Plan\n\nTraining Info\n\nDuration:  1 Day\
 nDate:  Sept 7\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfot
 ec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workl
 ab) \, Rama 4 Rd.\nTraining Fees: 9\,950 Baht (ex.vat7%)\nTel. 02 670 8980
 -3 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/01/image004.png
CATEGORIES:Digital Forensics,ICMS
END:VEVENT
BEGIN:VEVENT
UID:995@acinfotec.com
DTSTART:20260907T023000Z
DTEND:20260907T093000Z
DTSTAMP:20260107T102004Z
URL:https://www.acinfotec.com/training-event/computer-forensics-awareness-
 and-incident-response-thai-12/
SUMMARY:Computer Forensics Awareness and Incident Response (Thai)
DESCRIPTION:About this course\nCompanies are faced with cyber security thre
 ats on a daily basis. Many are external threats but many of the threats co
 me from within the networks resulting in both financial loss and loss of c
 onfidential company data. During an investigation\, IT staff will often be
  asked to collect electronic data. It is vital that any electronic data t
 hat may be used in future legal proceedings is collected following corre
 ct forensic procedures to maintain the integrity of the data and to ensur
 e the evidence can be used in court.\n\nWho Should attend?\nIT professiona
 ls who may be required to collect and preserve electronic data that could
  later be used as evidence in legal proceedings. IT managers who may be 
 responsible for overseeing the collection and preservation of electronic d
 ata.\nAim of the Course: \n\n\nThis is a one day course aimed at IT staff
  that may have to deal with cyber security threats. The candidate will be 
 trained in basic forensic procedures and how to respond to cyber security 
 threats.\nCourse Contents\n\nThe course will cover the following subjects:
 \n\n\n 	Introduction\n 	Cyber Threats 2020\n 	Economic Crime Thailand\n 	D
 efine Digital Forensics\n 	Legal Consideration\n 	Evidence Handling &amp\;
  Chain of Custody\n 	Exercise 1: Identifying Sources of Electronic Devices
 \n 	Why is Digital Forensics Important to your Organization?\n 	Good Pract
 ice Guidelines for Digital Evidence\n 	The Four Principles of Computer Bas
 ed Evidence\n 	Forensic Acquisitions\n 	Forensic Acquisition Tools\n 	Exer
 cise 2: Creating a Forensic Image\n 	Exercise 3 – Creating a Custom Cont
 ent Forensic Image\n 	Exercise 4 – Mounting a Forensic Image\n 	Hash Val
 ues (Digital Fingerprint)\n 	Exercise 5 – Identifying Hash Values of Fil
 es\n 	Persistent Vs Volatile Data\n 	Dealing with Live Systems\n 	Dealing 
 with Servers\n 	Exercise 6 – Capturing Volatile Data\n 	Capturing RAM Me
 mory\n 	Exercise 7 – Capturing RAM Memory\n 	How to Perform Bulk Forensi
 c Imaging?\n 	Exercise 8 – Creating a Easy2Boot Bootable hard drive\n 	P
 reparing an Incident Response Plan\n\nTraining Info\n\nDuration:  1 Day\
 nDate:  Sept 7\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfot
 ec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workl
 ab) \, Rama 4 Rd.\nTraining Fees: 9\,950 Baht (ex.vat7%)\nTel. 02 670 8980
 -3 ext.321-323\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/01/image004.png
CATEGORIES:Digital Forensics,ICMS
END:VEVENT
BEGIN:VEVENT
UID:852@acinfotec.com
DTSTART:20260907T023000Z
DTEND:20260911T093000Z
DTSTAMP:20260107T101942Z
URL:https://www.acinfotec.com/training-event/certified-cybersecurity-techn
 ician-cct-new-exam-included-2/
SUMMARY:Certified Cybersecurity Technician (C|CT) New! (Exam Included)
DESCRIPTION:\n\n\n\nEC-Council has developed the Certified Cybersecurity Te
 chnician certification\n\n\n 	The Certified Cybersecurity Technician (C|CT
 ) is an entry-level cybersecurity program created by EC-Council\, the crea
 tor of the Certified Ethical Hacker (C|EH) certification\, to address the 
 global demand for a qualified cybersecurity workforce.\n 	EC-Council devel
 oped the C|CT to provide individuals starting their careers in IT and cybe
 rsecurity with a certification that validates their hands-on technical ski
 lls.\n 	To equip individuals with the skills they need to pursue and devel
 op their careers as cybersecurity specialists\, consultants\, network engi
 neers\, IT administrators\, and more.\n___________________________________
 _____________________________________________________________\n\n\n\nWhat 
 is Unique About the C|CT Program?\n\n\n\n\n\n\n\n\n_______________________
 __________________________________________________\nC|CT’s Key Offerings
 :\n\n Strong Foundational Coverage\nThe C|CT certification provides total
  foundational cybersecurity domain coverage with key concepts in each doma
 in combined with practical hands-on labs and critical thinking challenges 
 producing world-class cyber security technologists.\n\n Live Range Experi
 ence\nOther popular programs rely on simulation and interactivity as pract
 ical-based assessment\, the C|CT program is delivered on a live Cyber Rang
 e utilizing live targets and real attack systems for a truly immersive\, r
 eal-life practice and assessment platform.\n\n Capture the Flag\nThe C|CT
  certification offers capture the flag (CTF) style critical thinking chall
 enges to accompany each lab exercise putting knowledge into practice and p
 roviding a proven record of skill demonstration. Candidates completing the
  C|CT program will earn the C|CT certification and have a proven track rec
 ord of performing the tasks required in a live Cyber Range\, proving to em
 ployers their ability to perform critical job duties.\n\n Multiple Certif
 ications\nThe course outline of the C|CT program goes above and beyond som
 e of the more common entry-level cybersecurity programs\, such as the Secu
 rity+\, in a completely hands-on cyber range environment instead of simula
 tions to ensure cybersecurity skills development. We believe that candidat
 es who successfully attain the C|CT certification will attain other leadin
 g cybersecurity certifications\, including Security+\, without further tra
 ining\n\n Most Affordable\nDespite the unique design of the heavily hands
 -on course and its uses of real-world cyber range capability\, the certifi
 cation is one of the most affordable in the world!\n\n\nWhat Are the Benef
 its of the C|CT Credential?\n\n 	 Paves the way for a promising career in
  the realm of cybersecurity\n 	 Teaches the fundamental knowledge that cy
 bersecurity professionals need:\n\n 	Information security\n 	Network secur
 ity\n 	Computer forensics\n 	Risk management\n 	Incident handling\n 	Indus
 try best practices\n\n\n 	 Improves employability by validating certifica
 tion holders’ skills as cybersecurity specialists who can strengthen org
 anizational security\n 	 Provides extensive opportunities to practice the
  hands-on skills necessary for any technical role involving administrative
  privileges and cybersecurity considerations\n\nCourse Contents\n\n\n\n\n\
 n\n\n\nModule 01: Information Security Threats and Vulnerabilities\n\n\nM
 odule 02: Information Security Attacks\n\n\nModule 03: Network Security 
 Fundamentals\n\n\nModule 04: Identification\, Authentication\, and Author
 ization\n\n\nModule 05: Network Security Controls – Administrative Cont
 rols\n\n\nModule 06: Network Security Controls – Physical Controls\n\n\
 nModule 07: Network Security Controls – Technical Controls\n\n\nModule 
 08: Network Security Assessment Techniques and Tools\n\n\nModule 09: App
 lication Security\n\n\nModule 10: Virtualization and Cloud Computing\n\n\
 nModule 11: Wireless Network Security\n\n\n\n\n\n\n\n\n\n\n\n\nModule 12:
  Mobile Device Security\n\n\nModule 13: IoT and OT Security\n\n\nModule 
 14: Cryptography\n\n\nModule 15: Data Security\n\n\nModule 16: Network 
 Troubleshooting\n\n\nModule 17: Network Traffic Monitoring\n\n\nModule 18
 : Network Logs Monitoring and Analysis\n\n\nModule 19: Incident Response
 \n\n\nModule 20: Computer Forensics\n\n\nModule 21: Business Continuity 
 and Disaster Recovery\n\n\nModule 22: Risk Management\n\n\n\n\n\n\n\n Wh
 o Can Attend This Course?_________________________________________________
 ________________________\n\n\n\n\n\n\nThe C|CT course can be taken by stud
 ents\, IT professionals\, IT managers\, career changers\, and any individu
 al seeking a career in cybersecurity\, or aspiring to advance their existi
 ng role. This course is ideal for those entering the cybersecurity workfor
 ce\, providing foundational technician level\, hands-on skills to solve th
 e most common security issues organizations face today.\n\n\n\n\n\n\n\n\nW
 hat Are the Prerequisites for the C|CT Program?___________________________
 ______________________________________________\n\n\n\n\n\n\nThere are no s
 pecific prerequisites to take the C|CT course and attempt the C|CT certifi
 cation exam. Although this is an entry-level course\, a working knowledge 
 of IT networking and basic cybersecurity concepts will be an advantage to 
 anyone taking this course.\n\n\nTraining Info\n\nDuration : 5 Days\nLangua
 ge: Conduct in Thai language\nTime : 09.30-04.30 pm.\nTraining Date: Sept
  7-11\, 2026\nTel. 02 670 8980-3 ext. 321-323\nPrice: 50\,000 THB (Excl. v
 at7%)\nEmail. training@acinfotec.com\n\nhttps://www.eccouncil.org/\n\n\n\
 n\n\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 2/11/CCTLogo_540x.webp
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:850@acinfotec.com
DTSTART:20260910T023000Z
DTEND:20260911T093000Z
DTSTAMP:20260107T101916Z
URL:https://www.acinfotec.com/training-event/exploiting-and-securing-web-a
 pplication-in-house-training-2/
SUMMARY:Exploiting and Securing Web Application (In-House Training)
DESCRIPTION:About this course\nThe development of Web 2.0\, HTML5 technolog
 y and better internet services allow users to interact\, generate contents
 \, and access information anytime and anywhere. Businesses are moving to o
 nline and running mainly on web application which serves a large amount of
  sensitive information\, especially personal and financial data. All of th
 ese advancements in web applications have also attracted malicious hackers
  and scammers\, who are always coming up with new attack vectors. To make 
 matters worse\, over the past few years\, user information has become more
  profitable to attackers. These all have raised critical concerns for ensu
 ring the privacy of digital communications and rendered the need for robus
 t protection mechanisms over the web. Such demands are pushing web develop
 ers to have a basic knowledge of web application security in order to impl
 ement and deploy their code securely.\n\nWe will wear many hats in this tr
 aining. We will point out numerous exploitations e.g.\, Injection attacks 
 to steal data\, Cross Site Scripting (XSS) vulnerabilities to compromise a
  user’s browser\, break authentication to gain access to data and access
  some secrets. We will also wear Defender Hats. We will discuss various mi
 tigation strategies as well as explore some of code examples and fix the r
 oot cause of these vulnerabilities.\n\nSince we want to make this training
  more practical and applicable to developers\, we will also focus on devel
 oping software using Secure Software Development Life Cycle (Secure SDLC).
  We will detail some of common developers' mistakes in implementations and
  deployments which in turn become security vulnerabilities of their system
 s.\n\nThis training is mainly based on OWASP The Top-10 Project\, WebGoat\
 , an OWASP project designed to teach penetration testing for web applicati
 ons as well as the instructor's web security experience and knowledge. In 
 addition\, we will discuss online resources as well as useful tools to hel
 p developers create a more secure web application.\nCourse Requirement?\n\
 n 	At least 1-2-year programming experience\n 	Interested in security and/
 or wanted to build more secure (web) applications\n\nCourse Contents\nDay1
  : \n\nCyber Security\n\n 	CIA Triad: Confidentiality\, Integrity\, Availa
 bility\n 	"Security" as part of system initial design\n 	Cyber security at
 tacks and trends in 2010s\n 	Overview of resources and tools for this trai
 ning: OWASP WebGoat Project\n\nWeb Application in a nutshell\n\n 	Web 2.0 
 as stateless request-response\n 	Request: GET vs POST\n 	HTTP and HTTPS\n 
 	Authentication: Cookie\, OAuth\n\nUnderstanding Web Application Security\
 n\nExplore common web application vulnerabilities\, selected from OWASP To
 p 10 2013 and 2017.\n\nSensitive Data Exposure [A3: 2017]\n\n 	Why we care
  about data: Data leakage impacts\, PII\, EU GDPR\, user privacy\n 	Attack
  vector examples. Popular attack vectors e.g.\, man-in-the-middle attacks 
 (HTTP\, SSL/TLS striping\, session hijacking\, replay)\n 	Encryption at be
 st (Enforce encryption deployment): HSTS\n 	How to store sensitive data\, 
 or how not to store sensitive data\n\nCross-Site Request Forgery (CSRF) [A
 8: 2013]\n\n 	What is Cross-site Request Forgery\n 	Vulnerable code exampl
 es\n 	DEMO: CSRF in action (e.g.\, on java web application)\n 	Basic testi
 ng and how to prevent CSRF attacks and practical countermeasures (e.g.\, p
 reventing CSRF in java)\n 	DEMO: Testing our measurement deployment\n\nCro
 ss-site Scripting Attacks (XSS) [A7: 2017\, A3: 2013]\n\n 	DOM\, Dynamical
 ly Generating Pages\, and Cross-Site Scripting (XSS)\n 	XSS vulnerabilitie
 s\n 	Dangers of XSS attacks\n 	DEMO: XSS attacks in action\n 	Protection a
 gainst XSS\n 	Patching reflected XSS\n 	DEMO: example of patching an XSS v
 ulnerability\n\nInjection [A1: 2017\, A4: 2017\, A1: 2013]\n\n 	Injection 
 attacks and popular injection attacks\n 	SQL syntax and basics\n 	SQL inje
 ction attacks\n 	Mitigating SQL Injection Using Prepared Statements\, Stor
 ed Procedures\, Whitelisting\n\nBroken Authentication and Session Manageme
 nt [A2: 2017\, A2: 2013]\n\n 	Common authentication weaknesses\n 	Protecti
 ng our user → Protect our system: how to prevent automated\, credential 
 stuffing\, brute force\, and stolen credential reuse attacks\n 	Hey what i
 s your password? It is "password"\n 	Common session management weaknesses\
 n 	DEMO: WebGoat’s Session Management Vulnerability\n\nInsecure Deserial
 ization [A8: 2017]\n\n 	What is serialization and deserialization?\n 	Obje
 ct serialization attack examples e.g.\, untrusted input\n 	Countermeasures
  e.g.\, integrity checks\, hash and signatures\n 	OWASP Deserialization se
 curity risks\n\nBroken Access Control [A5: 2017\, A4: 2013\, A7: 2013]\n\n
  	Access control and authorization\n 	Example scenarios e.g.\, users acces
 s API with missing authorization\n 	Rate limit APIs\n 	OWASP Testing for A
 ccess Control\n\nDay 2\n\nSecure Software Development Life Cycle (Secure S
 DLC)\n\nExplore the Secure SDLC as well as OWASP Top-10 vulnerabilities th
 at are common mistakes from development process.\n\nPlanning and Requireme
 nt\n\n 	Goal\, threat modeling\, security baselines\, mapping assets\n 	Se
 curity training and awareness\n\nArchitecture and design\n\n 	Because secu
 rity is not only at the testing phrase\n 	Security design and peer review\
 n\nDevelopment\n\n 	Security review and peer review\n 	Software version co
 ntrol\n 	Unit testing\n\nSecurity Testing\, Deployment and Beyond\n\nVulne
 rability scanning: Static and dynamic analysis\n\nSecurity Misconfiguratio
 n [A6: 2017\, A5: 2013]\n\n 	Security misconfiguration: Configuration madn
 esses on level of application stacks (web components)\n 	Common misconfigu
 rations e.g.\, develop vs production environment\n 	Example of web securit
 y misconfigurations e.g.\, HTTP headers: HSTS\, CORS\, Content Security Po
 licy\n 	Upgrade and deployment processes\n 	OWASP Testing guidelines\n\n- 
 Using Components with Known Vulnerabilities [A9: 2013\, A9: 2013]\n\n 	Act
 ively monitoring: update\, upgrade\, patch them!\n 	List of vulnerabilitie
 s and testing before and after deployment\n 	Zero-day vulnerabilities\n 	O
 WASP Testing guidelines\n 	Security tools to check vulnerabilities (automa
 ted style!)\n\nInsufficient Logging and Monitoring [A10: 2017]\n\n 	Why lo
 gging and monitoring?\n 	How to store security logs\n 	Penetration testing
 \n 	Real-time logging analysis\, anomaly detection\, and security data sci
 ence\n\nConclusion\n\nReview\, Take away\, Other useful resources\, tools 
 and feature readings\n\nQ&amp\;A\nTraining info\nDuration : 2 Days\nDate :
  Sept 10 - 11\, 2026\nTime : 9.30-16.30 pm.\nVenue : Client's Venue\nTrai
 ning Fee : Please Call\nTel. 02 670 8980-3 ext. 321-323\nEmail. training@a
 cinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/01/Exploiting-and-Securing-Web-Application.png
CATEGORIES:Web Application
END:VEVENT
BEGIN:VEVENT
UID:890@acinfotec.com
DTSTART:20260910T023000Z
DTEND:20260911T093000Z
DTSTAMP:20260107T101931Z
URL:https://www.acinfotec.com/training-event/pecb-certified-gdpr-foundatio
 nexam-included-3/
SUMMARY:PECB Certified GDPR Foundation(Exam Included)
DESCRIPTION:About this course\n\nGDPR Foundation training enables you to le
 arn the basic elements to implement and manage a compliance framework with
  regard to the protection of personal data. During this training course\, 
 you will be able to understand the fundamental privacy principles and beco
 me familiar with the role of the Data Protection Officer.\n\nAfter complet
 ing this course\, you can sit for the exam and apply for a “PECB Certifi
 ed GDPR Foundation” credential. A PECB Foundation Certificate shows that
  you have understood the fundamental methodologies\, requirements\, framew
 ork and management approach.\nWho should attend?\n\n 	Individuals involved
  in Personal Data Protection and Information Security\n 	Individuals seeki
 ng to gain knowledge about the main privacy principles\n 	Individuals inte
 rested to pursue a career in Data Protection\n\nLearning objectives\n\n 	U
 nderstand the General Data Protection Regulation  requirements and the fu
 ndamental principles of privacy\n 	Understand the obligations\, roles and 
 responsibilities of the Data Protection Officer\n 	Understand the concepts
 \, approaches\, methods and techniques to effectively align a compliance f
 ramework with regard to the protection of personal data\n\nCourse agenda\n
 Day 1: Introduction to GDPR and Data Protection Principles\nDay 2: The Gen
 eral Data Protection Regulation requirements and Certification Exam\nGener
 al information\n\n 	Certification fees are included on the exam price.\n 	
 Training material containing over 200 pages of information and practical e
 xamples will be distributed\n 	A participation certificate of 14 CPD (Cont
 inuing Professional Development) credits will be issued\n 	In case of exam
  failure\, you can retake the exam within 12 months for free\n\n Training 
 info\nDuration:  2 Days\nDate:  Sept 10 - 11\, 2026\nTime:  9.30 am. 
 – 16.30 pm.\nVenue:  ACinfotec Training Center\n16th Fl.\, Grande Cent
 re Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 32\,000 
 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec
 .com\n\n\n\nwww.pecb.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:814@acinfotec.com
DTSTART;VALUE=DATE:20260914
DTEND;VALUE=DATE:20260919
DTSTAMP:20260107T101905Z
URL:https://www.acinfotec.com/training-event/certified-network-defender-cn
 d-exam-included-2/
SUMMARY:CERTIFIED NETWORK DEFENDER (CND) (Exam Included)
DESCRIPTION:\n\n\nAbout this course\nCertified Network Defender (CND) is a 
 vendor-neutral\, hands-on\, instructor-led comprehensive network security 
 certification training program. It is a skills-based\, lab intensive progr
 am based on a job-task analysis and cybersecurity education framework pres
 ented by the National Initiative of Cybersecurity Education (NICE). The co
 urse has also been mapped to global job roles and responsibilities and the
  Department of Defense (DoD) job roles for system/network administrators. 
 The course is designed and developed after extensive market research and s
 urveys. The program prepares network administrators on network security te
 chnologies and operations to attain Defense-in-Depth network security prep
 aredness. It covers the project\, detect and respond approach to network s
 ecurity. The course contains hands-on labs\, based on major network securi
 ty tools and techniques which will provide network administrators real wor
 ld expertise on current network security technologies and operations. The 
 study-kit provides you with over 10 GB of network security best practices\
 , assessments and protection tools. The kit also contains templates for va
 rious network policies and a large number of white papers for additional l
 earning.\nCourse Benefits\n\n 	Student will learn about various network se
 curity controls\, protocols\, and devices.\n 	Students will able to troubl
 eshoot their network for various network problems.\n 	Student will able id
 entify various threats on organization network.\n 	Student will learn how 
 to design and implement various security policies for their organizations.
 \n 	Student will learn the importance of physical security and able to det
 ermine and implement various physical security controls for their organiza
 tions.\n 	Student will able to harden security of various hosts individual
 ly in the organization’s network.\n 	Student will able to choose appropr
 iate firewall solution\, topology\, and configurations to harden security 
 through firewall.\n 	Student will able to determine appropriate location f
 or IDS/IPS sensors\, tuning IDS for false positives and false negatives\, 
 and configurations to harden security through IDPS technologies.\n 	Studen
 ts will able to implement secure VPN implementation for their organization
 .\n 	Student will able identify various threats to wireless network and le
 arn how to mitigate them.\n 	Student will able to monitor and conduct sign
 ature analysis to detect various types of attacks and policy violation act
 ivities.\n 	Student will able to perform risk assessment\, vulnerability a
 ssessment/scanning through various scanning tools and generate detailed re
 ports on it.\n 	Student will able to identify the critical data\, choose a
 ppropriate back up method\, media and technique to perform successful back
 up of organization data on regular basis.\n 	Student will able to provide 
 first response to the network security incident and assist IRT team and fo
 rensics investigation team in dealing with an incident.\n\n\nWho should at
 tend?\n\n\n 	\nNetwork Administrators\n 	\nNetwork Defense Technicians\n 	
 \nSecurity Operator\n 	\nCND Analyst\n 	\nNetwork Security Administrators
 \n 	\nNetwork Security Engineer\n 	\nSecurity Analyst\n 	\nAnyone who invo
 lves in network operations\n\nCourse Contents\nModule I: Computer Network 
 and Defense Fundamentals\n\n\nModule II: Network Security Threats\, Vulner
 abilities\, and Attacks\n\n\nModule III: Network Security Controls\, Proto
 cols\, and Devices\n\n\nModule IV: Network Security Policy Design and Impl
 ementation\n\n\nModule V: Physical Security\n\n\nModule VI: Host Security\
 n\n\nModule VII: Secure Firewall Configuration and Management\n\n\nModule 
 VIII: Secure IDS Configuration and Management\n\n\nModule IX: Secure VPN C
 onfiguration and Management\n\n\nModule X: Wireless Network Defense\n\n\nM
 odule XI: Network Traffic Monitoring and Analysis\n\n\nModule XII: Network
  Risk and Vulnerability Management\n\n\nModule XIII: Data Backup and Recov
 ery\n\n\nModule XIV: Network Incident Response and Management\n\n\n\n\n\n\
 n\n\n\n\n\n\n\n\nConcept\n"IF YOUR IT CREW IS NOT INTO SECURITY\, YOU JUST
  WON’T HAVE SECURITY"\nPROTECT - DETECT - RESPOND\n\nTraining Info\nLang
 uage: Conducted in Thai Language\nDuration: 5 Days\nTraining Date: Sept
  14-18\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre
  Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 50\,000 BA
 HT (Ex.Vat 7%)\nTel : 02 670 8980-3 ext. 321-323\nE-mail: training@acinfot
 ec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/4.-CND-Certified-Network-Defender.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:962@acinfotec.com
DTSTART:20260914T023000Z
DTEND:20260918T093000Z
DTSTAMP:20260107T101844Z
URL:https://www.acinfotec.com/training-event/cissp-exam-preparation-exam-e
 xcluded-12/
SUMMARY:CISSP Exam Preparation (Exam Excluded)
DESCRIPTION:\nAbout This Course\nThe CISSP has clearly emerged as THE key c
 ertification for security professionals. In fact\, in an informal survey o
 f information security jobs on a major employment Web site\, over 70 perce
 nt of the positions required CISSP certification! Corporations are demandi
 ng experienced information security professionals with the certifications 
 to prove it to protect their information and assets.\n\nThe CISSP Prep cla
 ss was developed to meet current demands and the growing needs of the comp
 uter industry. This class provides the student with the level of knowledge
  needed as part of the (ISC)2 certification requirements for the Certified
  Information System Security Professional (CISSP) Certification. This cert
 ification is rapidly becoming a requirement for employment with security t
 asks. Students gain a solid background on security concerns\, communicatio
 ns\, infrastructure\, basic cryptography\, and operational\nWho should att
 end?\n\nThe CISSP is ideal for experienced security practitioners\, manage
 rs and executives interested in proving their knowledge across a wide arra
 y of security practices and principles\, including those in the following 
 positions:\n\n 	Security Manager\n 	Security Auditor\n 	Security Architect
 \n 	Security Consultant\n 	Network Architect\n 	Chief Information Security
  Officer\n 	Chief Information Officer\n 	Director of Security\n 	IT Direct
 or/Manager\n 	Security Systems Engineer\n 	Security Analyst\n\nCourse Cont
 ents\n\nThe CISSP exam evaluates your expertise across eight security doma
 ins. Think of the domains as topics you need to master based on your profe
 ssional experience and education.\n\n\nDomain 1 : Security and Risk Manage
 ment (Security\, Risk\,Compliance\, Law\, Regulations\, and Business Conti
 nuity)\n\n 	Confidentiality\, integrity\, and availability concepts\n 	Sec
 urity governance principles\n 	Compliance\n 	Legal and regulatory issues\n
  	Professional ethics\n 	Security policies\, standards\, procedures and gu
 idelines\n 	Business continuity requirements\n 	Personnel security policie
 s\n 	Risk management concepts\n 	Threat modeling\n 	Risk considerations\n 
 	Security education\, training\, and awareness\n\nDomain 2 : Asset Securit
 y (Protecting Security of Assets)\n\n 	Information and asset classificatio
 n\n 	Ownership (e.g. data owners\, system owners)\n 	Protect privacy\n 	Ap
 propriate retention\n 	Data security controls\n 	Handling requirements (e.
 g. markings\, labels\,storage)\n\nDomain 3 : Security Engineering (Enginee
 ring and Management of Security)\n\n 	Engineering processes using secure d
 esign principles\n 	Security models fundamental concepts\n 	Security evalu
 ation models\n 	Security capabilities of information systems\n 	Security a
 rchitectures\, designs\, and solution elements vulnerabilities\n 	Web-base
 d systems vulnerabilities\n 	Mobile systems vulnerabilities\n 	Embedded de
 vices and cyber-physical systems vulnerabilities\n 	Cryptography\n 	Site a
 nd facility design secure principles\n 	Physical security\n\nDomain 4 : Co
 mmunication and Network Security (Designing and Protecting Network Securit
 y)\n\n 	Secure network architecture design (e.g. IP &amp\; non-IP protocol
 s\, segmentation)\n 	Secure network components\n 	Secure communication cha
 nnels\n 	Network attacks\n\nDomain 5 : Identity and Access Management (Con
 trolling Access and Managing Identity)\n\n 	Physical and logical assets co
 ntrol\n 	Identification and authentication of people and devices\n 	Identi
 ty as a service (e.g. cloud identity)\n 	Third-par ty identity services (e
 .g. on-premise)\n 	Access control attacks\n 	Identity and access provision
 ing lifecycle (e.g. provisioning review)\n\nDomain 6 : Security Assessment
  and Testing (Designing\, Performing\, and Analyzing Security Testing)\n\n
  	Assessment and test strategies\n 	Security process data (e.g. management
  and operational controls)\n 	Security control testing\n 	Test outputs (e.
 g. automated\, manual)\n 	Security architectures vulnerabilities\n\nDomain
  7 : Security Operations (Foundational Concepts\, Investigations\, Inciden
 t Management\, and Disaster Recovery)\n\n 	Investigations support and requ
 irements\n 	Logging and monitoring activities\n 	Provisioning of resources
 \n 	Foundational security operations concepts\n 	Resource protection techn
 iques\n 	Incident management\n 	Preventative measures\n 	Patch and vulnera
 bility management\n 	Change management processes\n 	Recovery strategies\n 
 	Disaster recovery processes and plans\n 	Business continuity planning and
  exercises\n 	Physical security\n 	Personnel safety concerns\n\nDomain 8 :
  Software Development Security (Understanding\,Applying\, and Enforcing So
 ftware Security)\n\n 	Security in the software development life cycle\n 	D
 evelopment environment security controls\n 	Software security effectivenes
 s\n 	Acquired software security impact\n\nCISSP Changes To Computerized Ad
 aptive Testing\n(ISC)² has introduced Computerized Adaptive Testing (CAT)
  for all English CISSP exams worldwide. Based on the same exam content out
 line as the linear\, fixed-form exam\, CISSP CAT is a more precise and eff
 icient evaluation of your competency. CISSP CAT enables you to prove your 
 knowledge by answering fewer items and completing the exam in half the tim
 e.\nHow Does it Work?\nEach candidate taking the CISSP CAT exam will start
  with an item that is well below the passing standard. Following a candida
 te’s response to an item\, the scoring algorithm re-estimates the candid
 ate’s ability based on the difficulty of all items presented and answers
  provided. With each additional item answered\, the computer's estimate of
  the candidate’s ability becomes more precise – gathering as much info
 rmation as possible about a candidate’s true ability level more efficien
 tly than traditional\, linear exams.\n\nThis more precise evaluation enabl
 es us to reduce the maximum exam administration time from 6 hours to 3 hou
 rs\, and it reduces the items necessary to accurately assess a candidate
 ’s ability from 250 items on a linear\, fixed-form exam to as little as 
 100 items on the CISSP CAT exam.\n\nThe exam content outline and passing s
 tandard for both versions of the examination are exactly the same. Each ca
 ndidate will be assessed on the same content and must demonstrate the same
  level of competency regardless of the exam format.\n\nCISSP exams in all 
 other languages\, as well as all CISSP concentration exams are delivered a
 s linear\, fixed-form exams.\nTraining Info\nDuration : 5 Days\nDate : Se
 pt 14-18\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Training Cente
 r\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.
 \nTraining Fee : 38\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext.321-323\
 nEmail. training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-1.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:983@acinfotec.com
DTSTART:20260914T023000Z
DTEND:20260916T093000Z
DTSTAMP:20260107T101853Z
URL:https://www.acinfotec.com/training-event/crisc-certified-in-risk-and-i
 nformation-systems-control-exam-excluded-4/
SUMMARY:CRISC – Certified in Risk and Information Systems Control (Exam E
 xcluded)
DESCRIPTION:Course Overview\nThe Certified in Risk and Information Systems 
 Control™ certification (CRISC™\, pronounced “see-risk”) is designe
 d for IT professionals who have hands-on experience with risk identificati
 on\, assessment\, and evaluation\; risk response\; risk monitoring\; IS co
 ntrol design and implementation\; and IS control monitoring and maintenanc
 e.\n\nThe CRISC designation will not only certify professionals who have k
 nowledge and experience identifying and evaluating entity-specific risk\, 
 but also aid them in helping enterprises accomplish business objectives by
  designing\, implementing\, monitoring and maintaining risk-based\, effici
 ent and effective IS controls.\nWho Should attend?\nIT professionals inter
 ested in earning Certified in Risk and Information Systems Controls (CRISC
 ) certification. CRISC is for IT professionals\, risk professionals\, busi
 ness analysts\, project manager and/or compliance professionals\, how work
   towards evaluation and mitigation of risk\, and who have  job experien
 ce in the following areas:\n\n* Risk identification\, assessment and evalu
 ation\;\n* Risk response and monitoring and\n* IS control design/monitorin
 g and implementation/maintenance.\nCourse Benefits\nThe CRISC course offer
 s students outstanding benefits\, including:\n\n 	Three full days of inten
 se instruction with no outside distractions\n 	In-person access to the top
  security experts in the industry\n 	Lunch and snacks provided on each day
  of class\n 	Worldwide recognition as a universally accepted information s
 ystems manager\n 	Opportunity to build upon existing certifications/creden
 tials already earned\n 	Provides tangible evidence of career growth\n 	Pot
 ential for a salary increase and/or promotion\n 	Intense Courseware:\n\n 	
 ISACA Authorized Courseware including:\nCRISC Review Manual\nCRISC Review 
 Questions\, Answers &amp\; Explanations Manual\n\n\n 	Excellent Certificat
 ion Preparation (Note that Students are responsible for registering for th
 e exam and transportation to the exam\; InfoSec Institute will not provide
  exam logistics or transportation support)\n\nExamination\nOur CRISC exam 
 preparation course assists IT professionals to accomplish the following bu
 siness objectives in their enterprise:\n\n* Designing\, implementing\, mon
 itoring &amp\; maintaining risk-based\, effective IS controls\n* Complianc
 e with regulatory requirements\n\nAlso covered are the 5 domains as requir
 ed by ISACA:\n\n1. Risk Identification Assessment and Evaluation (RI)\n2. 
 Risk Response (RR)\n3. Risk Monitoring (RM)\n4. IS Control Design and Impl
 ementation (CD)\n5. IS Control Monitoring and Maintenance (MM)\n\n 	Comput
 er-based examination\n 	4 hours\n 	150 multiple-choice question exam\n 	IS
 ACA uses a 200 – 800 point scale with 450 as the passing mark for the ex
 ams\n\nCertifications\nInfoSec Institute’s CRISC course extensively prep
 ares students for the CRISC exam\, which consists of 200 multiple-choice q
 uestions that cover the five information systems auditing areas. These are
 as have been created from a CRISC job practice analysis and reflect the wo
 rk performed by information systems auditors.\nTraining Info\nDuration : 3
  Days\nDate : Sept 14-16\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfote
 c Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workla
 b) \, Rama 4 Rd.\nTraining Fee : 34\,000 Baht (ex.vat 7%)\nTel. 02 670 898
 0-3 ext.321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/1.png
CATEGORIES:ISC2 &amp; ISACA,Risk Based IT Audit,Risk Management &amp;
 Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:928@acinfotec.com
DTSTART:20260921T023000Z
DTEND:20260925T093000Z
DTSTAMP:20260115T031609Z
URL:https://www.acinfotec.com/training-event/pecb-iso-29100-certified-lead
 -privacy-implementer-clpi-exam-included-2/
SUMMARY:PECB ISO 29100 Certified Lead Privacy Implementer – CLPI (Exam In
 cluded)
DESCRIPTION:\nCourse Overview\nThis five-day intensive course enables parti
 cipants to develop the necessary expertise to support an organization in 
 implementing and managing a Privacy Framework based on ISO 29100. Partici
 pants will gain a thorough understanding of how to design\, build and lead
  organizations privacy programs in all processes of ICT systems and servi
 ces\, through the use of best practices.\n\nThe training provides a privac
 y framework which specifies a common privacy terminology\, defines the ac
 tors and their roles in processing personally identifiable information (PI
 I)\, describes privacy safeguarding considerations and provides reference
 s to known privacy principles for information\ntechnology.\nWho Should Att
 end\n\n 	Project managers or consultants wanting to prepare and to support
  organizations on implementing and managing a Privacy\nFramework\n 	Securi
 ty auditors who wish to fully understand the Privacy Framework implementat
 ion process\n 	Experienced IT security management professionals\n 	IT secu
 rity professionals interested in earning Privacy Management Framework cert
 ification\n 	Privacy Officers\, Data Protection Officers\, and Compliance 
 professionals with an interest in privacy legislation and risk\n 	Security
  professionals with front-line experience\n 	Information security staff\n 
 	Expert advisors in information technology\n 	Persons and organizations in
 volved in tasks where privacy controls are required for the processing of 
 PII\n\nLearning Objectives\n\n 	To understand the core competences on Priv
 acy Framework\n 	To gain a comprehensive understanding of the concepts\, a
 pproaches\, standards\, methods and techniques required for the\neffective
  protection of personally identifiable information (PII)\n 	To define priv
 acy safeguarding requirements related to PII within an ICT environment\n 	
 To understand the relationship between the components of Privacy Framework
  with existing security standards and various\napplicable laws\n 	To acqui
 re necessary expertise in privacy governance\, specifically in personally 
 identifiable information governance\n 	To acquire necessary expertise in p
 rivacy risk management compliance connected with personally identifiable i
 nformation\n 	To develop knowledge and skills required to advise for impro
 ve organizations’ privacy programs through the use of best\npractices\n 
 	To improve the capacity for analysis of privacy incident management\n\nCo
 urse Contents \n\nIntroduction to Privacy Framework concepts as recommend
 ed by ISO 29100\n\n▶ Privacy Framework based on ISO 29100 and regulatory
  framework\n▶ Fundamental Principles of Privacy\n▶ Privacy Legislation
  US &amp\; Europe\n▶ Writing a business case and a project plan for the 
 implementation of a Privacy Framework\n▶ Initiating the Privacy Framewor
 k implementation\n\nPlanning the implementation of the Privacy Framework\n
 \n▶ Preliminary analysis of Existing Controls\n▶ Leadership and approv
 al of the Privacy Framework project\n▶ Defining the scope of a Privacy F
 ramework\n▶ Development of a Privacy policy\n▶ Selection of the approa
 ch and methodology for risk assessment\n▶ Control Statement and manageme
 nt decision to implement the Privacy Framework\n▶ Definition of the orga
 nizational structure of Privacy\n\nImplementing a Privacy Framework\n\n▶
  Implementation of a document management framework\n▶ Design of controls
  and writing procedures and specific policies\n▶ Implementation of priva
 cy controls\n▶ Development of a training &amp\; awareness program and co
 mmunicating about the privacy\n▶ Incident management\n▶ Operations Man
 agement\n\nPrivacy Framework measurement and continuous improvement\n\n▶
  Monitoring\, Measurement\, Analysis and Evaluation\n▶ Internal Audit\n
 ▶ Management Review\n▶ Treatment of problems and points of concern\n
 ▶ Continual improvement\n▶ Competence and evaluation of implementers\n
 \nCertification Exam\n\n Training Info\n\n\n\n\nLanguage : Conducted in 
 Thai Language\nDuration : 5 Days\nDate :  Sept 21 - 25\, 2026\nTime : 9
 .30 am. – 16.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grand
 e Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 67
 0 8980-3 Ext. 321-323\nPrice : THB 51\,500 (Excluding 7% VAT)\nE training
 @acinfotec.com\n\n\n\nwww.pecb.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:942@acinfotec.com
DTSTART:20260921T023000Z
DTEND:20260923T093000Z
DTSTAMP:20260107T092829Z
URL:https://www.acinfotec.com/training-event/cgeit-certified-in-the-govern
 ance-of-enterprise-it-exam-prep-new/
SUMMARY:CGEIT - Certified in the Governance of Enterprise IT (Exam Prep.) -
  New!
DESCRIPTION:About this course\nCertified in the Governance of Enterprise IT
 ® (CGEIT®) certification is framework agnostic and the only IT governanc
 e certification for the individual. Whether you’re seeking a new career 
 opportunity or striving to grow within your current organization\, CGEIT p
 roves your expertise in enterprise IT governance\, resources\, benefits an
 d risk optimization.\nWho should attend?\n\n 	CISO/CTO\n 	Information Secu
 rity\n 	Compliance Manager\n 	Governance Risk Consultant\n\nCourse Content
 s\nValidate your proficiencies for handling the challenges and responsibil
 ities of a modern IT governance expert with a CGEIT\, which focuses on the
 se domains:\n\nDomain 1. GOVERNANCE OF ENTERPRISE IT\n\nThis domain deals 
 with the organizational structure of building IT frameworks\, the strategy
  and technology aspects of IT governance and essential knowledge about gov
 erning various types of information.\n\nA—GOVERNANCE FRAMEWORK\n\n 	Comp
 onents of a Governance Framework\n 	Organizational Structures\, Roles and 
 Responsibilities\n 	Strategy Development\n 	Legal and Regulatory Complianc
 e\n 	Organizational Culture\n 	Business Ethics\n\nB—TECHNOLOGY GOVERNANC
 E\n\n 	Governance Strategy Alignment with Enterprise Objectives\n 	Strateg
 ic Planning Process\n 	Stakeholder Analysis and Engagement\n 	Communicatio
 n and Awareness Strategy\n 	Enterprise Architecture\n 	Policies and Standa
 rds\n\nC— INFORMATION GOVERNANCE\n\n 	Information Architecture\n 	Inform
 ation Asset Lifecycle\n 	Information Ownership and Stewardship\n 	Informat
 ion Classification and Handling\n\nDomain 2. IT RESOURCES\n\nThis domain p
 rovides insight about where to effectively allocate your IT resources and 
 how to ensure IT resources are streamlined for performance.\n\nA— IT RES
 OURCE PLANNING\n\n 	Sourcing Strategies\n 	Resource Capacity Planning\n 	A
 cquisition of Resources\n\nB— IT RESOURCE OPTIMIZATION\n\n 	Sourcing Str
 ategies\n 	Resource Capacity Planning\n 	Acquisition of Resources\n\nDomai
 n 3. BENEFITS REALIZATION\n\nThis domain’s focus is on managing performa
 nce\, monitoring and reporting\, and analyzing IT-enabled technology inves
 tment management.\n\nA— IT PERFORMANCE AND OVERSIGHT\n\n 	Performance Ma
 nagement\n 	Change Management\n 	Governance Monitoring\n 	Governance Repor
 ting\n 	Quality Assurance\n 	Process Development and Improvement\n\nB— M
 ANAGEMENT OF IT-ENABLED INVESTMENTS\n\n 	Business Case Development and Eva
 luation\n 	IT Investment Management and Reporting\n 	Performance Metrics\n
  	Benefit Evaluation Methods\n\nDomain 4. RISK OPTIMIZATION\n\nThis domain
  is about mitigating potential IT risks and challenges and overseeing the 
 risks of IT management capabilities.\n\nA–RISK STRATEGY\n\n 	Risk Framew
 orks and Standards\n 	Enterprise Risk Management\n 	Risk Appetite and Risk
  Tolerance\n\nB–RISK MANAGEMENT\n\n 	IT-Enabled Capabilities\, Processes
  and Services\n 	Business Risk\, Exposures and Threats\n 	Risk Management 
 Lifecycle\n\n Training Info\nDuration:  3 Days\nDate: \, Sept 21 - 23\, 
 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:  ACinfotec Training Center
 \n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\
 nTraining Fees: 34\,000 Baht (ex.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE
 -mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/06/CGEIT-1.png
CATEGORIES:Compliance,Data Governance,ISC2 &amp; ISACA,Risk Management
 &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:978@acinfotec.com
DTSTART:20260921T023000Z
DTEND:20260925T093000Z
DTSTAMP:20260107T092813Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-42001-
 lead-implementer-artificial-intelligence-management-system-exam-included/
SUMMARY:PECB Certified ISO/IEC 42001 Lead Auditor (Artificial Intelligence 
 Management System) (Thai) (Exam Included)
DESCRIPTION:About this course\nISO/IEC 42001 Lead Auditor training course e
 nables you to gain the necessary expertise to audit artificial intelligenc
 e management systems (AIMS) by applying widely recognized audit principles
 \, procedures\, and techniques.\nCourse benefits\nArtificial intelligence 
 (AI) has become integral to the success of many organizations by enhancing
  efficiency through automation and improving decision-making by utilizing 
 advanced data analytics. However\, organizations should ensure the appropr
 iate and ethical use of AI. ISO/IEC 42001 enables organizations to impleme
 nt appropriate processes and controls to ensure the responsible use and ma
 nagement of AI system.\n\nAs the number of organizations seeking ISO/IEC 4
 2001 compliance increases\, there is a simultaneous surge in demand for sk
 illed auditors possessing the necessary knowledge to assess and verify com
 pliance. Therefore\, PECB has developed the ISO/IEC 42001 Lead Auditor tra
 ining course to empower participants with the knowledge and skills essenti
 al for planning and conducting ISO/IEC 42001 audits based on best audit pr
 actices.\n\nThe ISO/IEC 42001 Lead Auditor training course is beneficial f
 or professionals seeking to stay ahead of the competition. This training c
 ourse equips you with the expertise needed to navigate the intricate realm
  of AI-influenced organizational frameworks\, ensuring you are well-prepar
 ed to contribute to the success of organizations in this transformative er
 a.\n\nAfter finishing the training course\, you will be eligible to take t
 he exam. After passing the exam\, you will be able to apply for the “PEC
 B Certified ISO/IEC 42001 Lead Auditor” credential. This certification p
 roves your professional expertise in auditing organizations against ISO/IE
 C 42001 based on best auditing practices.\nWho should attend?\nThis traini
 ng course is intended for:\n\n 	Individuals with a background in auditing\
 , whether internal or external\, seeking to specialize in auditing AI mana
 gement system\n 	Managers or consultants seeking to master the AI manageme
 nt system audit process\n 	Individuals responsible for maintaining conform
 ity with the AI management system requirements in an organization\n 	Exper
 t advisors in AI management\n 	Professionals involved in analyzing and und
 erstanding business requirements for AI implementation\n 	Individuals invo
 lved in the development and implementation of AI solutions and in designin
 g the architecture of AI systems\n\nLearning Objectives\nAfter completing 
 this training course\, you will be able to:\n\n 	Explain the fundamental c
 oncepts and principles of an AI management system based on ISO/IEC 42001\n
  	Interpret the ISO/IEC 42001 requirements for an AI management system fro
 m the perspective of an auditor\n 	Evaluate the AI management system confo
 rmity to ISO/IEC 42001 requirements in accordance with the fundamental aud
 it concepts and principles\n 	Plan\, conduct\, and close an ISO/IEC 42001 
 compliance audit\, in accordance with ISO/IEC 17021-1 requirements\, ISO 1
 9011 guidelines\, and other best practices of auditing\n 	Manage an ISO/IE
 C 42001 audit program\n\nCourse Agenda\nDay 1: Introduction to the artifi
 cial intelligence management system and ISO/IEC 42001\n\nDay 2: Audit pri
 nciples and the preparation for and initiation of an audit\n\nDay 3: On-s
 ite audit activities\n\nDay 4: Closing of the audit\n\nDay 5: Certificat
 ion Exam\nTraining info\nLanguage: Conducted in Thai Language\nDuration:
  5 Days\nDate: Sept 21 - 25\, 2026\nVenue: ACinfotec Training Center\n16
 th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTra
 ining Fees: 51\,500 BAHT (Ex.Vat 7%)\nTel : 02 670 8980-3 ext. 321-323\nE
 -mail: training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:AI Intelligent,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:981@acinfotec.com
DTSTART:20260921T023000Z
DTEND:20260924T093000Z
DTSTAMP:20250910T073407Z
URL:https://www.acinfotec.com/training-event/cism-examination-preparation-
 exam-excluded-15/
SUMMARY:CISM Examination Preparation (Exam Excluded)
DESCRIPTION:About this course\nWhile information has become more easily acc
 essible and readily available\, the associated risks and security threats 
 have not only increased in number\, but also complexity.  As a result\, t
 he importance of ensuring that an enterprise’s information is protected 
 has also increased.  It is now more important than ever for executives to
  ensure that their IT security managers have the expertise needed to reduc
 e risk and protect the enterprise.\n\nDesigned specifically for informatio
 n security professionals who are preparing to sit for the CISM exam\, the 
 course focuses on the four content areas of the Certified Information Secu
 rity Manager (CISM) job practice:  information security governance\, risk
  management and compliance\, information security program development and 
 management\, information security incident management. Sample exam items w
 ill be used throughout the course to reinforce content and familiarize att
 endees with the CISM exam question format.\nCourse Benefits\nThe demand fo
 r skilled information security management professionals is on the rise\, a
 nd the CISM certification is the globally accepted standard of achievement
  in this area.\n\nCISMs understand the business. They know how to manage a
 nd adapt technology to their enterprise and industry.\nWho should Attend?\
 n\n 	Risk managers.\n 	Security professionals with front-line experience.\
 n 	Security auditors.\n 	Information security staff.\n 	Compliance personn
 el.\n 	Information security managers.\n 	CSOs\, CISOs and CIOs.\n 	Informa
 tion security assurance providers\n\nCourse Contents\nDay 1 – Informatio
 n Security Governance\n\nAttendees will understand the broad requirements 
 for effective information security governance\, the elements and actions r
 equired to develop an information security strategy\, and be able to formu
 late a plan of action to implement this strategy.\n\n 	Establish and maint
 ain an information security strategy and align the strategy with corporate
  governance\n 	Establish and maintain an information security governance f
 ramework\n 	Establish and maintain information security policies\n 	Develo
 p a business case\n 	Identify internal and external influences to the orga
 nization\n 	Obtain management commitment\n 	Define roles and responsibilit
 ies\n 	Establish\, monitor\, evaluate and report metrics\n\nDay 2 – Info
 rmation Risk Management and Compliance\n\nAttendees will be able to manage
  information security risks.\n\n 	Establish a process for information asse
 t classification and ownership\n 	Identify legal\, regulatory\, organizati
 onal and other applicable requirements\n 	Ensure that risk assessments\, v
 ulnerability assessments and threat analyses are conducted periodically.\n
  	Determine appropriate risk treatment options.\n 	Evaluate information se
 curity controls\n 	Identify the gap between current and desired risk level
 s\n 	Integrate information risk management into business and IT processes\
 n 	Monitor existing risk.\n 	Report noncompliance and other changes in inf
 ormation risk\n\nDay 3 – Information Security Program Development and Ma
 nagement\n\nAttendees will be able to develop and manage an information se
 curity plan.\n\n 	Establish and maintain the information security program\
 n 	Ensure alignment between the information security program and other bus
 iness functions\n 	Identify\, acquire\, manage and define requirements for
  internal and external resources\n 	Establish and maintain information sec
 urity architectures\n 	Establish\, communicate and maintain organizational
  information security standards\, procedures\, guidelines\n 	Establish and
  maintain a program for information security awareness and training\n 	Int
 egrate information security requirements into organizational processes\n 	
 Integrate information security requirements into contracts and activities 
 of third parties\n 	Establish\, monitor and periodically report program ma
 nagement and operational metrics\n\nDay 4 – Information Security Inciden
 t Management \n\nStudents will effectively manage information security wit
 hin an enterprise and develop policies and procedures to respond to and re
 cover from disruptive and destructive information security events.\n\n 	Es
 tablish and maintain an organizational definition of\, and severity hierar
 chy for\, information security incidents\n 	Establish and maintain an inci
 dent response plan\n 	Develop and implement processes to ensure the timely
  identification of information security incidents\n 	Establish and maintai
 n processes to investigate and document information security incidents\n 	
 Establish and maintain incident escalation and notification processes\n 	O
 rganize\, train and equip teams to effectively respond to information secu
 rity incidents\n 	Test and review the incident response plan periodically\
 n 	Establish and maintain communication plans and processes\n 	Conduct pos
 t-incident reviews\n 	Establish and maintain integration among the inciden
 t response plan\, disaster recovery plan and business continuity plan\n\nC
 ertification and Accreditation\nTo become a CISM\, an applicant must:\n•
  Achieve a passing score on the CISM exam.\n• Submit an application with
  verified evidence of three years of work experience as described below.\n
 • Agree to abide by the ISACA Code of Professional Ethics\, which can be
  viewed at www.isaca.org/ethics.\n• Agree to abide by the CRISC continui
 ng professional education (CPE) policy\, which can be viewed at ISACA CISM
  Maintenance Page.\nExamination\n\n 	Computer-based examination\n 	4 hours
 \n 	150 multiple-choice question exam\n 	ISACA uses a 200 - 800 point scal
 e with 450 as the passing mark for the exams\n\nTraining Info\nLanguage :
  Conducted in Thai Language\nDuration : 4 Days\nDate :  Sept 21-24\, 20
 26\nTime : 9.30 am. – 16.30 pm.\nLocation : ACinfotec Training Cente
 r\nContact : T 02 670 8980-3 Ext. 303\, 304\, 305\nE training@acinfotec.c
 om\n\nPrice : 34\,000 Bhts (Excluding Vat 7%)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/2.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:854@acinfotec.com
DTSTART:20260921T023000Z
DTEND:20260925T093000Z
DTSTAMP:20260107T092843Z
URL:https://www.acinfotec.com/training-event/certified-ethical-hacker-cehv
 13-exam-included-3/
SUMMARY:Certified Ethical Hacker (CEHv13) (Exam Included)
DESCRIPTION:Certified Ethical Hacker (CEHv13) Powered by AI CapabilitiesLE
 ARN | CERTIFY | ENGAGE | COMPETE\nWhat’s New in The CEH v13?\nThe C|EH v
 13 not only provides extensive hands-on coverage but also integrates AI in
 to all fve phases of ethical hacking:\n\nMaster AI to Automate Ethical Hac
 king Tasks\, to hack and defend against AI systems\, and boost your task e
 ffciency by 40% in your job role.\nDevelop a Hacker’s Mindset: Master th
 e 5 Phases of Ethical Hacking and Gain AI Skills to Automate Them1. Reconn
 aissance | Learn to gather essential information about your target 2. Vuln
 erability Scanning | Gain the ability to identify weaknesses in the target
  system 3. Gaining Access | Learn how to actively exploit identifed vulner
 abilities 4. Maintaining Access | Develop skills to maintain continued acc
 ess to the target systems\nLearn AI Tools:\n• ShellGPT• ChatGPT• Fra
 udGPT• WormGPT• DeepExploit• Nebula• Veed.io And many more!\nThe C
 |EH v13 is a specialized\, one-of-a- kind training program that helps you 
 gain expertise in ethical hacking\, AI\, and machine learning. With hands-
 on training labs\, knowledge-based and practical exams\, a mock ethical ha
 cking engagement on live networks\, and a global hacking competition\, thi
 s program ensures you master the most in-demand skills needed to excel and
  stand out in the cybersecurity industry.This learning framework offers no
 t only a comprehensive training program to prepare you for the certifcatio
 n exam but also the industry’s most robust\, in-depth\, hands- on lab an
 d practice range experience.\n\nCourseware Cyber Range Gain Skills\n\nKnow
 ledge-Based Practical ExamGain Recognition \n\nLive Cyber Range Gain Exper
 ience\n\nGlobal EthicalHacking CompetitionGain Respect\nBeat Hackers in th
 eir Own Game with CEH v13! A RevolutionaryWay to Learn Ethical Hacking\n1.
  Learn - 20 modules - 2500+ pages of student manual - 2000 pages of lab ma
 nual - Over 221 hands-on labs to practice attack vectors and hacking tools
  - AI integrated skills in the 5 phases of the ethical hacking framework -
  Hacking AI system\, based on the Top 10 OWASP vulnerabilities - Over 4000
  hacking and security tools - Learn how to hack multiple operating systems
  (Windows 11\, Windows servers\, Linux\, Ubuntu\, Android) - More than 50%
  of training time is dedicated to labs2. Certify - Knowledge-Based Exam (A
 NAB ISO 17024 and US DoD 8140)- 4 hours / 125 multiple-choice questions - 
 Practical Exam (ANAB ISO 17024 and US DoD 8140)- 6 hours / 20 real scenari
 o based questions\n3. Engage - 4000 hacking tools - 550 attack techniques 
 Conduct a real-world ethical hacking assignmentApply the 5 phases\n1. Reco
 nnaissance 2. Scanning 3. Gaining access 4. Maintaining access 5. Covering
  your tracks\n4. Compete\n- New challenges every month - 4-hour CTF compet
 ition - Compete with your peers worldwide Hack your way to the top of the 
 leaderboard Focus on new attack vectorsExploit emerging vulnerabilities Ch
 allenges include:- Ransomware - Web app hardening - Unpatched software - S
 ystem hacking - Service exploitation - Incident response - Forensic analys
 is- Web app hacking and pen testing - Reverse engineering - Cryptography -
  Encryption - Hacking cloud networks - ICS/SCADA\nCourse Outline\n20 Modul
 es that help you master the foundations of Ethical Hacking and prepare to 
 challenge the CEH certification exam.\nModule 1: Introduction to Ethical H
 acking| Learn the fundamentals and key issues in information security\, in
 cluding the basics of ethical hacking\, information security controls\, re
 levant laws\, and standard procedures. Module 2: Foot Printing and Reconna
 issance| Learn how to use the latest techniques and tools for footprinting
  and reconnaissance\, a critical pre-attack phase of ethical hackingModule
  3: Scanning Networks|Learn different network scanning techniques and coun
 termeasures.Module 4: Enumeration|Learn various enumeration techniques\, i
 ncluding Border Gateway Protocol (BGP) and Network File Sharing (NFS) expl
 oits and associated countermeasures. Module 5: Vulnerability Analysis| Le
 arn how to identify security loopholes in a target organization’s networ
 k\, communication infrastructure\, and end systems. Different types of vul
 nerability assessment and vulnerability assessment tools are also included
 . Module 6: System Hacking| Learn about the various system hacking methodo
 logies used to discover system and network vulnerabilities\, including ste
 ganography\, steganalysis attacks\, and how to cover tracks Module 7: Malw
 are Threats| Learn about different types of malware (Trojan\, viruses\, wo
 rms\, etc.)\, APT and fleless malware\, malware analysis procedures\, and 
 malware countermeasures. Module 8: Sniffing| Learn about packet sniffng te
 chniques and their uses for discovering network vulnerabilities\, plus cou
 ntermeasures to defend against sniffng attacks.Module 9: Social Engineerin
 g| Learn social engineering concepts and techniques\, including how to ide
 ntify theft attempts\, audit human-level vulnerabilities\, and suggest soc
 ial engineering countermeasures.Module 10: Denial-of-Service| Learn about 
 different Denial of Service (DoS) and Distributed DoS (DDoS) attack techni
 ques\, plus the tools used to audit a target and devise DoS and DDoS count
 ermeasures and protections.Module 11: Session Highjacking| Learn the vario
 us session-hijacking techniques used to discover network-level session man
 agement\, authentication\, authorization\, and cryptographic weaknesses an
 d associated countermeasures.Module 12: Evading IDS\, Firewalls\, and Hone
 ypots| Learn about frewalls\, intrusion detection systems (IDS)\, and hone
 ypot evasion techniques\; the tools used to audit a network perimeter for 
 weaknesses\; and countermeasures. Module 13: Hacking Web Servers| Learn a
 bout web server attacks\, including a comprehensive attack methodology use
 d to audit vulnerabilities in web server infrastructures and countermeasur
 es.Module 14: Hacking Web Applications| Learn about web application attack
 s\, including a comprehensive hacking methodology for auditing vulnerabili
 ties in web applications and countermeasures.Module 15: SQL Injection| Lea
 rn about SQL injection attack techniques\, evasion techniques\, and SQL in
 jection countermeasures.Module 16: Hacking Wireless Networks| Learn about 
 different types of encryption\, threats\, hacking methodologies\, hacking 
 tools\, security tools\, and countermeasures for wireless networks.Module 
 17: Hacking Mobile Platforms| Learn mobile platform attack vectors\, Andro
 id and iOS hacking\, mobile device management\, mobile security guidelines
 \, and security tools. Module 18: IoT and OT Hacking| Learn different type
 s of Internet of Things (IoT) and operational technology (OT) attacks\, ha
 cking methodologies\, hacking tools\, and countermeasures. Module 19: Clo
 ud Computing| Learn different cloud computing concepts\, such as container
  technologies and serverless computing\, various cloud computing threats\,
  attacks\, hacking methodologies\, and cloud security techniques and tools
 . Module 20: Cryptography| Learn about encryption algorithms\, cryptograp
 hy tools\, Public Key Infrastructure (PKI)\, email encryption\, disk encry
 ption\, cryptography attacks\, and cryptanalysis tools\n\nTraining Info\n\
 n\n\nDuration : 5 Days Language: Conduct in Thai Time : 09.30-04.30 pm.Tr
 aining Date: Sept 21 - 25\, 2026Tel. 02 670 8980-3 ext. 321-323Price: Plea
 se Call Email. training@acinfotec.com https://www.eccouncil.org/  
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/CEH-300x233.jpg
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:952@acinfotec.com
DTSTART:20260922T023000Z
DTEND:20260925T093000Z
DTSTAMP:20260115T031559Z
URL:https://www.acinfotec.com/training-event/comptia-advanced-security-pra
 ctitioner-caspexam-included-3/
SUMMARY:CompTIA Security X (Exam Included)
DESCRIPTION:About this course\nDesigned for experienced cybersecurity profe
 ssionals\, the CompTIA SecurityX Certification Prep (Exam CAS-005) course 
 focuses on advanced security concepts essential for managing and securing 
 complex enterprise environments also covering governance\, risk management
 \, security architecture and security operations. implementation of secure
  solutions across diverse infrastructures. Participants will gain expertis
 e in automation\, threat modeling\, and cryptographic technologies\, ensur
 ing proactive detection and response to cybersecurity threats.\n\n\nWho sh
 ould attend?\n\n 	Cybersecurity Specialist\n 	Network Security Analyst\n 	
 Security Architect\n 	Senior Security Engineer\n 	SOC Manager\n 	Security 
 Analyst\n 	IT Cybersecurity Specialist / INFOSEC Specialist\n 	Cyber Risk 
 Analyst\n\n\n\nCourse Content\nModule 1: Governance\, Risk\, and Complian
 ce\n\nOrganizational security requirements\, implementing the appropriate 
 governance components.\n\n 	Security program documentation\n 	Security pro
 gram management\n 	Governance frameworks\n 	Change/configuration managemen
 t\n 	Governance risk and compliance (GRC) tools\n 	Data governance in stag
 ing environments\n\n&nbsp\;\n\nOrganizational security requirements\, perf
 orm risk management activities.\n\n 	Impact analysis\n 	Risk assessment an
 d management\n 	Third-party risk management\n 	Availability risk considera
 tions\n 	Confidentiality risk considerations\n 	Integrity risk considerati
 ons\n 	Privacy risk considerations\n 	Crisis management\n 	Breach response
 \n\n&nbsp\;\n\nExplain how compliance affects information security strateg
 ies.\n\n 	Awareness of industry-specific\n 	Industry standards\n 	Security
  and reporting frameworks\n 	Audits vs. assessments vs. certifications\n 	
 Privacy regulations\n 	Awareness of cross-jurisdictional compliance requir
 ements\n\n&nbsp\;\n\nPerform threat-modeling activities.\n\n 	Actor charac
 teristics\n 	Attack patterns\n 	Frameworks\n 	Attack surface determination
 \n 	Methods\n 	Modeling applicability of threats to the organization/envir
 onment\n\n&nbsp\;\n\nSummarize the information security challenges associa
 ted with artificial intelligence (AI) adoption.\n\n 	Legal and privacy imp
 lications\n 	Threats to the model\n 	AI-enabled attacks\n 	Risks of AI usa
 ge\n 	AI-enabled assistants/digital workers\n\n&nbsp\;\n\nModule 2: Secur
 ity Architecture\n\nAnalyze requirements to design resilient systems.\n\n 
 	Component placement and configuration\n 	Availability and integrity desig
 n considerations\n\n&nbsp\;\n\nImplement security in the early stages of t
 he systems life cycle and throughout subsequent stages.\n\n 	Security requ
 irements definition\n 	Software assurance\n 	Continuous integration/contin
 uous deployment (CI/CD)\n 	Supply chain risk management\n 	Hardware assura
 nce\n 	End-of-life (EOL) considerations\n\n&nbsp\;\n\nIntegrate appropriat
 e controls in the design of secure architecture.\n\n 	Attack surface manag
 ement and reduction\n 	Detection and threat-hunting enablers\n 	Informatio
 n and data security design\n 	DLP\n 	Hybrid infrastructures\n 	Third-party
  integrations\n 	Control effectiveness\n\n&nbsp\;\n\nApply security concep
 ts to the design of access\, authentication\, and authorization systems.\n
 \n 	Provisioning/deprovisioning\n 	Federation\n 	Single sign-on (SSO)\n 	C
 onditional access\n 	Identity provider\n 	Service provider\n 	Attestations
 \n 	Policy decision and enforcement points\n 	Access control models\n 	Log
 ging and auditing\n 	Public key infrastructure (PKI) architecture\n 	Acces
 s control systems\n\n&nbsp\;\n\nSecurely implement cloud capabilities in a
 n enterprise environment.\n\n 	Cloud access security broker (CASB)\n 	Shad
 ow IT detection\n 	Shared responsibility model\n 	CI/CD pipeline\n 	Terraf
 orm\n 	Ansible\n 	Package monitoring\n 	Container security\n 	Container or
 chestration\n 	Serverless\n 	API security\n 	Cloud vs. customer-managed\n 
 	Cloud data security considerations\n 	Cloud control strategies\n 	Custome
 r-to-cloud connectivity\n 	Cloud service integration\n 	Cloud service adop
 tion\n\n&nbsp\;\n\nIntegrate Zero Trust concepts into system architecture 
 design.\n\n 	Continuous authorization\n 	Context-based reauthentication\n 
 	Network architecture\n 	API integration and validation\n 	Asset identific
 ation\, management\, and attestation\n 	Security boundaries\n 	Deperimeter
 ization\n 	Defining subject-object relationships\n\n&nbsp\;\n\nModule 3: 
 Security Engineering\n\nTroubleshoot common issues with identity and acces
 s management (IAM) components in an enterprise environment.\n\n 	Subject a
 ccess control\n 	Biometrics\n 	Secrets management\n 	Conditional access\n 
 	Attestation\n 	Cloud IAM access and trust policies\n 	Logging and monitor
 ing\n 	Privilege identity management\n 	Authentication and authorization\n
 \n&nbsp\;\n\nAnalyze requirements to enhance the security of endpoints and
  servers.\n\n 	Application control\n 	Endpoint detection response (EDR)\n 
 	Event logging and monitoring\n 	Endpoint privilege management\n 	Attack s
 urface monitoring and reduction\n 	Host-based intrusion protection system 
 / host-based detection system (HIPS/ HIDS)\n 	Anti-malware\n 	SELinux\n 	H
 ost-based firewall\n 	Browser isolation\n 	Configuration management\n 	Mob
 ile device management (MDM) technologies\n 	Threat-actor tactics\, techniq
 ues\, and procedures (TTPs)\n\n&nbsp\;\n\nTroubleshoot complex network inf
 rastructure security issues.\n\n 	Network misconfigurations\n 	IPS/IDS iss
 ues\n 	Observability\n 	Domain Name System (DNS) security\n 	Email securit
 y\n 	Transport Layer Security (TLS) errors\n 	Cipher mismatch\n 	PKI issue
 s\n 	Issues with cryptographic implementations\n 	DoS/distributed denial o
 f service (DDoS)\n 	Resource exhaustion\n 	Network access control list (AC
 L) issues\n\n&nbsp\;\n\nImplement hardware security technologies and techn
 iques.\n\n 	Roots of trust\n 	Security coprocessors\n 	Virtual hardware\n 
 	Host-based encryption\n 	Self-encrypting drive (SED)\n 	Secure Boot\n 	Me
 asured boot\n 	Self-healing hardware\n 	Tamper detection and countermeasur
 es\n 	Threat-actor TTPs\n\n&nbsp\;\n\nSecure specialized and legacy system
 s against threats.\n\n 	Operational technology (OT)\n 	Internet of Things 
 (IoT)\n 	System-on-chip (SoC)\n 	Embedded systems\n 	Wireless technologies
 /radio frequency (RF)\n 	Security and privacy considerations\n 	Industry-s
 pecific challenges\n 	Characteristics of specialized/legacy systems\n\n&nb
 sp\;\n\nUse automation to secure the enterprise.\n\n 	Scripting\n 	Cron/sc
 heduled tasks\n 	Event-based triggers\n 	Infrastructure as code (IaC)\n 	C
 onfiguration files\n 	Cloud APIs/software development kits (SDKs)\n 	Gener
 ative AI\n 	Containerization\n 	Automated patching\n 	Auto-containment\n 	
 Security orchestration\, automation\, and response (SOAR)\n 	Vulnerability
  scanning and reporting\n 	Security Content Automation Protocol (SCAP)\n 	
 Workflow automation\n\n&nbsp\;\n\nExplain the importance of advanced crypt
 ographic concepts.\n\n 	Post-quantum cryptography (PQC)\n 	Key stretching\
 n 	Key splitting\n 	Homomorphic encryption\n 	Forward secrecy\n 	Hardware 
 acceleration\n 	Envelope encryption\n 	Performance vs. security\n 	Secure 
 multiparty computation\n 	Authenticated encryption with associated data (A
 EAD)\n 	Mutual authentication\n\n&nbsp\;\n\nApply the appropriate cryptogr
 aphic use case and/or technique.\n\n 	Use cases\n 	Techniques\n\n&nbsp\;\n
 \nModule 4: Security Operations\n\nAnalyze data to enable monitoring and 
 response activities.\n\n 	Security information event management (SIEM)\n 	
 Aggregate data analysis\n 	Behavior baselines and analytics\n 	Incorporati
 ng diverse data sources\n 	Alerting\n 	Reporting and metrics\n\n&nbsp\;\n\
 nAnalyze vulnerabilities and attacks and recommend solutions to reduce the
  attack surface.\n\n 	Vulnerabilities and attacks\n 	Mitigations\n\n&nbsp\
 ;\n\nApply threat-hunting and threat intelligence concepts.\n\n 	Internal 
 intelligence sources\n 	External intelligence sources\n 	Counterintelligen
 ce and operational security\n 	Threat intelligence platforms (TIPs)\n 	Ind
 icator of compromise (IoC) sharing\n 	Rule-based languages\n 	Indicators o
 f attack\n\nAnalyze data and artifacts in support of incident response act
 ivities.\n\n 	Malware analysis\n 	Reverse engineering\n 	Volatile/non-vola
 tile storage analysis\n 	Network analysis\n 	Host analysis\n 	Metadata ana
 lysis\n 	Hardware analysis\n 	Data recovery and extraction\n 	Threat respo
 nse\n 	Preparedness exercises\n 	Timeline reconstruction\n 	Root cause ana
 lysis\n 	Cloud workload protection platform (CWPP)\n 	Insider threat\n\nEx
 am Description\nRequired exam: CAS-005\n\nNumber of questions: maximum of 
 90\, a mix of multiple-choice and performance-based questions\n\nDuration:
  maximum of 165 minutes\n\nLanguages: English\, with other languages to be
  determined\n\nRecommended experience: minimum of 10 years of general hand
 s-on IT experience\, including 5 years of hands-on security\, with Network
 +\, Security+\, CySA+\, Cloud+\, and PenTest+ or equivalent knowledge\nTra
 ining info\nDuration:  4 Days\nDate:  Sept 22-25\, 2026\nTime:  9.30 
 am. – 16.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Ce
 ntre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 89
 80-3 Ext. 321-323\nTraining Fees: 59\,000 Baht (ex.vat7%)\nE-mail.training
 @acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:972@acinfotec.com
DTSTART;VALUE=DATE:20261005
DTEND;VALUE=DATE:20261010
DTSTAMP:20260115T030427Z
URL:https://www.acinfotec.com/training-event/pecb-certified-artificial-int
 elligence-professional-caip-new-3/
SUMMARY:PECB Certified Artificial Intelligence Professional (CAIP) - NEW!
DESCRIPTION:PECB Certifed Artifcial Intelligence Professional (CAIP) - New!
 \nGain expertise in designing\, implementing\, and managing AI systems\nAb
 out this course\nIn today’s AI-driven world\, the demand for skilled pro
 fessionals who can effectively implement and manage artifcial intelligence
  systems is higher than ever. The Certifed Artifcial Intelligence Professi
 onal course is your gateway to mastering the essential skills and knowledg
 e needed to succeed in this fast changing feld. This program goes beyond t
 heoretical learning by equipping you with practical tools and real-world i
 nsights to design\, deploy\, and manage AI solutions effectively.\n\nBy at
 tending this course\, you will gain hands-on experience with advanced AI m
 ethodologies\, including machine learning\, deep learning and natural lang
 uage processing. You will also explore a range of cutting-edge areas\, whi
 le developing strategies for risk management and maintaining ethical stand
 ards. This unique combination of technical\, strategic\, and ethical exper
 tise will make you a valuable asset to any organization pursuing AI initia
 tives.\n\nAttaining the Certifed Artifcial Intelligence Professional crede
 ntial demonstrates your commitment to staying at the forefront of AI advan
 cements. It validates your ability to integrate AI into business strategie
 s\, solve complex problems\, and manage AI projects responsibly. This cert
 ifcation not only enhances your credibility but also opens doors to exciti
 ng career opportunities in AI and related felds.\n\n 	Whether you are an A
 I practitioner\, a data scientist\, or a decision-maker\, this course will
  empower you to:\n 	Understand and navigate the latest AI trends and techn
 ologies.\n 	Build and optimize AI systems that drive innovation.\n 	Addres
 s critical challenges such as AI bias\, privacy concerns\, and compliance.
 \n 	Strategically align AI solutions with organizational goals to maximize
  value.\n\nBy joining this course\, you are taking a signifcant step towar
 d becoming a leader in AI implementation and ensuring your skills remain r
 elevant in a technology-driven future.\nLearning objectives\nBy the end of
  this training course\, the participants will be able to:\n\n 	Explain the
  foundational principles of AI and its various applications.\n 	Conduct da
 ta analysis and create meaningful visualizations to support AI projects.\n
  	Apply machine learning techniques to real-world problems\, including sup
 ervised\, unsupervised\, and reinforcement learning.\n 	Implement simple n
 eural network and advanced deep learning architectures such as CNNs.\n 	Un
 derstand NLP systems and Computer Vision methodologies.\n 	Understand robo
 tics and expert systems for AI-driven automation.\n 	Identify and mitigate
  AI risks while ensuring compliance with regulations.\n 	Develop ethical A
 I strategies aligned with organizational values and societal needs.\n\nWho
  should attend?\nThis course is particularly advantageous and intended for
 :\n\n 	AI Professionals actively involved in the development and implement
 ation of AI technologies\n 	Experienced AI Practitioners seeking to enhanc
 e their knowledge\, stay updated with the latest trends\, and refne their 
 leadership skills\n 	Data Scientists responsible for developing and optimi
 zing AI models\n 	IT Managers overseeing AI projects and initiatives withi
 n their organizations\n 	AI Enthusiasts who aspire to advance into leaders
 hip roles\, such as AI project managers or AI strategists\n 	Risk and Comp
 liance Ofcers responsible for managing AI-related risks and ensuring compl
 iance with regulations\n 	Executives\, including CIOs\, CEOs\, and COOs\, 
 who play a crucial role in decision-making processes related to AI\n 	Prof
 essionals aiming for executive-level AI roles who need a comprehensive und
 erstanding of AI technologies\nand their applications\n\nCourse agenda\nDa
 y 1 Foundations of AI and Data Analysis\nDay 2 Machine Learning\nDay 3 Dee
 p Learning and Natural Language Processing\nDay 4 Computer Vision\, Roboti
 cs\, AI Strategy\, Governance\, and Risk Management\nDay 5 Certification e
 xam\nTraining Info\nDuration:  5 Days\nDate: Oct 5-9\, 2026\nTime:  9.
 30 am. – 16.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grande
  Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670
  8980-3 Ext. 321-323\nTraining Fees: 51\,500 Baht (ex.vat7%)\nE-mail.train
 ing@acinfotec.com\n\n\n\nwww.pecb.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:AI Intelligent,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:929@acinfotec.com
DTSTART:20261005T023000Z
DTEND:20261009T093000Z
DTSTAMP:20260115T030354Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-28000-supp
 ly-chain-security-lead-auditor-exam-included-2/
SUMMARY:PECB Certified ISO 28000 Supply Chain Security Lead Auditor (Exam I
 ncluded)
DESCRIPTION:About this course \nThis five-day intensive course enables part
 icipants to develop the necessary expertise to audit a Supply Chain Securi
 ty Management System (SCSMS) and to manage a team of auditors by applying 
 widely recognized audit principles\, procedures and techniques. During thi
 s training\, the participant will acquire the necessary knowledge and skil
 ls  to proficiently plan and perform internal and external audits in comp
 liance with ISO 19011 the certification process according to ISO 17021. Ba
 sed on practical exercises\, the participant will develop the skills (mast
 ering audit techniques) and competencies (managing audit teams and audit p
 rogram\, communicating with customers\, conflict resolution\, etc.) necess
 ary to conduct efficiently an audit.\nCourse Benefits\n\n 	To acquiring th
 e expertise to perform an ISO 28000 internal audit following ISO 19011 gui
 delines\n 	To acquiring the expertise to perform an ISO 28000 certificatio
 n audit following ISO 19011 guidelines and ISO 17021\, ISO 28003 specifica
 tions\n 	To acquiring the necessary expertise  to manage a SCSMS audit te
 am\n 	To understanding the operation of an ISO 28000 conformant Supply Cha
 in Security Management System\n 	To understand the relationship between a 
 Supply Chain Security Management System\, including risk management\, cont
 rols and compliance with the requirements of different stakeholders of the
  organization\n 	To improve the ability to analyze the internal and extern
 al environment of an organization\, risk assessment and audit decision-mak
 ing in the context of a SCSMS\n\nWho should attend?\n\n 	Internal auditors
 \n 	Auditors wanting to perform and lead Supply Chain Security Management 
 System (SCSMS)  certification audits\n 	Project managers or consultants w
 anting to master the Supply Chain Security Management System audit process
 \n 	Persons responsible for the supply chain security or conformity in an 
 organization\n 	Members of a supply chain security team\n 	Expert advisors
  in supply chain security\n 	Technical experts wanting to prepare for an s
 upply chain security audit function\n\n Course Contents\nDay 1: Introduct
 ion to Supply Chain Security Management System (SCSMS) concepts as require
 d by ISO 28000\n\n 	Presentation of the standards ISO 28000 family of stan
 dards and the regulatory and legal framework related to supply chain secur
 ity\n 	Fundamental principles of Supply chain security\n 	ISO 28000 certif
 ication process\n 	Supply Chain Security Management System (SCSMS)\n 	Deta
 iled presentation of the clauses of ISO 28000\n\nDay 2: Planning and Initi
 ating an ISO 28000 audit\n\n 	Fundamental audit concepts and principles\n 
 	Audit approach based on evidence and on risk\n 	Preparation of an ISO 280
 00 certification audit\n 	SCSMS documentation audit\n 	Conducting an openi
 ng meeting\n\nDay 3: Conducting an ISO 28000 audit\n\n 	Communication duri
 ng the audit\n 	Audit procedures: observation\, document review\, intervie
 w\, sampling techniques\, technical verification\, corroboration and evalu
 ation\n 	Audit test plans\n 	Formulation of audit findings\n 	Documenting 
 nonconformities\n\nDay 4: Concluding and ensuring the follow-up of an ISO 
 28000 audit\n\n 	Audit documentation\n 	Quality review\n 	Conducting a clo
 sing meeting and conclusion of an ISO 28000 audit\n 	Evaluation of correct
 ive action plans\n 	ISO 28000 surveillance audit\n 	ISO 28000 internal aud
 it management program\n\nDay 5: Certification Exam\n Training Info\nDurat
 ion:  5 Days\nDate:  Oct 5 - 9\, 2026\nTime:  9.30 am. – 16.30 pm.\n
 Venue: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini
  Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\n
 Training Fees: 51\,500 Baht (ex.vat7%)\nE-mail.training@acinfotec.com\n\n\
 n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:866@acinfotec.com
DTSTART:20261005T023000Z
DTEND:20261007T093000Z
DTSTAMP:20260115T030416Z
URL:https://www.acinfotec.com/training-event/ec-council-certified-encrypti
 on-specialist-eces-exam-included-5/
SUMMARY:EC-Council Certified Encryption Specialist (E|CES) (Exam Included)
DESCRIPTION:\nAbout this course\nIf you think that there is only one type o
 f encryption – think again!\n\nSecure organizations employ multiple leve
 ls of encryption – database encryption\, VoIP encryption\, portable stor
 age encryption\, mobile devices encryption\, Wi-Fi encryption\, e-mail enc
 ryption\, file encryption – server/desktop\, network link encryption\, w
 eb server encryption\, tape backup encryption and many more.\n\nSome of th
 e most recent attacks that have had serious consequences share one thing i
 n common – they all had either none or little effective encryption. This
  resulted in thousands of users being affected and hundreds of millions in
  losses. It resulted in serious decline of brand value and public embarras
 sment.\nPrerequisite\nNo prior knowledge of cryptography is assumed\, and 
 no mathematical skills beyond basic algebra are required.\nWho should atte
 nd?\n\n\nPenetration Testers\, Computer Forensics Specialists\, Anyone inv
 olved in selecting\, implementing VPN’s or digital certificates\, Anyone
  involved in information security operation\n\n\nCourse Contents\n\n\nModu
 le 01: Introduction and History of Cryptography\nModule 02: Symmetric Cryp
 tography &amp\; Hashes\nModule 03: Number Theory and Asymmetric Cryptograp
 hy\nModule 04: Applications of Cryptography\nModule 05: Applications of Cr
 yptography\n\n\nTraining Info\nLanguage: Conducted in Thai Language\nDur
 ation: 3 Days\nTraining Date: Oct 5 - 7\, 2026\nVenue: ACinfotec Training
  Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama
  4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining Fees: 39\,000 BAH
 T (Ex.Vat 7%)\nE-mail: training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/ECES.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:959@acinfotec.com
DTSTART:20261005T023000Z
DTEND:20261009T093000Z
DTSTAMP:20260115T030347Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-27701-
 lead-auditor-exam-included-5/
SUMMARY:PECB Certified ISO/IEC 27701 Lead Auditor (Exam Included)
DESCRIPTION:About this course\nDuring this training course\, you will obtai
 n the knowledge and skills to plan and carry out audits in compliance with
  ISO 19011 and ISO/IEC 17021-1 certification process.\n\nBased on practica
 l exercises\, you will be able to acquire knowledge on the protection of p
 rivacy in the context of processing personally identifiable information (P
 II)\, as well as master audit techniques and become competent to manage an
  audit program\, audit team\, establish communication with customers and r
 esolve potential conflicts.\n\nAfter completing this training course\, you
  can sit for the exam and\, if you successfully pass the exam\, you can ap
 ply for the “PECB Certified ISO/IEC 27701 Lead Auditor” credential. Th
 e internationally recognized PECB Lead Auditor certificate proves that you
  have the capabilities and competences to audit organizations based on bes
 t practices.\n\nWho should attend?\n\n 	\nAuditors seeking to perform and 
 lead Privacy Information Management System (PIMS) certification audits\n 	
 \nManagers or consultants seeking to master a PIMS audit process\n 	\nIndi
 viduals responsible for maintaining conformance with PIMS requirements\n 	
 \nTechnical experts seeking to prepare for a PIMS audit\n 	\nExpert adviso
 rs in the protection of Personally Identifiable Information (PII)\n\n\nCou
 rse Contents\nDay 1 Introduction to Privacy Information Management System 
 (PIMS) and ISO/IEC 27701\n- Training course objectives and structure\n- St
 andards and regulatory frameworks\n- Certification process\n- Fundamental 
 information security and privacy concepts and principles\n- Privacy inform
 ation management system (PIMS)\n\nDay 2 Audit principles\, preparation\, a
 nd launching of an audit\n- Fundamental audit concepts and principles\n- T
 he impact of trends and technology in auditing\n- Evidence-based auditing\
 n- Risk-based auditing\n- Initiation of the audit process\n- Stage 1 audit
 \n\nDay 3 On-site audit activities\n- Preparations for stage 2 audit (on-s
 ite audit)\n- Stage 2 audit\n- Communication during the audit\n- Audit pro
 cedures\n- Creating audit test plans\n\nDay 4 Closing the audit\n- Draftin
 g audit findings and nonconformity reports\n- Audit documentation and qual
 ity review\n- Closing of the audit\n- Evaluation of action plans by the au
 ditor\n- Beyond the initial audit\n- Managing an internal audit program\n-
  Closing of the training course\n\nDay 5 Certification exam\n\nTraining In
 fo\n\nDuration:  5 Days\nDate:   Oct 5-9\, 2026\nTime:  9.30 am. –
  16.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre Po
 int Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ex
 t. 321-323\nTraining Fees: 51\,500 Baht (ex.vat7%)\nE-mail.training@acinfo
 tec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:976@acinfotec.com
DTSTART:20261005T023000Z
DTEND:20261009T093000Z
DTSTAMP:20260115T030404Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-27001-lead
 -auditor-exam-included-6/
SUMMARY:PECB Certified ISO 27001 Lead Auditor (Exam Included)
DESCRIPTION:About this course\nISO/IEC 27001 Lead Auditor training enables 
 you to develop the necessary expertise to perform an Information Security 
 Management System (ISMS) audit by applying widely recognized audit princip
 les\, procedures and techniques. During this training course\, you will ac
 quire the necessary knowledge and skills to plan and carry out internal an
 d external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certifi
 cation process.\n\nBased on practical exercises\, you will be able to mast
 er audit techniques and become competent to manage an audit program\, audi
 t team\, communication with customers\, and conflict resolution.\n\nAfter 
 acquiring the necessary expertise to perform this audit\, you can sit for 
 the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” c
 redential. By holding a PECB Lead Auditor Certificate\, you will demonstra
 te that you have the capabilities and competencies to audit organizations 
 based on best practices.\nWho Should Attend\n\n 	Auditors seeking to perfo
 rm and lead Information Security Management System (ISMS) certification au
 dits\n 	Managers or consultants seeking to master an Information Security 
 Management System audit process\n 	Individuals responsible for maintaining
  conformance with Information Security Management System requirements\n 	T
 echnical experts seeking to prepare for an Information Security Management
  System audit\n 	Expert advisors in Information Security Management\n\nCou
 rse Contents\nDay 1: Introduction to the information security management s
 ystem (ISMS) and ISO/IEC 27001\n\n 	Training course objectives and structu
 re\n 	Standards and regulatory frameworks\n 	Certification process\n 	Fund
 amental concepts and principles of information security\n 	Information sec
 urity management system (ISMS)\n\nDay 2: Audit principles\, preparation\, 
 and initiation of an audit\n\n 	Fundamental audit concepts and principles\
 n 	The impact of trends and technology in auditing\n 	Evidence-based audit
 ing\n 	Risk-based auditing\n 	Initiation of the audit process\n 	Stage 1 a
 udit\n\nDay 3: On-site audit activities\n\n 	Preparing for stage 2 audit\n
  	Stage 2 audit\n 	Communication during the audit\n 	Audit procedures\n 	C
 reating audit test plans\n\nDay 4: Closing the audit\n\n 	Drafting audit f
 indings and nonconformity reports\n 	Audit documentation and quality revie
 w\n 	Closing of the audit\n 	Evaluation of action plans by the auditor\n 	
 Beyond the initial audit\n 	Managing an internal audit program\n 	Closing 
 of the training course\n\nDay 5: Certification Exam\nTraining Info\nDurati
 on:  5 Days\nDate:  Oct 5-9\, 2026\nTime:  9.30 am. – 16.30 pm.\nVe
 nue: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini B
 ldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTr
 aining Fees: 51\,500 Baht (ex.vat7%)\nE-mail.training@acinfotec.com\n\n\n\
 nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:986@acinfotec.com
DTSTART:20261006T023000Z
DTEND:20261007T093000Z
DTSTAMP:20251219T033904Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -technologist-cipt-thai-4/
SUMMARY:Certified Information Privacy Technologist (CIPT) (Thai)
DESCRIPTION: \n&nbsp\;\nAbout this course\nData privacy regulations worldwi
 de require privacy protections be built into products and services. IAPP P
 rivacy in Technology training\, aligned with the ANSI/ISO-accredited CIPT
  certification program\, will provide you with the knowledge to recognize
  privacy threats and skills to apply technical strategies to mitigate priv
 acy risk throughout the software and systems development lifecycles.\n Co
 urse Benefits\nPrivacy in Technology training teaches technology and data 
 professionals how to understand and integrate strategies and techniques to
  minimize privacy threats. The curriculum includes privacy-by-design princ
 iples\; implementing data- and process-oriented strategies to support priv
 acy policies\; and managing threats from AI\, location tracking\, etc.\n 
 Who should attend?\n\n 	Data Scientists/Analysts/Architects\n 	IT Managers
  and Administrators\n 	Records Managers\n 	System Developers\n 	Software E
 ngineers/Designers\n 	Privacy Engineers/Developers\n 	System Administrator
 s\n 	UX Designers\n 	Cybersecurity Professionals\n\n Course Contents\nMod
 ule 1: Foundational Principles in Technology\n\n 	Summarizes the foundatio
 nal elements for embedding privacy in technology through privacy by design
  and value sensitive design\; reviews the data life cycle and common priva
 cy risk models and frameworks.\n\nModule 2: The Tech Pro’s Role in Priva
 cy\n\n 	Reviews the fundamentals of privacy as they relate to the privacy 
 technologist\; describes the privacy technologist’s role in ensuring com
 pliance with privacy requirements and meeting stakeholder privacy expectat
 ions\; explores the relationship between privacy and security.\n\nModule 3
 : Privacy threats and violations\n\n 	Identifies inherent risks throughout
  the stages of the data life cycle and explores how software security help
 s mitigate privacy threats\; examines the impacts that behavioral advertis
 ing\, cyberbullying and social engineering have on privacy within the tech
 nological environment.\n\nModule 4: Technical measures and privacy-enhanci
 ng technologies \n\n 	Outlines the strategies and techniques for enhancing
  privacy throughout the data life cycle\, including: identity and access m
 anagement\; authentication\, encryption\, and\naggregation\; collection an
 d use of personal information.\n\nModule 5: Privacy engineering\n\n 	Explo
 res the role of privacy engineering within an organization\, including the
  objectives of privacy engineering\, privacy design patterns\, and softwar
 e privacy risks.\n\nModule 6: Privacy-by-design methodology\n\n 	Illustrat
 es the process and methodology of the privacy-by-design model\; explores p
 ractices to ensure ongoing vigilance when implementing privacy by design.\
 n\nModule 7: Technology challenges for privacy\n\n\n 	Examines the unique 
 challenges that come from online privacy issues\, including automated deci
 sion making\, tracking and surveillance technologies\, anthropomorphism\, 
 ubiquitous computing and mobile social computing.\n\n\n\n\n 	Privacy in Te
 chnology online training.\n 	One-year IAPP membership.\n 	CIPT sample ques
 tions (digital).\n 	CIPT certification exam.\n 	Two digital textbooks.\n\n
 Training Info:\n\nLanguage: Conducted in Thai Language\nDuration: 2 Days
 \nDate: Oct 6-7\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, Gran
 de Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 4
 9\,900 (Exam Included)\nTel : 02 670 8980-3 ext. 321-323\nE-mail: training
 @acinfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/cipt-seal.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:963@acinfotec.com
DTSTART:20261007T023000Z
DTEND:20261009T093000Z
DTSTAMP:20260115T030329Z
URL:https://www.acinfotec.com/training-event/comptia-project-exam-included
 -5/
SUMMARY:CompTIA Project+ (Exam Included)
DESCRIPTION:About this course      \nCompTIA Project+ Opens the Door t
 o Your Project Management Career! CompTIA Project+ covers the methodologie
 s\, frameworks and Agile skills necessary to efficiently manage and delive
 r IT projects while taking new topics like change management and complianc
 e into consideration. CompTIA Project+ is ideal for professionals handling
  less-complex projects while also managing the project life cycle\, ensuri
 ng appropriate communication\, managing resources and maintaining project 
 documentation. CompTIA Project+ is good for life. That means once you are 
 Project+ certified\, you won’t ever need to renew your certification. In
 stead\, you can focus on building your knowledge and advancing your career
 .\n\nCourse Benefits\nCOMPTIA PROJECT+ PROVES CERTIFIED PROFESSIONALS HAVE
  THE SKILLS REQUIRED FOR HIGH-STAKES PROJECT MANAGEMENT\nWhat Skills Will 
 You Learn?\n\nProject Basics\nThe properties of project\, phases\, schedul
 es\, roles and responsibilities\, and cost controls\, as well as the basic
  aspects of Agile methodology.\nProject Constraints\nThe impact of various
  constraint variables and influences throughout the project and the import
 ance of risk strategies and activities.\nCommunication and Change Manageme
 nt\nThe appropriate communication methods of influence and change control 
 processes within the context of a project.\nProject Tools and Documentatio
 n\nVarious project management tools and project and partner-centric docume
 ntation.\nWho should Attend?\n\n 	IT Project Manager\n 	Project Coordinato
 r\n 	IT Support Manager\n 	Business Analyst\n 	IT Manager\n\nCourse Conten
 ts\n1. Preparing for the Project \n1 A Understand Project Management Basi
 cs\n1 B Develop the Business Case\n1 C Identify Project Characteristics\n\
 n2. Selecting the Project Framework \n2A Identify Project Methodologies\n
 2B Compare Agile and Waterfall Project\n\n3. Initiating the Project\n3A Bu
 ild a Project Team\n3B Prepare Project Initiation Documents\n\n4. Facilita
 tion Effective Meetings \n4A Lead Effective Meetings\n4B Use Project mana
 gement Tools\n4C create a Communication Plan\n\n5. Implementing Solution D
 esign\n5A Create a Solution Desing\n5B Evaluate IT Infrastructure Needs\n\
 n6. Managing Resources\n6A Describe the Resource Life Cycle\n6B Conduct a 
 Needs Assessment\n\n7. Managing Risk\n7A Identify and Analyze Risk\n7B Tre
 at and Monitor Risk\n\n8. Creating a Project Schedule\n8A Define Units of 
 Work\n8B Sequence the Activities\n\n9. Creating a Project Plan\n9A Refine 
 the Timeline\n9B Establish Project Baselines\n9C Create a Quality Assuranc
 e Plan\n\n10. Procuring Solutions \n10A Compare Procurement Options\n10B 
 Evaluate and Select Vendors\n\n11 . Managing Project Execution\n11A Docume
 nt Progress\n11B Communicate Progress\n\n12. Managing Issues and Changes\n
 12A Resolve Issues\n12B Control Changes\n\n13. Managing Performance\n13A M
 easure Performance\n13B Maintain the Project Schedule\n\n14. Wrapping Up t
 he Project\n14A Prepare for Project Closure\n14B Close the Project\n\nGuid
 e for CompTIA Project+ Examination\nExam Details\nCompTIA Project+ is idea
 l for IT professionals who need to manage smaller\, less-complex projects 
 as part of their other job duties but still have foundational project mana
 gement skills. Project+ is versatile because it covers essential project m
 anagement concepts beyond the scope of just one methodology or framework.\
 n\n\n\nExam Code\nPK0-005\n\n\nExam Description\nCompTIA Project+ is ideal
  for IT professionals who need to manage smaller\, less-complex projects a
 s part of their other job duties but still have foundational project manag
 ement skills. Project+ is versatile because it covers essential project ma
 nagement concepts beyond the scope of just one methodology or framework.\n
 \n\nNumber of Questions\nMaximum of 90 questions\n\n\nType of Questions\nM
 ultiple-choice (single and multiple response) and performance-based\n\n\nL
 ength of Test\n90 Minutes\n\n\nPassing Score\n710 (on a scale of 100-900)\
 n\n\nRecommended Experience\nEquivalent to at least 6–12 months of hands
 -on experience managing projects in an IT environment\n\n\nLaunch Date\nNo
 vember 8\, 2022\n\n\nRetirement\nUsually three years after launch\n\n\nLan
 guages\nEnglish\, Japanese\, Thai\n\n\n\nTraining Info\n\nLanguage : Condu
 cted in Thai Language\n\nDuration : 3 Days\n\nDate : Oct 7-9\, 2026\n\nTim
 e : 9.30 - 16.30 pm\n\nVenue: ACinfotec Training Center\n16th Fl.\, Grand
 e Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\n\nContact : T 02 
 670 8980-3 Ext. 321-323\n\nPrice: 39\,000 Baht (Ex.vat 7% )
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:991@acinfotec.com
DTSTART:20261014T023000Z
DTEND:20261016T093000Z
DTSTAMP:20260115T030310Z
URL:https://www.acinfotec.com/training-event/ec-council-certified-incident
 -handler-ecihv3-exam-included-2/
SUMMARY:EC-Council Certified Incident Handler (ECIHv3) (Exam Included)
DESCRIPTION:About this course\nEC-Council's Certified Incident Handler prog
 ram equips students with the knowledge\, skills\, and abilities to effecti
 vely prepare for\, deal with\, and eradicate threats and threat actors in 
 an incident. This program provides the entire process of incident handling
  and response and hands-on labs that teach the tactical procedures and tec
 hniques required to effectively plan\, record\, triage\, notify and contai
 n. Students will learn the handling of various types of incidents\, risk a
 ssessment methodologies\, as well as laws and policies related to incident
  handling. After attending the course\, students will be able to create IH
 &amp\;R policies and deal with different types of security incidents such 
 as malware\, email security\, network security\, web application security\
 , cloud security\, and insider threat-related incidents.\n\nThe E|CIH (EC-
 Council Certified Incident Handler) also covers post incident activities s
 uch as containment\, eradication\, evidence gathering and forensic analysi
 s\, leading to prosecution or countermeasures to ensure the incident is no
 t repeated. The E|CIH is a method-driven course that provides a holistic a
 pproach covering vast concepts related to organizational IH&amp\;R\, from 
 preparing/planning the incident handling response process to recovering or
 ganizational assets from the impact of security incidents. These concepts 
 are essential for handling and responding to security incidents to protect
  organizations from future threats or attacks.\n\nWith over 95 advanced la
 bs\, 800 tools covered\, and exposure to incident handling activities on m
 any different operating systems\, E|CIH provides a well-rounded\, but tact
 ical approach to planning for and dealing with cyber incidents. The E|CIH 
 program addresses all stages involved in the IH&amp\;R process\, and this 
 attention toward a realistic and futuristic approach makes E|CIH one of th
 e most comprehensive IH&amp\;R-related certifications in the market today\
 nWho should attend?\n\n 	Incident Handler\n 	Incident Responder\n 	Inciden
 t Response Consultant/Associate /Analyst/Engineer/Specialist/ Expert/Manag
 er\n 	CSIRT Analyst/Engineer/Manager\n 	Information Security Associate/Ana
 lyst/Engineer/Specialist/Manager\n 	Cyber Defense Security Consultant/Asso
 ciate/Analyst\n 	IT Security Operations Center Analyst (SOC Analyst/Engine
 er)\n 	Cyber Forensic Investigator/Consultant/Analyst/Manager\n 	Digital F
 orensic Analyst\n 	Cyber Risk Vulnerability Analyst/Manager\n 	Cyber Intel
 ligence Analyst and Cyber Security Threat Analyst/Specialist\n 	Cyber Secu
 rity Incident Response Team Lead\n 	Penetration Tester\n\n\n\n\n\n\nLearn 
 the 9 Stages of Incident Handling &amp\; Response (IH &amp\; R) Process\n\
 n 	Planning\n 	Recording &amp\; Assignment\n 	Triage\n 	Notification\n 	Co
 ntainment\n 	Post Incident Activities\n 	Recovery\n 	Eradication\n 	Eviden
 ce Gathering &amp\; Forensics Analysis\n\nKey Features &amp\; Critical Com
 ponents of E|CIH Program\n\n 	\n1600+ Pages of the comprehensive student m
 anual\n\n 	\n800+ Incident handling and response tools\n\n 	\n780+ Illustr
 ated instructor slides\n\n 	\n125 Incident handling templates\, checklists
 \, and toolkits\n\n 	\n95 Labs environment simulates a real-time environme
 nt (Covered in 22 Scenario-based Labs)\n\n 	\n10+ Incident handling playbo
 oks and runbooks\n\n 	\n100%  Compliance to NICE 2.0 Framework\n\n 	\n100
 % compliance with CREST CCIM\n\n\nBased on a Comprehensive Industry-wide J
 ob Task Analysis (JTA)\nStructured approach for performing incident handli
 ng and response process.\nFocus on developing skills in handling different
  types of cybersecurity incidents\n\n\n\n\n\nCourse Contents\n\n 	Module 0
 1: Introduction to Incident Handling and Response\n 	Module 02: Incident H
 andling and Response Process\n 	Module 03: First Response\n 	Module 04: Ha
 ndling and Responding to Malware Incidents\n 	Module 05: Handling and Resp
 onding to Email Security Incidents\n 	Module 06: Handling and Responding t
 o Network Security Incidents\n 	Module 07: Handling and Responding to Web 
 Application Security Incidents\n 	Module 08: Handling and Responding to Cl
 oud Security Incidents\n 	Module 09: Handling and Responding to Insider Th
 reats\n 	Module 10: Handling and responding to Endpoint Security Incidents
  (New!!)\n\n\nTop: Latest Templates\, Checklists\, and Toolkits:\n\n• Di
 gital Forensics eadiness Policy Document Template\n• Incident Handling a
 nd Response Plan Template\n• Incident Handling and Response Policy and P
 rocedure Document Template\n• Incident Handler Checklist\n• Incident R
 esponder Toolkit Requirements\n• Forensics Investigative Analysis Report
  Recognition / Endorsement / Mapping\n\nDuration:  3 Days\nDate:  Oct 14
 -16\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue: ACinfotec Training Ce
 nter\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 
 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining Fees: 45\,000 Baht (
 ex.vat7%)\nE-mail.training@acinfotec.com\n\n\n\nwww.eccouncil.com\n\n&nbsp
 \;\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/hc135990835053.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:968@acinfotec.com
DTSTART:20261015T023000Z
DTEND:20261016T093000Z
DTSTAMP:20260115T030258Z
URL:https://www.acinfotec.com/training-event/digital-governance-for-se-am-
 iso-38500-cobit-2019-new-5/
SUMMARY:Digital Governance for SE-AM : ISO 38500 & COBIT 2019 (New!!)
DESCRIPTION:Digital Governance for SE-AM: ISO 38500 &amp\; COBIT 2019\nเ
 กี่ยวกับหลักสูตร\nการกำกับ
 ดูแลที่ดี เป็นหลักเกณฑ์ใน
 การขับเคลื่อนให้ฝ่ายจัดก
 ารสามารถปฏิบัติงานให้บรร
 ลุผลสำเร็จตามกรอบนโยบายภ
 ารกิจหน้าที่ ยุทธศาสตร์ หร
 ือแผนงาน กำหนดโดยการดําเน
 ินงานดังกล่าวต้องสามารถส
 ะท้อนได้ทั้งมิติกระบวนกา
 รทำงานที่มีประสิทธิภาพ มี
 คุณภาพ และได้มาตรฐาน รวมถึ
 งต้องสอดคล้องตามแนวทาง แล
 ะประยุกต์ใช้กับ SE-AM ด้วย ร่ว
 มกับมิติด้านผลลัพธ์ที่เป
 ็นเลิศที่สามารถสร้างการเ
 ติบโตอย่างยั่งยืนให้แก่ร
 ัฐวิสาหกิจ ควบคู่กับการสร
 ้างผลกระทบเชิงบวกต่อสังค
 ม และสิ่งแวดล้อมได้อย่างส
 มดุล ซึ่งการจะดำเนินการให
 ้เกิดความครบถ้วนตามหลักก
 ารข้างต้น มีความจําเป็นที
 ่องค์กรต้องสามารถประยุกต
 ์ใช้หลักการบริหารจัดการน
 วัตกรรม (Innovation Management) ร่วมกับหล
 ักมาตรฐานการพัฒนาความยั่
 งยืนในระดับองค์กร (Organizational Sustai
 nable Development) ได้อย่างมีประสิทธิ
 ผลในเชิงยุทธศาสตร์ ดังนั้
 น การกำกับดูแลด้านดิจิทัล 
 หรือธรรมภิบาลด้านดิจิทัล (
 Digital Governance) จะช่วยให้การดำเนิน
 งานบนระบบดิจิทัลของหลาย ๆ 
 องค์กรในปัจจุบัน มีความโป
 ร่งใส เป็นระบบ สามารถตรวจส
 อบย้อนหลัง รวมถึงสามารถสร
 ้างความน่าเชื่อถือของระบ
 บดิจิทัลขององค์กร สอดรับก
 ับกฎหมาย ระเบียบ ข้อบังคับ
  มาตรฐานระดับสากล แนวปฏิบั
 ติที่ดีที่เกี่ยวข้อง\nวัตถ
 ุประสงค์\n\n 	เพื่อให้ผู้เข้
 าอบรมได้เข้าใจถึงความสำค
 ัญ และวัตถุประสงค์ของการก
 ำกับดูแลด้านดิจิทัลที่เพ
 ียงพอและสอดรับกับกฎหมาย ร
 ะเบียบ ข้อบังคับ มาตรฐานระ
 ดับสากล แนวปฏิบัติที่ดีที
 ่เกี่ยวข้อง\n 	เพื่อให้ผู้เ
 ข้าอบรมได้เรียนรู้แนวทาง
 การนำ State Enterprise Assessment Model (SE-AM)\, ISO 38500 แ
 ละ COBIT 2019 ตลอดจนกฎหมาย ระเบีย
 บ ข้อบังคับ มาตรฐานระดับสา
 กล แนวปฏิบัติที่ดีที่เกี่
 ยวข้องมาประยุกต์ใช้ในองค
 ์กรอย่างมีประสิทธิภาพ\n 	เพ
 ื่อให้ผู้เข้าอบรมมีแนวทา
 งการดําเนินงานด้านพัฒนาค
 วามยั่งยืนที่ชัดเจน รวมถึ
 งมีองค์ประกอบ และสาระสำคั
 ญ/กรอบการดําเนินงานตามมาต
 รฐาน/แนวปฏิบัติที่ดีที่เก
 ี่ยวกับการกำกับดูแลด้านด
 ิจิทัลที่เป็นที่ยอมรับโด
 ยทั่วไป\n\nหลักสูตรนี้เหมาะ
 กับใคร\n\n 	ผู้บริหารระดับสู
 ง (Executives\, Board of Directors)\n 	ผู้บริหารสา
 ยงาน IT / Digital Transformation\n 	Enterprise Architect / IT Gove
 rnance / Risk &amp\; Compliance Officer\n 	ที่ปรึกษา (Co
 nsultants) และผู้วางกลยุทธ์ด้านด
 ิจิทัล\n\nรายละเอียดหลักสูต
 ร\n\n 	State Enterprise Assessment Model (SE-AM)\n\n 	Corporate Governan
 ce &amp\; Leadership\n 	Strategic Planning\n 	Risk Management &amp\; Inter
 nal Control\n 	Stakeholder and Customer Management\n 	Digital Technology\n
  	Human Capital Management\n 	Knowledge Management &amp\; Innovation Manag
 ement\n 	Internal Audit\n\n\n 	SE-AM: Digital Governance and Roadmap\n 	IS
 O 38500 and other related standards\n 	ISO 38500 SE-AM\n 	6 principles\n 	
 Establish responsibilities\n 	Plan to best support the organization\n 	Mak
 e acquisitions for valid reasons\n 	Ensure necessary levels of performance
 \n 	Ensure conformance with rules\n 	Ensure respect for human factors\n 	E
 nterprise Architecture (EA)\n 	Model for Corporate Governance of ICT\n 	CO
 BIT 2019 Principles\n 	COBIT 2019: 40 Governance Objectives\n 	Workshop 
 เรื่อง COBIT 2019 Implementation\n 	Applying Specific COBIT 20
 19 for ISO 38500\n 	Applying Specific COBIT 2019 for SE-AM\n\nTraining inf
 o:\nDuration:  2 Days\nDate: Oct 15-16\, 2026\nTime:  9.30 am. – 16.3
 0 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre Point L
 umphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 32
 1-323\nTraining Fees: 21\,900 Baht (ex.vat7%)\nFor Onsite training: Please
  Call\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/05/Yellow-and-Black-Modern-Medical-LinkedIn-Article-Cover-Image.png
CATEGORIES:Data Governance,Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:894@acinfotec.com
DTSTART:20261016T023000Z
DTEND:20261016T093000Z
DTSTAMP:20260115T030244Z
URL:https://www.acinfotec.com/training-event/it-risk-management-based-on-i
 so-27005-and-iso-31000-11/
SUMMARY:IT Risk Management Based on ISO 27005 and ISO 31000
DESCRIPTION:About this course\nDuring this 1-day course\, you will learn a 
 variety of topics regarding IT risks. Risks related to information systems
  and computer networks require different approaches to deal with and also 
 new types of controls and countermeasures. This course covers various topi
 cs that IT professionals need to know in order to prepare themselves again
 st various kinds of risks related to information systems. This course will
  provide knowledge for audience to understand IT risks and how to manage r
 isks based on global risk management standards such as ISO27005 and ISO310
 00 so that they will be prompted and defended against possible risks and a
 ttacks.\nCourse Benefits\n\n 	Gain understanding of IT risks\n 	Learn and 
 understand how to manage risks based on ISO 27005 and ISO 31000 standards\
 n 	Enhance skills required for implementing security controls against iden
 tified risks\n 	Be prompted to apply knowledge given from the course to re
 al-world scenarios\n\nWho should attend?\n\n 	IT Professionals\n 	Informat
 ion security professionals\n 	Risk management professionals\n 	Anyone who 
 is responsible for and interested in managing IT risks\n\nCourse Contents\
 n\n 	Fundamental of IT risks in relations with other types of risks\n 	Var
 ious types of IT risks\, e.g. systems\, networks\, applications\, web appl
 ications\, cloud computing\, etc.\n 	Risk management framework based on IS
 O 27005\n 	Risk identification\, evaluation\, treatment\, acceptance\, com
 munications and surveillance\, Risk assessment methodologies\n 	Risk manag
 ement framework based on ISO 31000\n 	Risk identification\, evaluation\, t
 reatment\, acceptance\, communications and surveillance\, Risk assessment 
 methodologies\n 	Risk management case studies\n\n&nbsp\;\n\nTraining Info\
 n\nDuration:  1 Day\nDate:  Oct 16\, 2026\nTime:  9.30 am. – 16.30 
 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lum
 phini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-
 323\nTraining Fees: 9\,000 Baht (ex.vat7%)\nE-mail.training@acinfotec.com\
 n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-3.png
CATEGORIES:Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:989@acinfotec.com
DTSTART:20261016T023000Z
DTEND:20261016T093000Z
DTSTAMP:20260115T030236Z
URL:https://www.acinfotec.com/training-event/it-risk-management-based-on-i
 so-27005-and-iso-31000-12/
SUMMARY:IT Risk Management Based on ISO 27005 and ISO 31000
DESCRIPTION:About this course\nDuring this 1-day course\, you will learn a 
 variety of topics regarding IT risks. Risks related to information systems
  and computer networks require different approaches to deal with and also 
 new types of controls and countermeasures. This course covers various topi
 cs that IT professionals need to know in order to prepare themselves again
 st various kinds of risks related to information systems. This course will
  provide knowledge for audience to understand IT risks and how to manage r
 isks based on global risk management standards such as ISO27005 and ISO310
 00 so that they will be prompted and defended against possible risks and a
 ttacks.\nCourse Benefits\n\n 	Gain understanding of IT risks\n 	Learn and 
 understand how to manage risks based on ISO 27005 and ISO 31000 standards\
 n 	Enhance skills required for implementing security controls against iden
 tified risks\n 	Be prompted to apply knowledge given from the course to re
 al-world scenarios\n\nWho should attend?\n\n 	IT Professionals\n 	Informat
 ion security professionals\n 	Risk management professionals\n 	Anyone who 
 is responsible for and interested in managing IT risks\n\nCourse Contents\
 n\n 	Fundamental of IT risks in relations with other types of risks\n 	Var
 ious types of IT risks\, e.g. systems\, networks\, applications\, web appl
 ications\, cloud computing\, etc.\n 	Risk management framework based on IS
 O 27005\n 	Risk identification\, evaluation\, treatment\, acceptance\, com
 munications and surveillance\, Risk assessment methodologies\n 	Risk manag
 ement framework based on ISO 31000\n 	Risk identification\, evaluation\, t
 reatment\, acceptance\, communications and surveillance\, Risk assessment 
 methodologies\n 	Risk management case studies\n\n&nbsp\;\n\nTraining Info\
 n\nDuration:  1 Day\nDate:  Oct 16\, 2026\nTime:  9.30 am. – 16.30 
 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lum
 phini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-
 323\nTraining Fees: 9\,000 Baht (ex.vat7%)\nE-mail.training@acinfotec.com\
 n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-3.png
CATEGORIES:Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:899@acinfotec.com
DTSTART:20261019T023000Z
DTEND:20261020T093000Z
DTSTAMP:20260115T030208Z
URL:https://www.acinfotec.com/training-event/cobit-2019-6/
SUMMARY:COBIT 2019
DESCRIPTION:About this course \n\nThe heart of the COBIT framework updates 
 COBIT principles while laying out the structure of the overall framework.\
 n\n 	New concepts are introduced and terminology is explained—the COBIT 
 Core Model and its 40 governance and management objectives provide the pla
 tform for establishing your governance program\n 	The performance manageme
 nt system is updated and allows the flexibility to use maturity measuremen
 ts as well as capability measurements\n 	Introductions to design factors a
 nd focus areas offer additional practical guidance on flexible adoption of
  COBIT 2019\, whether for specific projects or full implementation\n\nFrom
  its foundation in the IT audit community\, COBIT has developed into a bro
 ader and more comprehensive information and technology (I&amp\;T) governan
 ce and management framework and continues to establish itself as a general
 ly accepted framework for I&amp\;T governance.\n\nCOBIT is a framework for
  the governance and management of enterprise information and technology\, 
 aimed at the whole enterprise. Enterprise IT means all the technology and 
 information processing the enterprise puts in place to achieve its goals\,
  regardless of where this happens in the enterprise. In other words\, ente
 rprise IT is not limited to the IT department of an organization\, but cer
 tainly includes it.\n\nCOBIT defines the components to build and sustain a
  governance system: processes\, organizational structures\, policies and p
 rocedures\, information flows\, culture and behaviors\, skills\, and infra
 structure.\nWho Should attend? \n\n 	IT Team leaders and Managers\n 	IT pr
 ofessionals responsible for Business Performance/ Quality Professional\n 	
 Risk management Team/ Risk Advisor\n 	IT Security and Privacy technician\n
  	Compliance Professionals\n 	Auditor\n 	Developers\n 	IT practitioner\n 	
 IT consultant\n\nCourse contents\nParticipants will learn more about:\n\n 
 	Key concepts and terminology\n 	Governance and Framework Principles\n 	CO
 BIT Principles\n 	COBIT Governance and Management Objectives\n 	Performanc
 e Management in COBIT\n 	Designing a Tailored Governance System\n 	Busines
 s Case and Implementation\n 	COBIT and Other Standards\n\nThe program incl
 ude 4 core publications.\n\n 	Introduction and Methodology\n 	Governance a
 nd Management Objectives\n 	Designing an Information and Technology Govern
 ance Solution\n 	Implementing and Optimizing an Information and Technology
  Governance Solution\n\nTraining info\nDuration:  2 Days\nDate:  Oct 19
  - 20\, 2026\nTime:  9.30 am. – 16.30 pm\nVenue: ACinfotec Training C
 enter\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4
  Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining Fees: 18\,900 Baht 
 (ex.vat7%)\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/COBIT-Services.jpg
CATEGORIES:Risk Based IT Audit,Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:843@acinfotec.com
DTSTART:20261019T023000Z
DTEND:20261022T093000Z
DTSTAMP:20260115T030229Z
URL:https://www.acinfotec.com/training-event/csslp-certified-secure-softwa
 re-lifecycle-professional-exam-prep-new-3/
SUMMARY:CSSLP - Certified Secure Software Lifecycle Professional (Exam Prep
 )
DESCRIPTION:CSSLP - Certified Secure Software Lifecycle Professional (Exam 
 Prep)\nAbout this course\nEarning the globally recognized CSSLP secure sof
 tware development certification is a proven way to build your career and b
 etter incorporate security practices into each phase of the software devel
 opment lifecycle (SDLC).\n\nCSSLP certification recognizes leading applica
 tion security skills. It shows employers and peers you have the advanced t
 echnical skills and knowledge necessary for authentication\, authorization
  and auditing throughout the SDLC using best practices\, policies and proc
 edures established by the cybersecurity experts at ISC2. Prove your skills
 \, advance your career\, and gain support from a community of cybersecurit
 y leaders here to help you throughout your professional journey.\nWho shou
 ld attend?\n\n 	Software developers\n 	Software architects\n 	Software eng
 ineers\n 	Application security specialists\n 	Penetration testers\n 	Proje
 ct managers\n 	Anyone involved in the software development lifecycle (SDLC
 )\n\nCourse Contents\nDomain 1. Secure Software Concepts\n\nDomain 2. Secu
 re Software Lifecycle Management\n\nDomain 3. Secure Software Requirements
 \n\nDomain 4. Secure Software Architecture and Design\n\nDomain 5. Secure 
 Software Implementation\n\nDomain 6. Secure Software Testing\n\nDomain 7. 
 Secure Software Deployment\, Operations\, Maintenance\n\nDomain 8. Secure 
 Software Supply Chain\n\n&nbsp\;\nCSSLP Examination Information\n\n\n\nLen
 gth of exam\n3 hours\n\n\nNumber of items\n125\n\n\nItem format\nMultiple 
 choice\n\n\nPassing grade\n700 out of 1000 points\n\n\nLanguage availabili
 ty\nEnglish\n\n\nTesting center\nPearson VUE Testing Center\n\n\n\n\nCSSLP
  Examination Weights\n\n\n\nDomains\nAverage Weight\n\n\n1. Secure Softwar
 e Concepts\n12%\n\n\n2. Secure Software Lifecycle Management\n11%\n\n\n3. 
 Secure Software Requirements\n13%\n\n\n4. Secure Software Architecture and
  Design\n15%\n\n\n5. Secure Software Implementation\n14%\n\n\n6. Secure So
 ftware Testing\n14%\n\n\n7. Secure Software Deployment\, Operations\, Main
 tenance\n11%\n\n\n8. Secure Software Supply Chain\n10%\n\n\nTotal\n100%\n\
 n\n\nTraining Info\nLanguage: Conducted in Thai Language\nDuration: 4 
 Days\nDate: Oct 110 - 19\, 2025\nPrice: 38\,000.- (ex.vat)\nVenue: ACinfo
 tec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Work
 lab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nE-mail: traini
 ng@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/07/images.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:948@acinfotec.com
DTSTART:20261019T023000Z
DTEND:20261022T093000Z
DTSTAMP:20260115T030218Z
URL:https://www.acinfotec.com/training-event/comptia-cybersecurity-analyst
 -cysaexam-included-4/
SUMMARY:CompTIA Cybersecurity Analyst (CySA+)(Exam Included)
DESCRIPTION:About this course\nThe CSA+ certification acronym has changed t
 o CySA+. CompTIA and its partners will make the change by June 29th\, 2018
 . The exam code will remain the same.\n\nAs attackers have learned to evad
 e traditional signature-based solutions such as firewalls\, an analytics-b
 ased approach within the IT security industry is increasingly important fo
 r most organizations. The behavioral analytics skills covered by CySA+ ide
 ntify and combat malware\, and advanced persistent threats (APTs)\, result
 ing in enhanced threat visibility across a broad attack surface. CompTIA C
 ySA+ is for IT professionals looking to gain the following security analys
 t skills:\n\n 	Configure and use threat detection tools.\n 	Perform data a
 nalysis.\n 	Interpret the results to identify vulnerabilities\, threats an
 d risks to an organization.\n\n\n\nCourse Objectives\nAfter completing the
  CompTIA CySA+ course\, delegates will have the skills and knowledge to:\n
 \n 	Assess information security risk in computing and network environments
 \n 	Analyse the cybersecurity threat landscape\n 	Analyse reconnaissance t
 hreats to computing and network environments\n 	Analyse attacks on computi
 ng and network environments\n 	Analyse post-attack techniques on computing
  and network environments\n 	Implement a vulnerability management program\
 n 	Evaluate the organization's security through penetration testing\n 	Col
 lect cybersecurity intelligence\n 	Analyse data collected from security an
 d event logs\n 	Perform active analysis on assets and networks\n 	Respond 
 to cyber security incidents\n 	Investigate cyber security incidents\n 	Add
 ress security issues with the organization's technology architecture\n\n\n
 \nCourse Content\n\n\nLesson 1: Assessing Information Security Risk \n\n 	
 Topic A: Identify the Importance of Risk Management\n 	Topic B: Assess Ris
 k\n 	Topic C: Mitigate Risk\n 	Topic D: Integrate Documentation into Risk 
 Management\n\n\n\n\nLesson 2: Analysing the Threat Landscape \n\n 	Topic A
 : Classify Threats and Threat Profiles\n 	Topic B: Perform Ongoing Threat 
 Research\n\n\nLesson 3: Analysing Reconnaissance Threats to Computing and 
 Network Environments \n\n 	Topic A: Implement Threat Modeling\n 	Topic B: 
 Assess the Impact of Reconnaissance Incidents\n 	Topic C: Assess the Impac
 t of Social Engineering\n\nLesson 4: Analysing Attacks on Computing and Ne
 twork Environments \n\n 	Topic A: Assess the Impact of System Hacking Atta
 cks\n 	Topic B: Assess the Impact of Web-Based Attacks\n 	Topic C: Assess 
 the Impact of Malware\n 	Topic D: Assess the Impact of Hijacking and Imper
 sonation Attacks\n 	Topic E: Assess the Impact of DoS Incidents\n 	Topic F
 : Assess the Impact of Threats to Mobile Security\n 	Topic G: Assess the I
 mpact of Threats to Cloud Security\n\nLesson 5: Analysing Post-Attack Tech
 niques \n\n 	Topic A: Assess Command and Control Techniques\n 	Topic B: As
 sess Persistence Techniques\n 	Topic C: Assess Lateral Movement and Pivoti
 ng Techniques\n 	Topic D: Assess Data Exfiltration Techniques\n 	Topic E: 
 Assess Anti-Forensics Techniques\n\nLesson 6: Managing Vulnerabilities in 
 the Organization \n\n 	Topic A: Implement a Vulnerability Management Plan\
 n 	Topic B: Assess Common Vulnerabilities\n 	Topic C: Conduct Vulnerabilit
 y Scans\n\nLesson 7: Implementing Penetration Testing to Evaluate Security
  \n\n 	Topic A: Conduct Penetration Tests on Network Assets\n 	Topic B: Fo
 llow Up on Penetration Testing\n\nLesson 8: Collecting Cybersecurity Intel
 ligence \n\n 	Topic A: Deploy a Security Intelligence Collection and Analy
 sis Platform\n 	Topic B: Collect Data from Network-Based Intelligence Sour
 ces\n 	Topic C: Collect Data from Host-Based Intelligence Sources\n\nLesso
 n 9: Analysing Log Data \n\n 	Topic A: Use Common Tools to Analyse Logs\n 
 	Topic B: Use SIEM Tools for Analysis\n 	Topic C: Parse Log Files with Reg
 ular Expressions\n\nLesson 10: Performing Active Asset and Network Analysi
 s \n\n 	Topic A: Analyse Incidents with Windows-Based Tools\n 	Topic B: An
 alyse Incidents with Linux-Based Tools\n 	Topic C: Analyse Malware\n 	Topi
 c D: Analyse Indicators of Compromise\n\nLesson 11: Responding to Cybersec
 urity Incidents \n\n 	Topic A: Deploy an Incident Handling and Response Ar
 chitecture\n 	Topic B: Mitigate Incidents\n 	Topic C: Prepare for Forensic
  Investigation as a CSIRT\n\nLesson 12: Investigating Cybersecurity Incide
 nts \n\n 	Topic A: Apply a Forensic Investigation Plan\n 	Topic B: Securel
 y Collect and Analyse Electronic Evidence\n 	Topic C: Follow Up on the Res
 ults of an Investigation\n\nLesson 13: Addressing Security Architecture Is
 sues \n\n\n 	Topic A: Remediate Identity and Access Management Issues\n 	T
 opic B: Implement Security During the SDLC\n\n\nExam Description\nThe Comp
 TIA Cybersecurity Analyst (CySA+) certification verifies that successful c
 andidates have the knowledge and skills required to configure and use thre
 at detection tools\, perform data analysis and interpret the results to id
 entify vulnerabilities\, threats and risks to an organization\, with the e
 nd goal of securing and protecting applications and systems within an orga
 nization.\n\nNumber of Questions : Maximum of 85 questions (Multiple choic
 e and performance-based)\n\nLength of Test: 165 minutes\n\nPassing Score: 
 750 (on a scale of 100-900)\nTraining info\nDuration:  4 Days\nDate: Oc
 t 19-22\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue: ACinfotec Trainin
 g Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ram
 a 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining Fees: 47\,000 Ba
 ht (ex.vat7%)\nE-mail.training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:565@acinfotec.com
DTSTART:20261021T023000Z
DTEND:20261022T093000Z
DTSTAMP:20260115T030159Z
URL:https://www.acinfotec.com/training-event/practical-implementation-appr
 oach-to-business-continuity-management-iso-22301-5/
SUMMARY:Practical Implementation Approach to Business Continuity Management
  – ISO 22301
DESCRIPTION:About this course \nIn this two days practical course\, you wi
 ll learn about principle and fundamental knowledge of international method
 ology for implementation of Business Continuity Management (BCM). The cour
 se also includes hands-on workshop on risk assessment and business impact 
 analysis to enhance your knowledge. All delegates will also receive a chec
 klist to help you create a better Business Continuity Plan for your organi
 zation.\n\n&nbsp\;\nWho Should attend?\n\n 	COO\, CIO\, or senior manageme
 nt\n 	BCM Manager\, Coordinators\, Recovery Team Leaders and members\n 	In
 formation security professionals\n 	Risk and compliance manager\n 	Anyone 
 who responsible for establishing BCM or developing BCP for their organizat
 ions\n\nCourse Benefits\n\n 	Gain understanding of international standard 
 methodology for BCM implementation\n 	Learn practical approach of BCM impl
 ementation\n 	Use common consistent framework\, based on international bes
 t practice\, to manage business continuity\n 	Enhance skills required to d
 evelop\, implement and maintain BCP\n 	Obtain necessary knowledge and gain
  confident working with BCM practitioners and making related decisions\n\n
 Course Contents\n\n 	Business Continuity Management Overview\n 	Important 
 Definitions\n 	Business Continuity Management Life Cycle\n 	Business Conti
 nuity Management Organization and Emergency Response Structure\n 	Crisis M
 anagement Plan\, Emergency Response Plan\, Business Resumption Plans and D
 isaster Recovery Plans\n 	Risk Analysis &amp\; Risk Assessment (RA)\n 	Bus
 iness Impact Analysis (BIA)\n 	Developing Business Continuity Strategy\n 	
 Developing the Business Continuity Plan (BCP)\n 	Exercising the Plan\n 	Pr
 actice and Group Workshop\n 	Q &amp\; A\n\nTraining Info\nDuration:  2 D
 ays\nDate:  Oct 21 - 22\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue: 
 ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\,
  (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining
  Fees: 18\,900 Baht (ex.vat7%)\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/BCMS1.jpg
CATEGORIES:Business Continuity (ISO 22301/BCM)
END:VEVENT
BEGIN:VEVENT
UID:966@acinfotec.com
DTSTART:20261026T023000Z
DTEND:20261030T093000Z
DTSTAMP:20260115T030150Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-200002018-
 lead-implementer-exam-included-2/
SUMMARY:PECB Certified ISO 20000:2018 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nThis five-day intensive course enables the p
 articipants to develop the necessary expertise to support an organization 
 in implementing and managing a Service Management System as specified in I
 SO/IEC 20000-1. Also\, the participant will gain a thorough understanding 
 of in best practices for planning and implementing Service Management proc
 esses starting from the six fields of ISO 20000: planning and implementing
  new and changed services\, service delivery process\, relationship manage
 ment processes\, problem resolution process\, control processes and releas
 e processes.\n\nThis training is consistent with the project management pr
 actices established in ISO 10006 (Quality Management Systems – Guideline
 s for Quality Management in Projects). This training is fully compatible w
 ith ISO 20000-2 (Guidelines for the Implementation of an SMS) and ITIL.\nL
 earning Objectives\n• To understand the implementation of an Service Man
 agement System in accordance with ISO 20000\n• To gain a comprehensive u
 nderstanding of the concepts\, approaches\, standards\, methods and techni
 ques allowing an effective management of an Service Management System\n•
  To know the interrelationships between ISO/IEC 20000-1\, ISO/IEC 20000-2 
 and ITIL\n• To acquire expertise to support an organization in implement
 ing\, managing and maintaining an Service Management System (SMS) as speci
 fied in ISO/IEC 20000\n• To acquire the necessary expertise to manage a 
 team in implementing the ISO 20000 standard\n Prerequisite\n• ISO 20000
  Foundation Certification or basic knowledge of ISO 20000 and ITIL is reco
 mmended\n Who Should attend?\n• Project managers or consultants wanting
  to implement of an Service Management System (SMS)\n• ISO 20000 auditor
 s who wish to fully understand the SMS implementation process\n• Persons
  responsible for the SMS conformity in an organization\n• Technical expe
 rts wanting to prepare for an SMS function\nCourse Agenda\n\nDay 1: Introd
 uction to Service Management System (SMS) concepts as required by ISO 2000
 0 Initiating an SMS\n\no Presentation of the ISO 20000 family of standards
  and comparison with ITIL V2 and V3\no Fundamental principles of Service M
 anagement System\no Preliminary analysis and establishment of the maturity
  level of an existing SMS\no Writing a business case and a project plan fo
 r the implementation of an SMS\n\nDay 2: Planning an SMS based on ISO 2000
 0\n\no Definition of the scope of an SMS\no Definition of an SMS policy an
 d objectives\no Documentation of the processes and procedures and SLAs\no 
 Budgeting and accounting for IT services\n\nDay 3: Implementing an SMS bas
 ed on ISO 20000\n\no Change\, configuration\, release\, capacity and avail
 ability management\no Service continuity and security management\no Incide
 nt and problem management\no Operations management of an SMS\n\nDay 4: Con
 trolling\, monitoring\, measuring and improving an SMS certification audit
  of an SMS in accordance with ISO 20000\n\no Controlling and monitoring an
  SMS\no Development of metrics\, performance indicators and dashboards\no 
 ISO 20000 internal Audit and Management review\no Implementation of a cont
 inual improvement program\no Preparing for an ISO 20000 certification audi
 t\n\nDay 5: Certification Exam (3 Hours)\n\nTraining Info\n\nDuration:  
 5 Days\nDate: Oct 26-30\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue: A
 Cinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, 
 (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining 
 Fees: 51\,500 Baht (ex.vat7%)\nE-mail.training@acinfotec.com\n\n\n\nwww.pe
 cb.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:931@acinfotec.com
DTSTART:20261027T023000Z
DTEND:20261030T093000Z
DTSTAMP:20260115T030135Z
URL:https://www.acinfotec.com/training-event/cisa-examination-preparation-
 exam-excluded-5/
SUMMARY:CISA Examination Preparation (Exam Excluded)
DESCRIPTION:About this course\nCertified Information Systems Auditor (CISA)
 ® is one of the world’s most popular information security/information t
 echnology auditing certifications for professionals worldwide. CISA certif
 ication course is developed by ISACA and ideal for anybody looking to forg
 e their career in the IT Security/Cybersecurity domain. This 4-day Certifi
 ed Information Systems Auditor (CISA) certification course validates your 
 auditing\, control\, and security skills among the best in the industry.\n
 Course Benefits\n\n 	 A thorough understanding of knowledge and skills re
 quired for an IS Auditor\n 	Insights into the level of knowledge required 
 to meet the complexities of a digital business landscape\n 	An in-depth un
 derstanding of auditing information systems\n 	Knowledge of management and
  governance of IT processes and systems\n 	Understanding of acquisition\, 
 development\, test\, and implementation of critical business information s
 ystems\n 	Thorough knowledge of managing\, maintaining\, and securing info
 rmation assets\n 	Proper understanding of the CISA course material to clea
 r your CISA exam on the first attempt\n\nWho should attend?\nThis course i
 s suitable for\;\n\n 	IT Managers\n 	Network Architects\n 	Security Consul
 tants\n 	Auditing Professionals\n 	Security Architects\n 	Security Auditor
 s\n 	Security Managers\n 	Security Analysts\n 	Security Systems Engineers\
 n 	Anybody who wants to gain knowledge of globally-recognized CISA informa
 tion systems auditing process\n 	Anybody who is looking create a career in
  information systems auditing\n\nCourse Contents\nDOMAIN 1 – INFORMATION
  SYSTEMS AUDITING PROCESS\n\n 	Planning\n 	IS Audit Standards\, Guidelines
 \, and Codes of Ethics\n 	Business Processes\n 	Types of Controls\n 	Risk-
 Based Audit Planning\n 	Types of Audits and Assessments\n 	Execution\n 	Au
 dit Project Management\n 	Sampling Methodology\n 	Audit Evidence Collectio
 n Techniques\n 	Data Analytics\n 	Reporting and Communication Techniques\n
 \nDOMAIN 2 – GOVERNANCE &amp\; MANAGEMENT OF IT\n\n 	IT Governance\n 	IT
  Governance and IT Strategy\n 	IT-Related Frameworks\n 	IT Standards\, Pol
 icies\, and Procedures\n 	Organizational Structure\n 	Enterprise Architect
 ure\n 	Enterprise Risk Management\n 	Maturity Models\n 	Laws\, Regulations
 \, and Industry Standards affecting the Organization\n 	IT Management\n 	I
 T Resource Management\n 	IT Service Provider Acquisition and Management\n 
 	IT Performance Monitoring and Reporting\n 	Quality Assurance and Quality 
 Management of IT\n\nDOMAIN 3 – INFORMATION SYSTEMS ACQUISITION\, DEVELOP
 MENT &amp\; IMPLEMENTATION\n\n 	Information Systems Acquisition and Develo
 pment\n 	Project Governance and Management\n 	Business Case and Feasibilit
 y Analysis\n 	System Development Methodologies\n 	Control Identification a
 nd Design\n 	Information Systems Implementation\n 	Testing Methodologies\n
  	Configuration and Release Management\n 	System Migration\, Infrastructur
 e Deployment\, and Data Conversion\n 	Post-implementation Review\n\nDOMAIN
  4 – INFORMATION SYSTEMS OPERATIONS &amp\; BUSINESS RESILIENCE\n\n 	Info
 rmation Systems Operations\n 	Common Technology Components\n 	IT Asset Man
 agement\n 	Job Scheduling and Production Process Automation\n 	System Inte
 rfaces\n 	End-User Computing\n 	Data Governance\n 	Systems Performance Man
 agement\n 	Problem and Incident Management\n 	Change\, Configuration\, Rel
 ease\, and Patch Management\n 	IT Service Level Management\n 	Database Man
 agement\n 	Business Resilience\n 	Business Impact Analysis (BIA)\n 	System
  Resiliency\n 	Data Backup\, Storage\, and Restoration\n 	Business Continu
 ity Plan (BCP)\n 	Disaster Recovery Plans (DRP)\n\nDOMAIN 5 – PROTECTION
  OF INFORMATION ASSETS\n\n 	Information Asset Security and Control\n 	Info
 rmation Asset Security Frameworks\, Standards\, and Guidelines\n 	Privacy 
 Principles\n 	Physical Access and Environmental Controls\n 	Identity and A
 ccess Management\n 	Network and End-Point Security\n 	Data Classification\
 n 	Data Encryption and Encryption-Related Techniques\n 	Public Key Infrast
 ructure (PKI)\n 	Web-Based Communication Techniques\n 	Virtualized Environ
 ments\n 	Mobile\, Wireless\, and Internet-of-Things (IoT) Devices\n 	Secur
 ity Event Management\n 	Security Awareness Training and Programs\n 	Inform
 ation System Attack Methods and Techniques\n 	Security Testing Tools and T
 echniques\n 	Security Monitoring Tools and Techniques\n 	Incident Response
  Management\n 	Evidence Collection and Forensics\n 	Supporting Tasks\n\nEx
 amination\n• Paper-based Examination\n• 4 Hours\n• 200 MCQ Questions
 \n• Minimum score of 450 out of a possible maximum of 800\nTraining Info
 \nDuration:  4 Days\nDate:  Oct 27 - 30\, 2026\nTime:  9.30 am. – 1
 6.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre Poin
 t Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext.
  321-323\nTraining Fees: 34\,000 Baht (ex.vat7%)\nE-mail.training@acinfote
 c.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/3.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:512@acinfotec.com
DTSTART:20261028T023000Z
DTEND:20261030T093000Z
DTSTAMP:20260115T030031Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-38500-it-c
 orporate-governance-manager-thai-exam-included/
SUMMARY:PECB Certified ISO 38500 IT Corporate Governance Manager (Exam Incl
 uded)
DESCRIPTION:About this course\nThis three day intensive course enables the 
 participants to develop the necessary expertise to support an organization
  in implementing corporate governance of Information Technology as specifi
 ed in ISO/IEC 38500. Participants will also gain a thorough understanding 
 of best practices used to implement guidance for Corporate Governance of I
 T from all areas of ISO 38500. ISO/ IEC 38500 applies to the governance of
  management processes (and decisions) relating to the information and comm
 unication services used by an organization. These processes could be contr
 olled by IT specialists within the organization or external service provid
 ers\, or by business units within the organization.\nCourse Benefits\n\n 	
 To understand the implementation of guidance for the corporate governance 
 of IT in accordance with ISO/IEC 38500\n 	To gain a comprehensive understa
 nding of the concepts\, approaches\, standards\, methods and techniques re
 quired for the effective management of an corporate governance of IT\n 	To
  understand the relationship between the components of a corporate governa
 nce of IT\, including responsibility\, strategy\, acquisition\, performanc
 e\, conformance\, human behavior\n 	To acquire necessary expertise to mana
 ge a team implementing ISO/IEC 38500\n\nWho should attend?\n\n 	Project ma
 nagers or consultants wanting to prepare and to support an organization in
  the implementation of corporate governance of Information Technology\n 	I
 SO 38500 auditors who wish to fully understand the corporate governance of
  IT implementation process\n 	Senior Managers responsible for the IT gover
 nance of an enterprise and the management of its risks\n 	Members of group
 s monitoring the resources within the organization\n 	External business or
  technical specialists\, such as legal or accounting specialists\, retail 
 associations\, or professional bodies\n 	Vendors of hardware\, software\, 
 communications and other IT products\n 	Internal and external service prov
 iders (including consultants)\n\nCourse Contents\nDay 1: Introduction to C
 orporate Governance of Information Technology as required by ISO/IEC 38500
 \n\n 	Introduction to corporate governance of IT\n 	Fundamental principles
  of corporate governance of IT\n 	Initiation process of corporate governan
 ce of IT\n 	Definition of the scope\n 	Corporate governance application\n 
 	Objectives of ISO/IEC 38500\n 	Benefits of using this standard\n 	Referen
 ced documents\n 	Definitions\n\nDay 2: Framework and Guidance for Good Co
 rporate Governance of IT\n\n 	Principles\n 	Model\n 	Responsibility of dir
 ectors for corporate governance of IT\n 	Strategy of IT development\n 	Acq
 uisition\n 	Performance of corporate governance of IT\n 	Conformance\n 	Hu
 man Behavior\n\nDay 3: Certification Exam\n Training Info\nDuration:  3
  Days\nDate: Oct 28 - 30\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue: 
 ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\,
  (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining
  Fees: 38\,500 Baht (ex.vat7%)\nE-mail.training@acinfotec.com\n\n\n\nwww.p
 ecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course),Risk Management &amp; Governance
 (GRC)
END:VEVENT
BEGIN:VEVENT
UID:730@acinfotec.com
DTSTART:20261030T023000Z
DTEND:20261030T093000Z
DTSTAMP:20260115T030019Z
URL:https://www.acinfotec.com/training-event/digital-forensics-unlocking-t
 he-secrets-thai-6/
SUMMARY:Digital Forensics – Unlocking the Secrets (Thai)
DESCRIPTION:About this course\nA one day training course for legal professi
 onals who have to deal with digital evidence. The course will look at the 
 types of digital evidence that is routinely produced for legal proceedings
  and the potential issues surrounding that evidence.\nThe course will prov
 ide an overview of the forensic principles\, techniques and terminology us
 ed by forensic investigators. The aim is to provide the candidate with a l
 evel of understanding so they can interpret forensic reports and assess th
 e authenticity and integrity of the digital evidence. A reference manual w
 ill be provided to each candidate along with a certificate of completion c
 onfirming the number of training hours undertaken.\n\nWho Should attend?\n
 The course is aimed at legal professionals who are required to deal with d
 igital evidence. No previous experience is required. \nCourse Contents\n1
  – Introduction to Digital Forensics\n\n 	Define Digital Forensics\n 	Le
 gal Considerations\n 	Integrity of Digital Evidence\n\n2 - Investigation F
 undamentals\n\n 	Best Practice Guidelines\n 	The Four Principles of Comput
 er Based Evidence\n 	Identifying Electronic Sources of Evidence\n 	The Fou
 r Levels of Computer Data\n 	Types of Data\n\n3 - Forensic Techniques / Te
 rms Explained\n\n 	Forensic Image\n 	Forensic Clone\n 	Hash Values (digita
 l fingerprint)\n 	Forensic Acquisition Reports\n\n4 - What Happens to Del
 eted Data?\n\n 	Live Data\n 	Deleted Data\n\n5 – Types of Digital Eviden
 ce\n\n 	Types of Digital Evidence\n\n6 - Understanding Digital Evidence\n\
 n 	Time and Date Stamps (what you need to know)\n 	File Metadata (the hidd
 en information)\n 	Internet History\n 	Email Headers\n\nTraining Info\nDur
 ation:  1 Day\nDate:  Oct 30\, 2026\nTime:  9.30 am. – 16.30 pm.\nV
 enue: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini 
 Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nT
 raining Fees: 9\,950 Baht (ex.vat7%)\nE-mail.training@acinfotec.com\n\n&nb
 sp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/01/image004.png
CATEGORIES:Digital Forensics,ICMS
END:VEVENT
BEGIN:VEVENT
UID:934@acinfotec.com
DTSTART:20261102T023000Z
DTEND:20261106T093000Z
DTSTAMP:20260115T025938Z
URL:https://www.acinfotec.com/training-event/irca-iso-270012013-isms-lead-
 auditor-8/
SUMMARY:IRCA ISO 27001 ISMS Lead Auditor
DESCRIPTION:About this course\nISO/IEC 27001:2013 – Information security 
 management system lead auditor teaches students the fundamentals of auditi
 ng information security management systems to ISO/IEC 27001. This five day
  intensive course trains students on how to conduct audits for certificati
 on bodies and facilitate the ISO/IEC 27001 registration process.\n\nThe au
 diting exercises and lectures are based on ISO 19011:2011\, “Guidelines 
 for Quality and/or Environmental Management Systems Auditing.” The cours
 e is designed specifically for those people who wish to conduct external a
 ssessments or internal audits to ISO/IEC 27001\, although students will al
 so gain the knowledge and understanding necessary to give practical help a
 nd information to other individuals and organizations working toward confo
 rmance to the standard.\nPrerequisites\n\n 	A prior knowledge of the requi
 rements of ISO 27001 would be beneficial.\n\nLearning Objective\n\n 	Revie
 w the requirements of ISO/IEC 27001\n 	Understand the relationship between
  ISO/IEC 27001 and ISO/IEC 27002\n 	Learn how to assess security threats a
 nd vulnerabilities\n 	Understand security controls and countermeasures\n 	
 Understand the roles and responsibilities of the auditor\n 	Learn how to\,
  plan\, execute\, report\, and follow-up on an information security manage
 ment system audit\n\nCourse Contents\nDay 1 :\n\no  Course Introduction\n
 \n– Housekeeping\n\n– Course and learner objectives\n\n– Course stru
 cture and methods\n\n– Delegate assessment\n\no  What is an Information
  Security Management System?\n\n– Information security\n\n– Management
  systems\n\n– Purpose and benefits of ISO 27001\n\n– Related standards
 \n\no  Process Approach\n\n– PDCA model\n\n– Process model\n\no  Ove
 rview of ISO 27001 contents\n\no  ISO 27001 Mandatory clauses 4 – 8\n\n
 Day 2 :\n\no  Course Recap day 1. Questions and Answers\n\no  Controls\n
 \no  Overview of the audit process\n\no  Auditing the SOA\n\no  Audit a
 nd Auditors\n\n– Definitions\n\n– 1st\, 2nd and 3rd party audits\n\n
 – Roles and responsibilities of auditors and lead auditors\n\n– Skills
  and characteristics of effective auditors\n\no  Audit Planning\n\n– In
 formation needed to plan the audit\, and things to consider\n\n– Prelimi
 nary visits\n\n– Preparation of an audit plan\n\no  Audit communication
 s and meetings\n\n– Good practice for communication during the audit\n\n
 – Formal meetings\n\n– Opening meeting – what to cover and how\n\no
   Checklists\n\n– Benefits and drawbacks\n\n– Content – what to inc
 lude\n\n– Developing a checklist for a specific audit\n\nDay 3 :\n\no  
 Process Audits\n\no  Case studies\n\no  Conducting the audit\n\n– inte
 rviewing\n\n– sampling\n\n– note taking\n\n– interacting with the au
 ditee\n\n– who’s involved and general points\n\no  Nonconformities\n\
 n– definition of nonconformity\n\n– linking to requirements of ISO 270
 01\n\n– grading nonconformity reports\n\n– structure and content of no
 nconformity reports\n\nDay 4 :\n\no  Case studies\n\n– including interv
 iewing.\n\n– developing and following audit trails\n\n– identifying no
 n conformities\n\no  Specimen Examination\n\n– Review of answers\n\n–
  Layout and marking scheme of the papers\n\no  Closing Meeting\n\n– Out
 comes\n\n– Content\n\n– Identifying possible issues and how to prevent
  or deal with these\n\no  Corrective Actions\n\n– Corrective action pro
 cess\n\n– Evaluating corrective actions\n\no  Reporting the audit\n\n
 – Purpose and content of the written audit report\n\no  Next steps\n\n
 – action planning\n\n– further development\n\n– auditor registration
 \n\nDay 5 :\n\no  Course Evaluations\n\no  Examination Rules\n\no  Writ
 ten Examination\n\no  End of the Course\nTraining Info\nDuration:  5 Da
 ys\nDate:  Nov 2 - 6\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue: ACi
 nfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (W
 orklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining Fe
 es: 38\,000 Baht (ex.vat7%)\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/irca_logo-e1441254509693.jpg
CATEGORIES:IRCA (Official IRCA course)
END:VEVENT
BEGIN:VEVENT
UID:993@acinfotec.com
DTSTART:20261102T023000Z
DTEND:20261106T093000Z
DTSTAMP:20260115T025954Z
URL:https://www.acinfotec.com/training-event/irca-iso-270012013-isms-lead-
 auditor-9/
SUMMARY:IRCA ISO 27001:2013 ISMS Lead Auditor
DESCRIPTION:About this course\nISO/IEC 27001:2013 – Information security 
 management system lead auditor teaches students the fundamentals of auditi
 ng information security management systems to ISO/IEC 27001. This five day
  intensive course trains students on how to conduct audits for certificati
 on bodies and facilitate the ISO/IEC 27001 registration process.\n\nThe au
 diting exercises and lectures are based on ISO 19011:2011\, “Guidelines 
 for Quality and/or Environmental Management Systems Auditing.” The cours
 e is designed specifically for those people who wish to conduct external a
 ssessments or internal audits to ISO/IEC 27001\, although students will al
 so gain the knowledge and understanding necessary to give practical help a
 nd information to other individuals and organizations working toward confo
 rmance to the standard.\nPrerequisites\n\n 	A prior knowledge of the requi
 rements of ISO 27001 would be beneficial.\n\nLearning Objective\n\n 	Revie
 w the requirements of ISO/IEC 27001\n 	Understand the relationship between
  ISO/IEC 27001 and ISO/IEC 27002\n 	Learn how to assess security threats a
 nd vulnerabilities\n 	Understand security controls and countermeasures\n 	
 Understand the roles and responsibilities of the auditor\n 	Learn how to\,
  plan\, execute\, report\, and follow-up on an information security manage
 ment system audit\n\nCourse Contents\nDay 1 :\n\no  Course Introduction\n
 \n– Housekeeping\n\n– Course and learner objectives\n\n– Course stru
 cture and methods\n\n– Delegate assessment\n\no  What is an Information
  Security Management System?\n\n– Information security\n\n– Management
  systems\n\n– Purpose and benefits of ISO 27001\n\n– Related standards
 \n\no  Process Approach\n\n– PDCA model\n\n– Process model\n\no  Ove
 rview of ISO 27001 contents\n\no  ISO 27001 Mandatory clauses 4 – 8\n\n
 Day 2 :\n\no  Course Recap day 1. Questions and Answers\n\no  Controls\n
 \no  Overview of the audit process\n\no  Auditing the SOA\n\no  Audit a
 nd Auditors\n\n– Definitions\n\n– 1st\, 2nd and 3rd party audits\n\n
 – Roles and responsibilities of auditors and lead auditors\n\n– Skills
  and characteristics of effective auditors\n\no  Audit Planning\n\n– In
 formation needed to plan the audit\, and things to consider\n\n– Prelimi
 nary visits\n\n– Preparation of an audit plan\n\no  Audit communication
 s and meetings\n\n– Good practice for communication during the audit\n\n
 – Formal meetings\n\n– Opening meeting – what to cover and how\n\no
   Checklists\n\n– Benefits and drawbacks\n\n– Content – what to inc
 lude\n\n– Developing a checklist for a specific audit\n\nDay 3 :\n\no  
 Process Audits\n\no  Case studies\n\no  Conducting the audit\n\n– inte
 rviewing\n\n– sampling\n\n– note taking\n\n– interacting with the au
 ditee\n\n– who’s involved and general points\n\no  Nonconformities\n\
 n– definition of nonconformity\n\n– linking to requirements of ISO 270
 01\n\n– grading nonconformity reports\n\n– structure and content of no
 nconformity reports\n\nDay 4 :\n\no  Case studies\n\n– including interv
 iewing.\n\n– developing and following audit trails\n\n– identifying no
 n conformities\n\no  Specimen Examination\n\n– Review of answers\n\n–
  Layout and marking scheme of the papers\n\no  Closing Meeting\n\n– Out
 comes\n\n– Content\n\n– Identifying possible issues and how to prevent
  or deal with these\n\no  Corrective Actions\n\n– Corrective action pro
 cess\n\n– Evaluating corrective actions\n\no  Reporting the audit\n\n
 – Purpose and content of the written audit report\n\no  Next steps\n\n
 – action planning\n\n– further development\n\n– auditor registration
 \n\nDay 5 :\n\no  Course Evaluations\n\no  Examination Rules\n\no  Writ
 ten Examination\n\no  End of the Course\nTraining Info\nDuration:  5 Da
 ys\nDate:  Nov 2-6\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue: ACinf
 otec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Wor
 klab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining Fees
 : 38\,000 Baht (ex.vat7%)\nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/irca_logo-e1441254509693.jpg
CATEGORIES:IRCA (Official IRCA course)
END:VEVENT
BEGIN:VEVENT
UID:881@acinfotec.com
DTSTART:20261102T023000Z
DTEND:20261103T093000Z
DTSTAMP:20260115T030009Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-270012
 022-transition-exam-included-6/
SUMMARY:PECB Certified ISO/IEC 27001 Transition (Exam Included)
DESCRIPTION:About this course\n\nThe ISO/IEC 27001 Transition training cour
 se enables participants to thoroughly understand the differences between I
 SO/IEC 27001:2013 and ISO/IEC 27001:2022. In addition\, participants will 
 acquire knowledge on the new concepts presented by ISO/IEC 27001:2022.\n\n
 The new version of ISO/IEC 27001 has been recently published and is now al
 igned with the new version of ISO/IEC 27002\, which was published in Febru
 ary\, 2022. The major changes between ISO/IEC 27001:2022 and ISO/IEC 27001
 :2013 are noticed in the information security controls of Annex A\, wherea
 s a few other minor changes are present in the clauses of the standard too
 . Furthermore\, the title of ISO/IEC 27001:2022 differs from the title of 
 ISO/IEC 27001:2013\, as now the standard is titled Information security\,
  cybersecurity and privacy protection — Information security management 
 systems — Requirements.\n\nThe “PECB ISO/IEC 27001 Transition” train
 ing course provides detailed information on the revised clauses\, the new 
 terminology\, and the differences in the controls of Annex A. Additionally
 \, this training course provides participants with the necessary knowledge
  to support organizations in planning and implementing the changes in thei
 r ISMS to ensure conformity with ISO/IEC 27001:2022. As such\, you will be
  able to participate in projects to transition from an ISMS based on ISO/I
 EC 27001:2013 to an ISMS based on ISO/IEC 27001:2022.\nWho should attend?\
 n\n 	This training course is intended for:\n\n 	Individuals seeking to rem
 ain up-to-date with ISO/IEC 27001 requirements for an ISMS\n 	Individuals 
 seeking to understand the differences between ISO/IEC 27001:2013 and ISO/I
 EC 27001:2022 requirements\n 	Individuals responsible for transitioning an
  ISMS from ISO/IEC 27001:2013 to ISO/IEC 27001:2022\n 	Managers\, trainers
 \, and consultants involved in maintaining an ISMS\n 	Professionals wishin
 g to update their ISO/IEC 27001 certificates\n\n\n\nLearning objectives\nU
 pon successfully completing the training course\, participants will be abl
 e to:\n\n 	Explain the differences between ISO/IEC 27001:2013 and ISO/IEC 
 27001:2022\n 	Interpret the new concepts and requirements of ISO/IEC 27001
 :2022\n 	Plan and implement the necessary changes to an existing ISMS in a
 ccordance with ISO/IEC 27001:2022\n\nCourse agenda\n\n 	Day 1: Introducti
 on to ISO/IEC 27001:2022 and comparison to ISO/IEC 27001:2013\n 	Day 2: C
 omparison between Annex A controls of ISO/IEC 27001:2013 and ISO/IEC 27001
 :2022\n\nEducational approach\n\n 	This training course is based on theory
 \, and best practices used in the process of transitioning an ISMS from IS
 O/IEC 27001:2013 to ISO/IEC 27001:2022\n 	Lecture sessions are illustrated
  with quizzes\n 	Quizzes have a similar structure to the certification exa
 m\n\n Training info\nDuration:  2 Days\nDate:  Nov 2-3\, 2026\nTime: 
  9.30 am. – 16.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Gr
 ande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02
  670 8980-3 Ext. 321-323\nTraining Fees: 27\,000 Baht (ex.vat7%)\nE-mail.t
 raining@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,Information Security (ISO 27001/ISMS),PECB (Official
 PECB course)
END:VEVENT
BEGIN:VEVENT
UID:923@acinfotec.com
DTSTART:20261102T023000Z
DTEND:20261106T093000Z
DTSTAMP:20260115T025919Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-22301-lead
 -implementer-exam-included-3/
SUMMARY:PECB Certified ISO 22301 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nNo two disasters in the world cause equal da
 mage. Between the unpredictability of natural disasters\, information secu
 rity breaches\, and incidents of different nature\, preparedness can make 
 you stand out in the crowd and predict the future of your business. In lig
 ht of this\, proper planning is essential to mitigating risks\, avoiding c
 onsequences\, coping with the negative effects of disasters and incidents\
 , but at the same time\, continuing your daily operations so that customer
  needs do not remain unfulfilled.\n\nOrganizations can make progress towar
 ds understanding and managing disasters\, incidents\, and risks by having 
 a BCMS based on ISO 22301 in place. Therefore\, PECB has designed this tra
 ining course to prepare its participants implement a business continuity m
 anagement system (BCMS) in compliance with the requirements of ISO 22301. 
 Attending this training course allows you to gain a comprehensive understa
 nding of the best practices of the business continuity management system a
 nd to be able to establish a framework that allows the organization to con
 tinue operating efficiently during disruptive events.\n\nAfter attending t
 he training course\, you can sit for the exam and\, if you successfully pa
 ss the exam\, you can apply for the “PECB Certified ISO 22301 Lead Imple
 menter” credential. The internationally recognized “PECB Certified ISO
  22301 Lead Implementer” certificate will prove that you have the profes
 sional capabilities and practical knowledge to implement a BCMS based on t
 he requirements of ISO 22301 in an organization.\nCourse Benefits\n\n 	Gai
 n a comprehensive understanding of the concepts\, approaches\, methods\, a
 nd techniques used for the implementation and effective management of a BC
 MS\n 	Learn how to interpret and implement the requirements of ISO 22301 i
 n the specific context of an organization\n 	Understand the operation of t
 he business continuity management system and its processes based on ISO 22
 301\n 	Acquire the necessary knowledge to support an organization in effec
 tively planning\, implementing\, managing\, monitoring\, and continually i
 mproving a BCMS\n\nWho should Attend?\n\n\n\n 	Project managers and consul
 tants involved in business continuity\n 	Expert advisors seeking to master
  the implementation of the business continuity management system\n 	Indivi
 duals responsible to maintain conformity with BCMS requirements within an 
 organization\n 	Members of the BCMS team\n\nCourse Contents\n\n\nDay 1: In
 troduction to ISO 22301 and initiation of a BCMS\n\n 	Training course obje
 ctives and structure\n 	Management system standards\n 	Fundamental busines
 s continuity principles and concepts\n 	Business continuity management sys
 tem\n 	Initiation of the BCMS implementation\n 	The organization and its c
 ontext\n 	Analysis of the existing system\n 	BCMS scope\n\nDay 2: Implemen
 tation plan of a BCMS\n\n 	Leadership and commitment\n 	Business continuit
 y objectives and planning of changes\n 	Business continuity policy\n 	Orga
 nizational structure\n 	Documented information management\n 	Competence an
 d awareness\n 	Business impact analysis\n\nDay 3: Implementation of a BCMS
 \n\n 	Risk assessment\n 	Business continuity strategies and solutions\n 	B
 usiness continuity plans and procedures\n 	Incident response plan\n 	Emerg
 ency response plan\n 	Crisis management plan\n 	Communication\n\nDay 4: BC
 MS monitoring\, continual improvement\, and preparation for the certificat
 ion audit\n\n 	Exercise programs\n 	Monitoring\, measurement\, analysis\, 
 and evaluation\n 	Internal audit h Management review\n 	Treatment of non c
 onformity\n 	Continual improvement\n 	Preparing for the certification audi
 t\n 	Certification process and closing of the training course\n\nDay 5: Ce
 rtification Exam\nTraining Info\nDuration : 5 Days\nDate :  Nov 2 - 6\, 
 2026\nTime : 9.30 am. - 16.30 pm.\nLanguage : Thai\nVenue: ACinfotec Tra
 ining Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \,
  Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nPrice : 51\,500 Baht 
 (Ex.vat 7%)\nE-mail training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:961@acinfotec.com
DTSTART:20261103T023000Z
DTEND:20261106T093000Z
DTSTAMP:20260115T025909Z
URL:https://www.acinfotec.com/training-event/certified-data-management-pro
 fessionals-cdmp-exam-included-new-5/
SUMMARY:Certified Data Management Professionals (CDMP) – Exam Included (N
 ew!!)
DESCRIPTION:Certified Data Management Professionals (CDMP)\nAbout this cour
 se\nCDMP – the gold standard in the data management field\n\nThe Certifi
 ed Data Management Professional (CDMP) credential is a globally recognized
  certification and many organizations are asking for this certification (m
 ore than other certifications) as a mandatory requirement for employment i
 n the data management field. The CDMP certificate shows that you are capab
 le\, knowledgeable and an expert in your field. Surveys show that CDMP-cer
 tified data management professionals earn more\, and advance at a more rap
 id pace than their non-certified colleagues. The 4-day CDMP training is a 
 comprehensive training program to help data-driven professionals prepare 
 for the certification requirements of the official CDMP exam.\n Who shoul
 d attend?\n\n 	Chief Data Officers (CDO’s)\n 	CIO’s\n 	Data Governance
  Managers / Data Quality Managers\n 	Data Scientists / Data Architects / D
 ata Specialists / Data Engineers\n 	Data Administrators\n 	Data Analysts\n
  	Data Modelers\n 	Database Administrators\n 	DWH Analysts\n 	Business Int
 elligence (BI) Professionals\n 	Information/ Application/ Solutions Archit
 ects\n 	Project/Program Managers\n 	Business Analysts\n 	Data Protection O
 fficers (DPO’s)\n 	Many other data professionals\n\nCourse Content\nDay 
 1\n\n 	CDMP Introduction\n 	Data Management Process\n 	Data Governance\n 	
 Data Management Organization and Role Expectations\n 	Data Architecture\n 
 	Data Modeling and Design\n\nDay 2\n\n 	Metadata Management\n 	Data Storag
 e and Operations\n 	Data Security\n 	Data Integration and Interoperability
 \n\nDay 3\n\n 	Document and Content Management\n 	Reference and Master Dat
 a\n 	Data Warehousing and Business Intelligence\n 	Data Quality\n\nDay 4\n
 \n 	Big Data and Data Science\n 	Data Ethics\n 	Data Management Maturity A
 ssessment\n 	Data Management and Organizational Change Management\n 	Exam 
 Preparation (0.5 day)\n\nExamination\nComing soon…\nTraining Info\nLangu
 age : Conducted in Thai Language\nDuration : 4 Days\nDate :  Nov 3 - 6\
 , 2026\nTime : 9.30 am. – 16.30 pm.\nVenue: ACinfotec Training Cente
 r\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.
 \nContact : T 02 670 8980-3 Ext. 321-323\nEmail : training@acinfotec.com\
 nPrice : 59\,500 Baht (Ex.Vat 7%)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/04/Blue-Modern-Digital-Marketing-Agency-Linkedin-Banner.png
CATEGORIES:Data Governance
END:VEVENT
BEGIN:VEVENT
UID:987@acinfotec.com
DTSTART:20261105T023000Z
DTEND:20261106T093000Z
DTSTAMP:20251219T034006Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -manager-cipm-thai-4/
SUMMARY:Certified Information Privacy Manager (CIPM) (Thai)
DESCRIPTION: \nAbout this course\nBusiness functions such as marketing\, f
 inance\, human resources and customer service have privacy responsibilitie
 s that can expose their organizations to financial loss and damage to repu
 tation. IAPP Privacy Program Management Training\, the training aligned wi
 th ANSI/ISO-accredited CIPM certification\, gives professionals the skill
 s to operationalize privacy and minimize risks to reputation from improper
  handling of personal data.\n Course Benefits\nCIPM training teaches a pr
 ocess for conceptualizing\, designing\, building and operating a data priv
 acy management program. The curriculum\, available in French\, German and 
 English\, includes creating a company vision\, structuring data protection
  teams\, developing and implementing system frameworks\, and measuring per
 formance.\n Who should attend?\n\n 	Anyone involved with data protection 
 processes and programs\n 	Data Protection Officers\n 	Data Protection Mana
 gers\n 	Auditors\n 	Legal Compliance Officers\n 	Security Managers\n 	Info
 rmation Managers\n\n Course Contents\nModule 1: Introduction to Privacy P
 rogram Management\n\n\n 	Identifies privacy program management responsibil
 ities and describes the role of accountability in privacy program manageme
 nt.\n\nModule 2: Privacy Governance\n\n\n 	Examines considerations for dev
 eloping and implementing a privacy program\, including the position of the
  privacy function within the organization\, role of the\nDPO\, program sco
 pe and charter\, privacy strategy\, support and ongoing involvement of key
  functions and privacy frameworks.\n\nModule 3: Applicable Laws and Regula
 tions\n\n\n 	Discusses the regulatory environment\, common elements across
  jurisdictions and strategies for aligning compliance with organizational 
 strategy.\n\nModule 4: Data Assessments\n\n\n 	Relates practical processes
  for creating and using data inventories/ maps\, gap analyses\, privacy as
 sessments\, privacy impact assessments/data protection impact\nassessments
  and vendor assessments.\n\nModule 5: Policies\n\n\n 	Describes common typ
 es of privacy-related policies\, outlines components and offers strategies
  for implementation.\n\nModule 6: Data Subject Rights\n\n\n 	Discusses ope
 rational considerations for communicating and ensuring data subject rights
 \, including privacy notice\, choice and consent\, access and rectificatio
 n\, data\nportability\, and erasure.\n\nModule 7 : Training and Awareness\
 n\n 	Outlines strategies for developing and implementing privacy training 
 and awareness programs.\n\n\nModule 8 : Protecting Personal Information\n\
 n\n 	Examines a holistic approach to protecting personal information throu
 gh privacy by design.\n\nModule 9 : Data Breach Incident Plans\n\n\n 	Prov
 ides guidance on planning for and responding to a data security incident o
 r breach.\n\nModule 10 : Monitoring and Auditing Program Performance\n\n\n
  	Relates common practices for monitoring\, measuring\, analyzing and audi
 ting privacy program performance.\n\nTraining Info:\n\nLanguage: Conducte
 d in Thai Language\nDuration: 2 Days\nDate: Nov 5-6\, 2026\nVenue: ACinf
 otec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Wor
 klab) \, Rama 4 Rd.\nTraining Fees: 49\,900 (Exam Included)\nTel : 02 670 
 8980-3 ext. 321-323\nE-mail: training@acinfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/10/CIPM_Seal_Final_CMYK-01-1.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:1004@acinfotec.com
DTSTART:20261105T023000Z
DTEND:20261106T093000Z
DTSTAMP:20260323T063211Z
URL:https://www.acinfotec.com/training-event/advanced-in-ai-audit-aaia-exa
 m-prep-thai-3/
SUMMARY:Advanced in AI Audit (AAIA) – Exam Prep. (Thai)
DESCRIPTION:About this course\nBe one of the first experienced IT auditors 
 to embrace AI and level up their careers with the new ISACA Advanced in AI
  Audit™ (AAIA™) certification. Designed exclusively for professionals 
 with CISA® and other qualified high-level audit certifications\, AAIA emp
 owers you to stand up to today’s AI challenges and become an AI audit le
 ader that more organizations demand.\nCourse Benefits\n\n 	Proven experien
 ce in it audits or its advisory roles\n 	Some expertise auditing\, assessi
 ng\, implementing and maintaining AI systems\n 	Holds an active prerequisi
 te certification\n\nPrerequisite\nTo qualify for AAIA\, candidates must ei
 ther hold a CISA certification or one of the following certifications with
  an IT audit or IT advisory role focus: CIA\, CPA\, ACCA\, FFCA\, Canadian
  CPA\, CPA Australia\, FCPA or Japanese CPA.\n\nAll holders qualify:\n\nCI
 SA (Certified Information Systems Auditor from ISACA)\nWho should attend?\
 n\n 	IT Auditor\n 	Senior IT Auditor\n 	Risk Manager\n 	Information Manage
 r\n\nCourse Contents\nDOMAIN 1 – AI GOVERNANCE AND RISK\n\nThis Domain d
 emonstrates your ability to advise stakeholders on implementing AI solutio
 ns through appropriate and effective policy\, risk controls\, data governa
 nce and ethical standards.\n\nA–AI Models\, Considerations\, and Require
 ments\n\nB–AI Governance and Program Management\n\nC–AI Risk Managemen
 t\n\nD–Privacy and Data Governance Programs\n\nE–Leading Practices\, E
 thics\, Regulations\, and Standards for AI\n\nDOMAIN 2 – AI OPERATIONS\n
 \nThis domain confirms your skill in balancing sustainability\, operationa
 l readiness\, and the risk profile with the benefits and innovation AI pro
 mises to support enterprise-wide adoption of this powerful technology.\n\n
 A–Data management specific to AI\n\nB–AI solution development methodol
 ogies and lifecycle\n\nC–Change management specific to AI\n\nD–Supervi
 sion of ai solutions (e.g.\, outputs\, impacts\, and decisions)\n\nE–T
 esting techniques for ai solutions\n\nF–Threats and vulnerabilities spec
 ific to AI\n\nG–Incident response management specific to AI\n\nDOMAIN 3 
 – AI AUDITING TOOLS AND TECHNIQUES\n\nThis domain focuses on optimizing 
 audit outcomes through innovation and highlights your knowledge of audit t
 echniques tailored to AI systems and the use of AI-enabled tools streamlin
 e audit efficiency and provide faster\, quality insight.\n\nA–Audit plan
 ning and design\n\nB–Audit testing and sampling methodologies\n\nC–Aud
 it evidence collection techniques\n\nD–Audit data quality and data analy
 tics\n\nE–AI Audit outputs and reports\nTraining Info\nDuration : 2 Days
 \nDate : Nov 5-6\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Traini
 ng Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ra
 ma 4 Rd.\nTraining Fee : 28\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext
 .321-323\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 6/03/AAIA.png
CATEGORIES:AI Intelligent,IRCA (Official IRCA course)
END:VEVENT
BEGIN:VEVENT
UID:953@acinfotec.com
DTSTART:20261109T023000Z
DTEND:20261113T093000Z
DTSTAMP:20260115T025846Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-27701-
 lead-implementer-exam-included-4/
SUMMARY:PECB Certified ISO/IEC 27701 Lead Implementer (Exam Included)
DESCRIPTION:About this course\nThis training course is designed to prepare 
 its participants implement a Privacy Information Management System (PIMS) 
 in compliance with the requirements and guidance of the ISO/IEC 27701. Mor
 eover\, you will gain a comprehensive understanding of the best practices 
 of privacy information management and learn how to manage and process data
  while complying with various data privacy regimes. After mastering the im
 plementation and management of a Privacy Information Management System (PI
 MS)\, you can sit for the exam and apply for a “PECB Certified ISO/IEC 2
 7701 Lead Implementer” credential. The internationally recognized PECB L
 ead Implementer Certificate proves that you have the practical knowledge a
 nd professional capabilities to implement the ISO/IEC 27701  requirements
  in an organization.\n\n\n\nWho should attend?\n\n 	Managers and consultan
 ts involved in privacy and data management\n 	Expert advisors seeking to m
 aster the implementation of a Privacy Information Management System\n 	Ind
 ividuals responsible and accountable for Personally Identifiable Informati
 on (PII) within organizations\n 	Individuals responsible for maintaining c
 onformance with data privacy regimes requirements\n 	PIMS team members\n\n
 \n\n\nCourse Contents\n\n 	Introduction to ISO/IEC 27701 and initiation of
  a PIMS\n- Training course objectives and structure\n- Standards and regul
 atory frameworks\n- Privacy Information Management System (PIMS)\n- Fundam
 ental concepts and principles of information security and privacy\n- Initi
 ation of the PIMS implementation\n- Analysis of the ISMS scope and Stateme
 nt of Applicability\n- PIMS scope\n- Management approval\n- Privacy policy
 \n- Privacy risk assessment\n 	Planning the implementation of a PIMS\n- Pr
 ivacy impact assessment\n- PIMS Statement of Applicability\n- Documentatio
 n management\n- Selection of controls\n- Implementation of controls\n 	Imp
 lementing a PIMS\n- Implementation of controls (cont’d)\n- Implementatio
 n of controls specific for PII controllers\n- Implementation of controls s
 pecific for PII processors\n 	PIMS monitoring\, continual improvement and 
 preparation for the certification audit\n- Awareness\, training\, and comm
 unication\n- Monitoring\, measurement\, analysis\, evaluation and manageme
 nt review\n- Internal audit\n- Treatment of nonconformities\n- Continual i
 mprovement\n- Preparing for the certification audit\n- Certification proce
 ss and closing of the training course\n 	Certification Exam\n\nTraining In
 fo\n\nDuration:  5 Days\nDate:  Nov 9 - 13\, 2026\nTime:  9.30 am. 
 – 16.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre
  Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3
  Ext. 321-323\nTraining Fees: 51\,500 Baht (ex.vat7%)\nE-mail.training@aci
 nfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:958@acinfotec.com
DTSTART:20261110T023000Z
DTEND:20261113T093000Z
DTSTAMP:20260115T025838Z
URL:https://www.acinfotec.com/training-event/comptia-network-exam-included
 -9/
SUMMARY:CompTIA Network+ (Exam Included)
DESCRIPTION:About this course      \n\nThis CompTIA's Network+ will pr
 oviding proof of your knowledge\, skills\, and ability to manage\, maintai
 n\, troubleshoot\, install\, operate\, and configure basic network infrast
 ructure. CompTIA Network+ Course points you in the right direction\, allo
 wing you to demonstrate the concepts covered on the Network+ in a real-wor
 ld environment.\n\nCourse Benefits\n\nNetwork+ ensures an IT professional 
 has the knowledge and skills to:\n\n 	Design and implement functional netw
 orks\n 	Configure\, manage\, and maintain essential network devices\n 	Use
  devices such as switches and routers to segment network traffic and creat
 e resilient networks\n 	Identify benefits and drawbacks of existing networ
 k configurations\n 	Implement network security\, standards\, and protocols
 \n 	Troubleshoot network problems\n 	Support the creation of virtualized n
 etworks\n\nWho should Attend?\n\n 	Junior Network Administrator\n 	Compute
 r Technician\n 	Network Field Technician\n 	Help Desk Technician\n 	Junior
  System Engineer\n 	System Engineer\n 	IS Consultant\n 	Network Support Sp
 ecialist\n 	Network Field Engineer\n 	Network Analyst\n\nCourse Contents\n
 \n\n1 - Network Theory\n\n 	Networking Terminology\n 	Network Categories\n
  	Standard Network Models\n 	Physical &amp\; Logical Network Topologies\n\
 n2 - Network Media and Hardware\n\n 	Bounded Network Media\n 	Unbounded Ne
 twork Media\n 	Network Connectivity Devices\n\n3 - Network Implementations
 \n\n 	Ethernet Networks\n 	Wireless Networks\n\n4 - Networking Models\n\n 
 	The OSI Model\n 	The TCP/IP Model\n\n5 - TCP/IP Fundamental\n\n 	The TCP/
 IP Protocol Suite\n 	IP Addressing (Version 4 &amp\; Version 6)\n 	Domain 
 Naming Services\n 	Dynamic Host Configuration Protocol Services\n\n6 - LAN
  Infrastructure\n\n 	Switching\n 	Enable Static Routing\n 	Implement Dynam
 ic IP Routing\n 	Virtual LANs\n\n7 - WAN Infrastructure\n\n 	WAN Transmiss
 ion Technologies\n 	WAN Connectivity Methods\n\n8 – Remote Networking &a
 mp\; Management\n\n 	Network Monitoring\n 	Remote Network Architectures\n 
 	Virtual Private Networking\n\n9 - System Security\n\n 	Computer Security 
 Basics\n 	System Security Tools\n 	Authentication Methods\n 	Encryption Me
 thods\n\n10 - Network Security\n\n 	Network Vulnerabilities\n 	Network Per
 imeter Security\n 	Intrusion Detection and Prevention\n\n11 - Network Secu
 rity Threats and Risks\n\n 	Network-Based Security Threats and Attacks\n 	
 Apply Threat Mitigation Techniques\n 	Educating Users / Officers\n\n12 - N
 etwork Troubleshooting\n\n 	Network Troubleshooting Utilities\n 	Hardware 
 Troubleshooting Tools\n 	Common Connectivity Issues\n\nTraining Info\n\nLa
 nguage : Conducted in Thai Language\nDuration : 4 Days\nDate : Nov 10 - 13
 \, 2026\nTime : 9.30 - 16.30 pm\nVenue: ACinfotec Training Center\n16th F
 l.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact
  : T 02 670 8980-3 Ext. 321-323\nPrice: 45\,000 Baht (Ex.vat 7% )
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:984@acinfotec.com
DTSTART:20261111T023000Z
DTEND:20261113T093000Z
DTSTAMP:20260115T025812Z
URL:https://www.acinfotec.com/training-event/ccsk-plus-lectures-lab-exam-6
 /
SUMMARY:CCSK PLUS (Lectures + Lab + Exam)
DESCRIPTION:About this course\nThe CCSK Plus builds on the foundation clas
 s with expanded material and offers extensive hands-on activities that re
 inforce classroom instruction. Students engage in a scenario of bringing a
  fictional organization securely into the cloud\, which gives them the opp
 ortunity to apply their knowledge by performing a series of activities tha
 t would be required in a real-world environment. Students will come away r
 eady to earn their Certificate of Cloud Security Knowledge (CCSK).\n\nCou
 rse Benefits\n\n 	Get hands-on experience securing an organization in the 
 cloud.\n 	Prepare to earn the widely recognized standard of expertise for 
 cloud security\, the Certificate of Cloud Security Knowledge (CCSK).\n 	Le
 arn and practice applying the knowledge from all 14 domains of the CSA Sec
 urity Guidance v4.\n\n Who should attend?\n\n 	\n\n 	IT Professionals\n 	
 Developers\n 	IT Operations\n 	Audit/Compliance Managers\n\nThe CCSK is de
 signed for any IT professional working in cloud computing. It is an essent
 ial credential for all security professionals to show proof of skills to c
 urrent and future employers. Because the CCSK is designed to deliver a wel
 l rounded view of cloud security\, professionals with less experience or n
 on-security backgrounds also find significant value in the training and ce
 rtificate\, particularly developers\, IT operations\, and audit/compliance
  professionals.\n\nCourse Contents\n\n 	Domain 1: Cloud Computing Concepts
  and Architecture\n 	Domain 2: Cloud Governance\n 	Domain 3: Risk\, Audit 
 &amp\; Compliance\n 	Domain 4: Organization Management\n 	Domain 5: Identi
 ty and Access Management\n 	Domain 6: Security Monitoring\n 	Domain 7: Inf
 rastructure and Networking\n 	Domain 8: Cloud Workload Security\n 	Domain 
 9: Data Security\n 	Domain 10: Application Security\n 	Domain 11: Insident
  Response &amp\; Resilience\n 	Domain 12: Related Technologies\n\n\n\nWhat
 ’s New in CCSK v5\n\n 	Latest in cloud architecture\, cloud native secur
 ity\, workload\, virtual networking\, data protection\, DevSecOps\, Zero T
 rust\, Generative AI and more.\n 	Vital information about managing risks\,
  achieving compliance\, and understanding the shared responsibility betwee
 n cloud provide and cloud user\n 	Organization management content\, includ
 ing governance\n 	Permanent access to CCSK Orb\, CSA’s revolutionary CCS
 K chatbot designed to help you master the body of knowledge\n\n\n\n\nCCSK 
 Plus Course - Additional Lab Content\n\n\n\n\nCore Account Security\nLearn
  what to configure in the first 5 minutes of opening a new cloud account a
 nd enable security controls such as MFA\, basic monitoring\, and IAM.\n\n\
 n\n\n\n\n\nIAM and Monitoring In-Depth\nExpand on your work in the first l
 ab and implement more-complex identity management and monitoring. This inc
 ludes expanding IAM with Attribute Based Access Controls\, implementing se
 curity alerting\, and understanding how to structure enterprise-scale IAM 
 and monitoring.\n\n\n\n\n\n\n\nNetwork and Instance Security\nCreate a vir
 tual network (VPC) and implement a baseline security configuration. You wi
 ll also learn how to securely select and launch a virtual machine (instanc
 e)\, run a vulnerability assessment in the cloud\, and connect to the inst
 ance.\n\n\n\n\n\n\n\n\n\nEncryption and Storage Security\nExpand your depl
 oyment by adding a storage volume encrypted with a customer managed key. Y
 ou will also learn how to secure snapshots and other data.\n\n\n\n\n\n\n\n
 Application Security and Federation\nFinish the technical labs by complete
 ly building out a 2-tier application and implementing federated identity u
 sing OpenID.\n\n\n\n\n\n\n\nRisk and Provider Assessment\nPractice using t
 he CSA Cloud Controls Matrix and STAR registry to evaluate risk and select
  a cloud provider.\n\n\n\n\n\n\n\n\n\nTraining Info\nDuration : 3 Days\nDa
 te : Nov 11-13\, 2026\nTime : 9.30-16.30 pm.\nVenue: ACinfotec Training 
 Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 
 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTraining Fee : 69\,000 Baht
  (ex.vat 7%)\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/CCSK_logo.png
CATEGORIES:Cloud Computing,Cloud Security,Cloud security
END:VEVENT
BEGIN:VEVENT
UID:985@acinfotec.com
DTSTART:20261111T023000Z
DTEND:20261112T093000Z
DTSTAMP:20260115T025757Z
URL:https://www.acinfotec.com/training-event/certificate-of-cloud-security
 -knowledge-ccsk-lectures-exam-included-4/
SUMMARY:Certificate of Cloud Security Knowledge (CCSK) - Lectures (Exam Inc
 luded)
DESCRIPTION:About this course\nThe CCSK Foundation course starts with the f
 undamentals\, then increases in complexity as it works through all 16 doma
 ins of the CSA Security Guidance\, recommendations from the European Union
  Agency for Network &amp\; Information Security (ENISA)\, and an overview 
 of the Cloud Controls Matrix.\nCourse Benefits\n\n 	Prove your competency
  in key cloud security issues through an organization that specializes in 
 cloud research.\n 	Increase employment opportunities by filling the skill
 s-gap for cloud-certified professionals.\n 	Demonstrate your technical kn
 owledge\, skills\, and abilities to effectively use controls tailored to t
 he cloud.\n 	Learn to establish a baseline of security best practices whe
 n dealing with a broad array of responsibilities\, from cloud governance t
 o configuring technical security controls.\n 	Complement other credential
 s such as the CISA\, CISSP and CCSP.\n\n Who should attend?\n\n 	Informat
 ion Security\n 	Senior Consultant Manager\n 	Security Architecture\n 	Solu
 tion Architecture\n 	SR Cloud\n 	Security Analyst\n 	Specialist\n 	Lead Co
 mpliances\n 	Director\n\nCourse Contents\n\n 	Domain 1 : Cloud Computing C
 oncepts and Architecture\n 	Domain 2 : Governance and Enterprise Risk Mana
 gement\n 	Domain 3 : Legal Issues\, Contracts\, and Electronic Discovery\n
  	Domain 4 : Compliance and Audit Management\n 	Domain 5 : Information Gov
 ernance\n 	Domain 6 : Management Plane and Business Continuity\n 	Domain 7
  : Infrastructure Security\n 	Domain 8 : Virtualization and Containers\n 	
 Domain 9 : Incident Response\n 	Domain 10 : Application Security\n 	Domain
  11 : Data Security and Encryption\n 	Domain 12 : Identity\, Entitlement a
 nd Access Management\n 	Domain 13 : Security as a Service\n 	Domain 14 : R
 elated Technologies\n 	Extra Domain : Cloud Controls Matrix\n 	Extra Domai
 n : ENISA Recommendations\n\nTraining Info\nDuration : 2 Days\nDate : Nov
  11-12\, 2026\nTime : 9.30-16.30 pm.\nVenue: ACinfotec Training Center\n
 16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nC
 ontact : T 02 670 8980-3 Ext. 321-323\nTraining Fee : 45\,000 Baht (ex.vat
  7%)\nEmail. training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/10/CCSK_logo.png
CATEGORIES:Cloud Computing,Cloud security,Cloud Security
END:VEVENT
BEGIN:VEVENT
UID:895@acinfotec.com
DTSTART:20261116T023000Z
DTEND:20261116T093000Z
DTSTAMP:20260115T025546Z
URL:https://www.acinfotec.com/training-event/principal-of-it-governance-ri
 sk-and-compliance-thai-7/
SUMMARY:Principal of IT Governance\, Risk and Compliance (Thai)
DESCRIPTION:Course Overview\n\nThis course defines IT Governance broadly as
  a collection of management\, planning and performance reporting and revie
 wing processes\, which establish controls and performance metrics over key
  IT investments\; business/IT alignment decisions\; the effectiveness of I
 T program and project deployment\, the efficiency of IT delivery\, infrast
 ructure and operational services and new or change request authorizations 
 and compliance with regulations\, laws and organizational policies.\n\nThe
  broad definition encompasses how well IT is providing value to and servic
 ing the business as well as doing its part in complying with regulations a
 nd organizational policies and plans. This is a “How to” Course that i
 s Pragmatic and Actionable. This course will enable an organization to mig
 rate from its current state of IT governance to a higher level of IT matur
 ity and impact the bottom line significantly.\n\nWho Should Attend?\n\n 	I
 T professionals working in audit\, compliance\, risk\, security and govern
 ance.\n 	Managers and Executives concerned about the quality of business i
 nformation.\n\nCourse Contents\n\nOverview of IT Governance\n\n 	Why IT go
 vernance? Driving forces and challenges\n 	IT Governance VS Enterprise Gov
 ernance\n 	Executive View of IT governance\n 	Who benefits and what are th
 e value propositions?\n 	The Role of the Board and Executive Management in
  IT Governance\n 	Enterprise Governance of The Securities and Exchange Com
 mission (SEC) and their relationship with IT governance\n\nOverview of Ind
 ustry Best Practice Standards\, Model and Guidelines covering some aspect 
 of IT governance\n\n 	PMBOK\, PRINCE2\, CMMI\, ITIL\, ISO 20000\, ISO 2700
 1\, ISO 22301\, COBIT\, COSO ERM\, SOX\, IIA Guidance on Governance\n 	IT 
 Governance framework\n 	Key Governance Processes- Planning\, Execution\, P
 erformance Management and Balanced Scorecard\, Steering Groups\, Outsourci
 ng etc.\n\nPrinciples of Business/IT Alignment Excellence\n\n 	Business an
 d IT Plans\n 	Investment/Portfolio Management Criteria\n 	IT Engagement Mo
 del\n\nPrinciples of Program/Project Management Excellence\n\n 	PM Life Cy
 cle Phases and Templates\n 	PM Metrics\n 	Project Risk Management\n\nPrinc
 iples of IT Service Management and Delivery Excellence\n\n 	 ITIL (IT Inf
 rastructure Library) and its value\, metrics\, work flows\n 	Overview of I
 SO 20000 service management system\n\nPrinciples of Information Security M
 anagement\n\n 	Security Risk Management\n 	ISO 27001 information security 
 management system\n\nPrinciples of Vendor Management and Outsourcing Excel
 lence\n\n 	Vendor Selection\, Negotiations and Management\n 	IT Governance
  in relations with Outsourcing\n\nUsing COBIT 4.1 as a tool for implementi
 ng IT Governance\n\n 	COBIT 4.1 introduction\n 	COBIT principles and enabl
 ers\n 	Roadmap to Implement IT Governance\n 	Difference between COBIT 4.1 
 and COBIT 5\n 	COBIT 4.1 and SOX\n\nSelected Case Studies and Lessons Lear
 ned\n\nTraining Info\n\nDuration  : 1 Day\nDate  :  Nov 16\, 2026\nTim
 e  : 9.30 am. – 16.30 pm.\nLanguage : Conducted in Thai Language\nVenue
 : ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg
 .\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nEmail
  : training@acinfotec.com\nPrice : 9\,000 Bhts (Exclusive of 7% VAT)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/08/it_governance1.png
CATEGORIES:Risk Management &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:971@acinfotec.com
DTSTART:20261116T023000Z
DTEND:20261120T093000Z
DTSTAMP:20260115T025605Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-27032-
 lead-cybersecurity-exam-included-3/
SUMMARY:PECB Certified ISO/IEC 27032 Lead Cybersecurity (Exam Included)
DESCRIPTION:About this course \nThis five day intensive course enables the 
 participants to develop the knowledge and competence needed to support an 
 organization in implementing and managing a Cybersecurity program based on
  ISO/IEC 27032 and NIST Cybersecurity Framework. This training will enable
  participants to have an overview of Cybersecurity\, to understand the rel
 ationship between Cybersecurity and other types of security\, and stakehol
 ders’ role in Cybersecurity. This course can be used as guidance for add
 ressing common Cybersecurity issues\, and it presents a framework that ena
 bles stakeholders to collaborate on resolving Cybersecurity issues.\nCours
 e Benefits\n\n 	To understand and acquire comprehensive knowledge on the c
 omponents and operations of a Cybersecurity program in conformance with IS
 O/IEC 27032 and NIST Cybersecurity Framework\n 	To explain the goal\, cont
 ent and correlation between ISO 27032 and NIST Cybersecurity Framework as 
 well as with other standards and operating frameworks\n 	To master concept
 s\, approaches\, standards\, methods and techniques to set up\, implement\
 , and effectively manage a Cybersecurity program within an organization\n 
 	To be able to interpret the guidelines of ISO/IEC 27032 in the specific c
 ontext of an organization\n 	To acquire the necessary expertise to plan\, 
 implement\, manage\, control and maintain a Cybersecurity program as speci
 fied in ISO/IEC 27032 and NIST Cybersecurity Framework\n 	To develop the e
 xpertise to advise an organization about the best practices for managing C
 ybersecurity\n 	To strengthen personal skills that are necessary for the e
 stablishment and maintenance of a Cybersecurity program\n\nWho should atte
 nd?\n\n 	Cybersecurity professionals\n 	Information security experts\n 	Pr
 oject managers wanting to manage the Cybersecurity program\n 	Technical ex
 perts wanting to prepare themselves  for Cybersecurity  functions\n 	Per
 sons responsible  to develop the Cybersecurity program\n 	Security and Bu
 siness Process consultants\n\n Course Contents\nDay 1: Introduction to Cy
 bersecurity and related concepts as recommended by ISO/IEC 27032\n\n 	Cour
 se Objectives and Structure\n 	Standard and Regulatory Framework\n 	Fundam
 ental Concepts in Cybersecurity\n 	Cybersecurity Program\n 	Initiating a C
 ybersecurity Program\n 	Analyzing the Organization\n 	Leadership\n\nDay 2:
  Cybersecurity Policy and Risk management\n\n 	Cybersecurity Policies\n 	C
 ybersecurity Risk Management\n 	Attack Mechanisms\n\nDay 3: Cybersecurity 
 Controls\, Information Sharing and Coordination\n\n 	Cybersecurity Control
 s\n 	Information Sharing and Coordination\n 	Training and Awareness Progra
 m\n\nDay 4: Incident management\, Monitoring and Continuous Improvement\n\
 n 	Business Continuity\n 	Cybersecurity Incident Management\n 	Testing in 
 Cybersecurity\n 	Performance Measurement\n 	Cybersecurity Incident Respons
 e and Recovery\n 	Continual Improvement\n 	Lead Manager Certification Sche
 me\n 	Closing the Training\n\nDay 5: Certification Exam\n\n 	Prerequisites
 \n 	Knowledge about information security and related concepts is preferred
 .\n 	Educational approach\n 	This training is based on both theory and pra
 ctice:\n 	Sessions of lectures illustrated with examples based on real cas
 es\n 	Practical exercises based\n 	Review exercises to assist the exam pre
 paration\n 	Practice test similar to the certification exam\n 	To benefit 
 from the practical exercises\, the number of training participants is limi
 ted\n 	Exam\n\n Training Info\nDuration : 5 Days\nDate : Nov 16-20\, 202
 6\nTime : 9.30-04.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Gr
 ande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02
  670 8980-3 Ext. 321-323\nTraining Fee : 51\,500 Baht (ex.vat 7%)\nEmail. 
 training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:960@acinfotec.com
DTSTART:20261116T023000Z
DTEND:20261117T093000Z
DTSTAMP:20260115T025722Z
URL:https://www.acinfotec.com/training-event/risk-based-it-audit-10/
SUMMARY:Risk-Based IT Audit
DESCRIPTION:\n\nเนื้อหาหลักสูตร\n\nเรื
 ่องการตรวจสอบ Risk-based IT Audit นั้น 
 มีความสำคัญมากในปัจจุบัน 
 เนื่องจาก\n\n 	ระเบียบคณะกรร
 มการตรวจเงินแผ่นดิน ว่าด้
 วยการปฏิบัติหน้าที่ของผู
 ้ตรวจสอบภายใน พ.ศ.2555 ตามแนว
 ทางปฏิบัติที่ 6 ได้ระบุชัด
 เจนว่าหน่วยรับตรวจที่ใช้
 เทคโนโลยีสารสนเทศเป็นส่ว
 นสำคัญในการปฏิบัติงานหรื
 อบริหารงาน ควรจัดให้มีผู้
 ตรวจสอบภายในซึ่งมีความรู
 ้ ความสามารถอย่างเพียงพอท
 ี่จะตรวจสอบระบบเทคโนโลยี
 สารสนเทศ เพื่อให้สามารถปร
 ะเมินและให้คำแนะนำเกี่ยว
 กับการปรับปรุงกระบวนการบ
 ริหารความเสี่ยง การควบคุม
  และการกำกับดูแลได้อย่างเ
 หมาะสมและเกิดประโยชน์\n 	มา
 ตรฐานเกี่ยวกับการตรวจสอบ
 ภายในของกระทรวงพาณิชย์ มา
 ตราที่28 และ 29 ซึ่งต่อมา จะม
 ีการเปลี่ยนแปลงมาตราที่เ
 กี่ยวข้อง ระบุเนื้อหาเกี่
 ยวกับหน่วยงานที่มีคอมพิว
 เตอร์ตั้งแต่ 1 เครื่องขึ้น
 ไป จำเป็นจะต้องมีการตรวจส
 อบทางด้านคอมพิวเตอร์\n\nแนว
 ทางปฏิบัติส่วนใหญ่ของหลา
 ยองค์กร ยังไม่มีการตรวจสอ
 บทางด้าน IT Audit โดยเฉพาะอย่า
 งยิ่ง Risk-based IT Audit อย่างจริงจัง
  ซึ่งมีผลทำให้กระบวนการตร
 วจสอบ และการตรวจสอบทางด้า
 นทั่วไปมีปัญหาค่อนข้างมา
 ก และในยุคปัจจุบันได้มีกา
 รก้าวเข้าไปสู่ การตรวจสอบ
 แบบผสมผสานและบูรณาการ ระห
 ว่าง IT Audit และ Non – IT Audit ที่เรีย
 กว่า Integrated Audit\n\nพื้นฐานของผู้
 อบรม\n\n 	ผู้ที่มีความรู้พื้
 นฐานด้านการจัดการทั่วไป\n 	
 ผู้เข้ารับการอบรมไม่จำเป
 ็นต้องมีพื้นฐานทางด้าน\nInform
 ation Security และ IT Audit หรือ Non-IT มาก่อน\n
 \nวัตถุประสงค์\n\n 	เพื่อให้เก
 ิดความเข้าใจในองค์ประกอบ
 ที่เกี่ยวข้องกับการตรวจส
 อบสามารถนำไปประยุกต์ใช้ก
 ับงานตรวจสอบในภาคปฏิบัติ
 ได้\n 	เพื่อให้ผู้มีผลประโย
 ชน์ร่วมเห็นคุณค่าและประโ
 ยชน์จากการตรวจสอบ IT/IT Audit ที่
 มีผลกระทบต่องานตรวจสอบทา
 งด้าน Non-IT Audit และ การบรรลุเป้
 าประสงค์ขององค์กรอย่างสำ
 คัญ\n 	เพื่อสร้างคุณค่าเพิ่
 ม และความน่าเชื่อถือ และกา
 รรับรองอย่างสมเหตุสมผลว่
 า สารสนเทศที่ได้รับถูกต้อ
 ง มีการปฏิบัติตามกฎเกณฑ์ แ
 ละเป็นนโยบายที่สามารถสร้
 างความมั่นใจให้กับผู้มีผ
 ลประโยชน์ร่วมได้ว่า งบการ
 เงินและรายงานต่างๆ ที่เกี
 ่ยวข้องเชื่อถือได้ พิสูจน
 ์ได้\n 	ผู้ที่ตรวจสอบทั้งทา
 งด้าน IT และ Non – IT รวมทั้งผู้บ
 ริหารจะได้เข้าใจภาพการหล
 อมรวม การตรวจสอบและการบริ
 หารในลักษณะ Integrated Audit / Monitoring ที่
 มีประโยชน์ต่อองค์กรในภาพ
 โดยรวมที่ตรงกับความต้องก
 ารของผู้บริหาร และผู้มีผล
 ประโยชน์ร่วม ทั้งภายในและ
 ภายนอกองค์กร\n\nเนื้อหาการบ
 รรยาย\n\nวันที่ 1\n\n 	ความจำเป็
 น และเหตุผลที่ต้องมี Risk-based IT A
 udit และการกำกับในเรื่องนี้\n 
 	การปฏิบัติตามกฎเกณฑ์ มาตร
 ฐาน แนวทางของผู้กำกับของ ไ
 ทยและสากล เกี่ยวกับการบริ
 หารความเสี่ยง การควบคุม แล
 ะการตรวจสอบทางด้าน IT\n 	หลัก 
 การที่ยอมรับทั่วไปทางด้า
 นการบริหาร การจัดการความเ
 สี่ยงทั่วไป ทั้งด้าน IT Risk แล
 ะ IT-Related Risk ที่มีผลกระทบต่อธุร
 กิจมุมมองต่างๆ\n 	มาตรฐาน หล
 ักการประเมินความเสี่ยง IT Risk
  และ IT-Related Risk กับการควบคุมและ
 ตรวจสอบ รวมทั้งการบริหาร\n\n
 วันที่ 2\n\n 	การ วิเคราะห์ผลก
 ระทบจากช่องโหว่และจุดอ่อ
 นของการจัดการบริหารความเ
 สี่ยงด้าน IT ที่มีผลต่อกระบ
 วนการจัดการบริหารความเสี
 ่ยงด้าน IT ที่มีผลต่อกระบวน
 การจัดการในมุมมองต่างๆ ทั
 ้ง Business &amp\; Information\n 	แนว ทางการตร
 วจสอบ IT Audit &amp\; Integrated Audit เพื่อให้
 บรรลุความต้องการของผู้มี
 ผลประโยชน์ร่วม ทั้งภายในแ
 ละภายนอกองค์กร ตามแนวทางข
 อง GTAG ผสมผสานกับ CobiT และ COSO-ERM\n 	ก
 ารจัดการรายงาน การตรวจสอบ 
 เพื่อตอบสนองความต้องการข
 องผู้มีผลประโยชน์ร่วมที่
 ได้รับความสนใจ ตรงตามการค
 าดหวังตั้งแต่ระดับผู้บริ
 หารไปถึงระดับกรรมการ\n 	วิเ
 คราะห์ – พิจารณ์\n\nข้อมูลหล
 ักสูตร\n\nระยะเวลา        : 2 วัน
 \n\nวันที่                 : Nov 16 - 17\, 202
 6\n\nราคา               : 18\,900 THB (อัตร
 านี้ยังไม่รวม VAT 7%)\n\nเวลา     
            : 9:30 – 16:30 น.\n\nสถานที่   
         :  ACinfotec Training Center\n\nติดต่อ    
          : 02-670-8980 -4 ต่อ 321-323\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 6/05/AAEAAQAAAAAAAAMMAAAAJDg3MWYxMzhiLWUxMjAtNDc4MS05OGEyLTcxZTYwNGJjZWY5O
 A.jpg
CATEGORIES:Risk Based IT Audit
END:VEVENT
BEGIN:VEVENT
UID:992@acinfotec.com
DTSTART:20261116T023000Z
DTEND:20261118T093000Z
DTSTAMP:20260115T025616Z
URL:https://www.acinfotec.com/training-event/certified-soc-analyst-csa-exa
 m-included-4/
SUMMARY:Certified SOC Analyst | CSA (Exam Included)
DESCRIPTION:\nAbout this course\nThe Certified SOC Analyst (CSA) program is
  the first step to joining a security operations center (SOC). It is engin
 eered for current and aspiring Tier I and Tier II SOC analysts to achieve 
 proficiency in performing entry-level and intermediate-level operations.\n
 \nCSA is a training and credentialing program that helps the candidate acq
 uire trending and in-demand technical skills through instruction by some o
 f the most experienced trainers in the industry. The program focuses on cr
 eating new career opportunities through extensive\, meticulous knowledge w
 ith enhanced level capabilities for dynamically contributing to a SOC team
 . Being an intense 3-day program\, it thoroughly covers the fundamentals o
 f SOC operations\, before relaying the knowledge of log management and cor
 relation\, SIEM deployment\, advanced incident detection\, and incident re
 sponse. Additionally\, the candidate will learn to manage various SOC proc
 esses and collaborate with CSIRT at the time of need. To read more about S
 OC and how they are important to many industries\nIndustries That Must Hav
 e a (SOC)\nMany industries are dependent on Security Operations Management
 \, including:\n\nWhy Must Organizations Have Log Management and a SOC Team
 ?\nLog management is an organized approach to deal with large volumes of c
 omputer-generated log data. It allows multiple operations on data like gen
 eration\, collection\, centralization\, parsing\, transmission\, storage\,
  archival\, and disposal.\n\nOrganizations have a Security Operations Cent
 er team and a log management solution in order to:\n\n\n 	Comply with appl
 icable regulatory standards such as PCI-DSS\, HIPAA\, RMiT\, ISO 27001\, a
 nd others.\n 	Protect servers storing sensitive data from internal and ext
 ernal threats.\n 	Secure proprietary information and intellectual property
 .\n\n\nBesides log management\, Security Operations Center analysts can al
 so integrate Security Information and Event Management (SIEM) tools in the
 ir process. These software tools aggregate security data from multiple sou
 rces\, such as network devices\, servers\, and other locations. SIEM tools
  then connect the dots to discover the trends and detect cyber threats so 
 that organizations can act on the alerts.\nHow Does a SOC Help?\n\n 	For t
 he Payment Card Industry (PCI)\, it is mandatory to maintain a Security
  Operations Center. According to the PCI Compliance Security Standard Coun
 cil\, any merchant processing and storing credit card data should be PCI c
 ompliant. PCI compliance helps to ensure secure online transactions and pr
 otection against identity theft.\n 	In such a scenario\, a SOC team helps 
 to:\n 	Monitor firewalls\, their logs\, and any configuration change to id
 entify an irregularity.\n 	Increase the speed of incident remediation.\n 	
 Check firewall and router configuration standards by comparing them  with
  documented services\, ports\, and protocols.\n\n&nbsp\;\n\nAs the healthc
 are industry contains crucial health data\, such as holistic reports of pa
 tients including personalized diagnoses and treatments\, it is an alluring
  target to cybercriminals. Threat actors monetize patient data by selling 
 it to the highest bidder or blackmailing the victim.\n\nFor keeping protec
 ted health information (PHI) secure\, healthcare organizations require a S
 OC 2 audit. SOC 2 compliance ensures:\n\n 	Customer trust\n 	Brand reputat
 ion\n 	Business continuity\n 	Competitive advantage\n\n&nbsp\;\n\n\n\nThe
  manufacturing sector has always been a vulnerable industry as it posses
 ses intellectual property and advanced technologies. Consider a Department
  of Defense (DoD) contractor for example: It is a must to meet the NIST cy
 bersecurity standards to maintain DFARS (Defense Federal Acquisition Regul
 ation Supplement) compliance. The NIST SP 800-171 outlines guidelines for 
 Audit and Accountability\, Configuration Management\, Identification\, and
  Authentication\, with several other criteria.\nSOC analysts are needed in
  the manufacturing industry to:\n\n 	Set up alerts to monitor potential th
 reats.\n 	Promptly remediate ongoing and possible security threats.\n\n&nb
 sp\;\n\n\n\nCybercriminals are eyeing financial services for their bulk 
 transactions and real-time monitoring of activities. Apart from external a
 ttacks\, institutions are also vulnerable to lost employee devices (like p
 hones) and insider threats.\n\nBanking and Financial services should perfo
 rm SOC Type 1 and SOC Type 2 audits along with annual SOC 1 SSAE 18 report
 s. Being in clear nexus with the Internal Control Over Financial Reporting
  (ICFR) concept\, these audits effectively report on internal controls. Th
 ey reveal:\n\n 	Weaknesses in security controls like improperly provisione
 d information systems\, weak authentication parameters\, lack of multiple 
 layers of security\, and others.\n 	Shortcomings in operational controls.\
 n 	Flaws in documentation.\n\n&nbsp\;\n\n\n\nAs government agencies store 
 personal information along with criminal records and religious and politic
 al inclinations\, they are a prized target for cyber attackers.\n\nGovernm
 ent institutions need SOC teams for:\n\n 	Network monitoring in real time.
 \n 	Analyzing activities on servers\, endpoints\, and databases.\n 	Lookin
 g for an incident or signs of a breach.\n\n&nbsp\;\n\n&nbsp\;\n\n\n\nEduca
 tion establishments are easy targets for cybercriminals. They not only car
 ry personal data but also valuable research data and allow access to large
 r networks.\n\nA Security Operations Center can help an educational instit
 ution’s IT staff respond to growing security threats by:\n\n 	Identifyin
 g and monitoring institutional assets and data.\n 	Neutralizing threats.\n
  	Providing cybersecurity metrics to the IT staff.\n\n&nbsp\;\nTarget Audi
 ence\n\n 	SOC Analysts (Tier I and Tier II)\n 	Network and Security Admini
 strators\, Network and Security Engineers\, Network Defense Analyst\, Netw
 ork Defense Technicians\, Network Security Specialist\, Network Security O
 perator\, and any security professional handling network security operatio
 ns\n 	Cybersecurity Analyst\n 	Entry-level cybersecurity professionals\n 	
 Anyone who wants to become a SOC Analyst.\n\nLearning Objectives of CSA\n\
 n 	Gain Knowledge of SOC processes\, procedures\, technologies\, and workf
 lows.\n 	Gain a basic understanding and in-depth knowledge of security thr
 eats\, attacks\, vulnerabilities\, attacker’s behaviors\, cyber killchai
 n\, etc.\n 	Able to recognize attacker tools\, tactics\, and procedures to
  identify indicators of compromise (IOCs) that can be utilized during acti
 ve and future investigations.\n 	Able to monitor and analyze logs and aler
 ts from a variety of different technologies across multiple platforms (IDS
 /IPS\, end-point protection\, servers\, and workstations).\n 	Gain knowled
 ge of the Centralized Log Management (CLM) process.\n 	Able to perform Sec
 urity events and log collection\, monitoring\, and analysis.\n 	Gain exper
 ience and extensive knowledge of Security Information and Event Management
 .\n 	Gain knowledge of administering SIEM solutions (Splunk/AlienVault/OSS
 IM/ELK).\n 	Understand the architecture\, implementation and fine-tuning o
 f SIEM solutions (Splunk/AlienVault/OSSIM/ELK).\n 	Gain hands-on experienc
 e in SIEM use case development process.\n 	Able to develop threat cases (c
 orrelation rules)\, create reports\, etc.\n 	Learn use cases that are wide
 ly used across the SIEM deployment.\n 	Plan\, organize\, and perform threa
 t monitoring and analysis in the enterprise.\n 	Able to monitor emerging t
 hreat patterns and perform security threat analysis.\n 	Gain hands-on expe
 rience in the alert triaging process.\n 	Able to escalate incidents to app
 ropriate teams for additional assistance.\n 	Able to use a Service Desk ti
 cketing system.\n 	Able to prepare briefings and reports of analysis metho
 dology and results.\n 	Gain knowledge of integrating threat intelligence i
 nto SIEM for enhanced incident detection and response.\n 	Able to make use
  of varied\, disparate\, constantly changing threat information.\n 	Gain k
 nowledge of Incident Response Process.\n 	Gain understating of SOC and IRT
  collaboration for better incident response.\n\n\nTraining Info\nDuration:
   3 Days\nDate:  Nov 16-18\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenu
 e: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bld
 g.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nTrai
 ning Fees: 39\,000 Baht (ex.vat 7%)\nE-mail.training@acinfotec.com\n\nwww.
 eccouncil.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 1/12/CSA.png
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:974@acinfotec.com
DTSTART:20261117T023000Z
DTEND:20261120T093000Z
DTSTAMP:20260115T025532Z
URL:https://www.acinfotec.com/training-event/comptia-security-exam-include
 d-18/
SUMMARY:CompTIA Security+ (Exam Included)
DESCRIPTION:\n\nAbout this course \nCompTIA® Security+® is the primary co
 urse you will need to take if your job responsibilities include securing n
 etwork services\, devices\, and traffic and your organization as a whole i
 ncluding the physical security elements and operational security measures.
  It is also the main course you will take to prepare for the CompTIA Secur
 ity+ Certification examination.\n\nIn this course\, you will build on your
  knowledge and professional experience with security fundamentals\, networ
 ks\, and organizational security as you acquire the specific skills requir
 ed to implement basic security services on any type of computer network. T
 his course can benefit you in two ways. If you intend to pass the CompTIA 
 Security+ (Exam SY0-701) Certification examination\, this course can be a 
 significant part of your preparation. But certification is not the only ke
 y to professional success in the field of computer security.\n\nToday's jo
 b market demands individuals with demonstrable skills\, and the informatio
 n and activities in this course can help you build your computer security 
 skill set so that you can confidently perform your duties in any security-
 related professional role.\n\nWho should attend?\nThis course is targeted 
 toward the information technology (IT) professional who has networking and
  administrative skills in Windows®-based Transmission Control Protocol/In
 ternet Protocol (TCP/IP) networks and familiarity with other operating sys
 tems\, such as Mac OS® X\, Unix\, or Linux\, and who wants to further a c
 areer in IT by acquiring a foundational knowledge of security topics\; pre
 pare for the CompTIA Security+ Certification examination\; or use Security
 + as the foundation for advanced security certifications or career roles.\
 n\n\n\n\n\n\n\nCourse Contents\n\n\n\n\n\nModule 1: General Security Conce
 pts\n\n 	Compare and contrast various types of security controls.\n 	Summa
 rize fundamental security concepts.\n 	Explain the importance of change ma
 nagement processes  and the impact to security.\n 	Explain the importance
  of using appropriate cryptographic solutions.\n\nModule 2: Security Opera
 tions\n\n 	Given a scenario\, apply common security techniques to computin
 g resources.\n 	Explain the security implications of proper hardware\, sof
 tware\, and data asset management.\n 	Explain various activities associate
 d with vulnerability management.\n 	Explain security alerting and monitori
 ng concepts and tools.\n 	Given a scenario\, modify enterprise capabilitie
 s to enhance security.\n 	Given a scenario\, implement and maintain identi
 ty and access management.\n 	Explain the importance of automation and orch
 estration related to secure operations.\n 	Explain appropriate incident re
 sponse activities.\n 	Given a scenario\, use data sources to support an in
 vestigation.\n\nModule 3: Security Architecture\n\n 	Compare and contrast 
 security implications of different architecture models.\n 	Given a scenari
 o\, apply security principles to secure enterprise infrastructure.\n 	Comp
 are and contrast concepts and strategies to protect data.\n 	Explain the i
 mportance of resilience and recovery in security architecture.\n\nModule 4
 : Threats\, Vulnerabilities\, and Mitigations\n\n 	Compare and contrast co
 mmon threat actors and motivations.\n 	Explain common threat vectors and a
 ttack surfaces.\n 	Explain various types of vulnerabilities.\n 	Given a sc
 enario\, analyze indicators of malicious activity.\n 	Explain the purpose 
 of mitigation techniques used to secure the enterprise.\n\nModule 5: Secur
 ity Program Management and Oversight\n\n 	Summarize elements of effective 
 security governance.\n 	Explain elements of the risk management process\n 
 	Explain the processes associated with third-party risk assessment and man
 agement.\n 	Summarize elements of effective security compliance.\n 	Explai
 n types and purposes of audits and assessments.\n 	Given a scenario\, impl
 ement security awareness practices.\n\nAbout the exam\nThe new CompTIA Sec
 urity+ (SY0-701) represents the latest and greatest in cybersecurity\, cov
 ering the most in-demand skills related to current threats\, automation\, 
 zero trust\, IoT\, risk – and more. Once certified\, you’ll understand
  the core skills needed to succeed on the job – and employers will notic
 e too. The Security+ exam verifies you have the knowledge and skills requi
 red to:\n\n 	Assess the security posture of an enterprise environment and 
 recommend and implement appropriate security solutions.\n 	Monitor and sec
 ure hybrid environments\, including cloud\, mobile\, Internet of Things (I
 oT)\, and operational technology.\n 	Operate with an awareness of applicab
 le regulations and policies\, including principles of governance\, risk\, 
 and compliance.\n 	Identify\, analyze\, and respond to security events and
  incidents.\n\nCompTIA Security+ is compliant with ISO 17024 standards and
  approved by the U.S. DoD to meet directive 8140/8570.01-M requirements. R
 egulators and government rely on ANSI accreditation because it provides co
 nfidence and trust in the outputs of an accredited program. Over 2.3 milli
 on CompTIA ISO/ANSI-accredited exams have been delivered since January 1\,
  2011.\nTraining Info\nLanguage : Conducted in Thai Language\nDuration : 4
  Days\nDate : Nov 17 - 20\, 2026\nTime : 9.30 - 16.30 pm\nVenue: ACinfote
 c Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Workla
 b) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323\nE training@acin
 fotec.com\nPrice: 45\,000 baht (Ex.vat 7%)\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:951@acinfotec.com
DTSTART:20261118T023000Z
DTEND:20261120T093000Z
DTSTAMP:20260115T025517Z
URL:https://www.acinfotec.com/training-event/cdpse-certified-data-privacy-
 solutions-engineer-exam-prep-new-5/
SUMMARY:CDPSE – Certified Data Privacy Solutions Engineer (Exam Prep) New
 **
DESCRIPTION:CDPSE – Certified Data Privacy Solutions Engineer (Exam Prep)
 \nAbout this course\nCertified Data Privacy Solutions Engineer™ (CDPSE
 ®) is focused on validating the technical skills and knowledge it takes t
 o assess\, build and implement comprehensive data privacy measures. CDPSE 
 holders help fill the technical privacy skills gap so that your organizati
 on has competent privacy technologists to build and implement solutions th
 at mitigate risk and enhance efficiency.\nWho should attend?\nIT professio
 nals experienced in the governance\, architecture\, and lifecycle of data 
 privacy at a technical level.\n Course Content\nDomain 1. Privacy Governa
 nce\n\nIdentify issues requiring remediation and opportunities for process
  improvement.\n\n 	Identify the internal and external privacy requirements
  specific to the organization's governance and risk management programs an
 d practices.\n 	Participate in the evaluation of privacy policies\, progra
 ms and policies for their alignment with legal requirements\, regulatory r
 equirements and/or industry best practices.\n 	Coordinate and/or perform p
 rivacy impact assessments (PIA) and other privacy-focused assessments.\n\n
 Domain 2. Privacy Architecture\n\nCollaborate with other practitioners to 
 ensure that privacy programs and practices are followed during the design\
 , development and implementation of systems\, applications and infrastruct
 ure.\n\n 	Coordinate and/or perform privacy impact assessment (PIA) and ot
 her privacy-focused assessments to identify appropriate tracking technolog
 ies and technical privacy controls.\n 	Participate in the development of p
 rivacy control procedures that align with privacy policies and business ne
 eds.\n 	Implement procedures related to privacy architecture that align wi
 th privacy policies.\n\nDomain 3. Data Lifecycle\nParticipate in the devel
 opment of data lifecycle procedures that align with privacy policies and b
 usiness needs.\n\n 	Identify the internal and external privacy requirement
 s relating to the organization's data lifecycle practices.\n 	Coordinate a
 nd/or perform privacy impact assessments (PIA) and other privacy-focused a
 ssessments relating to the organization’s data lifecycle practices.\n 	P
 articipate in the development of data lifecycle procedures that align with
  privacy policies and business needs.\n\nCDPSE Examination Weights\n\n\n\n
 Domains\nAverage Weight\n\n\n1. Privacy Governance\n34%\n\n\n2. Privacy Ar
 chitecture\n36%\n\n\n3. Data Lifecycle\n30%\n\n\nTotal\n100%\n\n\n\nTraini
 ng Info\nLanguage: Conducted in Thai Language\nDuration: 3 Days\nDate: 
 Nov 18-20\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Cen
 tre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 898
 0-3 Ext. 321-323\nPrice: 34\,000.- (ex.vat)\nE-mail: training@acinfotec.c
 om
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 4/07/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded-2.png
END:VEVENT
BEGIN:VEVENT
UID:969@acinfotec.com
DTSTART:20261123T023000Z
DTEND:20261127T093000Z
DTSTAMP:20260115T025506Z
URL:https://www.acinfotec.com/training-event/certified-penetration-testing
 -professional-cpentexam-included-6/
SUMMARY:Certified Penetration Testing Professional (CPENT)(Exam Included)
DESCRIPTION:\nAbout this course\nEC-Council’s Certified Penetration Teste
 r (CPENT) program teaches you how to perform an effective penetration test
  in an enterprise network environment that must be attacked\, exploited\, 
 evaded\, and defended. If you have only been working in flat networks\, CP
 ENT’s live practice range will teach you to take your skills to the next
  level by teaching you how to pen test IoT systems\, OT systems\, how to w
 rite your own exploits\, build your own tools\, conduct advanced binaries 
 exploitation\, double pivot to access hidden networks\, and also customize
  scripts/exploits to get into the innermost segments of the network.\nCPEN
 T Benefits\n\n\n\n\n\n 	100% mapped with the NICE framework.\n 	100% metho
 dology-based penetration testing program.\n 	Blends both manual and automa
 ted penetration testing approaches.\n 	Designed with the most common penet
 ration testing practices offered by the best service providers.\n 	Maps to
  all major Job Portals. Role Title: Penetration Tester and Security Analys
 t.\n 	Provides strong reporting writing guidance.\n 	Gives a real-world ex
 perience through an Advanced Penetration Testing Range.\n 	Provides candid
 ates with standard Pen test for use in the field.\n\nCPENT... No other Pen
  Test Course like it!\n\n\n\nAdvanced Windows Attacks\nThis zone contains 
 a complete forest that you first have to gain access to and then use Power
 Shell and any other means to execute Silver and Gold Ticket and Kerberoast
 ing. The machines will be configured with defenses in place meaning you to
  have to use PowerShell bypass techniques and other advanced methods to sc
 ore points within the zone.\n\n\n\nAttacking IOT Systems\nCPENT is the fir
 st certification that requires you to locate IOT devices and then gain acc
 ess to the network. Once on the network\, you must identify the firmware o
 f the IOT device\, extract it\, and then reverse engineer it.\n\n\n\nWriti
 ng Exploits: Advanced Binary Exploitation\nFinding flawed code is a skill 
 competent pen testers need. In this zone you will be required to find the 
 flawed binaries then reverse engineer them to write exploits to take contr
 ol of the program execution. The task is complicated by the requirement of
  penetrating from the perimeter to gain access then discover the binaries.
  Once that is done you have to reverse engineer the code. Unlike other cer
 tifications\, CPENT includes 32 and 64 bit code challenges and some of the
  code will be compiled with basic protections of non-executable stacks. Yo
 u must be able to write a driver program to exploit these binaries\, then 
 discover a method to escalate privileges. This will require advanced skill
 s in binary exploitation to include the latest debugging concepts and egg 
 hunting techniques. You are required to craft input code to first take con
 trol of program execution and second\, map an area in memory to get your s
 hell code to work and bypass system protections.\n\n\n\nBypassing a Filter
 ed Network\nThe CPENT certification provides web zone challenges that exis
 t within a segmentation architecture\, so you have to identify the filteri
 ng of the architecture then leverage this knowledge to gain access to web 
 applications. The next challenge is to compromise and then extract the req
 uired data from the web apps to achieve points.\n\n\n\nPentesting Operatio
 nal Technology (OT)\nThe CPENT range contains a zone that is dedicated to 
 ICS SCADA networks that the candidate will have to penetrate from the IT n
 etwork side and gain access to the OT network. Once there\, you will have 
 to identify the Programmable Logic Controller (PLC) and then modify the da
 ta to impact the OT network. You must be able to intercept the Mod Bus Com
 munication protocol and communication between the PLC and other nodes.\n\n
 \n\n\n\n\n\nAccess Hidden Networks with Pivoting\nBased on our beta testin
 g\, pen testers struggle to identify the rules that are in place when they
  encounter a layered network. Therefore\, in this zone you will have to id
 entify the filtering rules then penetrate the direct network. From there\,
  candidates have to attempt pivots into hidden networks using single pivot
 ing methods\, but through a filter. Most certifications do not have a true
  pivot across disparate networks and few (if any) have the requirement int
 o and out of a filtering device.\n\n\n\nDouble Pivoting\nOnce you have bra
 ved and mastered the challenges of the pivot\, the next challenge is the d
 ouble pivot. This is not something that you can use a tool for\; in most c
 ases the pivot has to be set up manually. CPENT is the first certification
  in the world that requires you to access hidden networks using double piv
 oting.\n\n\n\nPrivilege Escalation\nIn this challenge\, the latest methods
  of privilege escalation reverse engineering code to take control of execu
 tion then break out of the limited shell are required to gain root/admin.\
 n\n\n\nEvading Defense Mechanisms\nThe range requires your exploits be tes
 ted by different defenses you are likely to see in the wild. Candidates ar
 e required to get their exploits past the defenses by weaponizing them.\n\
 n\n\nAttack Automation with Scripts\nPrepare for advanced penetration test
 ing techniques and scripting with seven self-study appendices: Penetration
  testing with Ruby\, Python\, PowerShell\, Perl\, BASH\, Fuzzing\, and Met
 asploit.\n\n\n\nWeaponize Your Exploits\nCustomize your own tools and buil
 d your armory with your coding expertise to hack the challenges presented 
 to you as you would in real life.\n\n\n\nWrite Professional Reports\nExper
 ience how a pen tester can mitigate risks and validate the report presente
 d to the client to really make an impact. Great pen testing doesn’t mean
  much to clients without a clearly written report!\n\n\n\n\n\n\n\n\n\n\nCP
 ENT- Is this course for you?\n\n\n\nCPENT Candidates will be:\n\n\n 	Ethic
 al Hackers\n 	Penetration Testers\n 	Network server administrators\n 	Fire
 wall Administrators\n 	Security Testers\n 	System Administrators and Risk 
 Assessment professionals\n\n\nCPENT Maps to the following Industry Job Rol
 es:\n\n\n\n\n\n\n\n 	Cyber Security Forensic Analyst\n 	Cyber Threat Analy
 st Tier 2\n 	Cyber Threat Intelligence Analyst\n 	Information Security Ana
 lyst\n 	Cyber Security Engineer\n 	Application Security Analyst\n 	Cyber S
 ecurity Assurance Engineer\n 	Senior Information Assurance/ Security Speci
 alist\n 	Security Systems Analyst\n 	Security Operations Center (SOC) Anal
 yst\n\n\n\n\n\n\n\n\n 	Penetration Tester\n 	Technical Operations Network 
 Engineer\n 	IT Security Administrator\n 	Security Engineer\n 	Information 
 Security Engineer\n 	Network Security Information Analyst\n 	Mid Level Pen
 etration Tester\n 	IT Security Analyst III\n 	Junior Security Operations C
 enter (SOC) Analyst\n\n\n\n\n\nCPENT Course Outline\n\n\n\n\n\n\n\nModule 
 01: Introduction to Penetration Testing\n\n\nModule 02: Penetration Test
 ing Scoping and Engagement\n\n\nModule 03: Open Source Intelligence (OSIN
 T)\n\n\nModule 04: Social Engineering Penetration Testing\n\n\nModule 05:
  Network Penetration Testing – External\n\n\nModule 06: Network Penetr
 ation Testing– Internal\n\n\nModule 07: Network Penetration Testing –
  Perimeter Devices\n\n\nModule 08: Web Application Penetration Testing\n\
 n\nModule 09: Wireless Penetration Testing\n\n\nModule 10: IoT Penetrati
 on Testing\n\n\nModule 11: OT/SCADA Penetration Testing\n\n\nModule 12: 
 Cloud Penetration Testing\n\n\nModule 13: Binary Analysis and Exploitatio
 n\n\n\nModule 14: Report Writing and Post Testing Actions\n\n\n\n\n&nbsp\
 ;\n\n\n\n\n\n\n\nA Hands-On Exam Like No Other.\n24 Hours will define your
  Pen Testing career\n\nCPENT is a fully online\, remotely proctored practi
 cal exam that challenges you through a grueling 24-hour performance-based\
 , hands-on exam. The exam is broken into two practical exams of 12-hours e
 ach that will test your perseverance and focus by forcing you to outdo you
 rself with each new challenge. You have the option to choose either two 12
 -hour exams or one 24-hour exam.\n\n\n\n\n\n\n\n\n\nCandidates who score m
 ore than 70% will earn the CPENT certification. Candidates who score more 
 than 90% attain the prestigious LPT (Master) credential!\n\nExam features:
 \n\n 	Choose your challenge! Either two 12-hour sessions or a single 24-ho
 ur exam!\n 	EC-Council specialists proctor the entire exam\; cheating is n
 ot an option.\n 	Score at least 70% and become a CPENT.\n 	Score at least 
 90% and earn the highly regarded LPT (Master) designation!\n\n\n\n\n\n\n\n
 \n\nAn Exciting Career Awaits A CPENT\n\n\n\n\n\n\n\n\n\n\n\nTime of Compl
 etion\n40-hour course\n + 24-hour exam\n\n\n\n\n\n\n\n\n\n\n\n\n\nJobs Av
 ailable\n8\,000+ on LinkedIn alone for Pen Testers\n\n\n\n\n\n\n\n\n\n\n\n
   \n\n\nAverage Salary\n\n\n$84\,000 in the U.S.\n\n\n&nbsp\;\n\n\n\n\n\n
 \n\n\n\n\nSpend just 40-hours and align your career to the growing demand 
 for Penetration Testers. With CPENT\, you will cover advanced penetration 
 testing tools\, techniques\, and methodologies most needed right now.\n\n\
 n\n\n\n\nTraining Info\nDuration:  5 Days\nDate:  Nov 23-27\, 2026\nTime
 :  9.30 am. – 16.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\,
  Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T
  02 670 8980-3 Ext. 321-323\nTraining Fees: Please Call\nE-mail.training@a
 cinfotec.com\n\n\n\nwww.eccouncil.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 0/09/cover-cpent.jpg
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:920@acinfotec.com
DTSTART:20261123T023000Z
DTEND:20261127T093000Z
DTSTAMP:20260115T025449Z
URL:https://www.acinfotec.com/training-event/pecb-certified-data-protectio
 n-officer-cdpo-exam-included-3/
SUMMARY:PECB Certified Data Protection Officer (CDPO) (Exam Included)
DESCRIPTION:Why should you attend?\nAs data protection is becoming more and
  more valuable\, the need for organizations to protect these data is also 
 constantly increasing. Besides violating the fundamental rights and freedo
 ms of persons\, not complying with the data protection regulations can lea
 d to risky situations that could harm an organization’s credibility\, re
 putation\, and financial status. This is where your skills as a data prote
 ction officers come to place.\n\nThe PECB Certified Data Protection Office
 r training course will help you acquire the knowledge and skills to serve 
 as a Data Protection Officer (DPO) so as to help organizations ensure comp
 liance with the General Data Protection Regulation (GDPR) requirements.\n\
 nBased on practical exercises\, you will be able to master the role of the
  DPO and become competent to inform\, advise\, and monitor compliance with
  the GDPR and cooperate with the supervisory authority.\n\nAfter attending
  the training course\, you can sit for the exam\, and if you successfully 
 pass the exam\, you can apply for the “PECB Certified Data Protection Of
 ficer” credential. The internationally recognized “PECB Certified Data
  Protection Officer” certificate will prove that you have the profession
 al capabilities and practical knowledge to advise the controller and the p
 rocessor on how to meet their obligations regarding the GDPR compliance.\n
 Who should attend?\n\n 	Managers or consultants seeking to prepare and sup
 port an organization in planning\, implementing\, and maintaining a compli
 ance program based on the GDPR\n 	DPOs and individuals responsible for mai
 ntaining conformance with the GDPR requirements\n 	Members of information 
 security\, incident management\, and business continuity teams\n 	Technica
 l and compliance experts seeking to prepare for a data protection officer 
 role\n 	Expert advisors involved in the security of personal data\n\nCours
 e agenda \nDay 1: Introduction to the GDPR concepts and principles\n\n 	Tr
 aining course objectives and structure\n 	General Data Protection Regulati
 on (GDPR)\n 	Core considerations for the GDPR\n\nDay 2: Designation of the
  DPO and analysis of the GDPR compliance program\n\n 	Designation of the D
 PO\n 	Analysis of the GDPR compliance program\n 	Relationship with the top
  management\n 	Data protection policy\n 	Register of processing activities
 \n 	Risk management process\n\nDay 3: DPO operations\n\n 	Data protection 
 impact assessment\n 	Documentation management\n 	Evaluation of the data pr
 otection controls\n 	Data protection and technology\n 	Awareness\, trainin
 g\, and communication\n\nDay 4: Monitoring and continual improvement of GD
 PR compliance\n\n 	Incident management and personal data breaches\n 	Monit
 oring and measuring compliance\n 	Data protection internal audit\n 	Treatm
 ent of non conformity\n 	Continual improvement\n 	Closing the training cou
 rse\n\nDay 5: Certification Exam\n\nTraining Info\n\n\n\nLanguage : Condu
 cted in Thai Language\nDuration : 5 Days\nDate :  Nov 23-27\, 2026\nTime
  : 9.30 am. – 16.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, 
 Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 
 02 670 8980-3 Ext. 321-323\nPrice : 51\,500 Baht (Ex.vat 7%)\nE training@
 acinfotec.com\n\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:975@acinfotec.com
DTSTART:20261124T023000Z
DTEND:20261127T093000Z
DTSTAMP:20260115T025339Z
URL:https://www.acinfotec.com/training-event/cgeit-certified-in-the-govern
 ance-of-enterprise-it-exam-prep-new-3/
SUMMARY:CGEIT - Certified in the Governance of Enterprise IT (Exam Prep.) -
  New!
DESCRIPTION:About this course\nCertified in the Governance of Enterprise IT
 ® (CGEIT®) certification is framework agnostic and the only IT governanc
 e certification for the individual. Whether you’re seeking a new career 
 opportunity or striving to grow within your current organization\, CGEIT p
 roves your expertise in enterprise IT governance\, resources\, benefits an
 d risk optimization.\nWho should attend?\n\n 	CISO/CTO\n 	Information Secu
 rity\n 	Compliance Manager\n 	Governance Risk Consultant\n\nCourse Content
 s\nValidate your proficiencies for handling the challenges and responsibil
 ities of a modern IT governance expert with a CGEIT\, which focuses on the
 se domains:\n\nDomain 1. GOVERNANCE OF ENTERPRISE IT\n\nThis domain deals 
 with the organizational structure of building IT frameworks\, the strategy
  and technology aspects of IT governance and essential knowledge about gov
 erning various types of information.\n\nA—GOVERNANCE FRAMEWORK\n\n 	Comp
 onents of a Governance Framework\n 	Organizational Structures\, Roles and 
 Responsibilities\n 	Strategy Development\n 	Legal and Regulatory Complianc
 e\n 	Organizational Culture\n 	Business Ethics\n\nB—TECHNOLOGY GOVERNANC
 E\n\n 	Governance Strategy Alignment with Enterprise Objectives\n 	Strateg
 ic Planning Process\n 	Stakeholder Analysis and Engagement\n 	Communicatio
 n and Awareness Strategy\n 	Enterprise Architecture\n 	Policies and Standa
 rds\n\nC— INFORMATION GOVERNANCE\n\n 	Information Architecture\n 	Inform
 ation Asset Lifecycle\n 	Information Ownership and Stewardship\n 	Informat
 ion Classification and Handling\n\nDomain 2. IT RESOURCES\n\nThis domain p
 rovides insight about where to effectively allocate your IT resources and 
 how to ensure IT resources are streamlined for performance.\n\nA— IT RES
 OURCE PLANNING\n\n 	Sourcing Strategies\n 	Resource Capacity Planning\n 	A
 cquisition of Resources\n\nB— IT RESOURCE OPTIMIZATION\n\n 	Sourcing Str
 ategies\n 	Resource Capacity Planning\n 	Acquisition of Resources\n\nDomai
 n 3. BENEFITS REALIZATION\n\nThis domain’s focus is on managing performa
 nce\, monitoring and reporting\, and analyzing IT-enabled technology inves
 tment management.\n\nA— IT PERFORMANCE AND OVERSIGHT\n\n 	Performance Ma
 nagement\n 	Change Management\n 	Governance Monitoring\n 	Governance Repor
 ting\n 	Quality Assurance\n 	Process Development and Improvement\n\nB— M
 ANAGEMENT OF IT-ENABLED INVESTMENTS\n\n 	Business Case Development and Eva
 luation\n 	IT Investment Management and Reporting\n 	Performance Metrics\n
  	Benefit Evaluation Methods\n\nDomain 4. RISK OPTIMIZATION\n\nThis domain
  is about mitigating potential IT risks and challenges and overseeing the 
 risks of IT management capabilities.\n\nA–RISK STRATEGY\n\n 	Risk Framew
 orks and Standards\n 	Enterprise Risk Management\n 	Risk Appetite and Risk
  Tolerance\n\nB–RISK MANAGEMENT\n\n 	IT-Enabled Capabilities\, Processes
  and Services\n 	Business Risk\, Exposures and Threats\n 	Risk Management 
 Lifecycle\n\n Training Info\nDuration:  4 Days\nDate: Nov 24 - 27\, 2026
 \nTime:  9.30 am. – 16.30 pm.\nVenue: ACinfotec Training Center\n16th
  Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nConta
 ct : T 02 670 8980-3 Ext. 321-323\nTraining Fees: 34\,000 (Exam Included)\
 nE-mail.training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 5/06/CGEIT-1.png
CATEGORIES:Compliance,Data Governance,ISC2 &amp; ISACA,Risk Management
 &amp; Governance (GRC)
END:VEVENT
BEGIN:VEVENT
UID:956@acinfotec.com
DTSTART:20261201T023000Z
DTEND:20261204T093000Z
DTSTAMP:20260115T025321Z
URL:https://www.acinfotec.com/training-event/ccsp-certified-cloud-security
 -professional-exam-prep/
SUMMARY:CCSP - Certified Cloud Security Professional (Exam Prep)
DESCRIPTION:Course Overview\nAs powerful as cloud computing is for the orga
 nization\, understanding its information security risks and mitigation str
 ategies is critical. Legacy approaches are inadequate\, and organizations 
 need competent\, experienced professionals equipped with the right cloud s
 ecurity knowledge and skills to be successful. They need CCSPs.\n\nBacked 
 by the two leading non-profits focused on cloud and information security\,
  the Cloud Security Alliance (CSA) and (ISC) ²\, the CCSP credential de
 notes professionals with the deep-seated knowledge and competency derived 
 from hands-on experience with cyber\, information\, software and cloud com
 puting infrastructure security. CCSPs help you achieve the highest standar
 d for cloud security expertise and enable your organization to benefit fro
 m the power of cloud computing while keeping sensitive data secure.\nWho s
 hould Attend?\nCCSP is most appropriate for those whose day-to-day respons
 ibilities involve procuring\, securing and managing cloud environments or 
 purchased cloud services. In other words\, CCSPs are heavily involved with
  the cloud. Many CCSPs will be responsible for cloud security architecture
 \, design\, operations\, and/or service orchestration.\n\nExample job func
 tions include\, but are not limited to:\n\n 	Enterprise Architect\n 	Secur
 ity Administrator\n 	Systems Engineer\n 	Security Architect\n 	Security Co
 nsultant\n 	Security Engineer\n 	Security Manager\n 	Systems Architect\n\n
 Course Contents\nCCSP is a global credential born from the expertise of th
 e two industry-leading stewards of information systems and cloud computing
  security\, (ISC)² and CSA. The CCSP credential is appropriate and applic
 able to cloud security in a global environment. This is especially importa
 nt given the legal\, regulatory and compliance concerns that come with mul
 ti-jurisdictional housing of personally identifiable information (PII).\n\
 nFor those who qualify\, the CCSP exam will test their competence in the 
 six CCSP domains of the (ISC)² Common Body of Knowledge (CBK)\, which cov
 er:\n\n 	Architectural Concepts &amp\; Design Requirements\n 	Cloud Data S
 ecurity\n 	Cloud Platform &amp\; Infrastructure Security\n 	Cloud Applicat
 ion Security\n 	Operations\n 	Legal &amp\; Compliance\n\nTraining Info\nDu
 ration :  4 days\nDate : Dec 1-4\, 2026\nVenue: ACinfotec Training Cente
 r\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.
 \nContact : T 02 670 8980-3 Ext. 321-323\nEmail : training@acinfotec.com\n
 Price : 49\,000฿ (Exclusive of 7% VAT)
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/CRISC-–-Certified-in-Risk-and-Information-Systems-Control-Exam-Excl
 uded.png
CATEGORIES:Cloud security,ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:1006@acinfotec.com
DTSTART:20261201T023000Z
DTEND:20261202T093000Z
DTSTAMP:20260323T063311Z
URL:https://www.acinfotec.com/training-event/advanced-in-ai-security-manag
 ement-aaism-exam-prep-3/
SUMMARY:Advanced in AI Security Management (AAISM) – Exam Prep.
DESCRIPTION:About this course\nWith the significant potential of artificial
  intelligence comes new threats and vulnerabilities. ISACA Advanced in AI 
 Security Management™ (AAISM™) is the first and only AI-centric securit
 y management certification designed to help experienced IT professionals r
 einforce the enterprise’s security posture and protect against AI-specif
 ic threats. You’ll be able to manage the evolving security risk related 
 to AI\, implement policy\, and ensure its responsible and effective use ac
 ross the organization.\nCourse Benefits\n\n 	Proven experience in it audit
 s or its advisory roles\n 	Some expertise auditing\, assessing\, implement
 ing and maintaining AI systems\n 	Holds an active prerequisite certificati
 on\n\nPrerequisite\n\n 	ACTIVE CISM OR CISSP HOLDERS\n 	PROVEN EXPERIENCE 
 IN SECURITY OR ADVISORY ROLES\n 	SOME EXPERTISE ASSESSING\, IMPLEMENTING A
 ND MAINTAINING AI SYSTEMS\n\nWho should attend?\n\n 	Experienced Security 
 Professionals with CISM or CISSP\n 	Individuals in Security or Advisory Ro
 les\n 	Professionals with AI System Experience\n\nCourse Contents\nDOMAIN 
 1 – AI GOVERNANCE AND PROGRAM MANAGEMENT\n\nThis Domain demonstrates you
 r ability to advise stakeholders on implementing AI security solutions thr
 ough appropriate and effective policy\, data governance\, program manageme
 nt and incident response.\n\nA–Stakeholder considerations\, industry fra
 meworks\, and regulatory requirements\n\nB–AI-related strategies\, polic
 ies\, and procedures\n\nC– AI asset and data life cycle management\n\nD
 –AI security program development and management\n\nE–Business continui
 ty and incident response\n\nDOMAIN 2 – AI RISK MANAGEMENT\n\nThis Domain
  confirms your skill at assessing and managing risks\, threats\, vulnerabi
 lities and supply chain issues related to the enterprise-wide adoption of 
 AI.\n\nA–AI risk assessment\, thresholds\, and treatment\n\nB–AI threa
 t and vulnerability management\n\nC–AI vendor and supply chain managemen
 t\n\nDOMAIN 3 – AI TECHNOLOGIES AND CONTROLS\n\nThis Domain focuses on o
 ptimizing AI security and highlights your knowledge of security technologi
 es\, techniques and controls tailored to AI systems.\n\nA–AI security ar
 chitecture and design\n\nB–AI-related strategies\, policies\, and proced
 ures\n\nC–Data management controls\n\nD–Privacy\, ethical\, trust and 
 safety controls\n\nE–Security contr\nTraining info\nDuration : 2 Days\nD
 ate : Aug 17-18\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Trainin
 g Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Ram
 a 4 Rd.\nTraining Fee : 28\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext.
 321-323\nEmail. training@acinfotec.com\nAbout this course\nWith the signi
 ficant potential of artificial intelligence comes new threats and vulnerab
 ilities. ISACA Advanced in AI Security Management™ (AAISM™) is the fir
 st and only AI-centric security management certification designed to help 
 experienced IT professionals reinforce the enterprise’s security posture
  and protect against AI-specific threats. You’ll be able to manage the e
 volving security risk related to AI\, implement policy\, and ensure its re
 sponsible and effective use across the organization.\nCourse Benefits\n\n 
 	Proven experience in it audits or its advisory roles\n 	Some expertise au
 diting\, assessing\, implementing and maintaining AI systems\n 	Holds an a
 ctive prerequisite certification\n\nPrerequisite\n\n 	ACTIVE CISM OR CISSP
  HOLDERS\n 	PROVEN EXPERIENCE IN SECURITY OR ADVISORY ROLES\n 	SOME EXPERT
 ISE ASSESSING\, IMPLEMENTING AND MAINTAINING AI SYSTEMS\n\nWho should atte
 nd?\n\n 	Experienced Security Professionals with CISM or CISSP\n 	Individu
 als in Security or Advisory Roles\n 	Professionals with AI System Experien
 ce\n\nCourse Contents\nDOMAIN 1 – AI GOVERNANCE AND PROGRAM MANAGEMENT\n
 \nThis Domain demonstrates your ability to advise stakeholders on implemen
 ting AI security solutions through appropriate and effective policy\, data
  governance\, program management and incident response.\n\nA–Stakeholder
  considerations\, industry frameworks\, and regulatory requirements\n\nB
 –AI-related strategies\, policies\, and procedures\n\nC– AI asset and 
 data life cycle management\n\nD–AI security program development and mana
 gement\n\nE–Business continuity and incident response\n\nDOMAIN 2 – AI
  RISK MANAGEMENT\n\nThis Domain confirms your skill at assessing and manag
 ing risks\, threats\, vulnerabilities and supply chain issues related to t
 he enterprise-wide adoption of AI.\n\nA–AI risk assessment\, thresholds\
 , and treatment\n\nB–AI threat and vulnerability management\n\nC–AI ve
 ndor and supply chain management\n\nDOMAIN 3 – AI TECHNOLOGIES AND CONTR
 OLS\n\nThis Domain focuses on optimizing AI security and highlights your k
 nowledge of security technologies\, techniques and controls tailored to AI
  systems.\n\nA–AI security architecture and design\n\nB–AI-related str
 ategies\, policies\, and procedures\n\nC–Data management controls\n\nD
 –Privacy\, ethical\, trust and safety controls\n\nE–Security contr\nTr
 aining info\nDuration : 2 Days\nDate : Aug 17-18\, 2026\nTime : 9.30-16.3
 0 pm.\nVenue : ACinfotec Training Center\n16th Fl.\, Grande Centre Point 
 Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fee : 28\,000 Baht (ex.
 vat 7%)\nTel. 02 670 8980-3 ext.321-323\nEmail. training@acinfotec.com\n
 About this course\nWith the significant potential of artificial intelligen
 ce comes new threats and vulnerabilities. ISACA Advanced in AI Security Ma
 nagement™ (AAISM™) is the first and only AI-centric security managemen
 t certification designed to help experienced IT professionals reinforce th
 e enterprise’s security posture and protect against AI-specific threats.
  You’ll be able to manage the evolving security risk related to AI\, imp
 lement policy\, and ensure its responsible and effective use across the or
 ganization.\nCourse Benefits\n\n 	Proven experience in it audits or its ad
 visory roles\n 	Some expertise auditing\, assessing\, implementing and mai
 ntaining AI systems\n 	Holds an active prerequisite certification\n\nPrere
 quisite\n\n 	ACTIVE CISM OR CISSP HOLDERS\n 	PROVEN EXPERIENCE IN SECURITY
  OR ADVISORY ROLES\n 	SOME EXPERTISE ASSESSING\, IMPLEMENTING AND MAINTAIN
 ING AI SYSTEMS\n\nWho should attend?\n\n 	Experienced Security Professiona
 ls with CISM or CISSP\n 	Individuals in Security or Advisory Roles\n 	Prof
 essionals with AI System Experience\n\nCourse Contents\nDOMAIN 1 – AI GO
 VERNANCE AND PROGRAM MANAGEMENT\n\nThis Domain demonstrates your ability t
 o advise stakeholders on implementing AI security solutions through approp
 riate and effective policy\, data governance\, program management and inci
 dent response.\n\nA–Stakeholder considerations\, industry frameworks\, a
 nd regulatory requirements\n\nB–AI-related strategies\, policies\, and p
 rocedures\n\nC– AI asset and data life cycle management\n\nD–AI securi
 ty program development and management\n\nE–Business continuity and incid
 ent response\n\nDOMAIN 2 – AI RISK MANAGEMENT\n\nThis Domain confirms yo
 ur skill at assessing and managing risks\, threats\, vulnerabilities and s
 upply chain issues related to the enterprise-wide adoption of AI.\n\nA–A
 I risk assessment\, thresholds\, and treatment\n\nB–AI threat and vulner
 ability management\n\nC–AI vendor and supply chain management\n\nDOMAIN 
 3 – AI TECHNOLOGIES AND CONTROLS\n\nThis Domain focuses on optimizing AI
  security and highlights your knowledge of security technologies\, techniq
 ues and controls tailored to AI systems.\n\nA–AI security architecture a
 nd design\n\nB–AI-related strategies\, policies\, and procedures\n\nC–
 Data management controls\n\nD–Privacy\, ethical\, trust and safety contr
 ols\n\nE–Security contr\nTraining info\nDuration : 2 Days\nDate : Dec 1-
 2\, 2026\nTime : 9.30-16.30 pm.\nVenue : ACinfotec Training Center\n16th
  Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTrain
 ing Fee : 28\,000 Baht (ex.vat 7%)\nTel. 02 670 8980-3 ext.321-323\nEmail
 . training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 6/03/AAISM.png
CATEGORIES:AI Intelligent,ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:982@acinfotec.com
DTSTART:20261201T023000Z
DTEND:20261204T093000Z
DTSTAMP:20260115T025256Z
URL:https://www.acinfotec.com/training-event/cism-examination-preparation-
 exam-excluded-16/
SUMMARY:CISM Examination Preparation (Exam Excluded)
DESCRIPTION:About this course\nWhile information has become more easily acc
 essible and readily available\, the associated risks and security threats 
 have not only increased in number\, but also complexity.  As a result\, t
 he importance of ensuring that an enterprise’s information is protected 
 has also increased.  It is now more important than ever for executives to
  ensure that their IT security managers have the expertise needed to reduc
 e risk and protect the enterprise.\n\nDesigned specifically for informatio
 n security professionals who are preparing to sit for the CISM exam\, the 
 course focuses on the four content areas of the Certified Information Secu
 rity Manager (CISM) job practice:  information security governance\, risk
  management and compliance\, information security program development and 
 management\, information security incident management. Sample exam items w
 ill be used throughout the course to reinforce content and familiarize att
 endees with the CISM exam question format.\nCourse Benefits\nThe demand fo
 r skilled information security management professionals is on the rise\, a
 nd the CISM certification is the globally accepted standard of achievement
  in this area.\n\nCISMs understand the business. They know how to manage a
 nd adapt technology to their enterprise and industry.\nWho should Attend?\
 n\n 	Risk managers.\n 	Security professionals with front-line experience.\
 n 	Security auditors.\n 	Information security staff.\n 	Compliance personn
 el.\n 	Information security managers.\n 	CSOs\, CISOs and CIOs.\n 	Informa
 tion security assurance providers\n\nCourse Contents\nDay 1 – Informatio
 n Security Governance\n\nAttendees will understand the broad requirements 
 for effective information security governance\, the elements and actions r
 equired to develop an information security strategy\, and be able to formu
 late a plan of action to implement this strategy.\n\n 	Establish and maint
 ain an information security strategy and align the strategy with corporate
  governance\n 	Establish and maintain an information security governance f
 ramework\n 	Establish and maintain information security policies\n 	Develo
 p a business case\n 	Identify internal and external influences to the orga
 nization\n 	Obtain management commitment\n 	Define roles and responsibilit
 ies\n 	Establish\, monitor\, evaluate and report metrics\n\nDay 2 – Info
 rmation Risk Management and Compliance\n\nAttendees will be able to manage
  information security risks.\n\n 	Establish a process for information asse
 t classification and ownership\n 	Identify legal\, regulatory\, organizati
 onal and other applicable requirements\n 	Ensure that risk assessments\, v
 ulnerability assessments and threat analyses are conducted periodically.\n
  	Determine appropriate risk treatment options.\n 	Evaluate information se
 curity controls\n 	Identify the gap between current and desired risk level
 s\n 	Integrate information risk management into business and IT processes\
 n 	Monitor existing risk.\n 	Report noncompliance and other changes in inf
 ormation risk\n\nDay 3 – Information Security Program Development and Ma
 nagement\n\nAttendees will be able to develop and manage an information se
 curity plan.\n\n 	Establish and maintain the information security program\
 n 	Ensure alignment between the information security program and other bus
 iness functions\n 	Identify\, acquire\, manage and define requirements for
  internal and external resources\n 	Establish and maintain information sec
 urity architectures\n 	Establish\, communicate and maintain organizational
  information security standards\, procedures\, guidelines\n 	Establish and
  maintain a program for information security awareness and training\n 	Int
 egrate information security requirements into organizational processes\n 	
 Integrate information security requirements into contracts and activities 
 of third parties\n 	Establish\, monitor and periodically report program ma
 nagement and operational metrics\n\nDay 4 – Information Security Inciden
 t Management \n\nStudents will effectively manage information security wit
 hin an enterprise and develop policies and procedures to respond to and re
 cover from disruptive and destructive information security events.\n\n 	Es
 tablish and maintain an organizational definition of\, and severity hierar
 chy for\, information security incidents\n 	Establish and maintain an inci
 dent response plan\n 	Develop and implement processes to ensure the timely
  identification of information security incidents\n 	Establish and maintai
 n processes to investigate and document information security incidents\n 	
 Establish and maintain incident escalation and notification processes\n 	O
 rganize\, train and equip teams to effectively respond to information secu
 rity incidents\n 	Test and review the incident response plan periodically\
 n 	Establish and maintain communication plans and processes\n 	Conduct pos
 t-incident reviews\n 	Establish and maintain integration among the inciden
 t response plan\, disaster recovery plan and business continuity plan\n\nC
 ertification and Accreditation\nTo become a CISM\, an applicant must:\n•
  Achieve a passing score on the CISM exam.\n• Submit an application with
  verified evidence of three years of work experience as described below.\n
 • Agree to abide by the ISACA Code of Professional Ethics\, which can be
  viewed at www.isaca.org/ethics.\n• Agree to abide by the CRISC continui
 ng professional education (CPE) policy\, which can be viewed at ISACA CISM
  Maintenance Page.\nExamination\n\n 	Computer-based examination\n 	4 hours
 \n 	150 multiple-choice question exam\n 	ISACA uses a 200 - 800 point scal
 e with 450 as the passing mark for the exams\n\nTraining Info\nLanguage :
  Conducted in Thai Language\nDuration : 4 Days\nDate :  Dec 1-4\, 2026\
 nTime : 9.30 am. – 16.30 pm.\nPrice : 34\,000 Bhts (Excluding Vat 7%)
 \nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphi
 ni Bldg.\, (Worklab) \, Rama 4 Rd.\nContact : T 02 670 8980-3 Ext. 321-323
 \nE training@acinfotec.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 3/09/2.png
CATEGORIES:ISC2 &amp; ISACA
END:VEVENT
BEGIN:VEVENT
UID:988@acinfotec.com
DTSTART:20261203T023000Z
DTEND:20261204T093000Z
DTSTAMP:20251219T034036Z
URL:https://www.acinfotec.com/training-event/certified-information-privacy
 -professional-europe-cipp-e-thai-5/
SUMMARY:Certified Information Privacy Professional/Europe (CIPP/E) (Thai)
DESCRIPTION: \nAbout this course\nThis  training encompasses pan-European 
 and national data protection laws\, key data protection terminology and pr
 actical concepts concerning the protection of personal data and trans-bord
 er data flows.\nThe CIPP/E program was developed by the International Asso
 ciation of Privacy Professionals (IAPP)\, which is the world’s largest c
 omprehensive global information privacy community and resource. The CIPP/E
  certification holds accreditation under ISO 17024: 2012.\nAchieving a CIP
 P/E credential shows you have the comprehensive GDPR knowledge\, perspecti
 ve and understanding to ensure compliance and data protection success in E
 urope—and to take advantage of the career opportunity this sweeping legi
 slation represents. Adding the CIPM to your CIPP/E puts you at the forefro
 nt of ensuring you are ready for the GDPR.\n\nCourse Benefits\n\nIt will s
 how the world that you know privacy laws and regulations and how to apply 
 them\, and that you know how to secure your place in the information econo
 my. When you earn a CIPP credential\, it means you’ve gained a foundatio
 nal understanding of broad global concepts of privacy and data protection 
 law and practice\, including: jurisdictional laws\, regulations and enforc
 ement models\; essential privacy concepts and principals\; legal requireme
 nts for handling and transferring data and more.\n\nWhat you’ll learn\n\
 n 	Introduction to European Data Protection\n 	European Regulatory Institu
 tions\n 	Legislative Framework\n 	Compliance with European Data Protection
  Law and Regulation\n 	International Data Transfers\n\nWho should attend?\
 n\n 	Data Protection Lawyers\n 	Records Managers\n 	Information Officers\n
  	Compliance Officers\n 	Human Resource Officers\n 	Anyone who uses\, proc
 esses and maintains personal data\n\nCourse Contents\n\n 	Module 1: Data 
 protection laws\nIntroduces key European data protection laws and regulato
 ry bodies\, describing the evolution toward a harmonized legislative frame
 work.\n 	Module 2: Personal data\nDefies and differentiates between types
  of data as defied by the GDPR\, including personal\, anonymous\, pseudony
 mous and special categories.\n 	Module 3: Controllers and processors\nDes
 cribes the roles and relationships of controllers and processors as defied
  by the GDPR.\n 	Module 4: Processing personal data\nDefies data processi
 ng and GDPR processing principles\, explains the application of the GDPR a
 nd outlines the legal grounds for processing personal data.\n 	Module 5: 
 Data subject rights\nDescribes data subject rights\, applications of right
 s\, and controller and processor obligations as set out in the GDPR.\n 	Mo
 dule 6: Information provision obligations\nExplains controller obligation
 s for providing information about data processing activities to data subje
 cts and supervisory authorities as set out in the GDPR.\n 	Module 7: Inte
 rnational data transfers\nOutlines options and obligations under the GDPR 
 for transferring data outside the European Economic Area\, including adequ
 acy decisions and appropriate safeguards and derogations.\n 	Module 8: Co
 mpliance considerations\nDiscusses the applications of European data prote
 ction laws\, legal bases and compliance requirements for processing person
 al data in practice\, including employers processing employee data\, surve
 illance\, direct marketing\, and internet technology and communications.\n
  	Module 9: Security of processing\nDiscusses considerations and duties o
 f controllers and processors for ensuring security of personal data and GD
 PR specifications for providing notification of data breaches.\n 	Module 1
 0: Accountability\nInvestigates accountability requirements\, including d
 ata protection management systems\, data protection impact assessments\, d
 ata protection policies and the role of the data protection officer.\n 	Mo
 dule 11: Supervision and enforcement\nDescribes the role\, powers and pro
 cedures of supervisory authorities\; the composition and tasks of the Euro
 pean Data Protection Board\; the role of the European Data Protection Supe
 rvisor\; and remedies\, liabilities and penalties for noncompliance as set
  out in the GDPR.\n\nTraining Info:\n\nLanguage: Conducted in Thai Languag
 e\nDuration: 2 Days\nTraining Date: Dec 3-4\, 2026\nVenue: ACinfotec Train
 ing Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, R
 ama 4 Rd.\nTraining Fees: 49\,900 (Exam Included)\nTel : 02 670 8980-3 ext
 . 321-323\nE-mail: training@acinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 1/03/CIPP_logo.png
CATEGORIES:IAPP
END:VEVENT
BEGIN:VEVENT
UID:980@acinfotec.com
DTSTART:20261203T023000Z
DTEND:20261204T093000Z
DTSTAMP:20260115T025227Z
URL:https://www.acinfotec.com/training-event/pecb-certified-gdpr-foundatio
 nexam-included-7/
SUMMARY:PECB Certified GDPR Foundation(Exam Included)
DESCRIPTION:About this course\n\nGDPR Foundation training enables you to le
 arn the basic elements to implement and manage a compliance framework with
  regard to the protection of personal data. During this training course\, 
 you will be able to understand the fundamental privacy principles and beco
 me familiar with the role of the Data Protection Officer.\n\nAfter complet
 ing this course\, you can sit for the exam and apply for a “PECB Certifi
 ed GDPR Foundation” credential. A PECB Foundation Certificate shows that
  you have understood the fundamental methodologies\, requirements\, framew
 ork and management approach.\nWho should attend?\n\n 	Individuals involved
  in Personal Data Protection and Information Security\n 	Individuals seeki
 ng to gain knowledge about the main privacy principles\n 	Individuals inte
 rested to pursue a career in Data Protection\n\nLearning objectives\n\n 	U
 nderstand the General Data Protection Regulation  requirements and the fu
 ndamental principles of privacy\n 	Understand the obligations\, roles and 
 responsibilities of the Data Protection Officer\n 	Understand the concepts
 \, approaches\, methods and techniques to effectively align a compliance f
 ramework with regard to the protection of personal data\n\nCourse agenda\n
 Day 1: Introduction to GDPR and Data Protection Principles\nDay 2: The Gen
 eral Data Protection Regulation requirements and Certification Exam\nGener
 al information\n\n 	Certification fees are included on the exam price.\n 	
 Training material containing over 200 pages of information and practical e
 xamples will be distributed\n 	A participation certificate of 14 CPD (Cont
 inuing Professional Development) credits will be issued\n 	In case of exam
  failure\, you can retake the exam within 12 months for free\n\n Training 
 info\nDuration:  2 Days\nDate:  Dec 3-4\, 2026\nTime:  9.30 am. – 1
 6.30 pm.\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centre Poin
 t Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 32\,000 Baht (e
 x.vat7%)\nTel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\
 n\n\nwww.pecb.com\n\n&nbsp\;
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:Compliance,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:1000@acinfotec.com
DTSTART:20261214T023000Z
DTEND:20261214T050000Z
DTSTAMP:20260213T035836Z
URL:https://www.acinfotec.com/training-event/zero-trust-elearning-and-live
 -online-workshop-new-3/
SUMMARY:Zero Trust eLearning and Live Online Workshop (New!)
DESCRIPTION:Why E-Learning ??\neLearning + Live Online Zero Trust Workshop 
 ถึงเป็นเหตุผลที่คุณไม่คว
 รพลาด?\n\n✅ e-Learning ให้ความรู้ ขณ
 ะที่ Workshop ช่วยเสริมความเข้า
 ใจเพื่อการนำไปใช้งานจริง\n
 ✅ ลด Trial &amp\; Error ในการนำ Zero Trust ไปใ
 ช้ในองค์กร\n✅ เหมาะทั้งผู้
 บริหารที่ต้องการ Roadmap และที
 มเทคนิคที่ต้องออกแบบระบบ\n
 ✅ ได้มุมมองจากผู้เชี่ยวชา
 ญ มากกว่าการเรียนรู้ด้วยต
 นเองเพียงอย่างเดียว\n\n\n\nหลั
 กสูตร eLearning ที่ออกแบบมาเพื่อ
 ให้ผู้เรียนเข้าใจ Zero Trust อย่
 างครบถ้วนแบบ End-to-End ตั้งแต่แ
 นวคิดเชิงกลยุทธ์ ไปจนถึงก
 ารนำไปปรับใช้งานจริงในระ
 ดับองค์กร\n✅ เรียนออนไลน์ เ
 รียนได้ทุกที่ ทุกเวลา\n✅ เน
 ื้อหาอ้างอิง Best Practices และ Framework 
 ระดับสากล\n✅ ไม่เน้นเพียงท
 ฤษฎี แต่เชื่อมโยงกับบริบท
 ธุรกิจ และการนำไปปรับใช้ง
 านจริงในองค์กร\n\n\n\n\nWhat is the CCZT?\nThe
  Certificate of Competence in Zero Trust (CCZT) is the authoritative Zero 
 Trust training and certificate that delivers the knowledge needed to under
 stand the core concepts of Zero Trust. Developed by CSA\, the trusted indu
 stry leader for cloud security certificates\, the CCZT builds knowledge to
  drive the definition\, implementation and management of Zero Trust over t
 ime.\nWhy Zero Trust? Why now?\n\n\nEvolving Technology \n\nComputer tech
 nology continues to shift towards an open but untrusted infrastructure\n\n
 \n\nWorkforce Development\n\nSkills gaps are widening with rapidly evolvin
 g cybersecurity threats. Zero Trust provides a strategy for individuals an
 d organizations to develop the necessary skills to keep up\n\n\n\nSecurity
  Gaps\n\nZero Trust can help address gaps in traditional security models a
 nd facilitate a more mature and sustainable approach to security\n\n\n\nEm
 ergence of AI \n\nRapid availability of AI tools makes implementing a Zero
  Trust strategy critical\nWho should earn their CCZT?\nZero Trust is the f
 uture of information security making it essential knowledge for all inform
 ation security professionals. Zero Trust is an inevitable requirement for 
 organizations and a required skill for security professionals looking to r
 emain at the forefront of innovation and keep up with evolving cybersecuri
 ty threats.\n\n 	CISOs\n 	Security Managers\n 	Enterprise Architects\n 	Ri
 sk Officers &amp\; Owners\n 	Managers &amp\; Decision Makers\n 	Compliance
  Officers &amp\; Managers\n 	C-Suite\n 	Security Engineers &amp\; Architec
 ts\n 	System Engineers\n 	Cybersecurity Analysts\n 	Developers\n 	Security
  Administrators\n 	Government Agencies\n 	Federal Partners\n\nCurriculum\n
 Based on CSA’s Zero Trust Training (ZTT)\, the CCZT covers six core area
 s of Zero Trust knowledge:\n\n\n\n 	Zero Trust Foundational Concepts\n 	So
 ftware Defined\n 	Perimeter\n 	Industry Best Practices\n 	Zero Trust Archi
 tecture\n 	Zero Trust Planning\n 	Zero Trust Implementation\n\n&nbsp\;\n\n
 &nbsp\;\n\n&nbsp\;\n\n&nbsp\;\n\nExam Structure\nThe CCZT is an open-book\
 , online exam with 60 multiple-choice questions. Testers have two attempts
  to complete the exam in the allotted 90-minute timeframe and achieve a mi
 nimum passing score of 80%.\n\n\nPrepare\nSelect your Learning Style\n\n 	
 Study on your own\n 	Self-paced online training\n 	Instructor-led online t
 raining\n\nAccess Study Materials\n\n 	Download CCZT Prep-Kit\n 	Includes 
 recommended CSA Research artifacts\, authoritative sources and overview gu
 ides\n 	Comprehensive study guides are included with the purchase of CCZT 
 exam tokens\n 	Get support from the CSA community on Circle\n\nNo prerequi
 sites required\n\n 	The CCSK and/or ZTT are advised\n\nTraining Info\nDura
 tion:  0.5 Day\nDate: Jun 15\, 2026\nTime:  9.30 am. – 12.00 pm.\nVen
 ue:  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini 
 Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 29\,900 (Exam Included) Ea
 rly Bird: Please Call\nTel : 02 670 8980-4 ext. 321-323\nE-mail.training@a
 cinfotec.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 6/02/CCZT-logo-RGB-2.png
END:VEVENT
BEGIN:VEVENT
UID:977@acinfotec.com
DTSTART:20261214T023000Z
DTEND:20261218T093000Z
DTSTAMP:20260115T025110Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-27001-lead
 -auditor-exam-included-7/
SUMMARY:PECB Certified ISO 27001 Lead Auditor (Exam Included)
DESCRIPTION:About this course\nISO/IEC 27001 Lead Auditor training enables 
 you to develop the necessary expertise to perform an Information Security 
 Management System (ISMS) audit by applying widely recognized audit princip
 les\, procedures and techniques. During this training course\, you will ac
 quire the necessary knowledge and skills to plan and carry out internal an
 d external audits in compliance with ISO 19011 and ISO/IEC 17021-1 certifi
 cation process.\n\nBased on practical exercises\, you will be able to mast
 er audit techniques and become competent to manage an audit program\, audi
 t team\, communication with customers\, and conflict resolution.\n\nAfter 
 acquiring the necessary expertise to perform this audit\, you can sit for 
 the exam and apply for a “PECB Certified ISO/IEC 27001 Lead Auditor” c
 redential. By holding a PECB Lead Auditor Certificate\, you will demonstra
 te that you have the capabilities and competencies to audit organizations 
 based on best practices.\nWho Should Attend\n\n 	Auditors seeking to perfo
 rm and lead Information Security Management System (ISMS) certification au
 dits\n 	Managers or consultants seeking to master an Information Security 
 Management System audit process\n 	Individuals responsible for maintaining
  conformance with Information Security Management System requirements\n 	T
 echnical experts seeking to prepare for an Information Security Management
  System audit\n 	Expert advisors in Information Security Management\n\nCou
 rse Contents\nDay 1: Introduction to the information security management s
 ystem (ISMS) and ISO/IEC 27001\n\n 	Training course objectives and structu
 re\n 	Standards and regulatory frameworks\n 	Certification process\n 	Fund
 amental concepts and principles of information security\n 	Information sec
 urity management system (ISMS)\n\nDay 2: Audit principles\, preparation\, 
 and initiation of an audit\n\n 	Fundamental audit concepts and principles\
 n 	The impact of trends and technology in auditing\n 	Evidence-based audit
 ing\n 	Risk-based auditing\n 	Initiation of the audit process\n 	Stage 1 a
 udit\n\nDay 3: On-site audit activities\n\n 	Preparing for stage 2 audit\n
  	Stage 2 audit\n 	Communication during the audit\n 	Audit procedures\n 	C
 reating audit test plans\n\nDay 4: Closing the audit\n\n 	Drafting audit f
 indings and nonconformity reports\n 	Audit documentation and quality revie
 w\n 	Closing of the audit\n 	Evaluation of action plans by the auditor\n 	
 Beyond the initial audit\n 	Managing an internal audit program\n 	Closing 
 of the training course\n\nDay 5: Certification Exam\nTraining Info\nDurati
 on:  5 Days\nDate:  Dec 14-18\, 2026\nTime:  9.30 am. – 16.30 pm.\n
 Venue: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini
  Bldg.\, (Worklab) \, Rama 4 Rd.\nTraining Fees: 51\,500 Baht (ex.vat7%)\n
 Tel. 02 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n\n\nwww.p
 ecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:979@acinfotec.com
DTSTART:20261214T023000Z
DTEND:20261218T093000Z
DTSTAMP:20260115T025058Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-iec-42001-
 lead-auditor-artificial-intelligence-management-system-thai-exam-included/
SUMMARY:PECB Certified ISO/IEC 42001 Lead Auditor (Artificial Intelligence 
 Management System) (Thai) (Exam Included)
DESCRIPTION:About this course\nISO/IEC 42001 Lead Auditor training course e
 nables you to gain the necessary expertise to audit artificial intelligenc
 e management systems (AIMS) by applying widely recognized audit principles
 \, procedures\, and techniques.\nCourse benefits\nArtificial intelligence 
 (AI) has become integral to the success of many organizations by enhancing
  efficiency through automation and improving decision-making by utilizing 
 advanced data analytics. However\, organizations should ensure the appropr
 iate and ethical use of AI. ISO/IEC 42001 enables organizations to impleme
 nt appropriate processes and controls to ensure the responsible use and ma
 nagement of AI system.\n\nAs the number of organizations seeking ISO/IEC 4
 2001 compliance increases\, there is a simultaneous surge in demand for sk
 illed auditors possessing the necessary knowledge to assess and verify com
 pliance. Therefore\, PECB has developed the ISO/IEC 42001 Lead Auditor tra
 ining course to empower participants with the knowledge and skills essenti
 al for planning and conducting ISO/IEC 42001 audits based on best audit pr
 actices.\n\nThe ISO/IEC 42001 Lead Auditor training course is beneficial f
 or professionals seeking to stay ahead of the competition. This training c
 ourse equips you with the expertise needed to navigate the intricate realm
  of AI-influenced organizational frameworks\, ensuring you are well-prepar
 ed to contribute to the success of organizations in this transformative er
 a.\n\nAfter finishing the training course\, you will be eligible to take t
 he exam. After passing the exam\, you will be able to apply for the “PEC
 B Certified ISO/IEC 42001 Lead Auditor” credential. This certification p
 roves your professional expertise in auditing organizations against ISO/IE
 C 42001 based on best auditing practices.\nWho should attend?\nThis traini
 ng course is intended for:\n\n 	Individuals with a background in auditing\
 , whether internal or external\, seeking to specialize in auditing AI mana
 gement system\n 	Managers or consultants seeking to master the AI manageme
 nt system audit process\n 	Individuals responsible for maintaining conform
 ity with the AI management system requirements in an organization\n 	Exper
 t advisors in AI management\n 	Professionals involved in analyzing and und
 erstanding business requirements for AI implementation\n 	Individuals invo
 lved in the development and implementation of AI solutions and in designin
 g the architecture of AI systems\n\nLearning Objectives\nAfter completing 
 this training course\, you will be able to:\n\n 	Explain the fundamental c
 oncepts and principles of an AI management system based on ISO/IEC 42001\n
  	Interpret the ISO/IEC 42001 requirements for an AI management system fro
 m the perspective of an auditor\n 	Evaluate the AI management system confo
 rmity to ISO/IEC 42001 requirements in accordance with the fundamental aud
 it concepts and principles\n 	Plan\, conduct\, and close an ISO/IEC 42001 
 compliance audit\, in accordance with ISO/IEC 17021-1 requirements\, ISO 1
 9011 guidelines\, and other best practices of auditing\n 	Manage an ISO/IE
 C 42001 audit program\n\nCourse Agenda\nDay 1: Introduction to the artifi
 cial intelligence management system and ISO/IEC 42001\n\nDay 2: Audit pri
 nciples and the preparation for and initiation of an audit\n\nDay 3: On-s
 ite audit activities\n\nDay 4: Closing of the audit\n\nDay 5: Certificat
 ion Exam\nTraining info\nLanguage: Conducted in Thai Language\nDuration:
  5 Days\nDate: Dec 14 - 18\, 2026\nVenue: ACinfotec Training Center\n16t
 h Fl.\, Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTrai
 ning Fees: 51\,500 BAHT (Ex.Vat 7%)\nTel : 02 670 8980-3 ext. 321-323\nE-
 mail: training@acinfotec.com\n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:AI Intelligent,PECB (Official PECB course)
END:VEVENT
BEGIN:VEVENT
UID:965@acinfotec.com
DTSTART:20261214T023000Z
DTEND:20261218T093000Z
DTSTAMP:20260115T025213Z
URL:https://www.acinfotec.com/training-event/certified-cybersecurity-techn
 ician-cct-new-exam-included-4/
SUMMARY:Certified Cybersecurity Technician (C|CT) New! (Exam Included)
DESCRIPTION:\n\n\n\nEC-Council has developed the Certified Cybersecurity Te
 chnician certification\n\n\n 	The Certified Cybersecurity Technician (C|CT
 ) is an entry-level cybersecurity program created by EC-Council\, the crea
 tor of the Certified Ethical Hacker (C|EH) certification\, to address the 
 global demand for a qualified cybersecurity workforce.\n 	EC-Council devel
 oped the C|CT to provide individuals starting their careers in IT and cybe
 rsecurity with a certification that validates their hands-on technical ski
 lls.\n 	To equip individuals with the skills they need to pursue and devel
 op their careers as cybersecurity specialists\, consultants\, network engi
 neers\, IT administrators\, and more.\n___________________________________
 _____________________________________________________________\n\n\n\nWhat 
 is Unique About the C|CT Program?\n\n\n\n\n\n\n\n\n_______________________
 __________________________________________________\nC|CT’s Key Offerings
 :\n\n Strong Foundational Coverage\nThe C|CT certification provides total
  foundational cybersecurity domain coverage with key concepts in each doma
 in combined with practical hands-on labs and critical thinking challenges 
 producing world-class cyber security technologists.\n\n Live Range Experi
 ence\nOther popular programs rely on simulation and interactivity as pract
 ical-based assessment\, the C|CT program is delivered on a live Cyber Rang
 e utilizing live targets and real attack systems for a truly immersive\, r
 eal-life practice and assessment platform.\n\n Capture the Flag\nThe C|CT
  certification offers capture the flag (CTF) style critical thinking chall
 enges to accompany each lab exercise putting knowledge into practice and p
 roviding a proven record of skill demonstration. Candidates completing the
  C|CT program will earn the C|CT certification and have a proven track rec
 ord of performing the tasks required in a live Cyber Range\, proving to em
 ployers their ability to perform critical job duties.\n\n Multiple Certif
 ications\nThe course outline of the C|CT program goes above and beyond som
 e of the more common entry-level cybersecurity programs\, such as the Secu
 rity+\, in a completely hands-on cyber range environment instead of simula
 tions to ensure cybersecurity skills development. We believe that candidat
 es who successfully attain the C|CT certification will attain other leadin
 g cybersecurity certifications\, including Security+\, without further tra
 ining\n\n Most Affordable\nDespite the unique design of the heavily hands
 -on course and its uses of real-world cyber range capability\, the certifi
 cation is one of the most affordable in the world!\n\n\nWhat Are the Benef
 its of the C|CT Credential?\n\n 	 Paves the way for a promising career in
  the realm of cybersecurity\n 	 Teaches the fundamental knowledge that cy
 bersecurity professionals need:\n\n 	Information security\n 	Network secur
 ity\n 	Computer forensics\n 	Risk management\n 	Incident handling\n 	Indus
 try best practices\n\n\n 	 Improves employability by validating certifica
 tion holders’ skills as cybersecurity specialists who can strengthen org
 anizational security\n 	 Provides extensive opportunities to practice the
  hands-on skills necessary for any technical role involving administrative
  privileges and cybersecurity considerations\n\nCourse Contents\n\n\n\n\n\
 n\n\n\nModule 01: Information Security Threats and Vulnerabilities\n\n\nM
 odule 02: Information Security Attacks\n\n\nModule 03: Network Security 
 Fundamentals\n\n\nModule 04: Identification\, Authentication\, and Author
 ization\n\n\nModule 05: Network Security Controls – Administrative Cont
 rols\n\n\nModule 06: Network Security Controls – Physical Controls\n\n\
 nModule 07: Network Security Controls – Technical Controls\n\n\nModule 
 08: Network Security Assessment Techniques and Tools\n\n\nModule 09: App
 lication Security\n\n\nModule 10: Virtualization and Cloud Computing\n\n\
 nModule 11: Wireless Network Security\n\n\n\n\n\n\n\n\n\n\n\n\nModule 12:
  Mobile Device Security\n\n\nModule 13: IoT and OT Security\n\n\nModule 
 14: Cryptography\n\n\nModule 15: Data Security\n\n\nModule 16: Network 
 Troubleshooting\n\n\nModule 17: Network Traffic Monitoring\n\n\nModule 18
 : Network Logs Monitoring and Analysis\n\n\nModule 19: Incident Response
 \n\n\nModule 20: Computer Forensics\n\n\nModule 21: Business Continuity 
 and Disaster Recovery\n\n\nModule 22: Risk Management\n\n\n\n\n\n\n\n Wh
 o Can Attend This Course?_________________________________________________
 ________________________\n\n\n\n\n\n\nThe C|CT course can be taken by stud
 ents\, IT professionals\, IT managers\, career changers\, and any individu
 al seeking a career in cybersecurity\, or aspiring to advance their existi
 ng role. This course is ideal for those entering the cybersecurity workfor
 ce\, providing foundational technician level\, hands-on skills to solve th
 e most common security issues organizations face today.\n\n\n\n\n\n\n\n\nW
 hat Are the Prerequisites for the C|CT Program?___________________________
 ______________________________________________\n\n\n\n\n\n\nThere are no s
 pecific prerequisites to take the C|CT course and attempt the C|CT certifi
 cation exam. Although this is an entry-level course\, a working knowledge 
 of IT networking and basic cybersecurity concepts will be an advantage to 
 anyone taking this course.\n\n\nTraining Info\n\nDuration : 5 Days\nLangua
 ge: Conduct in Thai language\nTime : 09.30-04.30 pm.\nTraining Date: Dec 
 14 - 18\, 2026\nVenue: ACinfotec Training Center\n16th Fl.\, Grande Centr
 e Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.\nTel. 02 670 8980-3 ext. 
 321-323\nPrice: 50\,000 THB (Excl. vat7%)\nEmail. training@acinfotec.com\
 n\nhttps://www.eccouncil.org/\n\n\n\n\n\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/202
 2/11/CCTLogo_540x.webp
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:970@acinfotec.com
DTSTART:20261215T023000Z
DTEND:20261218T093000Z
DTSTAMP:20260115T025040Z
URL:https://www.acinfotec.com/training-event/comptia-pentest-exam-included
 -6/
SUMMARY:CompTIA Pentest+ (Exam Included)
DESCRIPTION:About this course\nCompTIA Pentest+ has been designed to help y
 ou learn both knowledges and hands-on of penetration testing. This course 
 also includes management skills used to plan\, scope\, and manage weakness
 es\, not just only exploit them. Additional\, CompTIA Pentest+ certificati
 on meets the ISO 17024 standard. Regulators and government rely on ANSI ac
 creditation because it provides confidence and trust in the outputs of an 
 accredited program.\nCourse Benefits\n        The CompTIA Pentest+ 
 course will prepare you to both knowledges and hands-on experience of Comp
 TIA Pentest+ by providing coverage of the objectives and content examples 
 listed on the syllabus\, including how to:\n\n 	Plan and scope penetration
  tests\n 	Conduct passive reconnaissance\n 	Perform non-technical tests to
  gather information\n 	Conduct active reconnaissance\n 	Analyze vulnerabil
 ities\n 	Penetrate networks\n 	Exploit host-based vulnerabilities\n 	Test 
 applications\n 	Complete post-exploit tasks\n 	Analyze and report penetrat
 ion test results\n\nWho should attend?\n\n 	Penetration Tester\n 	Vulnerab
 ility Tester\n 	Security Analyst (II)\n 	Vulnerability Assessment Analyst\
 n 	Network Security Operations\n 	Application Security Vulnerability\n\nCo
 urse Contents\n\n 	Planning and Scoping\n\n 	Explain the importance of pla
 nning for an engagement.\n 	Explain key legal concepts.\n 	Explain the imp
 ortance of scoping an engagement properly.\n 	Explain the key aspects of c
 ompliance-based assessments.\n\n\n 	Information Gathering and Identificati
 on\n\n 	Conduct information gathering using appropriate techniques.\n 	Per
 form a vulnerability scan.\n 	Analyze vulnerability scan results.\n 	Expla
 in the process of leveraging information to prepare for exploitation.\n 	E
 xplain weaknesses related to specialized systems.\n 	Hands-on experience p
 erforming information gathering.\n\n\n 	Attacks and Exploits\n\n 	Compare 
 and contrast social engineering attacks.\n 	Exploit network-based vulnerab
 ilities.\n 	Exploit wireless vulnerabilities.\n 	Exploit application-based
  vulnerabilities.\n 	Exploit local host vulnerabilities.\n 	Perform post-e
 xploitation techniques.\n 	Hands-on experience performing vulnerability as
 sessments.\n\n\n 	Penetration Testing Tools\n\n 	Use Tools: Scanning Tools
 \, Credential Testing\, Password Cracking\, OSINT\, Social Engineering Too
 ls\, Web Proxies\, Miscellaneous.\n 	Compare and contrast various use case
 s of tools.\n 	Analyze tool output or data related to a penetration test.\
 n 	Hands-on experience performing penetration tests.\n\n\n 	Reporting and 
 Communication\n\n 	Use report writing and handling best practices.\n 	Expl
 ain post-report delivery activities.\n 	Recommend mitigation strategies fo
 r discovered vulnerabilities.\n 	Explain the importance of communication d
 uring the penetration testing process.\n\n\n\n\nTraining Info\nDuration: 
  4 Days\nDate: Dec 15 - 18\, 2026\nTime:  9.30 am. – 16.30 pm.\nVenue:
  ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bldg.
 \, (Worklab) \, Rama 4 Rd.\nTraining Fees: 47\,000 Baht (ex.vat7%)\nTel. 0
 2 670 8980-3 ext.321-323\nE-mail.training@acinfotec.com\n\n
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/Comptia1.jpg
CATEGORIES:CompTIA
END:VEVENT
BEGIN:VEVENT
UID:990@acinfotec.com
DTSTART:20261221T023000Z
DTEND:20261225T093000Z
DTSTAMP:20260115T025015Z
URL:https://www.acinfotec.com/training-event/certified-ethical-hacker-cehv
 13-exam-included-6/
SUMMARY:Certified Ethical Hacker (CEHv13) (Exam Included)
DESCRIPTION:Certified Ethical Hacker (CEHv13) Powered by AI CapabilitiesLE
 ARN | CERTIFY | ENGAGE | COMPETE\nWhat’s New in The CEH v13?\nThe C|EH v
 13 not only provides extensive hands-on coverage but also integrates AI in
 to all fve phases of ethical hacking:\n\nMaster AI to Automate Ethical Hac
 king Tasks\, to hack and defend against AI systems\, and boost your task e
 ffciency by 40% in your job role.\nDevelop a Hacker’s Mindset: Master th
 e 5 Phases of Ethical Hacking and Gain AI Skills to Automate Them1. Reconn
 aissance | Learn to gather essential information about your target 2. Vuln
 erability Scanning | Gain the ability to identify weaknesses in the target
  system 3. Gaining Access | Learn how to actively exploit identifed vulner
 abilities 4. Maintaining Access | Develop skills to maintain continued acc
 ess to the target systems\nLearn AI Tools:\n• ShellGPT• ChatGPT• Fra
 udGPT• WormGPT• DeepExploit• Nebula• Veed.io And many more!\nThe C
 |EH v13 is a specialized\, one-of-a- kind training program that helps you 
 gain expertise in ethical hacking\, AI\, and machine learning. With hands-
 on training labs\, knowledge-based and practical exams\, a mock ethical ha
 cking engagement on live networks\, and a global hacking competition\, thi
 s program ensures you master the most in-demand skills needed to excel and
  stand out in the cybersecurity industry.This learning framework offers no
 t only a comprehensive training program to prepare you for the certifcatio
 n exam but also the industry’s most robust\, in-depth\, hands- on lab an
 d practice range experience.\n\nCourseware Cyber Range Gain Skills\n\nKnow
 ledge-Based Practical ExamGain Recognition \n\nLive Cyber Range Gain Exper
 ience\n\nGlobal EthicalHacking CompetitionGain Respect\nBeat Hackers in th
 eir Own Game with CEH v13! A RevolutionaryWay to Learn Ethical Hacking\n1.
  Learn - 20 modules - 2500+ pages of student manual - 2000 pages of lab ma
 nual - Over 221 hands-on labs to practice attack vectors and hacking tools
  - AI integrated skills in the 5 phases of the ethical hacking framework -
  Hacking AI system\, based on the Top 10 OWASP vulnerabilities - Over 4000
  hacking and security tools - Learn how to hack multiple operating systems
  (Windows 11\, Windows servers\, Linux\, Ubuntu\, Android) - More than 50%
  of training time is dedicated to labs2. Certify - Knowledge-Based Exam (A
 NAB ISO 17024 and US DoD 8140)- 4 hours / 125 multiple-choice questions - 
 Practical Exam (ANAB ISO 17024 and US DoD 8140)- 6 hours / 20 real scenari
 o based questions\n3. Engage - 4000 hacking tools - 550 attack techniques 
 Conduct a real-world ethical hacking assignmentApply the 5 phases\n1. Reco
 nnaissance 2. Scanning 3. Gaining access 4. Maintaining access 5. Covering
  your tracks\n4. Compete\n- New challenges every month - 4-hour CTF compet
 ition - Compete with your peers worldwide Hack your way to the top of the 
 leaderboard Focus on new attack vectorsExploit emerging vulnerabilities Ch
 allenges include:- Ransomware - Web app hardening - Unpatched software - S
 ystem hacking - Service exploitation - Incident response - Forensic analys
 is- Web app hacking and pen testing - Reverse engineering - Cryptography -
  Encryption - Hacking cloud networks - ICS/SCADA\nCourse Outline\n20 Modul
 es that help you master the foundations of Ethical Hacking and prepare to 
 challenge the CEH certification exam.\nModule 1: Introduction to Ethical H
 acking| Learn the fundamentals and key issues in information security\, in
 cluding the basics of ethical hacking\, information security controls\, re
 levant laws\, and standard procedures. Module 2: Foot Printing and Reconna
 issance| Learn how to use the latest techniques and tools for footprinting
  and reconnaissance\, a critical pre-attack phase of ethical hackingModule
  3: Scanning Networks|Learn different network scanning techniques and coun
 termeasures.Module 4: Enumeration|Learn various enumeration techniques\, i
 ncluding Border Gateway Protocol (BGP) and Network File Sharing (NFS) expl
 oits and associated countermeasures. Module 5: Vulnerability Analysis| Le
 arn how to identify security loopholes in a target organization’s networ
 k\, communication infrastructure\, and end systems. Different types of vul
 nerability assessment and vulnerability assessment tools are also included
 . Module 6: System Hacking| Learn about the various system hacking methodo
 logies used to discover system and network vulnerabilities\, including ste
 ganography\, steganalysis attacks\, and how to cover tracks Module 7: Malw
 are Threats| Learn about different types of malware (Trojan\, viruses\, wo
 rms\, etc.)\, APT and fleless malware\, malware analysis procedures\, and 
 malware countermeasures. Module 8: Sniffing| Learn about packet sniffng te
 chniques and their uses for discovering network vulnerabilities\, plus cou
 ntermeasures to defend against sniffng attacks.Module 9: Social Engineerin
 g| Learn social engineering concepts and techniques\, including how to ide
 ntify theft attempts\, audit human-level vulnerabilities\, and suggest soc
 ial engineering countermeasures.Module 10: Denial-of-Service| Learn about 
 different Denial of Service (DoS) and Distributed DoS (DDoS) attack techni
 ques\, plus the tools used to audit a target and devise DoS and DDoS count
 ermeasures and protections.Module 11: Session Highjacking| Learn the vario
 us session-hijacking techniques used to discover network-level session man
 agement\, authentication\, authorization\, and cryptographic weaknesses an
 d associated countermeasures.Module 12: Evading IDS\, Firewalls\, and Hone
 ypots| Learn about frewalls\, intrusion detection systems (IDS)\, and hone
 ypot evasion techniques\; the tools used to audit a network perimeter for 
 weaknesses\; and countermeasures. Module 13: Hacking Web Servers| Learn a
 bout web server attacks\, including a comprehensive attack methodology use
 d to audit vulnerabilities in web server infrastructures and countermeasur
 es.Module 14: Hacking Web Applications| Learn about web application attack
 s\, including a comprehensive hacking methodology for auditing vulnerabili
 ties in web applications and countermeasures.Module 15: SQL Injection| Lea
 rn about SQL injection attack techniques\, evasion techniques\, and SQL in
 jection countermeasures.Module 16: Hacking Wireless Networks| Learn about 
 different types of encryption\, threats\, hacking methodologies\, hacking 
 tools\, security tools\, and countermeasures for wireless networks.Module 
 17: Hacking Mobile Platforms| Learn mobile platform attack vectors\, Andro
 id and iOS hacking\, mobile device management\, mobile security guidelines
 \, and security tools. Module 18: IoT and OT Hacking| Learn different type
 s of Internet of Things (IoT) and operational technology (OT) attacks\, ha
 cking methodologies\, hacking tools\, and countermeasures. Module 19: Clo
 ud Computing| Learn different cloud computing concepts\, such as container
  technologies and serverless computing\, various cloud computing threats\,
  attacks\, hacking methodologies\, and cloud security techniques and tools
 . Module 20: Cryptography| Learn about encryption algorithms\, cryptograp
 hy tools\, Public Key Infrastructure (PKI)\, email encryption\, disk encry
 ption\, cryptography attacks\, and cryptanalysis tools\n\nTraining Info\n\
 n\n\nDuration : 5 Days Language: Conduct in Thai Time : 09.30-04.30 pm.Tr
 aining Date: Dec 21 - 25\, 2026Venue: ACinfotec Training Center16th Fl.\,
  Grande Centre Point Lumphini Bldg.\, (Worklab) \, Rama 4 Rd.Tel. 02 670 8
 980-3 ext. 321-323Price: Please Call Email. training@acinfotec.com https:/
 /www.eccouncil.org/  
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 4/07/CEH-300x233.jpg
CATEGORIES:EC-Council
END:VEVENT
BEGIN:VEVENT
UID:964@acinfotec.com
DTSTART:20261221T023000Z
DTEND:20261223T093000Z
DTSTAMP:20260115T025127Z
URL:https://www.acinfotec.com/training-event/pecb-certified-iso-31000-risk
 -manager-exam-included-3/
SUMMARY:PECB Certified ISO 31000 Risk Manager (Exam Included)
DESCRIPTION:About this course\nThe ISO 31000 Risk Manager training course h
 elps participants acquire the knowledge necessary and ability to integrate
  the risk management guidelines of ISO 31000 in an organization. It provid
 es information with regard to the risk management principles and their app
 lication\, as well as the core elements of the risk management framework a
 nd steps for a risk management process. In addition\, it provides the basi
 c approaches\, methods\, and practices for assessing risk in a wide range 
 of situations.\n\nUpon completion of the training course\, you can sit for
  the exam and apply to obtain the “PECB Certified ISO 31000 Risk Manager
 ” credential. The credential demonstrates your knowledge and ability to 
 apply the risk management process in an organization based on the guidelin
 es of ISO 31000 and best practices.\nCourse Benefits\n\n 	Understand the r
 isk management concepts\, approaches\, methods\, and techniques\n 	Learn h
 ow to establish a risk management framework in the context of an organizat
 ion\n 	Learn how to apply the ISO 31000 risk management process in an orga
 nization\n 	Understand the basic approaches\, methods\, and practices used
  to integrate risk management in an organization\n\nWho should attend?\n\n
  	Managers or consultants responsible for the effective management of risk
  in an organization\n 	Individuals seeking to gain knowledge about the ris
 k management principles\, framework\, and process\n 	Individuals responsib
 le for the creation and protection of value in their organizations\n 	Indi
 viduals interested in pursuing a career in risk management\n\nCourse Conte
 nts\nDay 1: Introduction to ISO 31000 and risk management and establishing
  the risk management framework\n\n 	Training course objectives and structu
 re\n 	Standards\n 	Introduction to ISO 31000 concepts\n 	ISO 31000 princip
 les\, framework\, and process\n 	Establishing the framework and defining t
 he governance\n\nDay 2: Initiation of the risk management process and risk
  assessment based on ISO 31000 \n\n 	Scope\, context\, and risk criteria\n
  	Risk identification\n 	Risk analysis\n 	Risk evaluation\n\nDay 3 Risk tr
 eatment\, recording and reporting\, monitoring and review\, and communicat
 ion and consultation according to ISO 31000 \n\n 	Risk treatment\n 	Recor
 ding and reporting\n 	Monitoring and review\n 	Communication and consultat
 ion\n 	Closing of the training course\n 	Exam (2 hours)\n\nTraining Info\n
 Duration : 3 Days\nDate : Dec 21 - 23\, 2026\nTime : 9.30-16.30 pm.\nVenu
 e: ACinfotec Training Center\n16th Fl.\, Grande Centre Point Lumphini Bld
 g.\, (Worklab) \, Rama 4 Rd.\nTraining Fee : 38\,500 Baht (ex.vat 7%)\nTel
 . 02 670 8980-3 ext .321-323\nwww.pecb.com\nEmail. training@acinfotec.com\
 n\n\n\nwww.pecb.com
ATTACH;FMTTYPE=image/jpeg:https://www.acinfotec.com/wp-content/uploads/201
 8/01/pecb-logo-200.png
CATEGORIES:PECB (Official PECB course)
END:VEVENT
END:VCALENDAR