:Search:

ISO 27001 2022 Compliant Cybersecurity The Annex A Controls FreeCourseWeb

Torrent:
Info Hash: DB72DFC8DE9ED8F545F9897E63CA81ECABC3D86E
Thumbnail:
Similar Posts:
Uploader: FreeCourseWeb
Source: T Logo Torrent Galaxy
Downloads: 1919
Language: English
Category: Other
Size: 296.0 MB
Added: Oct. 30, 2023, 10:12 p.m.
Peers: Seeders: 31, Leechers: 3 (Last updated: 11 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 5 1 824
udp://exodus.desync.com:6969/announce 6 0 24
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 10 0 470
udp://tracker.torrent.eu.org:451/announce 6 0 587
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce 4 0 14
udp://tracker.therarbg.to:6969/announce 0 1 0
Files:
  1. Get Bonus Downloads Here.url 183 bytes
  2. 01 - Introduction to the Annex A controls.mp4 3.2 MB
  3. 01 - Introduction to the Annex A controls.srt 1.5 KB
  4. 01 - Policies for information security (Control 5.1).mp4 9.6 MB
  5. 01 - Policies for information security (Control 5.1).srt 9.0 KB
  6. 02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4 9.9 MB
  7. 02 - Roles, responsibilities, and duties (Controls 5.2–5.4).srt 7.4 KB
  8. 03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4 10.5 MB
  9. 03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).srt 8.5 KB
  10. 01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4 10.3 MB
  11. 01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).srt 8.3 KB
  12. 02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).mp4 7.8 MB
  13. 02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).srt 6.7 KB
  14. 01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4 10.3 MB
  15. 01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).srt 8.1 KB
  16. 02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4 12.1 MB
  17. 02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).srt 9.7 KB
  18. 01 - Access management (Controls 5.15–5.18).mp4 12.3 MB
  19. 01 - Access management (Controls 5.15–5.18).srt 8.7 KB
  20. 02 - System and application access control (Controls 8.2–8.5).mp4 11.0 MB
  21. 02 - System and application access control (Controls 8.2–8.5).srt 8.1 KB
  22. 01 - Supplier relationships security (Controls 5.19–5.21).mp4 9.2 MB
  23. 01 - Supplier relationships security (Controls 5.19–5.21).srt 7.9 KB
  24. 02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4 9.1 MB
  25. 02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).srt 6.5 KB
  26. 01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4 12.7 MB
  27. 01 - Information security incident management (Controls 5.24–5.28, and 6.8).srt 10.0 KB
  28. 02 - Logging and monitoring (Controls 8.15–8.17).mp4 9.5 MB
  29. 02 - Logging and monitoring (Controls 8.15–8.17).srt 7.2 KB
  30. 01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4 11.8 MB
  31. 01 - Continuity (Controls 5.29, 5.30, and 8.13).srt 9.0 KB
  32. 02 - Backup and availability (Controls 8.13 and 8.14).mp4 6.0 MB
  33. 02 - Backup and availability (Controls 8.13 and 8.14).srt 4.4 KB
  34. 01 - Legal and compliance (Controls 5.31–5.33).mp4 8.6 MB
  35. 01 - Legal and compliance (Controls 5.31–5.33).srt 6.2 KB
  36. 02 - Information security assurance (Control 5.35 and 5.36).mp4 7.2 MB
  37. 02 - Information security assurance (Control 5.35 and 5.36).srt 5.2 KB
  38. 01 - Prior to employment (Controls 6.1 and 6.2).mp4 7.8 MB
  39. 01 - Prior to employment (Controls 6.1 and 6.2).srt 6.1 KB
  40. 02 - During employment (Controls 6.3–6.6).mp4 11.8 MB
  41. 02 - During employment (Controls 6.3–6.6).srt 10.1 KB
  42. 01 - Ensuring authorized access (Controls 7.1–7.3).mp4 6.8 MB
  43. 01 - Ensuring authorized access (Controls 7.1–7.3).srt 4.7 KB
  44. 02 - Protecting secure areas (Controls 7.4–7.6).mp4 6.6 MB
  45. 02 - Protecting secure areas (Controls 7.4–7.6).srt 5.2 KB
  46. 03 - Equipment security (Controls 7.7–7.10).mp4 8.4 MB
  47. 03 - Equipment security (Controls 7.7–7.10).srt 6.6 KB
  48. 04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).mp4 9.1 MB
  49. 04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).srt 6.2 KB
  50. 01 - Network security management (Controls 8.20–8.23).mp4 11.5 MB
  51. 01 - Network security management (Controls 8.20–8.23).srt 8.2 KB
  52. 02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4 11.3 MB
  53. 02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).srt 8.5 KB
  54. 01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4 9.1 MB
  55. 01 - Threat and vulnerability management (Controls 5.7 and 8.8).srt 7.5 KB
  56. 02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4 13.6 MB
  57. 02 - Secure configuration (Controls 8.9, 8.19, and 8.24).srt 10.1 KB
  58. 01 - Secure development (Controls 8.25–8.28).mp4 11.8 MB
  59. 01 - Secure development (Controls 8.25–8.28).srt 9.5 KB
  60. 02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4 11.2 MB
  61. 02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).srt 9.9 KB
  62. 01 - Achieving ISO 27001 compliance.mp4 4.9 MB
  63. 01 - Achieving ISO 27001 compliance.srt 2.9 KB
  64. Bonus Resources.txt 386 bytes
  65. Handout 01.02 - Example roles and responsibilities matrix.xlsx 82.8 KB
  66. Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx 22.7 KB
  67. ~$Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx 171 bytes
  68. Handout 01.01 - How to demonstrate compliance with Control 5.1.pdf 24.9 KB
  69. Handout 01.01 - Suggested Topic-specific Information Security Policies.pdf 27.2 KB
  70. Handout 01.02 - Example roles and responsibilities matrix.pdf 30.2 KB
  71. Handout 01.02 - How to demonstrate compliance with Controls 5.2 - 5.4.pdf 24.7 KB
  72. Handout 01.03 - How to demonstrate compliance with Controls 5.5, 5.6 _ 5.8.pdf 24.7 KB
  73. Handout 02.01 - How to demonstrate compliance with Controls 5.9, 5.10, 6.7 _ 8.1.pdf 26.6 KB
  74. Handout 02.02 - How to demonstrate compliance with Controls 5.11, 5.14 _ 5.37.pdf 24.4 KB
  75. Handout 03.01 - How to demonstrate compliance with Controls 5.12, 5.13 _ 5.34.pdf 24.8 KB
  76. Handout 03.02 - How to demonstrate compliance with Controls 8.10 - 8.12 _ 8.33.pdf 27.1 KB
  77. Handout 04.01 - How to demonstrate compliance with Controls 5.15 - 5.18.pdf 25.0 KB
  78. Handout 04.02 - How to demonstrate compliance with Controls 8.2 - 8.5.pdf 24.8 KB
  79. Handout 05.01 - How to demonstrate compliance with Controls 5.19 - 5.21.pdf 24.4 KB
  80. Handout 05.02 - How to demonstrate compliance with Controls 5.22 _ 5.23.pdf 24.6 KB
  81. Handout 06.01 - How to demonstrate compliance with Controls 5.24 - 5.28 _ 6.8.pdf 25.5 KB
  82. Handout 06.02 - How to demonstrate compliance with Controls 8.15 - 8.17.pdf 25.2 KB
  83. Handout 07.01 - How to demonstrate compliance with Controls 5.29, 5.30 _ 8.6.pdf 25.3 KB
  84. Handout 07.02 - How to demonstrate compliance with Controls 8.13 _ 8.14.pdf 25.0 KB
  85. Handout 08.01 - How to demonstrate compliance with Controls 5.31 - 5.33.pdf 27.9 KB
  86. Handout 08.02 - How to demonstrate compliance with Controls 5.35 _ 5.36.pdf 24.8 KB
  87. Handout 09.01 - How to demonstrate compliance with Controls 6.1 _ 6.2.pdf 26.6 KB
  88. Handout 09.02 - How to demonstrate compliance with Controls 6.3 - 6.6.pdf 27.3 KB
  89. Handout 10.01 - How to demonstrate compliance with Controls 7.1 - 7.3.pdf 24.3 KB
  90. Handout 10.02 - How to demonstrate compliance with Controls 7.4 - 7.6.pdf 24.7 KB
  91. Handout 10.03 - How to demonstrate compliance with Controls 7.7 - 7.10.pdf 24.4 KB
  92. Handout 10.04 - How to demonstrate compliance with Controls 7.11 - 7.14.pdf 24.3 KB
  93. Handout 11.01 - How to demonstrate compliance with Controls 8.20 - 8.23.pdf 25.4 KB
  94. Handout 11.02 - How to demonstrate compliance with Controls 8.7, 8.18, 8.30 _ 8.34.pdf 26.5 KB
  95. Handout 12.01 - How to demonstrate compliance with Controls 5.7 _ 8.8.pdf 24.9 KB
  96. Handout 12.02 - How to demonstrate compliance with Controls 8.9, 8.19 _ 8.24.pdf 25.1 KB
  97. Handout 13.01 - How to demonstrate compliance with Controls 8.25 - 8.28.pdf 24.9 KB

Discussion