| Files: |
-
Get Bonus Downloads Here.url
180 bytes
-
1 - ISO 27001 Explained in Practical Language.mp4
14.0 MB
-
2 - Certification Journey from Start to Finish.mp4
13.5 MB
-
3 - Building an Audit-Ready Mindset Early.mp4
11.4 MB
-
4 - Course Roadmap, Capstones, and Resources.mp4
11.2 MB
-
1 - Healthcare and Life Sciences PHI, Validation, and Traceability.mp4
12.2 MB
-
2 - Financial Services SOX, AML, Encryption, and Fraud Controls.mp4
12.3 MB
-
3 - SaaS and IT SDLC, Multi-Tenant Isolation, and SOC Mapping.mp4
13.2 MB
-
4 - Manufacturing and Automotive OT Controls and Change Discipline.mp4
14.1 MB
-
5 - Public Sector and Education Procurement and Records Controls.mp4
12.4 MB
-
6 - Tailoring Templates Without Introducing Scope Creep.mp4
10.4 MB
-
1 - Supplier Tiering, Criticality, and Risk Segmentation.mp4
13.0 MB
-
2 - Onboarding and Offboarding Packs for Vendors.mp4
10.8 MB
-
3 - Third-Party Due Diligence and Audit Playbooks.mp4
10.1 MB
-
4 - Cloud Shared Responsibility and Contract Clauses.mp4
13.5 MB
-
5 - Continuous Monitoring, Attestations, and SOC Reports.mp4
11.8 MB
-
6 - Vendor Nonconformities, Remediation, and Exit Plans.mp4
12.9 MB
-
1 - Practical Risk Frameworks ISO 27005, FAIR-Lite, and Choices.mp4
12.2 MB
-
2 - Incident Playbooks Ransomware, Breach, and Insider Threats.mp4
14.1 MB
-
3 - BIA, BCP, and DR RTO, RPO, and Realistic Testing.mp4
12.3 MB
-
4 - Tabletop Exercises and Simulation Design That Teach.mp4
12.2 MB
-
5 - Notifications, After-Action Reviews, and Lessons Learned.mp4
11.6 MB
-
1 - Visible Leadership Behaviors Auditors Notice Quickly.mp4
12.7 MB
-
2 - Change Management That Sticks Across Teams.mp4
12.0 MB
-
3 - Documentation Without Fatigue or Busywork.mp4
11.9 MB
-
4 - Awareness Programs That People Actually Finish.mp4
11.5 MB
-
5 - Embedding KPIs into Roles and Performance Reviews.mp4
12.2 MB
-
1 - True Cost Models Implementation, Certification, and Hidden Items.mp4
12.4 MB
-
2 - ROI Modeling Risk Reduction, Sales Lift, and Insurance Effects.mp4
13.3 MB
-
3 - In-House, Hybrid, or Consultant Picking the Right Path.mp4
12.4 MB
-
4 - Grants, Incentives, and Budget Phasing Where Applicable.mp4
11.6 MB
-
5 - Integrated Systems for Smarter Cost and Evidence Reuse.mp4
13.8 MB
-
6 - When ISO 27001 Is Not the Right Investment.mp4
13.0 MB
-
7 - Reporting ISO ROI and Avoiding Vanity Metrics.mp4
11.9 MB
-
1 - Choosing DMS, GRC, SIEM, EDR, and Ticketing Tools.mp4
11.7 MB
-
2 - Automating Evidence Capture with APIs and RPA.mp4
11.7 MB
-
3 - Dashboards for Clause 9 Monitoring and Decisions.mp4
11.8 MB
-
4 - Secure Cloud Patterns, Backup, and Immutability.mp4
11.9 MB
-
5 - Continuous Auditing, Assurance-as-Code, and Responsible AI.mp4
10.8 MB
-
1 - Red Flags of Patchwork ISMS Implementations.mp4
9.9 MB
-
2 - Traits of High-Maturity, Risk-Driven Programs.mp4
10.6 MB
-
3 - Internal Audit Center of Excellence and Coaching.mp4
11.4 MB
-
4 - Improvement Pipeline and Effectiveness Verification.mp4
10.6 MB
-
5 - Board-Level Reporting and External Trust Signals.mp4
10.3 MB
-
1 - Readiness Gates and Self-Assessment Scoring.mp4
10.6 MB
-
2 - Running the Audit Day with Confidence and Clarity.mp4
10.2 MB
-
3 - Handling Findings Live and Negotiating Scope.mp4
9.4 MB
-
4 - Rapid Recovery, Re-Audit Planning, and Cost Control.mp4
10.6 MB
-
5 - Lessons Learned and a Stronger Next Cycle.mp4
10.0 MB
-
1 - ISO 27001 Origins, Revisions, and Transition Paths.mp4
13.1 MB
-
10 - How ISO Standards Evolve and Get Updated.mp4
11.2 MB
-
11 - Implementation Wins, Failures, and Key Lessons.mp4
11.7 MB
-
2 - Business Value, Trust Signals, and Risk Reduction.mp4
11.4 MB
-
3 - Annex SL Structure and Clause Flow Logic.mp4
11.8 MB
-
4 - PDCA and Risk-Based Thinking for ISMS.mp4
12.8 MB
-
5 - Mandatory Documents, Records, and Evidence Trails.mp4
10.8 MB
-
6 - Defining an ISMS Scope That Holds Up.mp4
11.3 MB
-
7 - Accreditation Bodies, Certification Bodies, and Roles.mp4
12.8 MB
-
8 - Mapping ISO 27001 to NIST, SOC 2, and GDPR.mp4
14.0 MB
-
9 - Costly Myths and Misconceptions to Avoid.mp4
12.5 MB
-
1 - Clause 4 Issues, Parties, and Defensible Scope.mp4
11.2 MB
-
10 - Clause 8 Operational Control, Change, and Outsourcing.mp4
11.9 MB
-
11 - Clause 8 Running Risk Activities in Daily Operations.mp4
11.0 MB
-
12 - Clause 9 Metrics That Matter and Data Quality.mp4
11.0 MB
-
13 - Clause 9 Internal Audits with Real Value Creation.mp4
10.8 MB
-
14 - Clause 9 Management Review Inputs and Decisions.mp4
9.9 MB
-
15 - Clause 10 Nonconformities, CAPA, and Effectiveness.mp4
11.2 MB
-
16 - Clause 10 Continuous Improvement as a Daily Habit.mp4
9.6 MB
-
2 - Clause 4 Process Interactions and ISMS Boundaries.mp4
10.0 MB
-
3 - Clause 5 Policy Direction, Leadership, and RACI.mp4
10.9 MB
-
4 - Clause 6 Risk Method, Criteria, and Acceptance Rules.mp4
11.3 MB
-
5 - Clause 6 Risk Treatment Plans and Strong SoA.mp4
10.6 MB
-
6 - Clause 6 Security Objectives, KPIs, and Tracking.mp4
12.3 MB
-
7 - Clause 7 Resources, Competence, and Training Records.mp4
11.2 MB
-
8 - Clause 7 Awareness, Communication, and Messaging.mp4
12.2 MB
-
9 - Clause 7 Documented Information Control and Retention.mp4
10.5 MB
-
1 - Learning Objectives.mp4
10.0 MB
-
10 - A.5.9 Inventory of Information and Other Associated Assets.mp4
11.4 MB
-
11 - A.5.10 Acceptable Use of Information and Other Associated Assets.mp4
12.8 MB
-
12 - A.5.11 Return of Assets.mp4
10.3 MB
-
13 - A.5.12 Classification of Information.mp4
10.3 MB
-
14 - A.5.13 Labelling of Information.mp4
9.7 MB
-
15 - A.5.14 Information Transfer.mp4
11.2 MB
-
16 - A.5.15 Access Control.mp4
9.8 MB
-
17 - A.5.16 Identity Management.mp4
9.4 MB
-
18 - A.5.17 Authentication Information.mp4
10.0 MB
-
19 - A.5.18 Access Rights.mp4
10.2 MB
-
2 - A.5.1 Policies for Information Security.mp4
10.4 MB
-
20 - Supplier Management Process.mp4
11.4 MB
-
21 - A.5.19 Information Security in Supplier Relationships.mp4
10.3 MB
-
22 - A.5.20 Addressing Information Security within Supplier Agreements.mp4
11.0 MB
-
23 - A.5.21 Managing Information Security in the ICT Supply Chain.mp4
11.0 MB
-
24 - A.5.22 Monitoring, Review and Change Management of Supplier Services.mp4
11.0 MB
-
25 - A.5.23 Information Security for Use of Cloud Services.mp4
11.8 MB
-
26 - Information Security Incident Management Process.mp4
10.8 MB
-
27 - A.5.24 Information Security Incident Management Planning and Preparation.mp4
10.5 MB
-
28 - A.5.25 Assessment and Decision on Information Security Events.mp4
10.1 MB
-
29 - A.5.26 Response to Information Security Incidents.mp4
9.6 MB
-
3 - A.5.2 Information Security Roles and Responsibilities.mp4
12.3 MB
-
30 - A.5.27 Learning from Information Security Incidents.mp4
9.4 MB
-
31 - A.5.28 Collection of Evidence.mp4
8.9 MB
-
32 - A.5.29 Information Security During Disruption.mp4
9.9 MB
-
33 - A.5.30 ICT Readiness for Business Continuity.mp4
9.3 MB
-
34 - A.5.31 Legal, Statutory, Regulatory and Contractual Requirements.mp4
10.5 MB
-
35 - A.5.32 Intellectual Property Rights.mp4
9.5 MB
-
36 - A.5.33 Protection of Records.mp4
9.3 MB
-
37 - A.5.34 Privacy and Protection of Personal Identifiable Information (PII).mp4
9.9 MB
-
38 - A.5.35 Independent Review of Information Security.mp4
10.0 MB
-
39 - A.5.36 Compliance with Policies, Rules and Standards for Information Security.mp4
10.3 MB
-
4 - A.5.3 Segregation of Duties.mp4
10.9 MB
-
40 - A.5.37 Documented Operating Procedures.mp4
10.7 MB
-
5 - A.5.4 Management Responsibilities.mp4
11.3 MB
-
6 - A.5.5 Contact with Authorities.mp4
10.6 MB
-
7 - A.5.6 Contact with Special Interest Groups.mp4
10.6 MB
-
8 - A.5.7 Threat Intelligence.mp4
9.7 MB
-
9 - A.5.8 Information Security in Project Management.mp4
11.2 MB
-
1 - Learning Objectives.mp4
10.8 MB
-
2 - A.6.1 Screening.mp4
9.3 MB
-
3 - A.6.2 Terms and Conditions of Employment.mp4
10.1 MB
-
4 - A.6.3 Information Security Awareness, Education and Training.mp4
10.0 MB
-
5 - A.6.4 Disciplinary Process.mp4
9.3 MB
-
6 - A.6.5 Responsibilities After Termination or Change of Employment.mp4
11.0 MB
-
7 - A.6.6 Confidentiality or Non-Disclosure Agreements.mp4
9.1 MB
-
8 - A.6.7 Remote Working.mp4
10.3 MB
-
9 - A.6.8 Information Security Event Reporting.mp4
8.9 MB
-
1 - Learning Objectives.mp4
11.1 MB
-
10 - A.7.9 Security of Assets Off-Premises.mp4
9.8 MB
-
11 - A.7.10 Storage Media.mp4
9.4 MB
-
12 - A.7.11 Supporting Utilities.mp4
10.1 MB
-
13 - A.7.12 Cabling Security.mp4
8.5 MB
-
14 - A.7.13 Equipment Maintenance.mp4
9.2 MB
-
15 - A.7.14 Secure Disposal or Re-Use of Equipment.mp4
10.6 MB
-
2 - A.7.1 Physical Security Perimeters.mp4
10.2 MB
-
3 - A.7.2 Physical Entry.mp4
8.7 MB
-
4 - A.7.3 Securing Offices, Rooms and Facilities.mp4
10.4 MB
-
5 - A.7.4 Physical Security Monitoring.mp4
10.6 MB
-
6 - A.7.5 Protecting Against Physical and Environmental Threats.mp4
10.7 MB
-
7 - A.7.6 Working in Secure Areas.mp4
10.2 MB
-
8 - A.7.7 Clear Desk and Clear Screen.mp4
9.2 MB
-
9 - A.7.8 Equipment Siting and Protection.mp4
9.9 MB
-
1 - Learning Objectives.mp4
12.0 MB
-
10 - A.8.9 Configuration Management.mp4
10.5 MB
-
11 - A.8.10 Information Deletion.mp4
11.2 MB
-
12 - A.8.11 Data Masking.mp4
10.0 MB
-
13 - A.8.12 Data Leakage Prevention.mp4
9.7 MB
-
14 - A.8.13 Information Backup.mp4
11.1 MB
-
15 - A.8.14 Redundancy of Information Processing Facilities.mp4
11.2 MB
-
16 - A.8.15 Logging.mp4
11.1 MB
-
17 - A.8.16 Monitoring Activities.mp4
9.7 MB
-
18 - A.8.17 Clock Synchronization.mp4
10.5 MB
-
19 - A.8.18 Use of Privileged Utility Programs.mp4
8.5 MB
-
2 - A.8.1 User End Point Devices.mp4
10.5 MB
-
20 - A.8.19 Installation of Software on Operational Systems.mp4
9.0 MB
-
21 - A.8.20 Networks Security.mp4
9.8 MB
-
22 - A.8.21 Security of Network Services.mp4
9.5 MB
-
23 - A.8.22 Segregation of Networks.mp4
8.9 MB
-
24 - A.8.23 Web Filtering.mp4
8.1 MB
-
25 - A.8.24 Use of Cryptography.mp4
8.0 MB
-
26 - A.8.25 Secure Development Life Cycle.mp4
9.7 MB
-
27 - A.8.26 Application Security Requirements.mp4
9.9 MB
-
28 - A.8.27 Secure System Architecture and Engineering Principles.mp4
17.0 MB
-
29 - A.8.28 Secure Coding.mp4
14.6 MB
-
3 - A.8.2 Privileged Access Rights.mp4
11.2 MB
-
30 - A.8.29 Security Testing in Development and Acceptance.mp4
12.8 MB
-
31 - A.8.30 Outsourced Development.mp4
12.3 MB
-
32 - A.8.31 Separation of Development, Test and Production Environments.mp4
13.4 MB
-
33 - A.8.32 Change Management.mp4
12.5 MB
-
34 - A.8.33 Test Information.mp4
12.2 MB
-
35 - A.8.34 Protection of Information Systems During Audit Testing.mp4
11.5 MB
-
4 - A.8.3 Information Access Restriction.mp4
10.6 MB
-
5 - A.8.4 Access to Source Code.mp4
10.7 MB
-
6 - A.8.5 Secure Authentication.mp4
9.7 MB
-
7 - A.8.6 Capacity Management.mp4
10.6 MB
-
8 - A.8.7 Protection Against Malware.mp4
9.7 MB
-
9 - A.8.8 Management of Technical Vulnerabilities.mp4
12.4 MB
-
1 - Kickoff and Charter Authority, Timeline, and RACI.mp4
13.2 MB
-
10 - Awareness and Competence Role-Based Training Records.mp4
12.5 MB
-
11 - Metrics and Monitoring KPIs, KRIs, and Dashboards.mp4
10.8 MB
-
12 - Internal Audit Program Plan, Samples, and Reports.mp4
12.7 MB
-
13 - Management Review Findings, Decisions, and Actions.mp4
11.1 MB
-
14 - Stage 1 Readiness Document Set and Gap Closure.mp4
12.8 MB
-
15 - Stage 2 Execution Interviews, Trials, and Rapid CAPA.mp4
11.7 MB
-
16 - Surveillance Cycle Keeping the ISMS Living and Effective.mp4
10.8 MB
-
2 - Context and Scope Boundaries, Interfaces, and Stakeholders.mp4
13.8 MB
-
3 - Risk Method and Criteria Scales, Rules, and Options.mp4
12.1 MB
-
4 - Asset and Data Inventory Ownership and Classification.mp4
14.6 MB
-
5 - Risk Assessment Execution Scenarios, Scoring, and Owners.mp4
11.7 MB
-
6 - Risk Treatment and SoA Control Selection and Rationale.mp4
12.4 MB
-
7 - Policies and Procedures Right-Sized and Traceable.mp4
11.9 MB
-
8 - Control Implementation Tech, People, and Process Actions.mp4
12.5 MB
-
9 - Supplier and Cloud Governance Due Diligence and SLAs.mp4
11.9 MB
-
1 - Selecting Certification Bodies and Contract Essentials.mp4
11.8 MB
-
2 - Stage 1 versus Stage 2 What Auditors Emphasize.mp4
13.6 MB
-
3 - Evidence Collection Strategies and Request Lists.mp4
11.4 MB
-
4 - Writing Clear Nonconformities and Strong Evidence.mp4
12.2 MB
-
5 - CAPA Lifecycle Root Cause, Actions, and Verification.mp4
11.7 MB
-
6 - Mock and Shadow Audits for First-Time Success.mp4
9.8 MB
-
7 - Remote and Onsite Audits Etiquette and Storytelling.mp4
10.9 MB
-
8 - Always-Ready Operations and Continuous Assurance.mp4
11.6 MB
-
Bonus Resources.txt
70 bytes
|
Discussion