:Search:

Udemy ISO IEC 27001 Information Security Management for Beg

Torrent:
Info Hash: 5A0E0D4826015FAF48D40602DE7A593448F609EF
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 637
Type: Tutorials
Language: English
Category: Other
Size: 2.2 GB
Added: March 1, 2026, 9:04 a.m.
Peers: Seeders: 13, Leechers: 1 (Last updated: 1 month, 2 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://tracker.therarbg.to:6969/announce 0 1 0
udp://tracker.opentrackr.org:1337/announce 6 0 365
udp://open.demonoid.ch:6969/announce 0 0 0
udp://open.demonii.com:1337/announce (Failed to scrape UDP tracker) 0 0 0
udp://open.stealth.si:80/announce 7 0 272
udp://explodie.org:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://wepzone.net:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker1.myporn.club:9337/announce 0 0 0
udp://tracker.srv00.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1 - ISO 27001 Explained in Practical Language.mp4 14.0 MB
  3. 2 - Certification Journey from Start to Finish.mp4 13.5 MB
  4. 3 - Building an Audit-Ready Mindset Early.mp4 11.4 MB
  5. 4 - Course Roadmap, Capstones, and Resources.mp4 11.2 MB
  6. 1 - Healthcare and Life Sciences PHI, Validation, and Traceability.mp4 12.2 MB
  7. 2 - Financial Services SOX, AML, Encryption, and Fraud Controls.mp4 12.3 MB
  8. 3 - SaaS and IT SDLC, Multi-Tenant Isolation, and SOC Mapping.mp4 13.2 MB
  9. 4 - Manufacturing and Automotive OT Controls and Change Discipline.mp4 14.1 MB
  10. 5 - Public Sector and Education Procurement and Records Controls.mp4 12.4 MB
  11. 6 - Tailoring Templates Without Introducing Scope Creep.mp4 10.4 MB
  12. 1 - Supplier Tiering, Criticality, and Risk Segmentation.mp4 13.0 MB
  13. 2 - Onboarding and Offboarding Packs for Vendors.mp4 10.8 MB
  14. 3 - Third-Party Due Diligence and Audit Playbooks.mp4 10.1 MB
  15. 4 - Cloud Shared Responsibility and Contract Clauses.mp4 13.5 MB
  16. 5 - Continuous Monitoring, Attestations, and SOC Reports.mp4 11.8 MB
  17. 6 - Vendor Nonconformities, Remediation, and Exit Plans.mp4 12.9 MB
  18. 1 - Practical Risk Frameworks ISO 27005, FAIR-Lite, and Choices.mp4 12.2 MB
  19. 2 - Incident Playbooks Ransomware, Breach, and Insider Threats.mp4 14.1 MB
  20. 3 - BIA, BCP, and DR RTO, RPO, and Realistic Testing.mp4 12.3 MB
  21. 4 - Tabletop Exercises and Simulation Design That Teach.mp4 12.2 MB
  22. 5 - Notifications, After-Action Reviews, and Lessons Learned.mp4 11.6 MB
  23. 1 - Visible Leadership Behaviors Auditors Notice Quickly.mp4 12.7 MB
  24. 2 - Change Management That Sticks Across Teams.mp4 12.0 MB
  25. 3 - Documentation Without Fatigue or Busywork.mp4 11.9 MB
  26. 4 - Awareness Programs That People Actually Finish.mp4 11.5 MB
  27. 5 - Embedding KPIs into Roles and Performance Reviews.mp4 12.2 MB
  28. 1 - True Cost Models Implementation, Certification, and Hidden Items.mp4 12.4 MB
  29. 2 - ROI Modeling Risk Reduction, Sales Lift, and Insurance Effects.mp4 13.3 MB
  30. 3 - In-House, Hybrid, or Consultant Picking the Right Path.mp4 12.4 MB
  31. 4 - Grants, Incentives, and Budget Phasing Where Applicable.mp4 11.6 MB
  32. 5 - Integrated Systems for Smarter Cost and Evidence Reuse.mp4 13.8 MB
  33. 6 - When ISO 27001 Is Not the Right Investment.mp4 13.0 MB
  34. 7 - Reporting ISO ROI and Avoiding Vanity Metrics.mp4 11.9 MB
  35. 1 - Choosing DMS, GRC, SIEM, EDR, and Ticketing Tools.mp4 11.7 MB
  36. 2 - Automating Evidence Capture with APIs and RPA.mp4 11.7 MB
  37. 3 - Dashboards for Clause 9 Monitoring and Decisions.mp4 11.8 MB
  38. 4 - Secure Cloud Patterns, Backup, and Immutability.mp4 11.9 MB
  39. 5 - Continuous Auditing, Assurance-as-Code, and Responsible AI.mp4 10.8 MB
  40. 1 - Red Flags of Patchwork ISMS Implementations.mp4 9.9 MB
  41. 2 - Traits of High-Maturity, Risk-Driven Programs.mp4 10.6 MB
  42. 3 - Internal Audit Center of Excellence and Coaching.mp4 11.4 MB
  43. 4 - Improvement Pipeline and Effectiveness Verification.mp4 10.6 MB
  44. 5 - Board-Level Reporting and External Trust Signals.mp4 10.3 MB
  45. 1 - Readiness Gates and Self-Assessment Scoring.mp4 10.6 MB
  46. 2 - Running the Audit Day with Confidence and Clarity.mp4 10.2 MB
  47. 3 - Handling Findings Live and Negotiating Scope.mp4 9.4 MB
  48. 4 - Rapid Recovery, Re-Audit Planning, and Cost Control.mp4 10.6 MB
  49. 5 - Lessons Learned and a Stronger Next Cycle.mp4 10.0 MB
  50. 1 - ISO 27001 Origins, Revisions, and Transition Paths.mp4 13.1 MB
  51. 10 - How ISO Standards Evolve and Get Updated.mp4 11.2 MB
  52. 11 - Implementation Wins, Failures, and Key Lessons.mp4 11.7 MB
  53. 2 - Business Value, Trust Signals, and Risk Reduction.mp4 11.4 MB
  54. 3 - Annex SL Structure and Clause Flow Logic.mp4 11.8 MB
  55. 4 - PDCA and Risk-Based Thinking for ISMS.mp4 12.8 MB
  56. 5 - Mandatory Documents, Records, and Evidence Trails.mp4 10.8 MB
  57. 6 - Defining an ISMS Scope That Holds Up.mp4 11.3 MB
  58. 7 - Accreditation Bodies, Certification Bodies, and Roles.mp4 12.8 MB
  59. 8 - Mapping ISO 27001 to NIST, SOC 2, and GDPR.mp4 14.0 MB
  60. 9 - Costly Myths and Misconceptions to Avoid.mp4 12.5 MB
  61. 1 - Clause 4 Issues, Parties, and Defensible Scope.mp4 11.2 MB
  62. 10 - Clause 8 Operational Control, Change, and Outsourcing.mp4 11.9 MB
  63. 11 - Clause 8 Running Risk Activities in Daily Operations.mp4 11.0 MB
  64. 12 - Clause 9 Metrics That Matter and Data Quality.mp4 11.0 MB
  65. 13 - Clause 9 Internal Audits with Real Value Creation.mp4 10.8 MB
  66. 14 - Clause 9 Management Review Inputs and Decisions.mp4 9.9 MB
  67. 15 - Clause 10 Nonconformities, CAPA, and Effectiveness.mp4 11.2 MB
  68. 16 - Clause 10 Continuous Improvement as a Daily Habit.mp4 9.6 MB
  69. 2 - Clause 4 Process Interactions and ISMS Boundaries.mp4 10.0 MB
  70. 3 - Clause 5 Policy Direction, Leadership, and RACI.mp4 10.9 MB
  71. 4 - Clause 6 Risk Method, Criteria, and Acceptance Rules.mp4 11.3 MB
  72. 5 - Clause 6 Risk Treatment Plans and Strong SoA.mp4 10.6 MB
  73. 6 - Clause 6 Security Objectives, KPIs, and Tracking.mp4 12.3 MB
  74. 7 - Clause 7 Resources, Competence, and Training Records.mp4 11.2 MB
  75. 8 - Clause 7 Awareness, Communication, and Messaging.mp4 12.2 MB
  76. 9 - Clause 7 Documented Information Control and Retention.mp4 10.5 MB
  77. 1 - Learning Objectives.mp4 10.0 MB
  78. 10 - A.5.9 Inventory of Information and Other Associated Assets.mp4 11.4 MB
  79. 11 - A.5.10 Acceptable Use of Information and Other Associated Assets.mp4 12.8 MB
  80. 12 - A.5.11 Return of Assets.mp4 10.3 MB
  81. 13 - A.5.12 Classification of Information.mp4 10.3 MB
  82. 14 - A.5.13 Labelling of Information.mp4 9.7 MB
  83. 15 - A.5.14 Information Transfer.mp4 11.2 MB
  84. 16 - A.5.15 Access Control.mp4 9.8 MB
  85. 17 - A.5.16 Identity Management.mp4 9.4 MB
  86. 18 - A.5.17 Authentication Information.mp4 10.0 MB
  87. 19 - A.5.18 Access Rights.mp4 10.2 MB
  88. 2 - A.5.1 Policies for Information Security.mp4 10.4 MB
  89. 20 - Supplier Management Process.mp4 11.4 MB
  90. 21 - A.5.19 Information Security in Supplier Relationships.mp4 10.3 MB
  91. 22 - A.5.20 Addressing Information Security within Supplier Agreements.mp4 11.0 MB
  92. 23 - A.5.21 Managing Information Security in the ICT Supply Chain.mp4 11.0 MB
  93. 24 - A.5.22 Monitoring, Review and Change Management of Supplier Services.mp4 11.0 MB
  94. 25 - A.5.23 Information Security for Use of Cloud Services.mp4 11.8 MB
  95. 26 - Information Security Incident Management Process.mp4 10.8 MB
  96. 27 - A.5.24 Information Security Incident Management Planning and Preparation.mp4 10.5 MB
  97. 28 - A.5.25 Assessment and Decision on Information Security Events.mp4 10.1 MB
  98. 29 - A.5.26 Response to Information Security Incidents.mp4 9.6 MB
  99. 3 - A.5.2 Information Security Roles and Responsibilities.mp4 12.3 MB
  100. 30 - A.5.27 Learning from Information Security Incidents.mp4 9.4 MB
  101. 31 - A.5.28 Collection of Evidence.mp4 8.9 MB
  102. 32 - A.5.29 Information Security During Disruption.mp4 9.9 MB
  103. 33 - A.5.30 ICT Readiness for Business Continuity.mp4 9.3 MB
  104. 34 - A.5.31 Legal, Statutory, Regulatory and Contractual Requirements.mp4 10.5 MB
  105. 35 - A.5.32 Intellectual Property Rights.mp4 9.5 MB
  106. 36 - A.5.33 Protection of Records.mp4 9.3 MB
  107. 37 - A.5.34 Privacy and Protection of Personal Identifiable Information (PII).mp4 9.9 MB
  108. 38 - A.5.35 Independent Review of Information Security.mp4 10.0 MB
  109. 39 - A.5.36 Compliance with Policies, Rules and Standards for Information Security.mp4 10.3 MB
  110. 4 - A.5.3 Segregation of Duties.mp4 10.9 MB
  111. 40 - A.5.37 Documented Operating Procedures.mp4 10.7 MB
  112. 5 - A.5.4 Management Responsibilities.mp4 11.3 MB
  113. 6 - A.5.5 Contact with Authorities.mp4 10.6 MB
  114. 7 - A.5.6 Contact with Special Interest Groups.mp4 10.6 MB
  115. 8 - A.5.7 Threat Intelligence.mp4 9.7 MB
  116. 9 - A.5.8 Information Security in Project Management.mp4 11.2 MB
  117. 1 - Learning Objectives.mp4 10.8 MB
  118. 2 - A.6.1 Screening.mp4 9.3 MB
  119. 3 - A.6.2 Terms and Conditions of Employment.mp4 10.1 MB
  120. 4 - A.6.3 Information Security Awareness, Education and Training.mp4 10.0 MB
  121. 5 - A.6.4 Disciplinary Process.mp4 9.3 MB
  122. 6 - A.6.5 Responsibilities After Termination or Change of Employment.mp4 11.0 MB
  123. 7 - A.6.6 Confidentiality or Non-Disclosure Agreements.mp4 9.1 MB
  124. 8 - A.6.7 Remote Working.mp4 10.3 MB
  125. 9 - A.6.8 Information Security Event Reporting.mp4 8.9 MB
  126. 1 - Learning Objectives.mp4 11.1 MB
  127. 10 - A.7.9 Security of Assets Off-Premises.mp4 9.8 MB
  128. 11 - A.7.10 Storage Media.mp4 9.4 MB
  129. 12 - A.7.11 Supporting Utilities.mp4 10.1 MB
  130. 13 - A.7.12 Cabling Security.mp4 8.5 MB
  131. 14 - A.7.13 Equipment Maintenance.mp4 9.2 MB
  132. 15 - A.7.14 Secure Disposal or Re-Use of Equipment.mp4 10.6 MB
  133. 2 - A.7.1 Physical Security Perimeters.mp4 10.2 MB
  134. 3 - A.7.2 Physical Entry.mp4 8.7 MB
  135. 4 - A.7.3 Securing Offices, Rooms and Facilities.mp4 10.4 MB
  136. 5 - A.7.4 Physical Security Monitoring.mp4 10.6 MB
  137. 6 - A.7.5 Protecting Against Physical and Environmental Threats.mp4 10.7 MB
  138. 7 - A.7.6 Working in Secure Areas.mp4 10.2 MB
  139. 8 - A.7.7 Clear Desk and Clear Screen.mp4 9.2 MB
  140. 9 - A.7.8 Equipment Siting and Protection.mp4 9.9 MB
  141. 1 - Learning Objectives.mp4 12.0 MB
  142. 10 - A.8.9 Configuration Management.mp4 10.5 MB
  143. 11 - A.8.10 Information Deletion.mp4 11.2 MB
  144. 12 - A.8.11 Data Masking.mp4 10.0 MB
  145. 13 - A.8.12 Data Leakage Prevention.mp4 9.7 MB
  146. 14 - A.8.13 Information Backup.mp4 11.1 MB
  147. 15 - A.8.14 Redundancy of Information Processing Facilities.mp4 11.2 MB
  148. 16 - A.8.15 Logging.mp4 11.1 MB
  149. 17 - A.8.16 Monitoring Activities.mp4 9.7 MB
  150. 18 - A.8.17 Clock Synchronization.mp4 10.5 MB
  151. 19 - A.8.18 Use of Privileged Utility Programs.mp4 8.5 MB
  152. 2 - A.8.1 User End Point Devices.mp4 10.5 MB
  153. 20 - A.8.19 Installation of Software on Operational Systems.mp4 9.0 MB
  154. 21 - A.8.20 Networks Security.mp4 9.8 MB
  155. 22 - A.8.21 Security of Network Services.mp4 9.5 MB
  156. 23 - A.8.22 Segregation of Networks.mp4 8.9 MB
  157. 24 - A.8.23 Web Filtering.mp4 8.1 MB
  158. 25 - A.8.24 Use of Cryptography.mp4 8.0 MB
  159. 26 - A.8.25 Secure Development Life Cycle.mp4 9.7 MB
  160. 27 - A.8.26 Application Security Requirements.mp4 9.9 MB
  161. 28 - A.8.27 Secure System Architecture and Engineering Principles.mp4 17.0 MB
  162. 29 - A.8.28 Secure Coding.mp4 14.6 MB
  163. 3 - A.8.2 Privileged Access Rights.mp4 11.2 MB
  164. 30 - A.8.29 Security Testing in Development and Acceptance.mp4 12.8 MB
  165. 31 - A.8.30 Outsourced Development.mp4 12.3 MB
  166. 32 - A.8.31 Separation of Development, Test and Production Environments.mp4 13.4 MB
  167. 33 - A.8.32 Change Management.mp4 12.5 MB
  168. 34 - A.8.33 Test Information.mp4 12.2 MB
  169. 35 - A.8.34 Protection of Information Systems During Audit Testing.mp4 11.5 MB
  170. 4 - A.8.3 Information Access Restriction.mp4 10.6 MB
  171. 5 - A.8.4 Access to Source Code.mp4 10.7 MB
  172. 6 - A.8.5 Secure Authentication.mp4 9.7 MB
  173. 7 - A.8.6 Capacity Management.mp4 10.6 MB
  174. 8 - A.8.7 Protection Against Malware.mp4 9.7 MB
  175. 9 - A.8.8 Management of Technical Vulnerabilities.mp4 12.4 MB
  176. 1 - Kickoff and Charter Authority, Timeline, and RACI.mp4 13.2 MB
  177. 10 - Awareness and Competence Role-Based Training Records.mp4 12.5 MB
  178. 11 - Metrics and Monitoring KPIs, KRIs, and Dashboards.mp4 10.8 MB
  179. 12 - Internal Audit Program Plan, Samples, and Reports.mp4 12.7 MB
  180. 13 - Management Review Findings, Decisions, and Actions.mp4 11.1 MB
  181. 14 - Stage 1 Readiness Document Set and Gap Closure.mp4 12.8 MB
  182. 15 - Stage 2 Execution Interviews, Trials, and Rapid CAPA.mp4 11.7 MB
  183. 16 - Surveillance Cycle Keeping the ISMS Living and Effective.mp4 10.8 MB
  184. 2 - Context and Scope Boundaries, Interfaces, and Stakeholders.mp4 13.8 MB
  185. 3 - Risk Method and Criteria Scales, Rules, and Options.mp4 12.1 MB
  186. 4 - Asset and Data Inventory Ownership and Classification.mp4 14.6 MB
  187. 5 - Risk Assessment Execution Scenarios, Scoring, and Owners.mp4 11.7 MB
  188. 6 - Risk Treatment and SoA Control Selection and Rationale.mp4 12.4 MB
  189. 7 - Policies and Procedures Right-Sized and Traceable.mp4 11.9 MB
  190. 8 - Control Implementation Tech, People, and Process Actions.mp4 12.5 MB
  191. 9 - Supplier and Cloud Governance Due Diligence and SLAs.mp4 11.9 MB
  192. 1 - Selecting Certification Bodies and Contract Essentials.mp4 11.8 MB
  193. 2 - Stage 1 versus Stage 2 What Auditors Emphasize.mp4 13.6 MB
  194. 3 - Evidence Collection Strategies and Request Lists.mp4 11.4 MB
  195. 4 - Writing Clear Nonconformities and Strong Evidence.mp4 12.2 MB
  196. 5 - CAPA Lifecycle Root Cause, Actions, and Verification.mp4 11.7 MB
  197. 6 - Mock and Shadow Audits for First-Time Success.mp4 9.8 MB
  198. 7 - Remote and Onsite Audits Etiquette and Storytelling.mp4 10.9 MB
  199. 8 - Always-Ready Operations and Continuous Assurance.mp4 11.6 MB
  200. Bonus Resources.txt 70 bytes

Discussion