:Search:

Udemy Auditing ISO 27001 2022 Technical Controls

Torrent:
Info Hash: FD2515D7BA85505A2B3B0C08D569CC569EE55667
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Type: Tutorials
Language: English
Category: Other
Size: 2.0 GB
Added: Sept. 5, 2025, 12:20 p.m.
Peers: Seeders: 1, Leechers: 16 (Last updated: 7 months, 1 week ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 2 0
udp://exodus.desync.com:6969/announce 0 5 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 1 4 0
udp://tracker.torrent.eu.org:451/announce 0 2 0
udp://explodie.org:6969/announce 0 2 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1 -Introduction.mp4 68.8 MB
  3. 2 -Introducing the Model Company - InfoSure Ltd.mp4 12.6 MB
  4. 1 -Identity and Access Management.mp4 14.9 MB
  5. 2 -Control 8.1 – User Endpoint Devices.mp4 57.9 MB
  6. 3 -Control 8.2 – Privileged Access Rights.mp4 56.8 MB
  7. 4 -Control 8.3 – Information Access Restriction.mp4 61.5 MB
  8. 5 -Control 8.4 – Access to Source Code.mp4 45.5 MB
  9. 6 -Control 8.5 – Secure Authentication.mp4 59.2 MB
  10. 1 -Capacity, Malware, and Vulnerability Management.mp4 18.0 MB
  11. 2 -Control 8.6 – Capacity Management.mp4 66.1 MB
  12. 3 -Control 8.7 – Protection Against Malware.mp4 49.7 MB
  13. 4 -Control 8.8 – Management of Technical Vulnerabilities.mp4 49.5 MB
  14. 5 -Control 8.9 – Configuration Management.mp4 49.2 MB
  15. 1 -Data Lifecycle Security.mp4 11.5 MB
  16. 2 -Control 8.10 – Information Deletion.mp4 58.0 MB
  17. 3 -Control 8.11 – Data Masking.mp4 57.5 MB
  18. 4 -Control 8.12 – Data Leakage Prevention.mp4 57.0 MB
  19. 5 -Control 8.13 – Information Backup.mp4 54.9 MB
  20. 6 -Control 8.14 – Redundancy of Information Processing Facilities.mp4 56.4 MB
  21. 1 -Logging, Monitoring, and Utilities.mp4 16.0 MB
  22. 2 -Control 8.15 – Logging.mp4 55.7 MB
  23. 3 -Control 8.16 – Monitoring Activities.mp4 48.9 MB
  24. 4 -Control 8.17 – Clock Synchronisation.mp4 54.5 MB
  25. 5 -Control 8.18 – Use of Privileged Utility Programs.mp4 51.1 MB
  26. 6 -Control 8.19 – Installation of Software on Operational Systems.mp4 48.9 MB
  27. 1 -Network and Cryptographic Security.mp4 13.9 MB
  28. 2 -Control 8.20 – Network Security.mp4 55.1 MB
  29. 3 -Control 8.21 Security of Network Services.mp4 50.6 MB
  30. 4 -8.22 – Segregation of Networks.mp4 59.4 MB
  31. 5 -Control 8.23 Web Filtering.mp4 51.2 MB
  32. 6 -Control 8.24 Use of Cryptography.mp4 56.3 MB
  33. 1 -Secure Development Practices.mp4 14.0 MB
  34. 10 -Control 8.33 – Test Information.mp4 52.3 MB
  35. 2 -Control 8.25 – Secure Development Life Cycle.mp4 49.0 MB
  36. 3 -Control 8.26 – Application Security Requirements.mp4 55.0 MB
  37. 4 -Control 8.27 – Secure Systems Architecture and Engineering Principles.mp4 60.8 MB
  38. 5 -Control 8.28 – Secure Coding.mp4 53.5 MB
  39. 6 -Control 8.29 – Security Testing in Development and Acceptance.mp4 50.2 MB
  40. 7 -Control 8.30 – Outsourced Development.mp4 48.8 MB
  41. 8 -Control 8.31 – Separation of Development, Test and Production Environments.mp4 50.4 MB
  42. 9 -Control 8.32 – Change Management.mp4 47.6 MB
  43. 1 -Control 8.34 – Protection of Information Systems During Audit Testing.mp4 45.3 MB
  44. 1 -Conclusion.mp4 21.1 MB
  45. Bonus Resources.txt 70 bytes

Discussion