:Search:

Udemy Auditing ISO 27001 2022 Organizational Controls

Torrent:
Info Hash: D4D3D287F7B044A69D18C2D58F90F80D1388717D
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Type: Tutorials
Language: English
Category: Other
Size: 1.4 GB
Added: Aug. 14, 2025, 12:23 a.m.
Peers: Seeders: 1, Leechers: 7 (Last updated: 8 months ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 0 1 0
udp://exodus.desync.com:6969/announce 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 1 1 0
udp://tracker.torrent.eu.org:451/announce 0 2 0
udp://explodie.org:6969/announce 0 1 0
udp://tracker.birkenwald.de:6969/announce 0 2 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce 0 0 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1 -Introduction.mp4 46.6 MB
  3. 2 -Framework and tools.mp4 27.2 MB
  4. 3 -Case Study Company Introduction.mp4 13.6 MB
  5. 1 -Information Security Governance and Direction.mp4 11.4 MB
  6. 2 -Control 5.1 – Policies for Information Security.mp4 38.9 MB
  7. 2 -Control 5.xlsx 5.6 KB
  8. 3 -Control 5.2 Information Security Roles and Responsibilities.mp4 34.3 MB
  9. 4 -Control 5.3 – Segregation of Duties.mp4 33.1 MB
  10. 5 -Control 5.4 – Management Responsibilities.mp4 34.4 MB
  11. 6 -Control 5.5 Contact with Authorities.mp4 36.2 MB
  12. 7 -Control 5.6 – Contact with Special Interest Groups.mp4 29.5 MB
  13. 1 -Information Security Policy and Strategic Alignment.mp4 15.2 MB
  14. 2 -Control 5.7 – Threat Intelligence.mp4 32.1 MB
  15. 3 -Control 5.8 Information Security in Project Management.mp4 37.3 MB
  16. 4 -Control 5.9 Inventory of Information and Associated Assets.mp4 30.2 MB
  17. 5 -Control 5.10 – Acceptable Use of Information and Other Associated Assets.mp4 29.5 MB
  18. 1 -Risk and Change Management.mp4 15.3 MB
  19. 10 -5.19 Information security in supplier relationships.mp4 25.2 MB
  20. 11 -5.20 Addressing information security within supplier agreements.mp4 35.3 MB
  21. 2 -5.11 Return of assets.mp4 36.6 MB
  22. 3 -5.12 Classification of information.mp4 36.8 MB
  23. 4 -5.13 Labelling of information.mp4 36.9 MB
  24. 5 -5.14 Information transfer.mp4 40.0 MB
  25. 6 -5.15 Access control.mp4 29.1 MB
  26. 7 -5.16 Identity management.mp4 31.8 MB
  27. 8 -5.17 Authentication information.mp4 32.3 MB
  28. 9 -5.18 Access rights.mp4 38.1 MB
  29. 1 -Supplier Management and Third-Party Risks.mp4 12.5 MB
  30. 2 -5.21 Managing information security in the ICT supply chain.mp4 37.2 MB
  31. 3 -5.22 Monitoring and review of supplier services.mp4 32.8 MB
  32. 4 -5.23 Managing changes to supplier services.mp4 37.6 MB
  33. 1 -Compliance and Legal Responsibility.mp4 14.7 MB
  34. 10 -5.32 Intellectual property rights.mp4 27.2 MB
  35. 11 -5.33 Protection of records.mp4 45.3 MB
  36. 12 -5.34 Privacy and protection of personally identifiable information (PII).mp4 33.0 MB
  37. 13 -5.35 Independent review of information security.mp4 40.1 MB
  38. 14 -5.36 Compliance with policies, rules and standards for information security.mp4 31.0 MB
  39. 15 -5.37 Information systems audit considerations.mp4 38.5 MB
  40. 2 -5.24 Information security incident management planning and preparation.mp4 30.8 MB
  41. 3 -5.25 Assessment and decision on information security events.mp4 39.4 MB
  42. 4 -5.26 Response to information security incidents.mp4 36.9 MB
  43. 5 -5.27 Learning from information security incidents.mp4 31.9 MB
  44. 6 -5.28 Collection of evidence.mp4 32.5 MB
  45. 7 -5.29 Information security during disruption.mp4 41.2 MB
  46. 8 -5.30 ICT readiness for business continuity.mp4 31.7 MB
  47. 9 -Control 5.31 – Legal, Statutory, Regulatory, and Contractual Require.mp4 43.0 MB
  48. 1 -Conclusion.mp4 22.2 MB
  49. Bonus Resources.txt 70 bytes

Discussion