:Search:

Udemy ISO IEC 27002 2022 Information security controls

Torrent:
Info Hash: B5547B01A28F78261A017E409CA46F845DD5A08B
Similar Posts:
Uploader: freecoursewb
Source: 1 Logo 1337x
Downloads: 4
Type: Tutorials
Language: English
Category: Other
Size: 3.8 GB
Added: May 29, 2025, 11:55 a.m.
Peers: Seeders: 10, Leechers: 41 (Last updated: 10 months, 2 weeks ago)
Tracker Data:
Tracker Seeders Leechers Completed
udp://open.stealth.si:80/announce 3 10 1
udp://exodus.desync.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.cyberia.is:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.opentrackr.org:1337/announce 2 13 2
udp://tracker.torrent.eu.org:451/announce 2 9 1
udp://explodie.org:6969/announce 3 7 0
udp://tracker.birkenwald.de:6969/announce 0 1 0
udp://tracker.moeking.me:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://ipv4.tracker.harry.lu:80/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.tiny-vps.com:6969/announce (Failed to scrape UDP tracker) 0 0 0
udp://tracker.therarbg.to:6969/announce 0 1 0
Files:
  1. Get Bonus Downloads Here.url 180 bytes
  2. 1 - Introduction.en.srt 4.3 KB
  3. 1 - Introduction.mp4 18.8 MB
  4. 2 - Information security, cybersecurity and privacy.en.srt 4.9 KB
  5. 2 - Information security, cybersecurity and privacy.mp4 20.6 MB
  6. 3 - The ISO - IEC 27000 series of standards.en.srt 5.6 KB
  7. 3 - The ISO - IEC 27000 series of standards.mp4 32.3 MB
  8. 4 - An ISMS according to ISO - IEC 27001.en.srt 4.9 KB
  9. 4 - An ISMS according to ISO - IEC 27001.mp4 24.9 MB
  10. 5 - About ISO - IEC 27002 - Security+controls+and+attributes.pdf 819.2 KB
  11. 5 - About ISO - IEC 27002.en.srt 8.5 KB
  12. 5 - About ISO - IEC 27002.mp4 48.9 MB
  13. 10 - Contact with authorities.en.srt 2.1 KB
  14. 10 - Contact with authorities.mp4 13.8 MB
  15. 11 - Contact with special interest groups.en.srt 2.8 KB
  16. 11 - Contact with special interest groups.mp4 11.3 MB
  17. 12 - Threat intelligence.en.srt 3.9 KB
  18. 12 - Threat intelligence.mp4 22.0 MB
  19. 13 - Information security in project management.en.srt 5.4 KB
  20. 13 - Information security in project management.mp4 31.9 MB
  21. 14 - Inventory of information and other associated assets.en.srt 7.2 KB
  22. 14 - Inventory of information and other associated assets.mp4 85.1 MB
  23. 15 - Acceptable use of information and other associated assets.en.srt 3.4 KB
  24. 15 - Acceptable use of information and other associated assets.mp4 22.0 MB
  25. 16 - Return of assets.en.srt 3.0 KB
  26. 16 - Return of assets.mp4 18.9 MB
  27. 17 - Classification of information.en.srt 6.3 KB
  28. 17 - Classification of information.mp4 35.8 MB
  29. 18 - Labelling of information.en.srt 2.8 KB
  30. 18 - Labelling of information.mp4 12.4 MB
  31. 19 - Information transfer.en.srt 6.3 KB
  32. 19 - Information transfer.mp4 46.6 MB
  33. 20 - Access control.en.srt 10.5 KB
  34. 20 - Access control.mp4 76.0 MB
  35. 21 - Identity management.en.srt 3.3 KB
  36. 21 - Identity management.mp4 19.8 MB
  37. 22 - Authentication information.en.srt 7.4 KB
  38. 22 - Authentication information.mp4 130.5 MB
  39. 23 - Access rights.en.srt 4.6 KB
  40. 23 - Access rights.mp4 59.8 MB
  41. 24 - Information security in supplier relationships.en.srt 7.1 KB
  42. 24 - Information security in supplier relationships.mp4 89.1 MB
  43. 25 - Addressing information security within supplier agreements.en.srt 7.4 KB
  44. 25 - Addressing information security within supplier agreements.mp4 55.7 MB
  45. 26 - Managing information security in the ICT supply chain.en.srt 4.0 KB
  46. 26 - Managing information security in the ICT supply chain.mp4 90.2 MB
  47. 27 - Monitoring, review and change management of supplier services.en.srt 4.1 KB
  48. 27 - Monitoring, review and change management of supplier services.mp4 30.0 MB
  49. 28 - Information security for use of cloud services.en.srt 7.0 KB
  50. 28 - Information security for use of cloud services.mp4 32.6 MB
  51. 29 - Information security incident management planning and preparation.en.srt 6.2 KB
  52. 29 - Information security incident management planning and preparation.mp4 47.6 MB
  53. 30 - Assessment and decision on information security events.en.srt 2.8 KB
  54. 30 - Assessment and decision on information security events.mp4 15.3 MB
  55. 31 - Response to information security incidents.en.srt 3.3 KB
  56. 31 - Response to information security incidents.mp4 21.5 MB
  57. 32 - Learning from information security incidents.en.srt 1.8 KB
  58. 32 - Learning from information security incidents.mp4 7.7 MB
  59. 33 - Collection of evidence.en.srt 3.9 KB
  60. 33 - Collection of evidence.mp4 22.6 MB
  61. 34 - Information security during disruption.en.srt 3.3 KB
  62. 34 - Information security during disruption.mp4 14.5 MB
  63. 35 - ICT readiness for business continuity.en.srt 5.4 KB
  64. 35 - ICT readiness for business continuity.mp4 36.3 MB
  65. 36 - Legal, statutory, regulatory and contractual requirements.en.srt 4.0 KB
  66. 36 - Legal, statutory, regulatory and contractual requirements.mp4 21.7 MB
  67. 37 - Intellectual property rights.en.srt 3.2 KB
  68. 37 - Intellectual property rights.mp4 14.1 MB
  69. 38 - Protection of records.en.srt 2.6 KB
  70. 38 - Protection of records.mp4 13.3 MB
  71. 39 - Privacy and protection of PII.en.srt 3.3 KB
  72. 39 - Privacy and protection of PII.mp4 21.0 MB
  73. 40 - Independent review of information security.en.srt 3.2 KB
  74. 40 - Independent review of information security.mp4 13.0 MB
  75. 41 - Conformance with policies, rules and standards for information security.en.srt 2.3 KB
  76. 41 - Conformance with policies, rules and standards for information security.mp4 12.4 MB
  77. 42 - Documented operating procedures.en.srt 4.9 KB
  78. 42 - Documented operating procedures.mp4 27.4 MB
  79. 43 - Recapitulation organizational controls.en.srt 8.8 KB
  80. 43 - Recapitulation organizational controls.mp4 44.2 MB
  81. 6 - Policies for information security.en.srt 7.6 KB
  82. 6 - Policies for information security.mp4 42.7 MB
  83. 7 - Information security roles and responsibilities.en.srt 4.5 KB
  84. 7 - Information security roles and responsibilities.mp4 56.5 MB
  85. 8 - Segregation of duties.en.srt 3.4 KB
  86. 8 - Segregation of duties.mp4 14.9 MB
  87. 9 - Management responsibilities.en.srt 3.5 KB
  88. 9 - Management responsibilities.mp4 69.3 MB
  89. 44 - Screening.en.srt 6.3 KB
  90. 44 - Screening.mp4 34.0 MB
  91. 45 - Terms and conditions of employment.en.srt 3.5 KB
  92. 45 - Terms and conditions of employment.mp4 20.4 MB
  93. 46 - Information security awareness, education and training.en.srt 5.8 KB
  94. 46 - Information security awareness, education and training.mp4 29.4 MB
  95. 47 - Disciplinary process.en.srt 2.6 KB
  96. 47 - Disciplinary process.mp4 9.9 MB
  97. 48 - Responsibilities after termination or change of employment.en.srt 3.8 KB
  98. 48 - Responsibilities after termination or change of employment.mp4 15.9 MB
  99. 49 - Confidentiality or non-disclosure agreements.en.srt 3.4 KB
  100. 49 - Confidentiality or non-disclosure agreements.mp4 52.5 MB
  101. 50 - Remote working.en.srt 5.5 KB
  102. 50 - Remote working.mp4 34.5 MB
  103. 51 - Information security event reporting - Information_security_event_reporting.mp4 9.4 MB
  104. 51 - Information security event reporting.en.srt 3.7 KB
  105. 51 - Information security event reporting.mp4 21.8 MB
  106. 52 - Recapitulation people controls.en.srt 2.3 KB
  107. 52 - Recapitulation people controls.mp4 14.7 MB
  108. 53 - Physical security perimeters.en.srt 4.8 KB
  109. 53 - Physical security perimeters.mp4 71.2 MB
  110. 54 - Physical entry.en.srt 6.6 KB
  111. 54 - Physical entry.mp4 126.2 MB
  112. 55 - Securing offices, rooms and facilities.en.srt 1.2 KB
  113. 55 - Securing offices, rooms and facilities.mp4 5.1 MB
  114. 56 - Physical security monitoring.en.srt 3.0 KB
  115. 56 - Physical security monitoring.mp4 11.9 MB
  116. 57 - Protecting against physical and environmental threats.en.srt 3.7 KB
  117. 57 - Protecting against physical and environmental threats.mp4 24.5 MB
  118. 58 - Working in secure areas.en.srt 2.2 KB
  119. 58 - Working in secure areas.mp4 13.2 MB
  120. 59 - Clear desk and clear screen.en.srt 3.8 KB
  121. 59 - Clear desk and clear screen.mp4 44.9 MB
  122. 60 - Equipment siting and protection.en.srt 3.8 KB
  123. 60 - Equipment siting and protection.mp4 19.9 MB
  124. 61 - Security of assets off-premises.en.srt 4.0 KB
  125. 61 - Security of assets off-premises.mp4 16.0 MB
  126. 62 - Storage media.en.srt 7.3 KB
  127. 62 - Storage media.mp4 139.0 MB
  128. 63 - Supporting utilities.en.srt 3.3 KB
  129. 63 - Supporting utilities.mp4 12.5 MB
  130. 64 - Cabling security.en.srt 2.6 KB
  131. 64 - Cabling security.mp4 41.7 MB
  132. 65 - Equipment maintenance.en.srt 3.6 KB
  133. 65 - Equipment maintenance.mp4 13.8 MB
  134. 66 - Secure disposal or re-use of equipment.en.srt 3.9 KB
  135. 66 - Secure disposal or re-use of equipment.mp4 21.7 MB
  136. 67 - Recapitulation physical controls.en.srt 3.3 KB
  137. 67 - Recapitulation physical controls.mp4 14.6 MB
  138. 100 - Test information.en.srt 3.5 KB
  139. 100 - Test information.mp4 11.6 MB
  140. 101 - Protection of information systems during audit testing.en.srt 4.5 KB
  141. 101 - Protection of information systems during audit testing.mp4 31.1 MB
  142. 102 - Recapitulation technological controls.en.srt 9.0 KB
  143. 102 - Recapitulation technological controls.mp4 30.0 MB
  144. 68 - User endpoint devices.en.srt 9.0 KB
  145. 68 - User endpoint devices.mp4 33.5 MB
  146. 69 - Privileged access rights.en.srt 5.6 KB
  147. 69 - Privileged access rights.mp4 21.3 MB
  148. 70 - Information access restriction.en.srt 3.9 KB
  149. 70 - Information access restriction.mp4 21.7 MB
  150. 71 - Access to source code.en.srt 2.9 KB
  151. 71 - Access to source code.mp4 15.4 MB
  152. 72 - Secure authentication.en.srt 6.2 KB
  153. 72 - Secure authentication.mp4 36.0 MB
  154. 73 - Capacity management.en.srt 3.9 KB
  155. 73 - Capacity management.mp4 23.8 MB
  156. 74 - Protection against malware.en.srt 4.9 KB
  157. 74 - Protection against malware.mp4 25.9 MB
  158. 75 - Management of technical vulnerabilities.en.srt 8.5 KB
  159. 75 - Management of technical vulnerabilities.mp4 36.5 MB
  160. 76 - Configuration management.en.srt 4.8 KB
  161. 76 - Configuration management.mp4 83.8 MB
  162. 77 - Information deletion.en.srt 4.6 KB
  163. 77 - Information deletion.mp4 14.8 MB
  164. 78 - Data masking.en.srt 4.7 KB
  165. 78 - Data masking.mp4 16.1 MB
  166. 79 - Data leakage prevention.en.srt 4.4 KB
  167. 79 - Data leakage prevention.mp4 31.3 MB
  168. 80 - Information backup.en.srt 5.6 KB
  169. 80 - Information backup.mp4 40.6 MB
  170. 81 - Redundancy of information processing facilities.en.srt 5.2 KB
  171. 81 - Redundancy of information processing facilities.mp4 30.2 MB
  172. 82 - Logging.en.srt 7.6 KB
  173. 82 - Logging.mp4 24.0 MB
  174. 83 - Monitoring activities.en.srt 5.0 KB
  175. 83 - Monitoring activities.mp4 27.2 MB
  176. 84 - Clock synchronization.en.srt 2.6 KB
  177. 84 - Clock synchronization.mp4 11.5 MB
  178. 85 - Use of privileged utility programs.en.srt 2.8 KB
  179. 85 - Use of privileged utility programs.mp4 56.3 MB
  180. 86 - Installation of software on operational systems.en.srt 4.3 KB
  181. 86 - Installation of software on operational systems.mp4 21.6 MB
  182. 87 - Networks security.en.srt 6.1 KB
  183. 87 - Networks security.mp4 70.9 MB
  184. 88 - Security of network services.en.srt 3.9 KB
  185. 88 - Security of network services.mp4 83.9 MB
  186. 89 - Segregation of networks.en.srt 3.7 KB
  187. 89 - Segregation of networks.mp4 18.5 MB
  188. 90 - Web filtering.en.srt 4.0 KB
  189. 90 - Web filtering.mp4 14.0 MB
  190. 91 - Use of cryptography.en.srt 8.2 KB
  191. 91 - Use of cryptography.mp4 58.3 MB
  192. 92 - Secure development life cycle.en.srt 4.5 KB
  193. 92 - Secure development life cycle.mp4 24.0 MB
  194. 93 - Application security requirements.en.srt 9.2 KB
  195. 93 - Application security requirements.mp4 46.8 MB
  196. 94 - Secure system architecture and engineering principles.en.srt 9.2 KB
  197. 94 - Secure system architecture and engineering principles.mp4 148.1 MB
  198. 95 - Secure coding.en.srt 6.5 KB
  199. 95 - Secure coding.mp4 25.8 MB
  200. 96 - Security testing in development and acceptance.en.srt 4.2 KB
  201. 96 - Security testing in development and acceptance.mp4 58.1 MB
  202. 97 - Outsourced development.en.srt 5.7 KB
  203. 97 - Outsourced development.mp4 20.3 MB
  204. 98 - Separation of development, test and production environments.en.srt 5.2 KB
  205. 98 - Separation of development, test and production environments.mp4 20.4 MB
  206. 99 - Change management.en.srt 3.1 KB
  207. 99 - Change management.mp4 15.4 MB
  208. 103 - The certification to ISO - IEC 27001 and ISO - IEC 27002.en.srt 5.4 KB
  209. 103 - The certification to ISO - IEC 27001 and ISO - IEC 27002.mp4 67.7 MB
  210. 104 - Thank you and good bye! - ISO_27002_Information_security_controls_presentation.pdf 22.5 MB
  211. 104 - Thank you and good bye!.en.srt 3.5 KB
  212. 104 - Thank you and good bye!.mp4 12.7 MB
  213. 105 - Bonus lecture - My other courses on information security management.en.srt 9.1 KB
  214. 105 - Bonus lecture - My other courses on information security management.mp4 170.3 MB
  215. about-isoiec-27002autogenerated.vtt 7.8 KB
  216. an-isms-according-to-isoiec-27001autogenerated.vtt 4.4 KB
  217. information-security-cybersecurity-and-privacyautogenerated.vtt 4.4 KB
  218. introductionautogenerated.vtt 3.9 KB
  219. the-isoiec-27000-series-of-standardsautogenerated.vtt 5.1 KB
  220. acceptable-use-of-information-and-other-associated-assetsautogenerated.vtt 3.1 KB
  221. access-controlautogenerated.vtt 9.5 KB
  222. access-rightsautogenerated.vtt 4.2 KB
  223. addressing-information-security-within-supplier-agreementsautogenerated.vtt 6.7 KB
  224. assessment-and-decision-on-information-security-eventsautogenerated.vtt 2.5 KB
  225. authentication-informationautogenerated.vtt 6.7 KB
  226. classification-of-informationautogenerated.vtt 5.7 KB
  227. collection-of-evidenceautogenerated.vtt 3.6 KB
  228. conformance-with-policies-and-standards-for-information-securityautogenerated.vtt 2.1 KB
  229. contact-with-authoritiesautogenerated.vtt 1.9 KB
  230. contact-with-special-interest-groupsautogenerated.vtt 2.5 KB
  231. documented-operating-proceduresautogenerated.vtt 4.5 KB
  232. ict-readiness-for-business-continuityautogenerated.vtt 4.9 KB
  233. identity-managementautogenerated.vtt 3.1 KB
  234. independent-review-of-information-securityautogenerated.vtt 2.9 KB
  235. information-security-during-disruptionautogenerated.vtt 3.0 KB
  236. information-security-for-use-of-cloud-servicesautogenerated.vtt 6.3 KB
  237. information-security-in-project-managementautogenerated.vtt 4.9 KB
  238. information-security-in-supplier-relationshipsautogenerated.vtt 6.4 KB
  239. information-security-incident-management-planning-and-preparationautogenerated.vtt 5.7 KB
  240. information-security-roles-and-responsibilitiesautogenerated.vtt 4.1 KB
  241. information-transferautogenerated.vtt 5.8 KB
  242. intellectual-property-rightsautogenerated.vtt 2.9 KB
  243. inventory-of-information-and-other-associated-assetsautogenerated.vtt 6.5 KB
  244. labelling-of-informationautogenerated.vtt 2.6 KB
  245. learning-from-information-security-incidentsautogenerated.vtt 1.7 KB
  246. legal-statutory-regulatory-and-contractual-requirementsautogenerated.vtt 3.7 KB
  247. management-responsibilitiesautogenerated.vtt 3.2 KB
  248. managing-information-security-in-the-ict-supply-chainautogenerated.vtt 3.7 KB
  249. monitoring-review-and-change-management-of-supplier-servicesautogenerated.vtt 3.8 KB
  250. policies-for-information-securityautogenerated.vtt 7.0 KB
  251. privacy-and-protection-of-piiautogenerated.vtt 3.0 KB
  252. protection-of-recordsautogenerated.vtt 2.4 KB
  253. recapitulation-organizational-controlsautogenerated.vtt 8.1 KB
  254. response-to-information-security-incidentsautogenerated.vtt 3.1 KB
  255. return-of-assetsautogenerated.vtt 2.8 KB
  256. segregation-of-dutiesautogenerated.vtt 3.1 KB
  257. threat-intelligenceautogenerated.vtt 3.6 KB
  258. confidentiality-or-non-disclosure-agreementsautogenerated.vtt 3.2 KB
  259. disciplinary-processautogenerated.vtt 2.4 KB
  260. information-security-awareness-education-and-trainingautogenerated.vtt 5.2 KB
  261. information-security-event-reportingautogenerated.vtt 3.4 KB
  262. recapitulation-people-controlsautogenerated.vtt 2.1 KB
  263. remote-workingautogenerated.vtt 5.1 KB
  264. responsibilities-after-termination-or-change-of-employmentautogenerated.vtt 3.5 KB
  265. screeningautogenerated.vtt 5.7 KB
  266. terms-and-conditions-of-employmentautogenerated.vtt 3.3 KB
  267. cabling-securityautogenerated.vtt 2.3 KB
  268. clear-desk-and-clear-screenautogenerated.vtt 3.4 KB
  269. equipment-maintenanceautogenerated.vtt 3.3 KB
  270. equipment-siting-and-protectionautogenerated.vtt 3.5 KB
  271. physical-entryautogenerated.vtt 6.0 KB
  272. physical-security-monitoringautogenerated.vtt 2.7 KB
  273. physical-security-perimetersautogenerated.vtt 4.4 KB
  274. protecting-against-physical-and-environmental-threatsautogenerated.vtt 3.4 KB
  275. recapitulation-physical-controlsautogenerated.vtt 3.0 KB
  276. secure-disposal-or-re-use-of-equipmentautogenerated.vtt 3.6 KB
  277. securing-offices-rooms-and-facilitiesautogenerated.vtt 1.1 KB
  278. security-of-assets-off-premisesautogenerated.vtt 3.6 KB
  279. storage-mediaautogenerated.vtt 6.6 KB
  280. supporting-utilitiesautogenerated.vtt 3.0 KB
  281. working-in-secure-areasautogenerated.vtt 2.0 KB
  282. access-to-source-codeautogenerated.vtt 2.6 KB
  283. application-security-requirementsautogenerated.vtt 8.4 KB
  284. capacity-managementautogenerated.vtt 3.6 KB
  285. change-managementautogenerated.vtt 2.9 KB
  286. clock-synchronizationautogenerated.vtt 2.4 KB
  287. configuration-managementautogenerated.vtt 4.4 KB
  288. data-leakage-preventionautogenerated.vtt 4.1 KB
  289. data-maskingautogenerated.vtt 4.3 KB
  290. information-access-restrictionautogenerated.vtt 3.6 KB
  291. information-backupautogenerated.vtt 5.1 KB
  292. information-deletionautogenerated.vtt 4.2 KB
  293. installation-of-software-on-operational-systemsautogenerated.vtt 3.9 KB
  294. loggingautogenerated.vtt 6.9 KB
  295. management-of-technical-vulnerabilitiesautogenerated.vtt 7.8 KB
  296. monitoring-activitiesautogenerated.vtt 4.6 KB
  297. networks-securityautogenerated.vtt 5.5 KB
  298. outsourced-developmentautogenerated.vtt 5.2 KB
  299. privileged-access-rightsautogenerated.vtt 5.1 KB
  300. protection-against-malwareautogenerated.vtt 4.5 KB
  301. protection-of-information-systems-during-audit-testingautogenerated.vtt 4.1 KB
  302. recapitulation-technological-controlsautogenerated.vtt 8.2 KB
  303. redundancy-of-information-processing-facilitiesautogenerated.vtt 4.8 KB
  304. secure-authenticationautogenerated.vtt 5.7 KB
  305. secure-codingautogenerated.vtt 5.9 KB
  306. secure-development-life-cycleautogenerated.vtt 4.1 KB
  307. secure-system-architecture-and-engineering-principlesautogenerated.vtt 8.4 KB
  308. security-of-network-servicesautogenerated.vtt 3.6 KB
  309. security-testing-in-development-and-acceptanceautogenerated.vtt 3.8 KB
  310. segregation-of-networksautogenerated.vtt 3.4 KB
  311. separation-of-development-test-and-production-environmentsautogenerated.vtt 4.7 KB
  312. test-informationautogenerated.vtt 3.2 KB
  313. use-of-cryptographyautogenerated.vtt 7.5 KB
  314. use-of-privileged-utility-programsautogenerated.vtt 2.6 KB
  315. user-endpoint-devicesautogenerated.vtt 8.2 KB
  316. web-filteringautogenerated.vtt 3.6 KB
  317. thank-you-and-good-byeautogenerated.vtt 3.2 KB
  318. the-certification-to-isoiec-27001-and-isoiec-27002autogenerated.vtt 4.9 KB
  319. Bonus Resources.txt 70 bytes

Discussion