FileMood

Download [ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls

FreeCourseWeb com ISO 27001 2022 Compliant Cybersecurity The Annex Controls

Name

[ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls

 DOWNLOAD Copy Link

Total Size

310.4 MB

Total Files

97

Last Seen

2024-07-08 23:42

Hash

DB72DFC8DE9ED8F545F9897E63CA81ECABC3D86E

/

Get Bonus Downloads Here.url

0.2 KB

/01 - Introduction/

01 - Introduction to the Annex A controls.mp4

3.4 MB

01 - Introduction to the Annex A controls.srt

1.5 KB

/02 - 1. Governance/

01 - Policies for information security (Control 5.1).mp4

10.1 MB

01 - Policies for information security (Control 5.1).srt

9.2 KB

02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4

10.4 MB

02 - Roles, responsibilities, and duties (Controls 5.2–5.4).srt

7.6 KB

03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4

11.0 MB

03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).srt

8.7 KB

/.../03 - 2. Asset Management/

01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4

10.8 MB

01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).srt

8.5 KB

02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).mp4

8.2 MB

02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).srt

6.9 KB

/.../04 - 3. Information Protection/

01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4

10.8 MB

01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).srt

8.3 KB

02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4

12.7 MB

02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).srt

10.0 KB

/.../05 - 4. Identity and Access Management/

01 - Access management (Controls 5.15–5.18).mp4

12.9 MB

01 - Access management (Controls 5.15–5.18).srt

9.0 KB

02 - System and application access control (Controls 8.2–8.5).mp4

11.6 MB

02 - System and application access control (Controls 8.2–8.5).srt

8.3 KB

/.../06 - 5. Supplier Relationships Security/

01 - Supplier relationships security (Controls 5.19–5.21).mp4

9.6 MB

01 - Supplier relationships security (Controls 5.19–5.21).srt

8.1 KB

02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4

9.6 MB

02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).srt

6.7 KB

/.../07 - 6. Information Security Event Management/

01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4

13.3 MB

01 - Information security incident management (Controls 5.24–5.28, and 6.8).srt

10.2 KB

02 - Logging and monitoring (Controls 8.15–8.17).mp4

9.9 MB

02 - Logging and monitoring (Controls 8.15–8.17).srt

7.4 KB

/08 - 7. Continuity/

01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4

12.4 MB

01 - Continuity (Controls 5.29, 5.30, and 8.13).srt

9.2 KB

02 - Backup and availability (Controls 8.13 and 8.14).mp4

6.3 MB

02 - Backup and availability (Controls 8.13 and 8.14).srt

4.5 KB

/.../09 - 8. Legal, Compliance, and Security Assurance/

01 - Legal and compliance (Controls 5.31–5.33).mp4

9.0 MB

01 - Legal and compliance (Controls 5.31–5.33).srt

6.3 KB

02 - Information security assurance (Control 5.35 and 5.36).mp4

7.6 MB

02 - Information security assurance (Control 5.35 and 5.36).srt

5.3 KB

/.../10 - 9. Human Resource Security/

01 - Prior to employment (Controls 6.1 and 6.2).mp4

8.2 MB

01 - Prior to employment (Controls 6.1 and 6.2).srt

6.2 KB

02 - During employment (Controls 6.3–6.6).mp4

12.3 MB

02 - During employment (Controls 6.3–6.6).srt

10.3 KB

/.../11 - 10. Physical Security/

01 - Ensuring authorized access (Controls 7.1–7.3).mp4

7.2 MB

01 - Ensuring authorized access (Controls 7.1–7.3).srt

4.9 KB

02 - Protecting secure areas (Controls 7.4–7.6).mp4

6.9 MB

02 - Protecting secure areas (Controls 7.4–7.6).srt

5.3 KB

03 - Equipment security (Controls 7.7–7.10).mp4

8.8 MB

03 - Equipment security (Controls 7.7–7.10).srt

6.7 KB

04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).mp4

9.5 MB

04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).srt

6.3 KB

/.../12 - 11. System and Network Security/

01 - Network security management (Controls 8.20–8.23).mp4

12.1 MB

01 - Network security management (Controls 8.20–8.23).srt

8.4 KB

02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4

11.8 MB

02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).srt

8.7 KB

/.../13 - 12. Threat and Vulnerability Management and Secure Configuration/

01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4

9.5 MB

01 - Threat and vulnerability management (Controls 5.7 and 8.8).srt

7.7 KB

02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4

14.2 MB

02 - Secure configuration (Controls 8.9, 8.19, and 8.24).srt

10.4 KB

/.../14 - 13. Application Security/

01 - Secure development (Controls 8.25–8.28).mp4

12.4 MB

01 - Secure development (Controls 8.25–8.28).srt

9.8 KB

02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4

11.7 MB

02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).srt

10.1 KB

/15 - Conclusion/

01 - Achieving ISO 27001 compliance.mp4

5.2 MB

01 - Achieving ISO 27001 compliance.srt

3.0 KB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

/.../Ex_Files_Annex_A_Controls/Exercise Files/Excel files/

Handout 01.02 - Example roles and responsibilities matrix.xlsx

84.8 KB

Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx

23.3 KB

~$Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx

0.2 KB

/.../Ex_Files_Annex_A_Controls/Exercise Files/PDF files/

Handout 01.01 - How to demonstrate compliance with Control 5.1.pdf

25.5 KB

Handout 01.01 - Suggested Topic-specific Information Security Policies.pdf

27.9 KB

Handout 01.02 - Example roles and responsibilities matrix.pdf

31.0 KB

Handout 01.02 - How to demonstrate compliance with Controls 5.2 - 5.4.pdf

25.3 KB

Handout 01.03 - How to demonstrate compliance with Controls 5.5, 5.6 _ 5.8.pdf

25.3 KB

Handout 02.01 - How to demonstrate compliance with Controls 5.9, 5.10, 6.7 _ 8.1.pdf

27.2 KB

Handout 02.02 - How to demonstrate compliance with Controls 5.11, 5.14 _ 5.37.pdf

25.0 KB

Handout 03.01 - How to demonstrate compliance with Controls 5.12, 5.13 _ 5.34.pdf

25.3 KB

Handout 03.02 - How to demonstrate compliance with Controls 8.10 - 8.12 _ 8.33.pdf

27.7 KB

Handout 04.01 - How to demonstrate compliance with Controls 5.15 - 5.18.pdf

25.6 KB

Handout 04.02 - How to demonstrate compliance with Controls 8.2 - 8.5.pdf

25.4 KB

Handout 05.01 - How to demonstrate compliance with Controls 5.19 - 5.21.pdf

25.0 KB

Handout 05.02 - How to demonstrate compliance with Controls 5.22 _ 5.23.pdf

25.2 KB

Handout 06.01 - How to demonstrate compliance with Controls 5.24 - 5.28 _ 6.8.pdf

26.1 KB

Handout 06.02 - How to demonstrate compliance with Controls 8.15 - 8.17.pdf

25.8 KB

Handout 07.01 - How to demonstrate compliance with Controls 5.29, 5.30 _ 8.6.pdf

25.9 KB

Handout 07.02 - How to demonstrate compliance with Controls 8.13 _ 8.14.pdf

25.6 KB

Handout 08.01 - How to demonstrate compliance with Controls 5.31 - 5.33.pdf

28.5 KB

Handout 08.02 - How to demonstrate compliance with Controls 5.35 _ 5.36.pdf

25.4 KB

Handout 09.01 - How to demonstrate compliance with Controls 6.1 _ 6.2.pdf

27.2 KB

Handout 09.02 - How to demonstrate compliance with Controls 6.3 - 6.6.pdf

28.0 KB

Handout 10.01 - How to demonstrate compliance with Controls 7.1 - 7.3.pdf

24.9 KB

Handout 10.02 - How to demonstrate compliance with Controls 7.4 - 7.6.pdf

25.2 KB

Handout 10.03 - How to demonstrate compliance with Controls 7.7 - 7.10.pdf

25.0 KB

Handout 10.04 - How to demonstrate compliance with Controls 7.11 - 7.14.pdf

24.8 KB

Handout 11.01 - How to demonstrate compliance with Controls 8.20 - 8.23.pdf

26.0 KB

Handout 11.02 - How to demonstrate compliance with Controls 8.7, 8.18, 8.30 _ 8.34.pdf

27.1 KB

Handout 12.01 - How to demonstrate compliance with Controls 5.7 _ 8.8.pdf

25.5 KB

Handout 12.02 - How to demonstrate compliance with Controls 8.9, 8.19 _ 8.24.pdf

25.7 KB

Handout 13.01 - How to demonstrate compliance with Controls 8.25 - 8.28.pdf

25.5 KB

 

Total files 97


Copyright © 2024 FileMood.com