/
|
Get Bonus Downloads Here.url
|
0.2 KB
|
/01 - Introduction/
|
01 - Introduction to the Annex A controls.mp4
|
3.4 MB
|
01 - Introduction to the Annex A controls.srt
|
1.5 KB
|
/02 - 1. Governance/
|
01 - Policies for information security (Control 5.1).mp4
|
10.1 MB
|
01 - Policies for information security (Control 5.1).srt
|
9.2 KB
|
02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4
|
10.4 MB
|
02 - Roles, responsibilities, and duties (Controls 5.2–5.4).srt
|
7.6 KB
|
03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4
|
11.0 MB
|
03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).srt
|
8.7 KB
|
/.../03 - 2. Asset Management/
|
01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4
|
10.8 MB
|
01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).srt
|
8.5 KB
|
02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).mp4
|
8.2 MB
|
02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).srt
|
6.9 KB
|
/.../04 - 3. Information Protection/
|
01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4
|
10.8 MB
|
01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).srt
|
8.3 KB
|
02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4
|
12.7 MB
|
02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).srt
|
10.0 KB
|
/.../05 - 4. Identity and Access Management/
|
01 - Access management (Controls 5.15–5.18).mp4
|
12.9 MB
|
01 - Access management (Controls 5.15–5.18).srt
|
9.0 KB
|
02 - System and application access control (Controls 8.2–8.5).mp4
|
11.6 MB
|
02 - System and application access control (Controls 8.2–8.5).srt
|
8.3 KB
|
/.../06 - 5. Supplier Relationships Security/
|
01 - Supplier relationships security (Controls 5.19–5.21).mp4
|
9.6 MB
|
01 - Supplier relationships security (Controls 5.19–5.21).srt
|
8.1 KB
|
02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4
|
9.6 MB
|
02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).srt
|
6.7 KB
|
/.../07 - 6. Information Security Event Management/
|
01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4
|
13.3 MB
|
01 - Information security incident management (Controls 5.24–5.28, and 6.8).srt
|
10.2 KB
|
02 - Logging and monitoring (Controls 8.15–8.17).mp4
|
9.9 MB
|
02 - Logging and monitoring (Controls 8.15–8.17).srt
|
7.4 KB
|
/08 - 7. Continuity/
|
01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4
|
12.4 MB
|
01 - Continuity (Controls 5.29, 5.30, and 8.13).srt
|
9.2 KB
|
02 - Backup and availability (Controls 8.13 and 8.14).mp4
|
6.3 MB
|
02 - Backup and availability (Controls 8.13 and 8.14).srt
|
4.5 KB
|
/.../09 - 8. Legal, Compliance, and Security Assurance/
|
01 - Legal and compliance (Controls 5.31–5.33).mp4
|
9.0 MB
|
01 - Legal and compliance (Controls 5.31–5.33).srt
|
6.3 KB
|
02 - Information security assurance (Control 5.35 and 5.36).mp4
|
7.6 MB
|
02 - Information security assurance (Control 5.35 and 5.36).srt
|
5.3 KB
|
/.../10 - 9. Human Resource Security/
|
01 - Prior to employment (Controls 6.1 and 6.2).mp4
|
8.2 MB
|
01 - Prior to employment (Controls 6.1 and 6.2).srt
|
6.2 KB
|
02 - During employment (Controls 6.3–6.6).mp4
|
12.3 MB
|
02 - During employment (Controls 6.3–6.6).srt
|
10.3 KB
|
/.../11 - 10. Physical Security/
|
01 - Ensuring authorized access (Controls 7.1–7.3).mp4
|
7.2 MB
|
01 - Ensuring authorized access (Controls 7.1–7.3).srt
|
4.9 KB
|
02 - Protecting secure areas (Controls 7.4–7.6).mp4
|
6.9 MB
|
02 - Protecting secure areas (Controls 7.4–7.6).srt
|
5.3 KB
|
03 - Equipment security (Controls 7.7–7.10).mp4
|
8.8 MB
|
03 - Equipment security (Controls 7.7–7.10).srt
|
6.7 KB
|
04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).mp4
|
9.5 MB
|
04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).srt
|
6.3 KB
|
/.../12 - 11. System and Network Security/
|
01 - Network security management (Controls 8.20–8.23).mp4
|
12.1 MB
|
01 - Network security management (Controls 8.20–8.23).srt
|
8.4 KB
|
02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4
|
11.8 MB
|
02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).srt
|
8.7 KB
|
/.../13 - 12. Threat and Vulnerability Management and Secure Configuration/
|
01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4
|
9.5 MB
|
01 - Threat and vulnerability management (Controls 5.7 and 8.8).srt
|
7.7 KB
|
02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4
|
14.2 MB
|
02 - Secure configuration (Controls 8.9, 8.19, and 8.24).srt
|
10.4 KB
|
/.../14 - 13. Application Security/
|
01 - Secure development (Controls 8.25–8.28).mp4
|
12.4 MB
|
01 - Secure development (Controls 8.25–8.28).srt
|
9.8 KB
|
02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4
|
11.7 MB
|
02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).srt
|
10.1 KB
|
/15 - Conclusion/
|
01 - Achieving ISO 27001 compliance.mp4
|
5.2 MB
|
01 - Achieving ISO 27001 compliance.srt
|
3.0 KB
|
/~Get Your Files Here !/
|
Bonus Resources.txt
|
0.4 KB
|
/.../Ex_Files_Annex_A_Controls/Exercise Files/Excel files/
|
Handout 01.02 - Example roles and responsibilities matrix.xlsx
|
84.8 KB
|
Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx
|
23.3 KB
|
~$Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx
|
0.2 KB
|
/.../Ex_Files_Annex_A_Controls/Exercise Files/PDF files/
|
Handout 01.01 - How to demonstrate compliance with Control 5.1.pdf
|
25.5 KB
|
Handout 01.01 - Suggested Topic-specific Information Security Policies.pdf
|
27.9 KB
|
Handout 01.02 - Example roles and responsibilities matrix.pdf
|
31.0 KB
|
Handout 01.02 - How to demonstrate compliance with Controls 5.2 - 5.4.pdf
|
25.3 KB
|
Handout 01.03 - How to demonstrate compliance with Controls 5.5, 5.6 _ 5.8.pdf
|
25.3 KB
|
Handout 02.01 - How to demonstrate compliance with Controls 5.9, 5.10, 6.7 _ 8.1.pdf
|
27.2 KB
|
Handout 02.02 - How to demonstrate compliance with Controls 5.11, 5.14 _ 5.37.pdf
|
25.0 KB
|
Handout 03.01 - How to demonstrate compliance with Controls 5.12, 5.13 _ 5.34.pdf
|
25.3 KB
|
Handout 03.02 - How to demonstrate compliance with Controls 8.10 - 8.12 _ 8.33.pdf
|
27.7 KB
|
Handout 04.01 - How to demonstrate compliance with Controls 5.15 - 5.18.pdf
|
25.6 KB
|
Handout 04.02 - How to demonstrate compliance with Controls 8.2 - 8.5.pdf
|
25.4 KB
|
Handout 05.01 - How to demonstrate compliance with Controls 5.19 - 5.21.pdf
|
25.0 KB
|
Handout 05.02 - How to demonstrate compliance with Controls 5.22 _ 5.23.pdf
|
25.2 KB
|
Handout 06.01 - How to demonstrate compliance with Controls 5.24 - 5.28 _ 6.8.pdf
|
26.1 KB
|
Handout 06.02 - How to demonstrate compliance with Controls 8.15 - 8.17.pdf
|
25.8 KB
|
Handout 07.01 - How to demonstrate compliance with Controls 5.29, 5.30 _ 8.6.pdf
|
25.9 KB
|
Handout 07.02 - How to demonstrate compliance with Controls 8.13 _ 8.14.pdf
|
25.6 KB
|
Handout 08.01 - How to demonstrate compliance with Controls 5.31 - 5.33.pdf
|
28.5 KB
|
Handout 08.02 - How to demonstrate compliance with Controls 5.35 _ 5.36.pdf
|
25.4 KB
|
Handout 09.01 - How to demonstrate compliance with Controls 6.1 _ 6.2.pdf
|
27.2 KB
|
Handout 09.02 - How to demonstrate compliance with Controls 6.3 - 6.6.pdf
|
28.0 KB
|
Handout 10.01 - How to demonstrate compliance with Controls 7.1 - 7.3.pdf
|
24.9 KB
|
Handout 10.02 - How to demonstrate compliance with Controls 7.4 - 7.6.pdf
|
25.2 KB
|
Handout 10.03 - How to demonstrate compliance with Controls 7.7 - 7.10.pdf
|
25.0 KB
|
Handout 10.04 - How to demonstrate compliance with Controls 7.11 - 7.14.pdf
|
24.8 KB
|
Handout 11.01 - How to demonstrate compliance with Controls 8.20 - 8.23.pdf
|
26.0 KB
|
Handout 11.02 - How to demonstrate compliance with Controls 8.7, 8.18, 8.30 _ 8.34.pdf
|
27.1 KB
|
Handout 12.01 - How to demonstrate compliance with Controls 5.7 _ 8.8.pdf
|
25.5 KB
|
Handout 12.02 - How to demonstrate compliance with Controls 8.9, 8.19 _ 8.24.pdf
|
25.7 KB
|
Handout 13.01 - How to demonstrate compliance with Controls 8.25 - 8.28.pdf
|
25.5 KB
|
Total files 97
|