/
|
Get Bonus Downloads Here.url
|
0.2 KB
|
/1 - Introductory section/
|
1 - Introduction.en.srt
|
4.4 KB
|
1 - Introduction.mp4
|
19.7 MB
|
2 - Information security, cybersecurity and privacy.en.srt
|
5.0 KB
|
2 - Information security, cybersecurity and privacy.mp4
|
21.6 MB
|
3 - The ISO - IEC 27000 series of standards.en.srt
|
5.8 KB
|
3 - The ISO - IEC 27000 series of standards.mp4
|
33.9 MB
|
4 - An ISMS according to ISO - IEC 27001.en.srt
|
5.0 KB
|
4 - An ISMS according to ISO - IEC 27001.mp4
|
26.1 MB
|
5 - About ISO - IEC 27002 - Security+controls+and+attributes.pdf
|
838.9 KB
|
5 - About ISO - IEC 27002.en.srt
|
8.7 KB
|
5 - About ISO - IEC 27002.mp4
|
51.3 MB
|
/2 - Organizational controls/
|
10 - Contact with authorities.en.srt
|
2.2 KB
|
10 - Contact with authorities.mp4
|
14.5 MB
|
11 - Contact with special interest groups.en.srt
|
2.8 KB
|
11 - Contact with special interest groups.mp4
|
11.9 MB
|
12 - Threat intelligence.en.srt
|
4.0 KB
|
12 - Threat intelligence.mp4
|
23.1 MB
|
13 - Information security in project management.en.srt
|
5.5 KB
|
13 - Information security in project management.mp4
|
33.4 MB
|
14 - Inventory of information and other associated assets.en.srt
|
7.4 KB
|
14 - Inventory of information and other associated assets.mp4
|
89.2 MB
|
15 - Acceptable use of information and other associated assets.en.srt
|
3.5 KB
|
15 - Acceptable use of information and other associated assets.mp4
|
23.0 MB
|
16 - Return of assets.en.srt
|
3.1 KB
|
16 - Return of assets.mp4
|
19.8 MB
|
17 - Classification of information.en.srt
|
6.5 KB
|
17 - Classification of information.mp4
|
37.6 MB
|
18 - Labelling of information.en.srt
|
2.9 KB
|
18 - Labelling of information.mp4
|
13.0 MB
|
19 - Information transfer.en.srt
|
6.4 KB
|
19 - Information transfer.mp4
|
48.9 MB
|
20 - Access control.en.srt
|
10.7 KB
|
20 - Access control.mp4
|
79.7 MB
|
21 - Identity management.en.srt
|
3.4 KB
|
21 - Identity management.mp4
|
20.7 MB
|
22 - Authentication information.en.srt
|
7.6 KB
|
22 - Authentication information.mp4
|
136.8 MB
|
23 - Access rights.en.srt
|
4.7 KB
|
23 - Access rights.mp4
|
62.7 MB
|
24 - Information security in supplier relationships.en.srt
|
7.2 KB
|
24 - Information security in supplier relationships.mp4
|
93.4 MB
|
25 - Addressing information security within supplier agreements.en.srt
|
7.6 KB
|
25 - Addressing information security within supplier agreements.mp4
|
58.4 MB
|
26 - Managing information security in the ICT supply chain.en.srt
|
4.1 KB
|
26 - Managing information security in the ICT supply chain.mp4
|
94.6 MB
|
27 - Monitoring, review and change management of supplier services.en.srt
|
4.2 KB
|
27 - Monitoring, review and change management of supplier services.mp4
|
31.5 MB
|
28 - Information security for use of cloud services.en.srt
|
7.1 KB
|
28 - Information security for use of cloud services.mp4
|
34.2 MB
|
29 - Information security incident management planning and preparation.en.srt
|
6.4 KB
|
29 - Information security incident management planning and preparation.mp4
|
49.9 MB
|
30 - Assessment and decision on information security events.en.srt
|
2.8 KB
|
30 - Assessment and decision on information security events.mp4
|
16.1 MB
|
31 - Response to information security incidents.en.srt
|
3.4 KB
|
31 - Response to information security incidents.mp4
|
22.5 MB
|
32 - Learning from information security incidents.en.srt
|
1.9 KB
|
32 - Learning from information security incidents.mp4
|
8.1 MB
|
33 - Collection of evidence.en.srt
|
4.0 KB
|
33 - Collection of evidence.mp4
|
23.6 MB
|
34 - Information security during disruption.en.srt
|
3.4 KB
|
34 - Information security during disruption.mp4
|
15.2 MB
|
35 - ICT readiness for business continuity.en.srt
|
5.5 KB
|
35 - ICT readiness for business continuity.mp4
|
38.1 MB
|
36 - Legal, statutory, regulatory and contractual requirements.en.srt
|
4.1 KB
|
36 - Legal, statutory, regulatory and contractual requirements.mp4
|
22.7 MB
|
37 - Intellectual property rights.en.srt
|
3.3 KB
|
37 - Intellectual property rights.mp4
|
14.8 MB
|
38 - Protection of records.en.srt
|
2.7 KB
|
38 - Protection of records.mp4
|
14.0 MB
|
39 - Privacy and protection of PII.en.srt
|
3.3 KB
|
39 - Privacy and protection of PII.mp4
|
22.1 MB
|
40 - Independent review of information security.en.srt
|
3.3 KB
|
40 - Independent review of information security.mp4
|
13.6 MB
|
41 - Conformance with policies, rules and standards for information security.en.srt
|
2.4 KB
|
41 - Conformance with policies, rules and standards for information security.mp4
|
13.0 MB
|
42 - Documented operating procedures.en.srt
|
5.0 KB
|
42 - Documented operating procedures.mp4
|
28.7 MB
|
43 - Recapitulation organizational controls.en.srt
|
9.0 KB
|
43 - Recapitulation organizational controls.mp4
|
46.4 MB
|
6 - Policies for information security.en.srt
|
7.8 KB
|
6 - Policies for information security.mp4
|
44.8 MB
|
7 - Information security roles and responsibilities.en.srt
|
4.6 KB
|
7 - Information security roles and responsibilities.mp4
|
59.3 MB
|
8 - Segregation of duties.en.srt
|
3.5 KB
|
8 - Segregation of duties.mp4
|
15.7 MB
|
9 - Management responsibilities.en.srt
|
3.5 KB
|
9 - Management responsibilities.mp4
|
72.7 MB
|
/3 - People controls/
|
44 - Screening.en.srt
|
6.4 KB
|
44 - Screening.mp4
|
35.7 MB
|
45 - Terms and conditions of employment.en.srt
|
3.6 KB
|
45 - Terms and conditions of employment.mp4
|
21.4 MB
|
46 - Information security awareness, education and training.en.srt
|
5.9 KB
|
46 - Information security awareness, education and training.mp4
|
30.8 MB
|
47 - Disciplinary process.en.srt
|
2.6 KB
|
47 - Disciplinary process.mp4
|
10.3 MB
|
48 - Responsibilities after termination or change of employment.en.srt
|
3.9 KB
|
48 - Responsibilities after termination or change of employment.mp4
|
16.7 MB
|
49 - Confidentiality or non-disclosure agreements.en.srt
|
3.5 KB
|
49 - Confidentiality or non-disclosure agreements.mp4
|
55.1 MB
|
50 - Remote working.en.srt
|
5.7 KB
|
50 - Remote working.mp4
|
36.2 MB
|
51 - Information security event reporting - Information_security_event_reporting.mp4
|
9.8 MB
|
51 - Information security event reporting.en.srt
|
3.8 KB
|
51 - Information security event reporting.mp4
|
22.9 MB
|
52 - Recapitulation people controls.en.srt
|
2.4 KB
|
52 - Recapitulation people controls.mp4
|
15.4 MB
|
/4 - Physical controls/
|
53 - Physical security perimeters.en.srt
|
4.9 KB
|
53 - Physical security perimeters.mp4
|
74.7 MB
|
54 - Physical entry.en.srt
|
6.8 KB
|
54 - Physical entry.mp4
|
132.3 MB
|
55 - Securing offices, rooms and facilities.en.srt
|
1.2 KB
|
55 - Securing offices, rooms and facilities.mp4
|
5.4 MB
|
56 - Physical security monitoring.en.srt
|
3.1 KB
|
56 - Physical security monitoring.mp4
|
12.5 MB
|
57 - Protecting against physical and environmental threats.en.srt
|
3.8 KB
|
57 - Protecting against physical and environmental threats.mp4
|
25.7 MB
|
58 - Working in secure areas.en.srt
|
2.3 KB
|
58 - Working in secure areas.mp4
|
13.8 MB
|
59 - Clear desk and clear screen.en.srt
|
3.9 KB
|
59 - Clear desk and clear screen.mp4
|
47.1 MB
|
60 - Equipment siting and protection.en.srt
|
3.9 KB
|
60 - Equipment siting and protection.mp4
|
20.9 MB
|
61 - Security of assets off-premises.en.srt
|
4.1 KB
|
61 - Security of assets off-premises.mp4
|
16.7 MB
|
62 - Storage media.en.srt
|
7.5 KB
|
62 - Storage media.mp4
|
145.7 MB
|
63 - Supporting utilities.en.srt
|
3.3 KB
|
63 - Supporting utilities.mp4
|
13.1 MB
|
64 - Cabling security.en.srt
|
2.6 KB
|
64 - Cabling security.mp4
|
43.8 MB
|
65 - Equipment maintenance.en.srt
|
3.7 KB
|
65 - Equipment maintenance.mp4
|
14.4 MB
|
66 - Secure disposal or re-use of equipment.en.srt
|
4.0 KB
|
66 - Secure disposal or re-use of equipment.mp4
|
22.8 MB
|
67 - Recapitulation physical controls.en.srt
|
3.3 KB
|
67 - Recapitulation physical controls.mp4
|
15.3 MB
|
/5 - Technological controls/
|
100 - Test information.en.srt
|
3.6 KB
|
100 - Test information.mp4
|
12.2 MB
|
101 - Protection of information systems during audit testing.en.srt
|
4.6 KB
|
101 - Protection of information systems during audit testing.mp4
|
32.6 MB
|
102 - Recapitulation technological controls.en.srt
|
9.2 KB
|
102 - Recapitulation technological controls.mp4
|
31.5 MB
|
68 - User endpoint devices.en.srt
|
9.2 KB
|
68 - User endpoint devices.mp4
|
35.1 MB
|
69 - Privileged access rights.en.srt
|
5.7 KB
|
69 - Privileged access rights.mp4
|
22.4 MB
|
70 - Information access restriction.en.srt
|
4.0 KB
|
70 - Information access restriction.mp4
|
22.8 MB
|
71 - Access to source code.en.srt
|
3.0 KB
|
71 - Access to source code.mp4
|
16.2 MB
|
72 - Secure authentication.en.srt
|
6.4 KB
|
72 - Secure authentication.mp4
|
37.8 MB
|
73 - Capacity management.en.srt
|
4.0 KB
|
73 - Capacity management.mp4
|
24.9 MB
|
74 - Protection against malware.en.srt
|
5.0 KB
|
74 - Protection against malware.mp4
|
27.1 MB
|
75 - Management of technical vulnerabilities.en.srt
|
8.7 KB
|
75 - Management of technical vulnerabilities.mp4
|
38.3 MB
|
76 - Configuration management.en.srt
|
4.9 KB
|
76 - Configuration management.mp4
|
87.8 MB
|
77 - Information deletion.en.srt
|
4.7 KB
|
77 - Information deletion.mp4
|
15.5 MB
|
78 - Data masking.en.srt
|
4.8 KB
|
78 - Data masking.mp4
|
16.8 MB
|
79 - Data leakage prevention.en.srt
|
4.5 KB
|
79 - Data leakage prevention.mp4
|
32.8 MB
|
80 - Information backup.en.srt
|
5.7 KB
|
80 - Information backup.mp4
|
42.5 MB
|
81 - Redundancy of information processing facilities.en.srt
|
5.3 KB
|
81 - Redundancy of information processing facilities.mp4
|
31.6 MB
|
82 - Logging.en.srt
|
7.8 KB
|
82 - Logging.mp4
|
25.2 MB
|
83 - Monitoring activities.en.srt
|
5.1 KB
|
83 - Monitoring activities.mp4
|
28.5 MB
|
84 - Clock synchronization.en.srt
|
2.7 KB
|
84 - Clock synchronization.mp4
|
12.1 MB
|
85 - Use of privileged utility programs.en.srt
|
2.9 KB
|
85 - Use of privileged utility programs.mp4
|
59.0 MB
|
86 - Installation of software on operational systems.en.srt
|
4.4 KB
|
86 - Installation of software on operational systems.mp4
|
22.6 MB
|
87 - Networks security.en.srt
|
6.2 KB
|
87 - Networks security.mp4
|
74.4 MB
|
88 - Security of network services.en.srt
|
4.0 KB
|
88 - Security of network services.mp4
|
88.0 MB
|
89 - Segregation of networks.en.srt
|
3.8 KB
|
89 - Segregation of networks.mp4
|
19.4 MB
|
90 - Web filtering.en.srt
|
4.1 KB
|
90 - Web filtering.mp4
|
14.7 MB
|
91 - Use of cryptography.en.srt
|
8.4 KB
|
91 - Use of cryptography.mp4
|
61.1 MB
|
92 - Secure development life cycle.en.srt
|
4.6 KB
|
92 - Secure development life cycle.mp4
|
25.2 MB
|
93 - Application security requirements.en.srt
|
9.4 KB
|
93 - Application security requirements.mp4
|
49.0 MB
|
94 - Secure system architecture and engineering principles.en.srt
|
9.4 KB
|
94 - Secure system architecture and engineering principles.mp4
|
155.3 MB
|
95 - Secure coding.en.srt
|
6.6 KB
|
95 - Secure coding.mp4
|
27.0 MB
|
96 - Security testing in development and acceptance.en.srt
|
4.3 KB
|
96 - Security testing in development and acceptance.mp4
|
60.9 MB
|
97 - Outsourced development.en.srt
|
5.8 KB
|
97 - Outsourced development.mp4
|
21.3 MB
|
98 - Separation of development, test and production environments.en.srt
|
5.3 KB
|
98 - Separation of development, test and production environments.mp4
|
21.4 MB
|
99 - Change management.en.srt
|
3.2 KB
|
99 - Change management.mp4
|
16.2 MB
|
/.../6 - One or two more things/
|
103 - The certification to ISO - IEC 27001 and ISO - IEC 27002.en.srt
|
5.5 KB
|
103 - The certification to ISO - IEC 27001 and ISO - IEC 27002.mp4
|
71.0 MB
|
104 - Thank you and good bye! - ISO_27002_Information_security_controls_presentation.pdf
|
23.6 MB
|
104 - Thank you and good bye!.en.srt
|
3.5 KB
|
104 - Thank you and good bye!.mp4
|
13.3 MB
|
105 - Bonus lecture - My other courses on information security management.en.srt
|
9.3 KB
|
105 - Bonus lecture - My other courses on information security management.mp4
|
178.6 MB
|
/.../6 - One or two more things/section01/
|
about-isoiec-27002autogenerated.vtt
|
7.9 KB
|
an-isms-according-to-isoiec-27001autogenerated.vtt
|
4.5 KB
|
information-security-cybersecurity-and-privacyautogenerated.vtt
|
4.5 KB
|
introductionautogenerated.vtt
|
4.0 KB
|
the-isoiec-27000-series-of-standardsautogenerated.vtt
|
5.2 KB
|
/.../6 - One or two more things/section02/
|
acceptable-use-of-information-and-other-associated-assetsautogenerated.vtt
|
3.2 KB
|
access-controlautogenerated.vtt
|
9.8 KB
|
access-rightsautogenerated.vtt
|
4.3 KB
|
addressing-information-security-within-supplier-agreementsautogenerated.vtt
|
6.9 KB
|
assessment-and-decision-on-information-security-eventsautogenerated.vtt
|
2.6 KB
|
authentication-informationautogenerated.vtt
|
6.9 KB
|
classification-of-informationautogenerated.vtt
|
5.9 KB
|
collection-of-evidenceautogenerated.vtt
|
3.7 KB
|
conformance-with-policies-and-standards-for-information-securityautogenerated.vtt
|
2.2 KB
|
contact-with-authoritiesautogenerated.vtt
|
2.0 KB
|
contact-with-special-interest-groupsautogenerated.vtt
|
2.6 KB
|
documented-operating-proceduresautogenerated.vtt
|
4.6 KB
|
ict-readiness-for-business-continuityautogenerated.vtt
|
5.0 KB
|
identity-managementautogenerated.vtt
|
3.1 KB
|
independent-review-of-information-securityautogenerated.vtt
|
2.9 KB
|
information-security-during-disruptionautogenerated.vtt
|
3.1 KB
|
information-security-for-use-of-cloud-servicesautogenerated.vtt
|
6.5 KB
|
information-security-in-project-managementautogenerated.vtt
|
5.1 KB
|
information-security-in-supplier-relationshipsautogenerated.vtt
|
6.6 KB
|
information-security-incident-management-planning-and-preparationautogenerated.vtt
|
5.8 KB
|
information-security-roles-and-responsibilitiesautogenerated.vtt
|
4.2 KB
|
information-transferautogenerated.vtt
|
5.9 KB
|
intellectual-property-rightsautogenerated.vtt
|
3.0 KB
|
inventory-of-information-and-other-associated-assetsautogenerated.vtt
|
6.7 KB
|
labelling-of-informationautogenerated.vtt
|
2.7 KB
|
learning-from-information-security-incidentsautogenerated.vtt
|
1.7 KB
|
legal-statutory-regulatory-and-contractual-requirementsautogenerated.vtt
|
3.8 KB
|
management-responsibilitiesautogenerated.vtt
|
3.3 KB
|
managing-information-security-in-the-ict-supply-chainautogenerated.vtt
|
3.8 KB
|
monitoring-review-and-change-management-of-supplier-servicesautogenerated.vtt
|
3.9 KB
|
policies-for-information-securityautogenerated.vtt
|
7.1 KB
|
privacy-and-protection-of-piiautogenerated.vtt
|
3.1 KB
|
protection-of-recordsautogenerated.vtt
|
2.5 KB
|
recapitulation-organizational-controlsautogenerated.vtt
|
8.3 KB
|
response-to-information-security-incidentsautogenerated.vtt
|
3.1 KB
|
return-of-assetsautogenerated.vtt
|
2.8 KB
|
segregation-of-dutiesautogenerated.vtt
|
3.2 KB
|
threat-intelligenceautogenerated.vtt
|
3.6 KB
|
/.../6 - One or two more things/section03/
|
confidentiality-or-non-disclosure-agreementsautogenerated.vtt
|
3.2 KB
|
disciplinary-processautogenerated.vtt
|
2.4 KB
|
information-security-awareness-education-and-trainingautogenerated.vtt
|
5.4 KB
|
information-security-event-reportingautogenerated.vtt
|
3.5 KB
|
recapitulation-people-controlsautogenerated.vtt
|
2.2 KB
|
remote-workingautogenerated.vtt
|
5.2 KB
|
responsibilities-after-termination-or-change-of-employmentautogenerated.vtt
|
3.6 KB
|
screeningautogenerated.vtt
|
5.9 KB
|
terms-and-conditions-of-employmentautogenerated.vtt
|
3.3 KB
|
/.../6 - One or two more things/section04/
|
cabling-securityautogenerated.vtt
|
2.4 KB
|
clear-desk-and-clear-screenautogenerated.vtt
|
3.5 KB
|
equipment-maintenanceautogenerated.vtt
|
3.4 KB
|
equipment-siting-and-protectionautogenerated.vtt
|
3.6 KB
|
physical-entryautogenerated.vtt
|
6.2 KB
|
physical-security-monitoringautogenerated.vtt
|
2.8 KB
|
physical-security-perimetersautogenerated.vtt
|
4.5 KB
|
protecting-against-physical-and-environmental-threatsautogenerated.vtt
|
3.5 KB
|
recapitulation-physical-controlsautogenerated.vtt
|
3.0 KB
|
secure-disposal-or-re-use-of-equipmentautogenerated.vtt
|
3.6 KB
|
securing-offices-rooms-and-facilitiesautogenerated.vtt
|
1.1 KB
|
security-of-assets-off-premisesautogenerated.vtt
|
3.7 KB
|
storage-mediaautogenerated.vtt
|
6.8 KB
|
supporting-utilitiesautogenerated.vtt
|
3.1 KB
|
working-in-secure-areasautogenerated.vtt
|
2.1 KB
|
/.../6 - One or two more things/section05/
|
access-to-source-codeautogenerated.vtt
|
2.7 KB
|
application-security-requirementsautogenerated.vtt
|
8.6 KB
|
capacity-managementautogenerated.vtt
|
3.7 KB
|
change-managementautogenerated.vtt
|
2.9 KB
|
clock-synchronizationautogenerated.vtt
|
2.4 KB
|
configuration-managementautogenerated.vtt
|
4.5 KB
|
data-leakage-preventionautogenerated.vtt
|
4.2 KB
|
data-maskingautogenerated.vtt
|
4.4 KB
|
information-access-restrictionautogenerated.vtt
|
3.6 KB
|
information-backupautogenerated.vtt
|
5.2 KB
|
information-deletionautogenerated.vtt
|
4.3 KB
|
installation-of-software-on-operational-systemsautogenerated.vtt
|
4.0 KB
|
loggingautogenerated.vtt
|
7.1 KB
|
management-of-technical-vulnerabilitiesautogenerated.vtt
|
8.0 KB
|
monitoring-activitiesautogenerated.vtt
|
4.7 KB
|
networks-securityautogenerated.vtt
|
5.7 KB
|
outsourced-developmentautogenerated.vtt
|
5.3 KB
|
privileged-access-rightsautogenerated.vtt
|
5.2 KB
|
protection-against-malwareautogenerated.vtt
|
4.6 KB
|
protection-of-information-systems-during-audit-testingautogenerated.vtt
|
4.2 KB
|
recapitulation-technological-controlsautogenerated.vtt
|
8.4 KB
|
redundancy-of-information-processing-facilitiesautogenerated.vtt
|
4.9 KB
|
secure-authenticationautogenerated.vtt
|
5.8 KB
|
secure-codingautogenerated.vtt
|
6.1 KB
|
secure-development-life-cycleautogenerated.vtt
|
4.2 KB
|
secure-system-architecture-and-engineering-principlesautogenerated.vtt
|
8.6 KB
|
security-of-network-servicesautogenerated.vtt
|
3.7 KB
|
security-testing-in-development-and-acceptanceautogenerated.vtt
|
3.9 KB
|
segregation-of-networksautogenerated.vtt
|
3.4 KB
|
separation-of-development-test-and-production-environmentsautogenerated.vtt
|
4.9 KB
|
test-informationautogenerated.vtt
|
3.2 KB
|
use-of-cryptographyautogenerated.vtt
|
7.7 KB
|
use-of-privileged-utility-programsautogenerated.vtt
|
2.7 KB
|
user-endpoint-devicesautogenerated.vtt
|
8.4 KB
|
web-filteringautogenerated.vtt
|
3.7 KB
|
/.../6 - One or two more things/section06/
|
thank-you-and-good-byeautogenerated.vtt
|
3.2 KB
|
the-certification-to-isoiec-27001-and-isoiec-27002autogenerated.vtt
|
5.0 KB
|
/~Get Your Files Here !/
|
Bonus Resources.txt
|
0.1 KB
|
Total files 319
|