FileMood

Download [ WebToolTip.com ] Udemy - ISO - IEC 27002 - 2022. Information security controls

WebToolTip com Udemy ISO IEC 27002 2022 Information security controls

Name

[ WebToolTip.com ] Udemy - ISO - IEC 27002 - 2022. Information security controls

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

4.1 GB

Total Files

319

Last Seen

2025-07-18 00:22

Hash

B5547B01A28F78261A017E409CA46F845DD5A08B

/

Get Bonus Downloads Here.url

0.2 KB

/1 - Introductory section/

1 - Introduction.en.srt

4.4 KB

1 - Introduction.mp4

19.7 MB

2 - Information security, cybersecurity and privacy.en.srt

5.0 KB

2 - Information security, cybersecurity and privacy.mp4

21.6 MB

3 - The ISO - IEC 27000 series of standards.en.srt

5.8 KB

3 - The ISO - IEC 27000 series of standards.mp4

33.9 MB

4 - An ISMS according to ISO - IEC 27001.en.srt

5.0 KB

4 - An ISMS according to ISO - IEC 27001.mp4

26.1 MB

5 - About ISO - IEC 27002 - Security+controls+and+attributes.pdf

838.9 KB

5 - About ISO - IEC 27002.en.srt

8.7 KB

5 - About ISO - IEC 27002.mp4

51.3 MB

/2 - Organizational controls/

10 - Contact with authorities.en.srt

2.2 KB

10 - Contact with authorities.mp4

14.5 MB

11 - Contact with special interest groups.en.srt

2.8 KB

11 - Contact with special interest groups.mp4

11.9 MB

12 - Threat intelligence.en.srt

4.0 KB

12 - Threat intelligence.mp4

23.1 MB

13 - Information security in project management.en.srt

5.5 KB

13 - Information security in project management.mp4

33.4 MB

14 - Inventory of information and other associated assets.en.srt

7.4 KB

14 - Inventory of information and other associated assets.mp4

89.2 MB

15 - Acceptable use of information and other associated assets.en.srt

3.5 KB

15 - Acceptable use of information and other associated assets.mp4

23.0 MB

16 - Return of assets.en.srt

3.1 KB

16 - Return of assets.mp4

19.8 MB

17 - Classification of information.en.srt

6.5 KB

17 - Classification of information.mp4

37.6 MB

18 - Labelling of information.en.srt

2.9 KB

18 - Labelling of information.mp4

13.0 MB

19 - Information transfer.en.srt

6.4 KB

19 - Information transfer.mp4

48.9 MB

20 - Access control.en.srt

10.7 KB

20 - Access control.mp4

79.7 MB

21 - Identity management.en.srt

3.4 KB

21 - Identity management.mp4

20.7 MB

22 - Authentication information.en.srt

7.6 KB

22 - Authentication information.mp4

136.8 MB

23 - Access rights.en.srt

4.7 KB

23 - Access rights.mp4

62.7 MB

24 - Information security in supplier relationships.en.srt

7.2 KB

24 - Information security in supplier relationships.mp4

93.4 MB

25 - Addressing information security within supplier agreements.en.srt

7.6 KB

25 - Addressing information security within supplier agreements.mp4

58.4 MB

26 - Managing information security in the ICT supply chain.en.srt

4.1 KB

26 - Managing information security in the ICT supply chain.mp4

94.6 MB

27 - Monitoring, review and change management of supplier services.en.srt

4.2 KB

27 - Monitoring, review and change management of supplier services.mp4

31.5 MB

28 - Information security for use of cloud services.en.srt

7.1 KB

28 - Information security for use of cloud services.mp4

34.2 MB

29 - Information security incident management planning and preparation.en.srt

6.4 KB

29 - Information security incident management planning and preparation.mp4

49.9 MB

30 - Assessment and decision on information security events.en.srt

2.8 KB

30 - Assessment and decision on information security events.mp4

16.1 MB

31 - Response to information security incidents.en.srt

3.4 KB

31 - Response to information security incidents.mp4

22.5 MB

32 - Learning from information security incidents.en.srt

1.9 KB

32 - Learning from information security incidents.mp4

8.1 MB

33 - Collection of evidence.en.srt

4.0 KB

33 - Collection of evidence.mp4

23.6 MB

34 - Information security during disruption.en.srt

3.4 KB

34 - Information security during disruption.mp4

15.2 MB

35 - ICT readiness for business continuity.en.srt

5.5 KB

35 - ICT readiness for business continuity.mp4

38.1 MB

36 - Legal, statutory, regulatory and contractual requirements.en.srt

4.1 KB

36 - Legal, statutory, regulatory and contractual requirements.mp4

22.7 MB

37 - Intellectual property rights.en.srt

3.3 KB

37 - Intellectual property rights.mp4

14.8 MB

38 - Protection of records.en.srt

2.7 KB

38 - Protection of records.mp4

14.0 MB

39 - Privacy and protection of PII.en.srt

3.3 KB

39 - Privacy and protection of PII.mp4

22.1 MB

40 - Independent review of information security.en.srt

3.3 KB

40 - Independent review of information security.mp4

13.6 MB

41 - Conformance with policies, rules and standards for information security.en.srt

2.4 KB

41 - Conformance with policies, rules and standards for information security.mp4

13.0 MB

42 - Documented operating procedures.en.srt

5.0 KB

42 - Documented operating procedures.mp4

28.7 MB

43 - Recapitulation organizational controls.en.srt

9.0 KB

43 - Recapitulation organizational controls.mp4

46.4 MB

6 - Policies for information security.en.srt

7.8 KB

6 - Policies for information security.mp4

44.8 MB

7 - Information security roles and responsibilities.en.srt

4.6 KB

7 - Information security roles and responsibilities.mp4

59.3 MB

8 - Segregation of duties.en.srt

3.5 KB

8 - Segregation of duties.mp4

15.7 MB

9 - Management responsibilities.en.srt

3.5 KB

9 - Management responsibilities.mp4

72.7 MB

/3 - People controls/

44 - Screening.en.srt

6.4 KB

44 - Screening.mp4

35.7 MB

45 - Terms and conditions of employment.en.srt

3.6 KB

45 - Terms and conditions of employment.mp4

21.4 MB

46 - Information security awareness, education and training.en.srt

5.9 KB

46 - Information security awareness, education and training.mp4

30.8 MB

47 - Disciplinary process.en.srt

2.6 KB

47 - Disciplinary process.mp4

10.3 MB

48 - Responsibilities after termination or change of employment.en.srt

3.9 KB

48 - Responsibilities after termination or change of employment.mp4

16.7 MB

49 - Confidentiality or non-disclosure agreements.en.srt

3.5 KB

49 - Confidentiality or non-disclosure agreements.mp4

55.1 MB

50 - Remote working.en.srt

5.7 KB

50 - Remote working.mp4

36.2 MB

51 - Information security event reporting - Information_security_event_reporting.mp4

9.8 MB

51 - Information security event reporting.en.srt

3.8 KB

51 - Information security event reporting.mp4

22.9 MB

52 - Recapitulation people controls.en.srt

2.4 KB

52 - Recapitulation people controls.mp4

15.4 MB

/4 - Physical controls/

53 - Physical security perimeters.en.srt

4.9 KB

53 - Physical security perimeters.mp4

74.7 MB

54 - Physical entry.en.srt

6.8 KB

54 - Physical entry.mp4

132.3 MB

55 - Securing offices, rooms and facilities.en.srt

1.2 KB

55 - Securing offices, rooms and facilities.mp4

5.4 MB

56 - Physical security monitoring.en.srt

3.1 KB

56 - Physical security monitoring.mp4

12.5 MB

57 - Protecting against physical and environmental threats.en.srt

3.8 KB

57 - Protecting against physical and environmental threats.mp4

25.7 MB

58 - Working in secure areas.en.srt

2.3 KB

58 - Working in secure areas.mp4

13.8 MB

59 - Clear desk and clear screen.en.srt

3.9 KB

59 - Clear desk and clear screen.mp4

47.1 MB

60 - Equipment siting and protection.en.srt

3.9 KB

60 - Equipment siting and protection.mp4

20.9 MB

61 - Security of assets off-premises.en.srt

4.1 KB

61 - Security of assets off-premises.mp4

16.7 MB

62 - Storage media.en.srt

7.5 KB

62 - Storage media.mp4

145.7 MB

63 - Supporting utilities.en.srt

3.3 KB

63 - Supporting utilities.mp4

13.1 MB

64 - Cabling security.en.srt

2.6 KB

64 - Cabling security.mp4

43.8 MB

65 - Equipment maintenance.en.srt

3.7 KB

65 - Equipment maintenance.mp4

14.4 MB

66 - Secure disposal or re-use of equipment.en.srt

4.0 KB

66 - Secure disposal or re-use of equipment.mp4

22.8 MB

67 - Recapitulation physical controls.en.srt

3.3 KB

67 - Recapitulation physical controls.mp4

15.3 MB

/5 - Technological controls/

100 - Test information.en.srt

3.6 KB

100 - Test information.mp4

12.2 MB

101 - Protection of information systems during audit testing.en.srt

4.6 KB

101 - Protection of information systems during audit testing.mp4

32.6 MB

102 - Recapitulation technological controls.en.srt

9.2 KB

102 - Recapitulation technological controls.mp4

31.5 MB

68 - User endpoint devices.en.srt

9.2 KB

68 - User endpoint devices.mp4

35.1 MB

69 - Privileged access rights.en.srt

5.7 KB

69 - Privileged access rights.mp4

22.4 MB

70 - Information access restriction.en.srt

4.0 KB

70 - Information access restriction.mp4

22.8 MB

71 - Access to source code.en.srt

3.0 KB

71 - Access to source code.mp4

16.2 MB

72 - Secure authentication.en.srt

6.4 KB

72 - Secure authentication.mp4

37.8 MB

73 - Capacity management.en.srt

4.0 KB

73 - Capacity management.mp4

24.9 MB

74 - Protection against malware.en.srt

5.0 KB

74 - Protection against malware.mp4

27.1 MB

75 - Management of technical vulnerabilities.en.srt

8.7 KB

75 - Management of technical vulnerabilities.mp4

38.3 MB

76 - Configuration management.en.srt

4.9 KB

76 - Configuration management.mp4

87.8 MB

77 - Information deletion.en.srt

4.7 KB

77 - Information deletion.mp4

15.5 MB

78 - Data masking.en.srt

4.8 KB

78 - Data masking.mp4

16.8 MB

79 - Data leakage prevention.en.srt

4.5 KB

79 - Data leakage prevention.mp4

32.8 MB

80 - Information backup.en.srt

5.7 KB

80 - Information backup.mp4

42.5 MB

81 - Redundancy of information processing facilities.en.srt

5.3 KB

81 - Redundancy of information processing facilities.mp4

31.6 MB

82 - Logging.en.srt

7.8 KB

82 - Logging.mp4

25.2 MB

83 - Monitoring activities.en.srt

5.1 KB

83 - Monitoring activities.mp4

28.5 MB

84 - Clock synchronization.en.srt

2.7 KB

84 - Clock synchronization.mp4

12.1 MB

85 - Use of privileged utility programs.en.srt

2.9 KB

85 - Use of privileged utility programs.mp4

59.0 MB

86 - Installation of software on operational systems.en.srt

4.4 KB

86 - Installation of software on operational systems.mp4

22.6 MB

87 - Networks security.en.srt

6.2 KB

87 - Networks security.mp4

74.4 MB

88 - Security of network services.en.srt

4.0 KB

88 - Security of network services.mp4

88.0 MB

89 - Segregation of networks.en.srt

3.8 KB

89 - Segregation of networks.mp4

19.4 MB

90 - Web filtering.en.srt

4.1 KB

90 - Web filtering.mp4

14.7 MB

91 - Use of cryptography.en.srt

8.4 KB

91 - Use of cryptography.mp4

61.1 MB

92 - Secure development life cycle.en.srt

4.6 KB

92 - Secure development life cycle.mp4

25.2 MB

93 - Application security requirements.en.srt

9.4 KB

93 - Application security requirements.mp4

49.0 MB

94 - Secure system architecture and engineering principles.en.srt

9.4 KB

94 - Secure system architecture and engineering principles.mp4

155.3 MB

95 - Secure coding.en.srt

6.6 KB

95 - Secure coding.mp4

27.0 MB

96 - Security testing in development and acceptance.en.srt

4.3 KB

96 - Security testing in development and acceptance.mp4

60.9 MB

97 - Outsourced development.en.srt

5.8 KB

97 - Outsourced development.mp4

21.3 MB

98 - Separation of development, test and production environments.en.srt

5.3 KB

98 - Separation of development, test and production environments.mp4

21.4 MB

99 - Change management.en.srt

3.2 KB

99 - Change management.mp4

16.2 MB

/.../6 - One or two more things/

103 - The certification to ISO - IEC 27001 and ISO - IEC 27002.en.srt

5.5 KB

103 - The certification to ISO - IEC 27001 and ISO - IEC 27002.mp4

71.0 MB

104 - Thank you and good bye! - ISO_27002_Information_security_controls_presentation.pdf

23.6 MB

104 - Thank you and good bye!.en.srt

3.5 KB

104 - Thank you and good bye!.mp4

13.3 MB

105 - Bonus lecture - My other courses on information security management.en.srt

9.3 KB

105 - Bonus lecture - My other courses on information security management.mp4

178.6 MB

/.../6 - One or two more things/section01/

about-isoiec-27002autogenerated.vtt

7.9 KB

an-isms-according-to-isoiec-27001autogenerated.vtt

4.5 KB

information-security-cybersecurity-and-privacyautogenerated.vtt

4.5 KB

introductionautogenerated.vtt

4.0 KB

the-isoiec-27000-series-of-standardsautogenerated.vtt

5.2 KB

/.../6 - One or two more things/section02/

acceptable-use-of-information-and-other-associated-assetsautogenerated.vtt

3.2 KB

access-controlautogenerated.vtt

9.8 KB

access-rightsautogenerated.vtt

4.3 KB

addressing-information-security-within-supplier-agreementsautogenerated.vtt

6.9 KB

assessment-and-decision-on-information-security-eventsautogenerated.vtt

2.6 KB

authentication-informationautogenerated.vtt

6.9 KB

classification-of-informationautogenerated.vtt

5.9 KB

collection-of-evidenceautogenerated.vtt

3.7 KB

conformance-with-policies-and-standards-for-information-securityautogenerated.vtt

2.2 KB

contact-with-authoritiesautogenerated.vtt

2.0 KB

contact-with-special-interest-groupsautogenerated.vtt

2.6 KB

documented-operating-proceduresautogenerated.vtt

4.6 KB

ict-readiness-for-business-continuityautogenerated.vtt

5.0 KB

identity-managementautogenerated.vtt

3.1 KB

independent-review-of-information-securityautogenerated.vtt

2.9 KB

information-security-during-disruptionautogenerated.vtt

3.1 KB

information-security-for-use-of-cloud-servicesautogenerated.vtt

6.5 KB

information-security-in-project-managementautogenerated.vtt

5.1 KB

information-security-in-supplier-relationshipsautogenerated.vtt

6.6 KB

information-security-incident-management-planning-and-preparationautogenerated.vtt

5.8 KB

information-security-roles-and-responsibilitiesautogenerated.vtt

4.2 KB

information-transferautogenerated.vtt

5.9 KB

intellectual-property-rightsautogenerated.vtt

3.0 KB

inventory-of-information-and-other-associated-assetsautogenerated.vtt

6.7 KB

labelling-of-informationautogenerated.vtt

2.7 KB

learning-from-information-security-incidentsautogenerated.vtt

1.7 KB

legal-statutory-regulatory-and-contractual-requirementsautogenerated.vtt

3.8 KB

management-responsibilitiesautogenerated.vtt

3.3 KB

managing-information-security-in-the-ict-supply-chainautogenerated.vtt

3.8 KB

monitoring-review-and-change-management-of-supplier-servicesautogenerated.vtt

3.9 KB

policies-for-information-securityautogenerated.vtt

7.1 KB

privacy-and-protection-of-piiautogenerated.vtt

3.1 KB

protection-of-recordsautogenerated.vtt

2.5 KB

recapitulation-organizational-controlsautogenerated.vtt

8.3 KB

response-to-information-security-incidentsautogenerated.vtt

3.1 KB

return-of-assetsautogenerated.vtt

2.8 KB

segregation-of-dutiesautogenerated.vtt

3.2 KB

threat-intelligenceautogenerated.vtt

3.6 KB

/.../6 - One or two more things/section03/

confidentiality-or-non-disclosure-agreementsautogenerated.vtt

3.2 KB

disciplinary-processautogenerated.vtt

2.4 KB

information-security-awareness-education-and-trainingautogenerated.vtt

5.4 KB

information-security-event-reportingautogenerated.vtt

3.5 KB

recapitulation-people-controlsautogenerated.vtt

2.2 KB

remote-workingautogenerated.vtt

5.2 KB

responsibilities-after-termination-or-change-of-employmentautogenerated.vtt

3.6 KB

screeningautogenerated.vtt

5.9 KB

terms-and-conditions-of-employmentautogenerated.vtt

3.3 KB

/.../6 - One or two more things/section04/

cabling-securityautogenerated.vtt

2.4 KB

clear-desk-and-clear-screenautogenerated.vtt

3.5 KB

equipment-maintenanceautogenerated.vtt

3.4 KB

equipment-siting-and-protectionautogenerated.vtt

3.6 KB

physical-entryautogenerated.vtt

6.2 KB

physical-security-monitoringautogenerated.vtt

2.8 KB

physical-security-perimetersautogenerated.vtt

4.5 KB

protecting-against-physical-and-environmental-threatsautogenerated.vtt

3.5 KB

recapitulation-physical-controlsautogenerated.vtt

3.0 KB

secure-disposal-or-re-use-of-equipmentautogenerated.vtt

3.6 KB

securing-offices-rooms-and-facilitiesautogenerated.vtt

1.1 KB

security-of-assets-off-premisesautogenerated.vtt

3.7 KB

storage-mediaautogenerated.vtt

6.8 KB

supporting-utilitiesautogenerated.vtt

3.1 KB

working-in-secure-areasautogenerated.vtt

2.1 KB

/.../6 - One or two more things/section05/

access-to-source-codeautogenerated.vtt

2.7 KB

application-security-requirementsautogenerated.vtt

8.6 KB

capacity-managementautogenerated.vtt

3.7 KB

change-managementautogenerated.vtt

2.9 KB

clock-synchronizationautogenerated.vtt

2.4 KB

configuration-managementautogenerated.vtt

4.5 KB

data-leakage-preventionautogenerated.vtt

4.2 KB

data-maskingautogenerated.vtt

4.4 KB

information-access-restrictionautogenerated.vtt

3.6 KB

information-backupautogenerated.vtt

5.2 KB

information-deletionautogenerated.vtt

4.3 KB

installation-of-software-on-operational-systemsautogenerated.vtt

4.0 KB

loggingautogenerated.vtt

7.1 KB

management-of-technical-vulnerabilitiesautogenerated.vtt

8.0 KB

monitoring-activitiesautogenerated.vtt

4.7 KB

networks-securityautogenerated.vtt

5.7 KB

outsourced-developmentautogenerated.vtt

5.3 KB

privileged-access-rightsautogenerated.vtt

5.2 KB

protection-against-malwareautogenerated.vtt

4.6 KB

protection-of-information-systems-during-audit-testingautogenerated.vtt

4.2 KB

recapitulation-technological-controlsautogenerated.vtt

8.4 KB

redundancy-of-information-processing-facilitiesautogenerated.vtt

4.9 KB

secure-authenticationautogenerated.vtt

5.8 KB

secure-codingautogenerated.vtt

6.1 KB

secure-development-life-cycleautogenerated.vtt

4.2 KB

secure-system-architecture-and-engineering-principlesautogenerated.vtt

8.6 KB

security-of-network-servicesautogenerated.vtt

3.7 KB

security-testing-in-development-and-acceptanceautogenerated.vtt

3.9 KB

segregation-of-networksautogenerated.vtt

3.4 KB

separation-of-development-test-and-production-environmentsautogenerated.vtt

4.9 KB

test-informationautogenerated.vtt

3.2 KB

use-of-cryptographyautogenerated.vtt

7.7 KB

use-of-privileged-utility-programsautogenerated.vtt

2.7 KB

user-endpoint-devicesautogenerated.vtt

8.4 KB

web-filteringautogenerated.vtt

3.7 KB

/.../6 - One or two more things/section06/

thank-you-and-good-byeautogenerated.vtt

3.2 KB

the-certification-to-isoiec-27001-and-isoiec-27002autogenerated.vtt

5.0 KB

/~Get Your Files Here !/

Bonus Resources.txt

0.1 KB

 

Total files 319


Copyright © 2025 FileMood.com