[ TutGee.Com ] Udemy - ISO 27001 - Network &Amp; Communication Security Management

Torrent Details


[ TutGee.com ] Udemy - ISO 27001 - Network & Communication Security Management

NAME
[ TutGee.com ] Udemy - ISO 27001 - Network & Communication Security Management.torrent
CATEGORY
Other
INFOHASH
cc4080380d92b30fcceee19efc3487074bf14b11
SIZE
745 MB in 26 files
ADDED
Uploaded on 09-10-2021 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

ISO 27001 - Network & Communication Security Management



Created by Casual Useful | Last updated 9/2021
Duration: 1h 35m | 2 sections | 12 lectures | Video: 1280x720, 44 KHz | 744 MB
Genre: eLearning | Language: English + Sub
Communication Security Mangement as it relates to ISO 27001:2013.

What you'll learn
Annex 13 Communication Security Overview
Understand the need for Network Security
Understand Segregation of Network Services
Familiarize yourself with common Network Attacks
Understand different Control Types
Understand what a defensive strategy may comprise of
Understand the security of Information Transfer
Understand policies and procedures related to electronic messgeing
Understand the need for Agreements of Information Transfer & Confidentiality and NDA Agreements

Requirements
Basic understanding of ISO 27001:2013
Description
In this course, you're going to learn about Communication Security Management. This is Annex 13 of ISO 27001:2013. It is divided into two sections Network Security and Information Transfer. This is a theoretical course in which we will discuss the control objectives and general requirements of these two areas, as well as implementation guidelines. The style of lectures is a presentation with a voiceover
In network security, we'll discuss things like network services security, segregation in networks, methods of attack, and more. The goal of network security is to protect the areas of the organization where information flows and is stored or process. The organization has to identify these areas, understand what the risks associated with each of them are, and implement controls in order to reduce or eliminate the risks.
Information transfer is concerned with the transfer of information. In this section, we discuss information agreements, electronic messaging, and NDAs. The organization should have appropriate procedures, policies, and documented information in place to maintain the security of information while it is being handled by various parties. These guidelines can be legally enforceable and are a useful tool, especially when dealing with external parties.
Also, electronic messaging plays an important role in sharing information across an organization and is vulnerable to attacks and being mishandled. Therefore, it's important to create procedures and policies that guide and direct people with regards to what channels of communication to use and how to protect data while doing so.
You'll learn about all this and more in this course.
Who this course is for:This course is about ISO 27001:2013, Annex 13. It's for people who have an overview of the ISO and would like more knowledge on this specific area.

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/1. Network Security/1. Introduction.mp479.1 MB
~Get Your Files Here !/1. Network Security/1. Introduction.srt7.7 KB
~Get Your Files Here !/1. Network Security/2. Network Security.mp461.7 MB
~Get Your Files Here !/1. Network Security/2. Network Security.srt10.3 KB
~Get Your Files Here !/1. Network Security/3. Security of Network Services.mp488.4 MB
~Get Your Files Here !/1. Network Security/3. Security of Network Services.srt11.2 KB
~Get Your Files Here !/1. Network Security/4. Segregation in Networks.mp4111.3 MB
~Get Your Files Here !/1. Network Security/4. Segregation in Networks.srt12.8 KB
~Get Your Files Here !/1. Network Security/5. Methods of Attack.mp449.2 MB
~Get Your Files Here !/1. Network Security/5. Methods of Attack.srt7 KB
~Get Your Files Here !/1. Network Security/6. Control Types.mp431.9 MB
~Get Your Files Here !/1. Network Security/6. Control Types.srt4.3 KB
~Get Your Files Here !/1. Network Security/7. Defence In-depth.mp460 MB
~Get Your Files Here !/1. Network Security/7. Defence In-depth.srt8.5 KB
~Get Your Files Here !/2. Information Transfer/1. Introduction.mp486 MB
~Get Your Files Here !/2. Information Transfer/1. Introduction.srt14.6 KB
~Get Your Files Here !/2. Information Transfer/2. Agreements on Information Transfer.mp457.6 MB
~Get Your Files Here !/2. Information Transfer/2. Agreements on Information Transfer.srt9.3 KB
~Get Your Files Here !/2. Information Transfer/3. Electronic Messaging.mp453.8 MB
~Get Your Files Here !/2. Information Transfer/3. Electronic Messaging.srt8.8 KB
~Get Your Files Here !/2. Information Transfer/4. NDAs.mp455.9 MB
~Get Your Files Here !/2. Information Transfer/4. NDAs.srt12.2 KB
~Get Your Files Here !/2. Information Transfer/5. Conclusion.mp49.3 MB
~Get Your Files Here !/2. Information Transfer/5. Conclusion.srt2.6 KB
~Get Your Files Here !/3. Electronic Messaging.jpeg169.3 KB
~Get Your Files Here !/Bonus Resources.txt357 B

Alternative Torrents for 'TutGee.com Udemy ISO Network Communication Security Management'.

There are no alternative torrents found.