Warning! Do NOT Download Without a VPN!
Your IP Address is . Location is Planet Earth
Your Internet Provider and Government can track your download activities! Hide your IP ADDRESS with a VPN!
We strongly recommend using a VPN service to anonymize your torrent downloads. It's FREE!
START YOUR FREE TRIAL NOW!
|
[ TutGee.Com ] Udemy - ISO 27001 - Network &Amp; Communication Security Management |
---|
Torrent Details |
---|
![[ TutGee.com ] Udemy - ISO 27001 - Network & Communication Security Management](https://l.t0r.site/cover/55664777.jpg)
- NAME
- [ TutGee.com ] Udemy - ISO 27001 - Network & Communication Security Management.torrent
- CATEGORY
- Other
- INFOHASH
- cc4080380d92b30fcceee19efc3487074bf14b11
- SIZE
- 745 MB in 26 files
- ADDED
- Uploaded on 09-10-2021 by our crawler pet called "Spidey".
- SWARM
- 0 seeders & 0 peers
- RATING
- No votes yet.
Please login to vote for this torrent.
Description |
---|
ISO 27001 - Network & Communication Security Management
Created by Casual Useful | Last updated 9/2021
Duration: 1h 35m | 2 sections | 12 lectures | Video: 1280x720, 44 KHz | 744 MB
Genre: eLearning | Language: English + Sub
Communication Security Mangement as it relates to ISO 27001:2013.
What you'll learn
Annex 13 Communication Security Overview
Understand the need for Network Security
Understand Segregation of Network Services
Familiarize yourself with common Network Attacks
Understand different Control Types
Understand what a defensive strategy may comprise of
Understand the security of Information Transfer
Understand policies and procedures related to electronic messgeing
Understand the need for Agreements of Information Transfer & Confidentiality and NDA Agreements
Requirements
Basic understanding of ISO 27001:2013
Description
In this course, you're going to learn about Communication Security Management. This is Annex 13 of ISO 27001:2013. It is divided into two sections Network Security and Information Transfer. This is a theoretical course in which we will discuss the control objectives and general requirements of these two areas, as well as implementation guidelines. The style of lectures is a presentation with a voiceover
In network security, we'll discuss things like network services security, segregation in networks, methods of attack, and more. The goal of network security is to protect the areas of the organization where information flows and is stored or process. The organization has to identify these areas, understand what the risks associated with each of them are, and implement controls in order to reduce or eliminate the risks.
Information transfer is concerned with the transfer of information. In this section, we discuss information agreements, electronic messaging, and NDAs. The organization should have appropriate procedures, policies, and documented information in place to maintain the security of information while it is being handled by various parties. These guidelines can be legally enforceable and are a useful tool, especially when dealing with external parties.
Also, electronic messaging plays an important role in sharing information across an organization and is vulnerable to attacks and being mishandled. Therefore, it's important to create procedures and policies that guide and direct people with regards to what channels of communication to use and how to protect data while doing so.
You'll learn about all this and more in this course.
Who this course is for:This course is about ISO 27001:2013, Annex 13. It's for people who have an overview of the ISO and would like more knowledge on this specific area.
Discussion |
---|
Comments 0
There are no comments yet.
Post Your Comment
To post your comment to this torrent, please login to our site.
Files in this torrent |
---|
FILENAME | SIZE | |
---|---|---|
![]() | ~Get Your Files Here !/1. Network Security/1. Introduction.mp4 | 79.1 MB |
![]() | ~Get Your Files Here !/1. Network Security/1. Introduction.srt | 7.7 KB |
![]() | ~Get Your Files Here !/1. Network Security/2. Network Security.mp4 | 61.7 MB |
![]() | ~Get Your Files Here !/1. Network Security/2. Network Security.srt | 10.3 KB |
![]() | ~Get Your Files Here !/1. Network Security/3. Security of Network Services.mp4 | 88.4 MB |
![]() | ~Get Your Files Here !/1. Network Security/3. Security of Network Services.srt | 11.2 KB |
![]() | ~Get Your Files Here !/1. Network Security/4. Segregation in Networks.mp4 | 111.3 MB |
![]() | ~Get Your Files Here !/1. Network Security/4. Segregation in Networks.srt | 12.8 KB |
![]() | ~Get Your Files Here !/1. Network Security/5. Methods of Attack.mp4 | 49.2 MB |
![]() | ~Get Your Files Here !/1. Network Security/5. Methods of Attack.srt | 7 KB |
![]() | ~Get Your Files Here !/1. Network Security/6. Control Types.mp4 | 31.9 MB |
![]() | ~Get Your Files Here !/1. Network Security/6. Control Types.srt | 4.3 KB |
![]() | ~Get Your Files Here !/1. Network Security/7. Defence In-depth.mp4 | 60 MB |
![]() | ~Get Your Files Here !/1. Network Security/7. Defence In-depth.srt | 8.5 KB |
![]() | ~Get Your Files Here !/2. Information Transfer/1. Introduction.mp4 | 86 MB |
![]() | ~Get Your Files Here !/2. Information Transfer/1. Introduction.srt | 14.6 KB |
![]() | ~Get Your Files Here !/2. Information Transfer/2. Agreements on Information Transfer.mp4 | 57.6 MB |
![]() | ~Get Your Files Here !/2. Information Transfer/2. Agreements on Information Transfer.srt | 9.3 KB |
![]() | ~Get Your Files Here !/2. Information Transfer/3. Electronic Messaging.mp4 | 53.8 MB |
![]() | ~Get Your Files Here !/2. Information Transfer/3. Electronic Messaging.srt | 8.8 KB |
![]() | ~Get Your Files Here !/2. Information Transfer/4. NDAs.mp4 | 55.9 MB |
![]() | ~Get Your Files Here !/2. Information Transfer/4. NDAs.srt | 12.2 KB |
![]() | ~Get Your Files Here !/2. Information Transfer/5. Conclusion.mp4 | 9.3 MB |
![]() | ~Get Your Files Here !/2. Information Transfer/5. Conclusion.srt | 2.6 KB |
![]() | ~Get Your Files Here !/3. Electronic Messaging.jpeg | 169.3 KB |
![]() | ~Get Your Files Here !/Bonus Resources.txt | 357 B |
Alternative Torrents for 'TutGee.com Udemy ISO Network Communication Security Management'. |
---|
There are no alternative torrents found.