The Annex A controls in the ISO 27001 standard are used by organizations around the world to improve their information security programs and nstrate good security practices to others. In this second part of his two-part ISO 27001 course, instructor Marc Menninger provides a comprehensive overview of all 114 security controls in Annex A of the ISO 27001 standard. You can use this knowledge to build a better security program and prepare for compliance with the ISO 27001 standard. This course includes handy documents with recommended ways to nstrate compliance with ISO 27001, providing you with tools you need to get started on implementing the controls to build an ISO 27001-compliant cybersecurity program.
Note: It is recommended that you start with part one, Building an ISO 27001-Compliant Cybersecurity Program: Getting Started, which includes background information and compliance requirements you need to know if you're serious about building an ISO 27,001-compliant cybersecurity program.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.en.srt
2.9 KB
~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.mp4
17 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.en.srt
5 KB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4
29.7 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.en.srt
4.9 KB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.mp4
27.9 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.en.srt
7.9 KB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4
40.7 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.en.srt
4.5 KB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.mp4
24.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..en.srt
5.2 KB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..mp4
28.5 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..en.srt
6.7 KB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4
32.8 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.en.srt
3.6 KB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.mp4
18.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).en.srt
5.5 KB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4
31.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).en.srt
7.1 KB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4
38.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).en.srt
5.3 KB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4
29 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.en.srt
5.8 KB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.mp4
28.4 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.en.srt
10.1 KB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4
57.9 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.en.srt
9.2 KB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4
53.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.en.srt
4.8 KB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.mp4
28.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.en.srt
7.6 KB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4
42.7 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.en.srt
9.9 KB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4
54.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.en.srt
7.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4
45 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).en.srt
2.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).mp4
15.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/020. Operations security Backup (Clause A.12.3).en.srt
2.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).en.srt
7.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4
43.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.en.srt
2.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.mp4
14.8 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.en.srt
4.6 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.mp4
25.4 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.en.srt
2.7 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.mp4
16.2 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.en.srt
6.2 KB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4
32.6 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..en.srt
6.8 KB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4
38.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.en.srt
6.2 KB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4
35.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.en.srt
10.1 KB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4
54.6 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.en.srt
2.9 KB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.mp4
16.2 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.en.srt
5.9 KB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4
29.9 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.en.srt
4.4 KB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.mp4
24.5 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.en.srt
9.6 KB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4
52.2 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.en.srt
7.7 KB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4
43.4 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.en.srt
8.6 KB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4
44.4 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).en.srt
5.1 KB
~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).mp4
27.8 MB
~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.en.srt
2.4 KB
~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.mp4
14.1 MB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - How to demonstrate compliance with Clause A.5.1_PQA.pdf
25.7 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - Recommended Lower-Level Information Security Policies_PQA.pdf
27.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.02 - Example roles and responsibilities matrix_PQA.pdf
30.4 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.02 - How to demonstrate compliance with Clauses A.6.1.1 _ A.6.1.2_PQA.pdf
25.1 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.03 - How to demonstrate compliance with Clauses A.6.1.3, A.6.1.4, _ A.6.1.5_PQA.pdf
25.7 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.04 - How to demonstrate compliance with Clauses A.6.2.1 _ A.6.2.2_PQA.pdf
25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.01 - How to demonstrate compliance with Clause A.7.1_PQA.pdf
25.6 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.02 - How to demonstrate compliance with Clause A.7.2_PQA.pdf
25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.03 - How to demonstrate compliance with Clause A.7.3_PQA.pdf
25.4 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.01 - How to demonstrate compliance with Clause A.8.1_PQA.pdf
25.4 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.02 - How to demonstrate compliance with Clause A.8.2_PQA.pdf
25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.03 - How to demonstrate compliance with Clause A.8.3_PQA.pdf
25.2 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.01 - How to demonstrate compliance with Clause A.9.1_PQA.pdf
25 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.02 - How to demonstrate compliance with Clauses A.9.2 and A.9.3_PQA.pdf
27.5 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.03 - How to demonstrate compliance with Clause A.9.4_PQA.pdf
25.9 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.04 - How to demonstrate compliance with Clause A.10.1_PQA.pdf
24.9 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 05.01 - How to demonstrate compliance with Clause A.11.1_PQA.pdf
25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 05.02 - How to demonstrate compliance with Clause A.11.2_PQA.pdf
25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.01 - How to demonstrate compliance with Clause A.12.1_PQA.pdf
25.1 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.02 - How to demonstrate compliance with Clause A.12.2_PQA.pdf
25.6 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.03 - How to demonstrate compliance with Clause A.12.3_PQA.pdf
25.4 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.04 - How to demonstrate compliance with Clause A.12.4_PQA.pdf
25.8 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.05 - How to demonstrate compliance with Clause A.12.5_PQA.pdf
25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.06 - How to demonstrate compliance with Clause A.12.6_PQA.pdf
25.6 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.07 - How to demonstrate compliance with Clause A.12.7_PQA.pdf
24.7 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 07.01 - How to demonstrate compliance with Clause A.13.1_PQA.pdf
25.8 KB
Alternative Torrents for 'CourseMega.com Linkedin Building an ISO Compliant Cybersecurity Program Annex Controls'.