[ CourseMega.Com ] Linkedin - Building An ISO 27001-Compliant Cybersecurity Program - The Annex A Controls

Torrent Details


[ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls

NAME
[ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls.torrent
CATEGORY
Other
INFOHASH
ccd1228151d969a6dd2bdd2b086d2d73c2217d98
SIZE
1.1 GB in 98 files
ADDED
Uploaded on 29-03-2022 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ DevCourseWeb.com ] Building an ISO 27001-Compliant Cybersecurity Program: The Annex A Controls



If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com







LinkedIn Learning

Duration: 2h 15m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 1.13 GB

Genre: eLearning | Language: English



The Annex A controls in the ISO 27001 standard are used by organizations around the world to improve their information security programs and nstrate good security practices to others. In this second part of his two-part ISO 27001 course, instructor Marc Menninger provides a comprehensive overview of all 114 security controls in Annex A of the ISO 27001 standard. You can use this knowledge to build a better security program and prepare for compliance with the ISO 27001 standard. This course includes handy documents with recommended ways to nstrate compliance with ISO 27001, providing you with tools you need to get started on implementing the controls to build an ISO 27001-compliant cybersecurity program.



Note: It is recommended that you start with part one, Building an ISO 27001-Compliant Cybersecurity Program: Getting Started, which includes background information and compliance requirements you need to know if you're serious about building an ISO 27,001-compliant cybersecurity program.



If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com



Get More Tutorials and Support Us -->> https://FreeCourseWeb.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.en.srt2.9 KB
~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.mp417 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.en.srt5 KB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp429.7 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.en.srt4.9 KB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.mp427.9 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.en.srt7.9 KB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp440.7 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.en.srt4.5 KB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.mp424.2 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..en.srt5.2 KB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..mp428.5 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..en.srt6.7 KB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp432.8 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.en.srt3.6 KB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.mp418.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).en.srt5.5 KB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp431.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).en.srt7.1 KB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp438.7 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).en.srt5.3 KB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp429 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.en.srt5.8 KB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.mp428.4 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.en.srt10.1 KB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp457.9 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.en.srt9.2 KB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp453.2 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.en.srt4.8 KB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.mp428.5 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.en.srt7.6 KB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp442.7 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.en.srt9.9 KB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp454.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.en.srt7.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp445 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).en.srt2.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).mp415.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/020. Operations security Backup (Clause A.12.3).en.srt2.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).en.srt7.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp443.5 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.en.srt2.8 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.mp414.8 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.en.srt4.6 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.mp425.4 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.en.srt2.7 KB
~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.mp416.2 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.en.srt6.2 KB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp432.6 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..en.srt6.8 KB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp438.8 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.en.srt6.2 KB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp435.5 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.en.srt10.1 KB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp454.6 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.en.srt2.9 KB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.mp416.2 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.en.srt5.9 KB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp429.9 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.en.srt4.4 KB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.mp424.5 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.en.srt9.6 KB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp452.2 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.en.srt7.7 KB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp443.4 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.en.srt8.6 KB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp444.4 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).en.srt5.1 KB
~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).mp427.8 MB
~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.en.srt2.4 KB
~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.mp414.1 MB
~Get Your Files Here !/Bonus Resources.txt386 B
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - How to demonstrate compliance with Clause A.5.1_PQA.pdf25.7 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - Recommended Lower-Level Information Security Policies_PQA.pdf27.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.02 - Example roles and responsibilities matrix_PQA.pdf30.4 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.02 - How to demonstrate compliance with Clauses A.6.1.1 _ A.6.1.2_PQA.pdf25.1 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.03 - How to demonstrate compliance with Clauses A.6.1.3, A.6.1.4, _ A.6.1.5_PQA.pdf25.7 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.04 - How to demonstrate compliance with Clauses A.6.2.1 _ A.6.2.2_PQA.pdf25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.01 - How to demonstrate compliance with Clause A.7.1_PQA.pdf25.6 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.02 - How to demonstrate compliance with Clause A.7.2_PQA.pdf25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.03 - How to demonstrate compliance with Clause A.7.3_PQA.pdf25.4 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.01 - How to demonstrate compliance with Clause A.8.1_PQA.pdf25.4 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.02 - How to demonstrate compliance with Clause A.8.2_PQA.pdf25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.03 - How to demonstrate compliance with Clause A.8.3_PQA.pdf25.2 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.01 - How to demonstrate compliance with Clause A.9.1_PQA.pdf25 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.02 - How to demonstrate compliance with Clauses A.9.2 and A.9.3_PQA.pdf27.5 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.03 - How to demonstrate compliance with Clause A.9.4_PQA.pdf25.9 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.04 - How to demonstrate compliance with Clause A.10.1_PQA.pdf24.9 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 05.01 - How to demonstrate compliance with Clause A.11.1_PQA.pdf25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 05.02 - How to demonstrate compliance with Clause A.11.2_PQA.pdf25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.01 - How to demonstrate compliance with Clause A.12.1_PQA.pdf25.1 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.02 - How to demonstrate compliance with Clause A.12.2_PQA.pdf25.6 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.03 - How to demonstrate compliance with Clause A.12.3_PQA.pdf25.4 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.04 - How to demonstrate compliance with Clause A.12.4_PQA.pdf25.8 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.05 - How to demonstrate compliance with Clause A.12.5_PQA.pdf25.3 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.06 - How to demonstrate compliance with Clause A.12.6_PQA.pdf25.6 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.07 - How to demonstrate compliance with Clause A.12.7_PQA.pdf24.7 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 07.01 - How to demonstrate compliance with Clause A.13.1_PQA.pdf25.8 KB

Alternative Torrents for 'CourseMega.com Linkedin Building an ISO Compliant Cybersecurity Program Annex Controls'.

There are no alternative torrents found.