error code: 500


ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls

Torrent Details


ISO 27001 -<span style=color:#777> 2022</span>-Compliant Cybersecurity - The Annex A Controls

NAME
ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls.torrent
CATEGORY
Other
INFOHASH
db72dfc8de9ed8f545f9897e63ca81ecabc3d86e
SIZE
296 MB in 96 files
ADDED
Uploaded on 30-10-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ FreeCourseWeb.com ] ISO 27001:2022-Compliant Cybersecurity: The Annex A Controls



If You Need More Stuff, kindly Visit and Support Us -->> https://FreeCourseWeb.com







Released: 10/2023

Duration: 2h 10m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 295 MB

Level: Advanced | Genre: eLearning | Language: English



The Annex A controls in the ISO 27001 standard are used by organizations around the world to improve their information security programs and nstrate good security practices to others. In this second part of his two-part ISO 27001 course, instructor Marc Menninger provides a comprehensive overview of all 93 security controls in Annex A of the ISO 27001 standard. You can use this knowledge to build a better security program and prepare for compliance with the ISO 27001 standard. This course includes handy documents with recommended ways to nstrate compliance with ISO 27001, providing you with tools you need to get started on implementing the controls to build an ISO 27001-compliant cybersecurity program.

Note: It is recommended that you start with part one, ISO 27001:2022-Compliant Cybersecurity: Getting Started, which includes background information and compliance requirements you need to know if you're serious about building an ISO 27001-compliant cybersecurity program.





If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com



Get More Tutorials and Support Us -->> https://CourseWikia.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/01 - Introduction/01 - Introduction to the Annex A controls.mp43.2 MB
~Get Your Files Here !/01 - Introduction/01 - Introduction to the Annex A controls.srt1.5 KB
~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp49.6 MB
~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).srt9 KB
~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp49.9 MB
~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).srt7.4 KB
~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp410.5 MB
~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).srt8.5 KB
~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp410.3 MB
~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).srt8.3 KB
~Get Your Files Here !/03 - 2. Asset Management/02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).mp47.8 MB
~Get Your Files Here !/03 - 2. Asset Management/02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).srt6.7 KB
~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp410.3 MB
~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).srt8.1 KB
~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp412.1 MB
~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).srt9.7 KB
~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp412.3 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).srt8.7 KB
~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp411 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).srt8.1 KB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp49.2 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).srt7.9 KB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp49.1 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).srt6.5 KB
~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp412.7 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).srt10 KB
~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp49.5 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).srt7.2 KB
~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp411.8 MB
~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).srt9 KB
~Get Your Files Here !/08 - 7. Continuity/02 - Backup and availability (Controls 8.13 and 8.14).mp46 MB
~Get Your Files Here !/08 - 7. Continuity/02 - Backup and availability (Controls 8.13 and 8.14).srt4.4 KB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/01 - Legal and compliance (Controls 5.31–5.33).mp48.6 MB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/01 - Legal and compliance (Controls 5.31–5.33).srt6.2 KB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/02 - Information security assurance (Control 5.35 and 5.36).mp47.2 MB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/02 - Information security assurance (Control 5.35 and 5.36).srt5.2 KB
~Get Your Files Here !/10 - 9. Human Resource Security/01 - Prior to employment (Controls 6.1 and 6.2).mp47.8 MB
~Get Your Files Here !/10 - 9. Human Resource Security/01 - Prior to employment (Controls 6.1 and 6.2).srt6.1 KB
~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp411.8 MB
~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).srt10.1 KB
~Get Your Files Here !/11 - 10. Physical Security/01 - Ensuring authorized access (Controls 7.1–7.3).mp46.8 MB
~Get Your Files Here !/11 - 10. Physical Security/01 - Ensuring authorized access (Controls 7.1–7.3).srt4.7 KB
~Get Your Files Here !/11 - 10. Physical Security/02 - Protecting secure areas (Controls 7.4–7.6).mp46.6 MB
~Get Your Files Here !/11 - 10. Physical Security/02 - Protecting secure areas (Controls 7.4–7.6).srt5.2 KB
~Get Your Files Here !/11 - 10. Physical Security/03 - Equipment security (Controls 7.7–7.10).mp48.4 MB
~Get Your Files Here !/11 - 10. Physical Security/03 - Equipment security (Controls 7.7–7.10).srt6.6 KB
~Get Your Files Here !/11 - 10. Physical Security/04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).mp49.1 MB
~Get Your Files Here !/11 - 10. Physical Security/04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).srt6.2 KB
~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp411.5 MB
~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).srt8.2 KB
~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp411.3 MB
~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).srt8.5 KB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp49.1 MB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).srt7.5 KB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp413.6 MB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).srt10.1 KB
~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp411.8 MB
~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).srt9.5 KB
~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp411.2 MB
~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).srt9.9 KB
~Get Your Files Here !/15 - Conclusion/01 - Achieving ISO 27001 compliance.mp44.9 MB
~Get Your Files Here !/15 - Conclusion/01 - Achieving ISO 27001 compliance.srt2.9 KB
~Get Your Files Here !/Bonus Resources.txt386 B
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/Handout 01.02 - Example roles and responsibilities matrix.xlsx82.8 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx22.7 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/~$Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx171 B
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.01 - How to demonstrate compliance with Control 5.1.pdf24.9 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.01 - Suggested Topic-specific Information Security Policies.pdf27.2 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.02 - Example roles and responsibilities matrix.pdf30.2 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.02 - How to demonstrate compliance with Controls 5.2 - 5.4.pdf24.7 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.03 - How to demonstrate compliance with Controls 5.5, 5.6 _ 5.8.pdf24.7 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 02.01 - How to demonstrate compliance with Controls 5.9, 5.10, 6.7 _ 8.1.pdf26.6 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 02.02 - How to demonstrate compliance with Controls 5.11, 5.14 _ 5.37.pdf24.4 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 03.01 - How to demonstrate compliance with Controls 5.12, 5.13 _ 5.34.pdf24.8 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 03.02 - How to demonstrate compliance with Controls 8.10 - 8.12 _ 8.33.pdf27.1 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 04.01 - How to demonstrate compliance with Controls 5.15 - 5.18.pdf25 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 04.02 - How to demonstrate compliance with Controls 8.2 - 8.5.pdf24.8 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 05.01 - How to demonstrate compliance with Controls 5.19 - 5.21.pdf24.4 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 05.02 - How to demonstrate compliance with Controls 5.22 _ 5.23.pdf24.6 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 06.01 - How to demonstrate compliance with Controls 5.24 - 5.28 _ 6.8.pdf25.5 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 06.02 - How to demonstrate compliance with Controls 8.15 - 8.17.pdf25.2 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 07.01 - How to demonstrate compliance with Controls 5.29, 5.30 _ 8.6.pdf25.3 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 07.02 - How to demonstrate compliance with Controls 8.13 _ 8.14.pdf25 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 08.01 - How to demonstrate compliance with Controls 5.31 - 5.33.pdf27.9 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 08.02 - How to demonstrate compliance with Controls 5.35 _ 5.36.pdf24.8 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 09.01 - How to demonstrate compliance with Controls 6.1 _ 6.2.pdf26.6 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 09.02 - How to demonstrate compliance with Controls 6.3 - 6.6.pdf27.3 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.01 - How to demonstrate compliance with Controls 7.1 - 7.3.pdf24.3 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.02 - How to demonstrate compliance with Controls 7.4 - 7.6.pdf24.7 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.03 - How to demonstrate compliance with Controls 7.7 - 7.10.pdf24.4 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.04 - How to demonstrate compliance with Controls 7.11 - 7.14.pdf24.3 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 11.01 - How to demonstrate compliance with Controls 8.20 - 8.23.pdf25.4 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 11.02 - How to demonstrate compliance with Controls 8.7, 8.18, 8.30 _ 8.34.pdf26.5 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 12.01 - How to demonstrate compliance with Controls 5.7 _ 8.8.pdf24.9 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 12.02 - How to demonstrate compliance with Controls 8.9, 8.19 _ 8.24.pdf25.1 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 13.01 - How to demonstrate compliance with Controls 8.25 - 8.28.pdf24.9 KB

Alternative Torrents for 'ISO Compliant Cybersecurity Annex Controls'.

There are no alternative torrents found.