[ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls
File List
- ~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4 13.6 MB
- ~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4 12.7 MB
- ~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4 12.3 MB
- ~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4 12.1 MB
- ~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4 11.8 MB
- ~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4 11.8 MB
- ~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4 11.8 MB
- ~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4 11.5 MB
- ~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4 11.3 MB
- ~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4 11.2 MB
- ~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4 11.0 MB
- ~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4 10.5 MB
- ~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4 10.3 MB
- ~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4 10.3 MB
- ~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4 9.9 MB
- ~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4 9.6 MB
- ~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4 9.5 MB
- ~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4 9.2 MB
- ~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4 9.1 MB
- ~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4 9.1 MB
- ~Get Your Files Here !/11 - 10. Physical Security/04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).mp4 9.1 MB
- ~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/01 - Legal and compliance (Controls 5.31–5.33).mp4 8.6 MB
- ~Get Your Files Here !/11 - 10. Physical Security/03 - Equipment security (Controls 7.7–7.10).mp4 8.4 MB
- ~Get Your Files Here !/03 - 2. Asset Management/02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).mp4 7.8 MB
- ~Get Your Files Here !/10 - 9. Human Resource Security/01 - Prior to employment (Controls 6.1 and 6.2).mp4 7.8 MB
- ~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/02 - Information security assurance (Control 5.35 and 5.36).mp4 7.2 MB
- ~Get Your Files Here !/11 - 10. Physical Security/01 - Ensuring authorized access (Controls 7.1–7.3).mp4 6.8 MB
- ~Get Your Files Here !/11 - 10. Physical Security/02 - Protecting secure areas (Controls 7.4–7.6).mp4 6.6 MB
- ~Get Your Files Here !/08 - 7. Continuity/02 - Backup and availability (Controls 8.13 and 8.14).mp4 6.0 MB
- ~Get Your Files Here !/15 - Conclusion/01 - Achieving ISO 27001 compliance.mp4 4.9 MB
- ~Get Your Files Here !/01 - Introduction/01 - Introduction to the Annex A controls.mp4 3.2 MB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/Handout 01.02 - Example roles and responsibilities matrix.xlsx 82.8 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.02 - Example roles and responsibilities matrix.pdf 30.2 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 08.01 - How to demonstrate compliance with Controls 5.31 - 5.33.pdf 27.9 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 09.02 - How to demonstrate compliance with Controls 6.3 - 6.6.pdf 27.3 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.01 - Suggested Topic-specific Information Security Policies.pdf 27.2 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 03.02 - How to demonstrate compliance with Controls 8.10 - 8.12 _ 8.33.pdf 27.1 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 02.01 - How to demonstrate compliance with Controls 5.9, 5.10, 6.7 _ 8.1.pdf 26.6 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 09.01 - How to demonstrate compliance with Controls 6.1 _ 6.2.pdf 26.6 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 11.02 - How to demonstrate compliance with Controls 8.7, 8.18, 8.30 _ 8.34.pdf 26.5 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 06.01 - How to demonstrate compliance with Controls 5.24 - 5.28 _ 6.8.pdf 25.5 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 11.01 - How to demonstrate compliance with Controls 8.20 - 8.23.pdf 25.4 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 07.01 - How to demonstrate compliance with Controls 5.29, 5.30 _ 8.6.pdf 25.3 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 06.02 - How to demonstrate compliance with Controls 8.15 - 8.17.pdf 25.2 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 12.02 - How to demonstrate compliance with Controls 8.9, 8.19 _ 8.24.pdf 25.1 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 04.01 - How to demonstrate compliance with Controls 5.15 - 5.18.pdf 25.0 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 07.02 - How to demonstrate compliance with Controls 8.13 _ 8.14.pdf 25.0 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.01 - How to demonstrate compliance with Control 5.1.pdf 24.9 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 12.01 - How to demonstrate compliance with Controls 5.7 _ 8.8.pdf 24.9 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 13.01 - How to demonstrate compliance with Controls 8.25 - 8.28.pdf 24.9 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 08.02 - How to demonstrate compliance with Controls 5.35 _ 5.36.pdf 24.8 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 04.02 - How to demonstrate compliance with Controls 8.2 - 8.5.pdf 24.8 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 03.01 - How to demonstrate compliance with Controls 5.12, 5.13 _ 5.34.pdf 24.8 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.02 - How to demonstrate compliance with Controls 5.2 - 5.4.pdf 24.7 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.03 - How to demonstrate compliance with Controls 5.5, 5.6 _ 5.8.pdf 24.7 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.02 - How to demonstrate compliance with Controls 7.4 - 7.6.pdf 24.7 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 05.02 - How to demonstrate compliance with Controls 5.22 _ 5.23.pdf 24.6 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 02.02 - How to demonstrate compliance with Controls 5.11, 5.14 _ 5.37.pdf 24.4 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 05.01 - How to demonstrate compliance with Controls 5.19 - 5.21.pdf 24.4 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.03 - How to demonstrate compliance with Controls 7.7 - 7.10.pdf 24.4 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.01 - How to demonstrate compliance with Controls 7.1 - 7.3.pdf 24.3 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.04 - How to demonstrate compliance with Controls 7.11 - 7.14.pdf 24.3 KB
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx 22.7 KB
- ~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).srt 10.1 KB
- ~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).srt 10.1 KB
- ~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).srt 10.0 KB
- ~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).srt 9.9 KB
- ~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).srt 9.7 KB
- ~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).srt 9.5 KB
- ~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).srt 9.0 KB
- ~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).srt 9.0 KB
- ~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).srt 8.7 KB
- ~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).srt 8.5 KB
- ~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).srt 8.5 KB
- ~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).srt 8.3 KB
- ~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).srt 8.2 KB
- ~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).srt 8.1 KB
- ~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).srt 8.1 KB
- ~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).srt 7.9 KB
- ~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).srt 7.5 KB
- ~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).srt 7.4 KB
- ~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).srt 7.2 KB
- ~Get Your Files Here !/03 - 2. Asset Management/02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).srt 6.7 KB
- ~Get Your Files Here !/11 - 10. Physical Security/03 - Equipment security (Controls 7.7–7.10).srt 6.6 KB
- ~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).srt 6.5 KB
- ~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/01 - Legal and compliance (Controls 5.31–5.33).srt 6.2 KB
- ~Get Your Files Here !/11 - 10. Physical Security/04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).srt 6.2 KB
- ~Get Your Files Here !/10 - 9. Human Resource Security/01 - Prior to employment (Controls 6.1 and 6.2).srt 6.1 KB
- ~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/02 - Information security assurance (Control 5.35 and 5.36).srt 5.2 KB
- ~Get Your Files Here !/11 - 10. Physical Security/02 - Protecting secure areas (Controls 7.4–7.6).srt 5.2 KB
- ~Get Your Files Here !/11 - 10. Physical Security/01 - Ensuring authorized access (Controls 7.1–7.3).srt 4.7 KB
- ~Get Your Files Here !/08 - 7. Continuity/02 - Backup and availability (Controls 8.13 and 8.14).srt 4.4 KB
- ~Get Your Files Here !/15 - Conclusion/01 - Achieving ISO 27001 compliance.srt 2.9 KB
- ~Get Your Files Here !/01 - Introduction/01 - Introduction to the Annex A controls.srt 1.5 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 183 bytes
- ~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/~$Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx 171 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.