Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started

seeders: 3
leechers: 6
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 59
  • Language: English

Files

[ CourseHulu.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Introduction
    • 001. The international standard for information security.en.srt (1.7 KB)
    • 001. The international standard for information security.mp4 (9.6 MB)
    • 002. Who this course is for and prerequisites.en.srt (1.6 KB)
    • 002. Who this course is for and prerequisites.mp4 (8.6 MB)
    2. ISO 27001 Overview
    • 003. What is the ISO 27001 standard.en.srt (6.4 KB)
    • 003. What is the ISO 27001 standard.mp4 (43.0 MB)
    • 004. Breaking down the ISO 27001 standard.en.srt (5.1 KB)
    • 004. Breaking down the ISO 27001 standard.mp4 (30.9 MB)
    • 005. Why build an ISO 27001-compliant cybersecurity program.en.srt (5.1 KB)
    • 005. Why build an ISO 27001-compliant cybersecurity program.mp4 (25.7 MB)
    • 006. ISO 27001 gaps and criticisms.en.srt (5.5 KB)
    • 006. ISO 27001 gaps and criticisms.mp4 (29.8 MB)
    3. Complying with ISO 27001
    • 007. ISO 27001 compliance and certification.en.srt (5.9 KB)
    • 007. ISO 27001 compliance and certification.mp4 (29.4 MB)
    • 008. What to expect when getting ISO 27001 certified.en.srt (7.1 KB)
    • 008. What to expect when getting ISO 27001 certified.mp4 (36.8 MB)
    • 009. Building your ISO 27001 compliance plan.en.srt (7.2 KB)
    • 009. Building your ISO 27001 compliance plan.mp4 (39.9 MB)
    5. Leadership (Clause 5)
    • 013. Leadership and commitment (Clause 5.1).en.srt (5.1 KB)
    • 013. Leadership and commitment (Clause 5.1).mp4 (28.0 MB)
    • 014. Policy (Clause 5.2).en.srt (6.0 KB)
    • 014. Policy (Clause 5.2).mp4 (30.8 MB)
    • 015. Organizational roles, responsibilities, and authorities (Clause 5.3).en.srt (4.5 KB)
    • 015. Organizational roles, responsibilities, and authorities (Clause 5.3).mp4 (25.3 MB)
    6. Planning (Clause 6)
    • 016. Information security risk assessment (Clause 6.1.2).en.srt (9.1 KB)
    • 016. Information security risk assessment (Clause 6.1.2).mp4 (52.5 MB)
    • 017. Information security risk treatment (Clause 6.1.3).en.srt (4.6 KB)
    • 017. Information security risk treatment (Clause 6.1.3).mp4 (26.6 MB)
    • 018. Information security objectives and planning to achieve them (Clause 6.2).en.srt (4.1 KB)
    • 018. Information security objectives and planning to achieve them (Clause 6.2).mp4 (22.7 MB)
    7. Support and Operation (Clauses 7 and 8)
    • 020. Communication (Clause 7.4).en.srt (3.5 KB)
    • 020. Communication (Clause 7.4).mp4 (18.8 MB)
    • 021. Documented information (Clause 7.5).en.srt (5.3 KB)
    • 021. Documented information (Clause 7.5).mp4 (30.9 MB)
    8. Performance Evaluation and Improvement (Clauses 9 and 10)
    • 024. Internal audit (Clause 9.2).en.srt (5.7 KB)
    • 024. Internal audit (Clause 9.2).mp4 (32.6 MB)
    • 025. Management review (Clause 9.3).en.srt (3.5 KB)
    • 025. Management review (Clause 9.3).mp4 (19.6 MB)
    9. Conclusion
    • 027. Next steps to take with ISO 27001.en.srt (1.9 KB)
    • 027. Next steps to take with ISO 27001.mp4 (11.1 MB)
    • Bonus Resources.txt (0.4 KB)
    • Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Program Exercise Files
      • Example Risk Register.pdf (121.6 KB)
      • Example Statement of Applicability.pdf (673.4 KB)
      • Example roles and responsibilities matrix.pdf (30.5 KB)
      • How to demonstrate compliance with Clause 10.pdf (25.0 KB)
      • How to demonstrate compliance with Clause 5.1.pdf (28.4 KB)
      • How to demonstrate compliance with Clause 5.2.pdf (24.9 KB)
      • How to demonstrate compliance with Clause 5.3.pdf (25.6 KB)
      • How to demonstrate compliance with Clause 6.1.2.pdf (24.6 KB)
      • How to demonstrate compliance with Clause 6.1.3.pdf (24.9 KB)
      • How to demonstrate compliance with Clause 6.2.pdf (24.8 KB)
      • How to demonstrate compliance with Clause 7.4.pdf (25.0 KB)
      • How to demonstrate compliance with Clause 7.5.pdf (25.4 KB)
      • How to demonstrate compliance with Clause 8.1 - 8.3.pdf (27.7 KB)
      • How to demonstrate compliance with Clause 9.1.pdf (25.1 KB)
      • How to demonstrate compliance with Clause 9.2.pdf (27.1 KB)
      • How to demonstrate compliance with Clause 9.3.pdf (24.8 KB)
      • How to demonstrate compliance with Clauses 4.1 and 4.2.pdf (25.7 KB)
      • How to demonstrate compliance with Clauses 4.3 and 4.4.pdf (24.9 KB)
      • How to demonstrate compliance with Clauses 7.1-7.3.pdf (25.3 KB)
      • ISO 27001 Compliance Plan Outline.pdf (32.4 KB)
      • Mandatory and non-mandatory documents and records for ISO 27001.pdf (33.1 KB)

Description

Building an ISO 27001-Compliant Cybersecurity Program: Getting Started



https://CourseHulu.com

LinkedIn Learning
Duration: 1h 29m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 553 MB
Genre: eLearning | Language: English

If you’re an information security manager, your day-to-day work life depends on meeting recognized standards of practice. In this new two-part course, instructor Marc Menninger takes a closer look at what the ISO 27001 standard is and why it’s used around the world to build information security programs that work.

Discover why the ISO 27001 standard is one of the most popular frameworks for building effective cybersecurity programs. Learn what it takes to comply with and become certified as compliant with the standard. Find out how the standard is organized, get a description of the certification process, and explore an easy-to-follow, step-by-step plan for building a cybersecurity program that’s ISO 27001-compliant as defined by clauses four through ten. Along the way, Marc gives you handy reference documents and checklists that you can use to retain what you learn and track your compliance progress.



Download torrent
554 MB
seeders:3
leechers:6
Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
554 MB
seeders:3
leechers:6
Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - Getting Started


Torrent hash: EA663F9407B57FCC82D6998EE49E3FCB82FC5A0E