Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls

seeders: 10
leechers: 4
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 55
  • Language: English

Files

[ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01. Introduction
    • 001. Introduction to the Annex A controls.en.srt (2.9 KB)
    • 001. Introduction to the Annex A controls.mp4 (17.0 MB)
    02. Policies and the Organization of Information Security (Clauses A.5 and A.6)
    • 002. Management direct.en.srt (5.0 KB)
    • 002. Management direct.mp4 (29.7 MB)
    • 003. Information secur.en.srt (4.9 KB)
    • 003. Information secur.mp4 (27.9 MB)
    • 004. Contact with auth.en.srt (7.9 KB)
    • 004. Contact with auth.mp4 (40.7 MB)
    • 005. Mobile device pol.en.srt (4.5 KB)
    • 005. Mobile device pol.mp4 (24.2 MB)
    03. Human Resources Security (Clause A.7)
    • 006. Human resources security Prior to employment (Clause A..en.srt (5.2 KB)
    • 006. Human resources security Prior to employment (Clause A..mp4 (28.5 MB)
    • 007. Human resources security During employment (Clause A.7..en.srt (6.7 KB)
    • 007. Human resources security During employment (Clause A.7..mp4 (32.8 MB)
    • 008. Human resources security Termination and change of empl.en.srt (3.6 KB)
    • 008. Human resources security Termination and change of empl.mp4 (18.7 MB)
    04. Asset Management (Clause A.8)
    • 009. Asset management Responsibility for assets (Clause A.8.1).en.srt (5.5 KB)
    • 009. Asset management Responsibility for assets (Clause A.8.1).mp4 (31.7 MB)
    • 010. Asset management Information classification (Clause A.8.2).en.srt (7.1 KB)
    • 010. Asset management Information classification (Clause A.8.2).mp4 (38.7 MB)
    • 011. Asset management Media handling (Clause A.8.3).en.srt (5.3 KB)
    • 011. Asset management Media handling (Clause A.8.3).mp4 (29.0 MB)
    05. Access Control and Cryptography (Clauses A.9 and A.10)
    • 012. Access control Business requirements o.en.srt (5.8 KB)
    • 012. Access control Business requirements o.mp4 (28.4 MB)
    • 013. Access control User access management.en.srt (10.1 KB)
    • 013. Access control User access management.mp4 (57.9 MB)
    • 014. Access control System and application.en.srt (9.2 KB)
    • 014. Access control System and application.mp4 (53.2 MB)
    • 015. Cryptography Cryptographic controls (C.en.srt (4.8 KB)
    • 015. Cryptography Cryptographic controls (C.mp4 (28.5 MB)
    06. Physical and Environmental Security (Clause A.11)
    • 016. Physical and environmental security Secure.en.srt (7.6 KB)
    • 016. Physical and environmental security Secure.mp4 (42.7 MB)
    • 017. Physical and environmental security Equipme.en.srt (9.9 KB)
    • 017. Physical and environmental security Equipme.mp4 (54.5 MB)
    07. Operations Security (Clause A.12)
    • 018. Operations security Operational procedures and responsibili.en.srt (7.8 KB)
    • 018. Operations security Operational procedures and responsibili.mp4 (45.0 MB)
    • 019. Operations security Protection from malware (Clause A.12.2).en.srt (2.8 KB)
    • 019. Operations security Protection from malware (Clause A.12.2).mp4 (15.5 MB)
    • 020. Operations security Backup (Clause A.12.3).en.srt (2.8 KB)
    • 021. Operations security Logging and monitoring (Clause A.12.4).en.srt (7.8 KB)
    • 021. Operations security Logging and monitoring (Clause A.12.4).mp4 (43.5 MB)
    • 022. Operations security Control of operational software (Clause.en.srt (2.8 KB)
    • 022. Operations security Control of operational software (Clause.mp4 (14.8 MB)
    • 023. Operations security Technical vulnerability management (Cla.en.srt (4.6 KB)
    • 023. Operations security Technical vulnerability management (Cla.mp4 (25.4 MB)
    • 024. Operations security Information systems audit consideration.en.srt (2.7 KB)
    • 024. Operations security Information systems audit consideration.mp4 (16.2 MB)
    08. Communications Security (Clause A.13)
    • 025. Communications security Network security management (Cl.en.srt (6.2 KB)
    • 025. Communications security Network security management (Cl.mp4 (32.6 MB)
    • 026. Communications security Information transfer (Clause A..en.srt (6.8 KB)
    • 026. Communications security Information transfer (Clause A..mp4 (38.8 MB)
    09. System Acquisition, Development, and Maintenance (Clause A.14)
    • 027. System lifecycle Security requ.en.srt (6.2 KB)
    • 027. System lifecycle Security requ.mp4 (35.5 MB)
    • 028. System lifecycle Security in d.en.srt (10.1 KB)
    • 028. System lifecycle Security in d.mp4 (54.6 MB)
    • 029. System lifecycle Test data (Cl.en.srt (2.9 KB)
    • 029. System lifecycle Test data (Cl.mp4 (16.2 MB)
    10. Supplier Relationships (Clause A.15)
    • 030. Supplier relationships Information security in supplier.en.srt (5.9 KB)
    • 030. Supplier relationships Information security in supplier.mp4 (29.9 MB)
    • 031. Supplier relationships Supplier service delivery managem.en.srt (4.4 KB)
    • 031. Supplier relationships Supplier service delivery managem.mp4 (24.5 MB)
    11. Incident Management and Continuity (Clauses A.16 and A.17)
    • 032. Management of information security.en.srt (9.6 KB)
    • 032. Management of information security.mp4 (52.2 MB)
    • 033. Information security continuity an.en.srt (7.7 KB)
    • 033. Information security continuity an.mp4 (43.4 MB)
    12. Compliance (Clause A.18)
    • 034. Compliance Compliance with legal and contractual requirements (Claus.en.srt (8.6 KB)
    • 034. Compliance Compliance with legal and contractual requirements (Claus.mp4 (44.4 MB)
    • 035. Compliance Information security reviews (Clause A.18.2).en.srt (5.1 KB)
    • 035. Compliance Information security reviews (Clause A.18.2).mp4 (27.8 MB)
    13. Conclusion
    • 036. Next steps for complying with ISO 27001.en.srt (2.4 KB)
    • 036. Next steps for complying with ISO 27001.mp4 (14.1 MB)
    • Bonus Resources.txt (0.4 KB)
    • Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A Exercise Files
      • Handout 01.01 - How to demonstrate compliance with Clause A.5.1_PQA.pdf (25.7 KB)
      • Handout 01.01 - Recommended Lower-Level Information Security Policies_PQA.pdf (27.3 KB)
      • Handout 01.02 - Example roles and responsibilities matrix_PQA.pdf (30.4 KB)

Description

Building an ISO 27001-Compliant Cybersecurity Program: The Annex A Controls



https://CourseMega.com

LinkedIn Learning
Duration: 2h 15m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 1.13 GB
Genre: eLearning | Language: English

The Annex A controls in the ISO 27001 standard are used by organizations around the world to improve their information security programs and nstrate good security practices to others. In this second part of his two-part ISO 27001 course, instructor Marc Menninger provides a comprehensive overview of all 114 security controls in Annex A of the ISO 27001 standard. You can use this knowledge to build a better security program and prepare for compliance with the ISO 27001 standard. This course includes handy documents with recommended ways to nstrate compliance with ISO 27001, providing you with tools you need to get started on implementing the controls to build an ISO 27001-compliant cybersecurity program.

Note: It is recommended that you start with part one, Building an ISO 27001-Compliant Cybersecurity Program: Getting Started, which includes background information and compliance requirements you need to know if you're serious about building an ISO 27,001-compliant cybersecurity program.



Download torrent
1.1 GB
seeders:10
leechers:4
Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
1.1 GB
seeders:10
leechers:4
Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls


Torrent hash: CCD1228151D969A6DD2BDD2B086D2D73C2217D98