资源详情

返回首页 | 相关搜索
[ FreeCourseWeb.com ] ISO 27001 - 2022-Compliant Cybersecurity - The Annex A Controls
大小 296.01 MB
文件数 97
Info Hash: DB72DFC8DE9ED8F545F9897E63CA81ECABC3D86E
收录时间 2026-02-12 05:00:41
更新时间 2026-02-12 05:00:41
文件列表 (97)
Get Bonus Downloads Here.url
183 B
~Get Your Files Here !/01 - Introduction/01 - Introduction to the Annex A controls.mp4
3.21 MB
~Get Your Files Here !/01 - Introduction/01 - Introduction to the Annex A controls.srt
1.46 KB
~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4
9.64 MB
~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).srt
8.99 KB
~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4
9.93 MB
~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).srt
7.43 KB
~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4
10.48 MB
~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).srt
8.48 KB
~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4
10.31 MB
~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).srt
8.28 KB
~Get Your Files Here !/03 - 2. Asset Management/02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).mp4
7.83 MB
~Get Your Files Here !/03 - 2. Asset Management/02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).srt
6.72 KB
~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4
10.3 MB
~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).srt
8.1 KB
~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4
12.08 MB
~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).srt
9.74 KB
~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4
12.34 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).srt
8.75 KB
~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4
11.05 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).srt
8.11 KB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4
9.19 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).srt
7.88 KB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4
9.13 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).srt
6.52 KB
~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4
12.69 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).srt
9.99 KB
~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4
9.49 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).srt
7.18 KB
~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4
11.81 MB
~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).srt
9.02 KB
~Get Your Files Here !/08 - 7. Continuity/02 - Backup and availability (Controls 8.13 and 8.14).mp4
5.97 MB
~Get Your Files Here !/08 - 7. Continuity/02 - Backup and availability (Controls 8.13 and 8.14).srt
4.39 KB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/01 - Legal and compliance (Controls 5.31–5.33).mp4
8.58 MB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/01 - Legal and compliance (Controls 5.31–5.33).srt
6.17 KB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/02 - Information security assurance (Control 5.35 and 5.36).mp4
7.2 MB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/02 - Information security assurance (Control 5.35 and 5.36).srt
5.18 KB
~Get Your Files Here !/10 - 9. Human Resource Security/01 - Prior to employment (Controls 6.1 and 6.2).mp4
7.81 MB
~Get Your Files Here !/10 - 9. Human Resource Security/01 - Prior to employment (Controls 6.1 and 6.2).srt
6.07 KB
~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4
11.76 MB
~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).srt
10.09 KB
~Get Your Files Here !/11 - 10. Physical Security/01 - Ensuring authorized access (Controls 7.1–7.3).mp4
6.83 MB
~Get Your Files Here !/11 - 10. Physical Security/01 - Ensuring authorized access (Controls 7.1–7.3).srt
4.75 KB
~Get Your Files Here !/11 - 10. Physical Security/02 - Protecting secure areas (Controls 7.4–7.6).mp4
6.55 MB
~Get Your Files Here !/11 - 10. Physical Security/02 - Protecting secure areas (Controls 7.4–7.6).srt
5.17 KB
~Get Your Files Here !/11 - 10. Physical Security/03 - Equipment security (Controls 7.7–7.10).mp4
8.4 MB
~Get Your Files Here !/11 - 10. Physical Security/03 - Equipment security (Controls 7.7–7.10).srt
6.57 KB
~Get Your Files Here !/11 - 10. Physical Security/04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).mp4
9.07 MB
~Get Your Files Here !/11 - 10. Physical Security/04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).srt
6.15 KB
~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4
11.5 MB
~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).srt
8.24 KB
~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4
11.26 MB
~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).srt
8.53 KB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4
9.09 MB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).srt
7.53 KB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4
13.58 MB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).srt
10.12 KB
~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4
11.79 MB
~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).srt
9.55 KB
~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4
11.16 MB
~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).srt
9.89 KB
~Get Your Files Here !/15 - Conclusion/01 - Achieving ISO 27001 compliance.mp4
4.91 MB
~Get Your Files Here !/15 - Conclusion/01 - Achieving ISO 27001 compliance.srt
2.89 KB
~Get Your Files Here !/Bonus Resources.txt
386 B
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/Handout 01.02 - Example roles and responsibilities matrix.xlsx
82.77 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx
22.74 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/~$Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx
171 B
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.01 - How to demonstrate compliance with Control 5.1.pdf
24.91 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.01 - Suggested Topic-specific Information Security Policies.pdf
27.24 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.02 - Example roles and responsibilities matrix.pdf
30.23 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.02 - How to demonstrate compliance with Controls 5.2 - 5.4.pdf
24.72 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.03 - How to demonstrate compliance with Controls 5.5, 5.6 _ 5.8.pdf
24.68 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 02.01 - How to demonstrate compliance with Controls 5.9, 5.10, 6.7 _ 8.1.pdf
26.56 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 02.02 - How to demonstrate compliance with Controls 5.11, 5.14 _ 5.37.pdf
24.45 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 03.01 - How to demonstrate compliance with Controls 5.12, 5.13 _ 5.34.pdf
24.75 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 03.02 - How to demonstrate compliance with Controls 8.10 - 8.12 _ 8.33.pdf
27.06 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 04.01 - How to demonstrate compliance with Controls 5.15 - 5.18.pdf
24.96 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 04.02 - How to demonstrate compliance with Controls 8.2 - 8.5.pdf
24.79 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 05.01 - How to demonstrate compliance with Controls 5.19 - 5.21.pdf
24.38 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 05.02 - How to demonstrate compliance with Controls 5.22 _ 5.23.pdf
24.63 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 06.01 - How to demonstrate compliance with Controls 5.24 - 5.28 _ 6.8.pdf
25.49 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 06.02 - How to demonstrate compliance with Controls 8.15 - 8.17.pdf
25.19 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 07.01 - How to demonstrate compliance with Controls 5.29, 5.30 _ 8.6.pdf
25.33 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 07.02 - How to demonstrate compliance with Controls 8.13 _ 8.14.pdf
24.96 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 08.01 - How to demonstrate compliance with Controls 5.31 - 5.33.pdf
27.85 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 08.02 - How to demonstrate compliance with Controls 5.35 _ 5.36.pdf
24.83 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 09.01 - How to demonstrate compliance with Controls 6.1 _ 6.2.pdf
26.55 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 09.02 - How to demonstrate compliance with Controls 6.3 - 6.6.pdf
27.31 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.01 - How to demonstrate compliance with Controls 7.1 - 7.3.pdf
24.33 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.02 - How to demonstrate compliance with Controls 7.4 - 7.6.pdf
24.65 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.03 - How to demonstrate compliance with Controls 7.7 - 7.10.pdf
24.37 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 10.04 - How to demonstrate compliance with Controls 7.11 - 7.14.pdf
24.26 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 11.01 - How to demonstrate compliance with Controls 8.20 - 8.23.pdf
25.42 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 11.02 - How to demonstrate compliance with Controls 8.7, 8.18, 8.30 _ 8.34.pdf
26.47 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 12.01 - How to demonstrate compliance with Controls 5.7 _ 8.8.pdf
24.88 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 12.02 - How to demonstrate compliance with Controls 8.9, 8.19 _ 8.24.pdf
25.13 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 13.01 - How to demonstrate compliance with Controls 8.25 - 8.28.pdf
24.86 KB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。