[ WebToolTip.com ] Udemy - Auditing ISO 27001 - 2022 - Technical Controls
File List
- ~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 68.8 MB
- ~Get Your Files Here !/3 - Capacity, Malware, and Vulnerability Management/2 -Control 8.6 – Capacity Management.mp4 66.1 MB
- ~Get Your Files Here !/2 - Identity and Access Management/4 -Control 8.3 – Information Access Restriction.mp4 61.5 MB
- ~Get Your Files Here !/7 - Secure Development Practices/4 -Control 8.27 – Secure Systems Architecture and Engineering Principles.mp4 60.8 MB
- ~Get Your Files Here !/6 - Network and Cryptographic Security/4 -8.22 – Segregation of Networks.mp4 59.4 MB
- ~Get Your Files Here !/2 - Identity and Access Management/6 -Control 8.5 – Secure Authentication.mp4 59.2 MB
- ~Get Your Files Here !/4 - Data Lifecycle Security/2 -Control 8.10 – Information Deletion.mp4 58.0 MB
- ~Get Your Files Here !/2 - Identity and Access Management/2 -Control 8.1 – User Endpoint Devices.mp4 57.9 MB
- ~Get Your Files Here !/4 - Data Lifecycle Security/3 -Control 8.11 – Data Masking.mp4 57.5 MB
- ~Get Your Files Here !/4 - Data Lifecycle Security/4 -Control 8.12 – Data Leakage Prevention.mp4 57.0 MB
- ~Get Your Files Here !/2 - Identity and Access Management/3 -Control 8.2 – Privileged Access Rights.mp4 56.8 MB
- ~Get Your Files Here !/4 - Data Lifecycle Security/6 -Control 8.14 – Redundancy of Information Processing Facilities.mp4 56.4 MB
- ~Get Your Files Here !/6 - Network and Cryptographic Security/6 -Control 8.24 Use of Cryptography.mp4 56.3 MB
- ~Get Your Files Here !/5 - Logging, Monitoring, and Utilities/2 -Control 8.15 – Logging.mp4 55.7 MB
- ~Get Your Files Here !/6 - Network and Cryptographic Security/2 -Control 8.20 – Network Security.mp4 55.1 MB
- ~Get Your Files Here !/7 - Secure Development Practices/3 -Control 8.26 – Application Security Requirements.mp4 55.0 MB
- ~Get Your Files Here !/4 - Data Lifecycle Security/5 -Control 8.13 – Information Backup.mp4 54.9 MB
- ~Get Your Files Here !/5 - Logging, Monitoring, and Utilities/4 -Control 8.17 – Clock Synchronisation.mp4 54.5 MB
- ~Get Your Files Here !/7 - Secure Development Practices/5 -Control 8.28 – Secure Coding.mp4 53.5 MB
- ~Get Your Files Here !/7 - Secure Development Practices/10 -Control 8.33 – Test Information.mp4 52.3 MB
- ~Get Your Files Here !/6 - Network and Cryptographic Security/5 -Control 8.23 Web Filtering.mp4 51.2 MB
- ~Get Your Files Here !/5 - Logging, Monitoring, and Utilities/5 -Control 8.18 – Use of Privileged Utility Programs.mp4 51.1 MB
- ~Get Your Files Here !/6 - Network and Cryptographic Security/3 -Control 8.21 Security of Network Services.mp4 50.6 MB
- ~Get Your Files Here !/7 - Secure Development Practices/8 -Control 8.31 – Separation of Development, Test and Production Environments.mp4 50.4 MB
- ~Get Your Files Here !/7 - Secure Development Practices/6 -Control 8.29 – Security Testing in Development and Acceptance.mp4 50.2 MB
- ~Get Your Files Here !/3 - Capacity, Malware, and Vulnerability Management/3 -Control 8.7 – Protection Against Malware.mp4 49.7 MB
- ~Get Your Files Here !/3 - Capacity, Malware, and Vulnerability Management/4 -Control 8.8 – Management of Technical Vulnerabilities.mp4 49.5 MB
- ~Get Your Files Here !/3 - Capacity, Malware, and Vulnerability Management/5 -Control 8.9 – Configuration Management.mp4 49.2 MB
- ~Get Your Files Here !/7 - Secure Development Practices/2 -Control 8.25 – Secure Development Life Cycle.mp4 49.0 MB
- ~Get Your Files Here !/5 - Logging, Monitoring, and Utilities/6 -Control 8.19 – Installation of Software on Operational Systems.mp4 48.9 MB
- ~Get Your Files Here !/5 - Logging, Monitoring, and Utilities/3 -Control 8.16 – Monitoring Activities.mp4 48.9 MB
- ~Get Your Files Here !/7 - Secure Development Practices/7 -Control 8.30 – Outsourced Development.mp4 48.8 MB
- ~Get Your Files Here !/7 - Secure Development Practices/9 -Control 8.32 – Change Management.mp4 47.6 MB
- ~Get Your Files Here !/2 - Identity and Access Management/5 -Control 8.4 – Access to Source Code.mp4 45.5 MB
- ~Get Your Files Here !/8 - Audit-Specific Technology Protections/1 -Control 8.34 – Protection of Information Systems During Audit Testing.mp4 45.3 MB
- ~Get Your Files Here !/9 - Conclusion/1 -Conclusion.mp4 21.1 MB
- ~Get Your Files Here !/3 - Capacity, Malware, and Vulnerability Management/1 -Capacity, Malware, and Vulnerability Management.mp4 18.0 MB
- ~Get Your Files Here !/5 - Logging, Monitoring, and Utilities/1 -Logging, Monitoring, and Utilities.mp4 16.0 MB
- ~Get Your Files Here !/2 - Identity and Access Management/1 -Identity and Access Management.mp4 14.9 MB
- ~Get Your Files Here !/7 - Secure Development Practices/1 -Secure Development Practices.mp4 14.0 MB
- ~Get Your Files Here !/6 - Network and Cryptographic Security/1 -Network and Cryptographic Security.mp4 13.9 MB
- ~Get Your Files Here !/1 - Introduction/2 -Introducing the Model Company - InfoSure Ltd.mp4 12.6 MB
- ~Get Your Files Here !/4 - Data Lifecycle Security/1 -Data Lifecycle Security.mp4 11.5 MB
- Get Bonus Downloads Here.url 180 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.