[ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
File List
- ~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 57.9 MB
- ~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 54.6 MB
- ~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 54.5 MB
- ~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 53.2 MB
- ~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 52.2 MB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 45.0 MB
- ~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 44.4 MB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 43.5 MB
- ~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 43.4 MB
- ~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 42.7 MB
- ~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 40.7 MB
- ~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 38.8 MB
- ~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 38.7 MB
- ~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 35.5 MB
- ~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 32.8 MB
- ~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 32.6 MB
- ~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 31.7 MB
- ~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 29.9 MB
- ~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 29.7 MB
- ~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 29.0 MB
- ~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..mp4 28.5 MB
- ~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.mp4 28.5 MB
- ~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.mp4 28.4 MB
- ~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.mp4 27.9 MB
- ~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).mp4 27.8 MB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.mp4 25.4 MB
- ~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.mp4 24.5 MB
- ~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.mp4 24.2 MB
- ~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.mp4 18.7 MB
- ~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.mp4 17.0 MB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.mp4 16.2 MB
- ~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.mp4 16.2 MB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).mp4 15.5 MB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.mp4 14.8 MB
- ~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.mp4 14.1 MB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 12.01 - Annex A Controls Checklist_PQA.pdf 218.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.02 - Example roles and responsibilities matrix_PQA.pdf 30.4 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 11.01 - How to demonstrate compliance with Clause A.18.1_PQA.pdf 29.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 10.02 - How to demonstrate compliance with Clauses A.17.1 _ A.17.2_PQA.pdf 27.9 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 08.02 - How to demonstrate compliance with Clause A.14.2_PQA.pdf 27.7 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.02 - How to demonstrate compliance with Clauses A.9.2 and A.9.3_PQA.pdf 27.5 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 11.02 - How to demonstrate compliance with Clause A.18.2_PQA.pdf 27.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - Recommended Lower-Level Information Security Policies_PQA.pdf 27.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 07.02 - How to demonstrate compliance with Clause A.13.2_PQA.pdf 26.0 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 10.01 - How to demonstrate compliance with Clause A.16.1_PQA.pdf 25.9 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.03 - How to demonstrate compliance with Clause A.9.4_PQA.pdf 25.9 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.04 - How to demonstrate compliance with Clause A.12.4_PQA.pdf 25.8 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 07.01 - How to demonstrate compliance with Clause A.13.1_PQA.pdf 25.8 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - How to demonstrate compliance with Clause A.5.1_PQA.pdf 25.7 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 09.02 - How to demonstrate compliance with Clause A.15.2_PQA.pdf 25.7 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.03 - How to demonstrate compliance with Clauses A.6.1.3, A.6.1.4, _ A.6.1.5_PQA.pdf 25.7 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.06 - How to demonstrate compliance with Clause A.12.6_PQA.pdf 25.6 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.01 - How to demonstrate compliance with Clause A.7.1_PQA.pdf 25.6 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.02 - How to demonstrate compliance with Clause A.12.2_PQA.pdf 25.6 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.03 - How to demonstrate compliance with Clause A.7.3_PQA.pdf 25.4 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.03 - How to demonstrate compliance with Clause A.12.3_PQA.pdf 25.4 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.01 - How to demonstrate compliance with Clause A.8.1_PQA.pdf 25.4 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.02 - How to demonstrate compliance with Clause A.8.2_PQA.pdf 25.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.04 - How to demonstrate compliance with Clauses A.6.2.1 _ A.6.2.2_PQA.pdf 25.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.02 - How to demonstrate compliance with Clause A.7.2_PQA.pdf 25.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.05 - How to demonstrate compliance with Clause A.12.5_PQA.pdf 25.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 05.01 - How to demonstrate compliance with Clause A.11.1_PQA.pdf 25.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 05.02 - How to demonstrate compliance with Clause A.11.2_PQA.pdf 25.3 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 09.01 - How to demonstrate compliance with Clause A.15.1_PQA.pdf 25.2 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 08.01 - How to demonstrate compliance with Clause A.14.1_PQA.pdf 25.2 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.03 - How to demonstrate compliance with Clause A.8.3_PQA.pdf 25.2 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.02 - How to demonstrate compliance with Clauses A.6.1.1 _ A.6.1.2_PQA.pdf 25.1 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.01 - How to demonstrate compliance with Clause A.12.1_PQA.pdf 25.1 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.01 - How to demonstrate compliance with Clause A.9.1_PQA.pdf 25.0 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.04 - How to demonstrate compliance with Clause A.10.1_PQA.pdf 24.9 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 08.03 - How to demonstrate compliance with Clause A.14.3_PQA.pdf 24.7 KB
- ~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.07 - How to demonstrate compliance with Clause A.12.7_PQA.pdf 24.7 KB
- ~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.en.srt 10.1 KB
- ~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.en.srt 10.1 KB
- ~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.en.srt 9.9 KB
- ~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.en.srt 9.6 KB
- ~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.en.srt 9.2 KB
- ~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.en.srt 8.6 KB
- ~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.en.srt 7.9 KB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).en.srt 7.8 KB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.en.srt 7.8 KB
- ~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.en.srt 7.7 KB
- ~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.en.srt 7.6 KB
- ~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).en.srt 7.1 KB
- ~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..en.srt 6.8 KB
- ~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..en.srt 6.7 KB
- ~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.en.srt 6.2 KB
- ~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.en.srt 6.2 KB
- ~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.en.srt 5.9 KB
- ~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.en.srt 5.8 KB
- ~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).en.srt 5.5 KB
- ~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).en.srt 5.3 KB
- ~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..en.srt 5.2 KB
- ~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).en.srt 5.1 KB
- ~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.en.srt 5.0 KB
- ~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.en.srt 4.9 KB
- ~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.en.srt 4.8 KB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.en.srt 4.6 KB
- ~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.en.srt 4.5 KB
- ~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.en.srt 4.4 KB
- ~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.en.srt 3.6 KB
- ~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.en.srt 2.9 KB
- ~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.en.srt 2.9 KB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.en.srt 2.8 KB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).en.srt 2.8 KB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/020. Operations security Backup (Clause A.12.3).en.srt 2.8 KB
- ~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.en.srt 2.7 KB
- ~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.en.srt 2.4 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 180 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.