Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 59.33 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 55.93 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 55.82 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 54.52 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 53.46 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 46.03 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 45.45 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 44.50 MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 44.46 MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 43.70 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 41.65 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 39.74 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 39.60 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 36.31 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 33.59 MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 33.34 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 32.50 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 30.62 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 30.39 MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 29.65 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..mp4 29.21 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.mp4 29.18 MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.mp4 29.07 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.mp4 28.59 MB
~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).mp4 28.45 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.mp4 25.99 MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.mp4 25.06 MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.mp4 24.79 MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.mp4 19.16 MB
~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.mp4 17.45 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.mp4 16.56 MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.mp4 16.55 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).mp4 15.84 MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.mp4 15.20 MB
~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.mp4 14.41 MB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 12.01 - Annex A Controls Checklist_PQA.pdf 223 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.02 - Example roles and responsibilities matrix_PQA.pdf 31 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 11.01 - How to demonstrate compliance with Clause A.18.1_PQA.pdf 29 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 10.02 - How to demonstrate compliance with Clauses A.17.1 _ A.17.2_PQA.pdf 28 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 08.02 - How to demonstrate compliance with Clause A.14.2_PQA.pdf 28 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.02 - How to demonstrate compliance with Clauses A.9.2 and A.9.3_PQA.pdf 28 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 11.02 - How to demonstrate compliance with Clause A.18.2_PQA.pdf 27 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - Recommended Lower-Level Information Security Policies_PQA.pdf 27 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 07.02 - How to demonstrate compliance with Clause A.13.2_PQA.pdf 26 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 10.01 - How to demonstrate compliance with Clause A.16.1_PQA.pdf 26 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.03 - How to demonstrate compliance with Clause A.9.4_PQA.pdf 26 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.04 - How to demonstrate compliance with Clause A.12.4_PQA.pdf 26 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 07.01 - How to demonstrate compliance with Clause A.13.1_PQA.pdf 26 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - How to demonstrate compliance with Clause A.5.1_PQA.pdf 26 KB
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 09.02 - How to demonstrate compliance with Clause A.15.2_PQA.pdf 26 KB