Statement:This site does not provide download links, only text displays, and does not contain any infringement.
File List
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4 13.90 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4 12.99 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/01 - Access management (Controls 5.15–5.18).mp4 12.63 MB
~Get Your Files Here !/04 - 3. Information Protection/02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4 12.36 MB
~Get Your Files Here !/08 - 7. Continuity/01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4 12.09 MB
~Get Your Files Here !/14 - 13. Application Security/01 - Secure development (Controls 8.25–8.28).mp4 12.07 MB
~Get Your Files Here !/10 - 9. Human Resource Security/02 - During employment (Controls 6.3–6.6).mp4 12.04 MB
~Get Your Files Here !/12 - 11. System and Network Security/01 - Network security management (Controls 8.20–8.23).mp4 11.77 MB
~Get Your Files Here !/12 - 11. System and Network Security/02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4 11.53 MB
~Get Your Files Here !/14 - 13. Application Security/02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4 11.43 MB
~Get Your Files Here !/05 - 4. Identity and Access Management/02 - System and application access control (Controls 8.2–8.5).mp4 11.31 MB
~Get Your Files Here !/02 - 1. Governance/03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4 10.73 MB
~Get Your Files Here !/03 - 2. Asset Management/01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4 10.56 MB
~Get Your Files Here !/04 - 3. Information Protection/01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4 10.55 MB
~Get Your Files Here !/02 - 1. Governance/02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4 10.16 MB
~Get Your Files Here !/02 - 1. Governance/01 - Policies for information security (Control 5.1).mp4 9.87 MB
~Get Your Files Here !/07 - 6. Information Security Event Management/02 - Logging and monitoring (Controls 8.15–8.17).mp4 9.71 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/01 - Supplier relationships security (Controls 5.19–5.21).mp4 9.41 MB
~Get Your Files Here !/06 - 5. Supplier Relationships Security/02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4 9.35 MB
~Get Your Files Here !/13 - 12. Threat and Vulnerability Management and Secure Configuration/01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4 9.31 MB
~Get Your Files Here !/11 - 10. Physical Security/04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).mp4 9.29 MB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/01 - Legal and compliance (Controls 5.31–5.33).mp4 8.79 MB
~Get Your Files Here !/11 - 10. Physical Security/03 - Equipment security (Controls 7.7–7.10).mp4 8.60 MB
~Get Your Files Here !/03 - 2. Asset Management/02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).mp4 8.02 MB
~Get Your Files Here !/10 - 9. Human Resource Security/01 - Prior to employment (Controls 6.1 and 6.2).mp4 8.00 MB
~Get Your Files Here !/09 - 8. Legal, Compliance, and Security Assurance/02 - Information security assurance (Control 5.35 and 5.36).mp4 7.37 MB
~Get Your Files Here !/11 - 10. Physical Security/01 - Ensuring authorized access (Controls 7.1–7.3).mp4 6.99 MB
~Get Your Files Here !/11 - 10. Physical Security/02 - Protecting secure areas (Controls 7.4–7.6).mp4 6.71 MB
~Get Your Files Here !/08 - 7. Continuity/02 - Backup and availability (Controls 8.13 and 8.14).mp4 6.11 MB
~Get Your Files Here !/15 - Conclusion/01 - Achieving ISO 27001 compliance.mp4 5.03 MB
~Get Your Files Here !/01 - Introduction/01 - Introduction to the Annex A controls.mp4 3.28 MB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/Excel files/Handout 01.02 - Example roles and responsibilities matrix.xlsx 84 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.02 - Example roles and responsibilities matrix.pdf 30 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 08.01 - How to demonstrate compliance with Controls 5.31 - 5.33.pdf 28 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 09.02 - How to demonstrate compliance with Controls 6.3 - 6.6.pdf 27 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.01 - Suggested Topic-specific Information Security Policies.pdf 27 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 03.02 - How to demonstrate compliance with Controls 8.10 - 8.12 _ 8.33.pdf 27 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 02.01 - How to demonstrate compliance with Controls 5.9, 5.10, 6.7 _ 8.1.pdf 27 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 09.01 - How to demonstrate compliance with Controls 6.1 _ 6.2.pdf 27 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 11.02 - How to demonstrate compliance with Controls 8.7, 8.18, 8.30 _ 8.34.pdf 27 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 06.01 - How to demonstrate compliance with Controls 5.24 - 5.28 _ 6.8.pdf 26 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 11.01 - How to demonstrate compliance with Controls 8.20 - 8.23.pdf 26 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 07.01 - How to demonstrate compliance with Controls 5.29, 5.30 _ 8.6.pdf 25 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 06.02 - How to demonstrate compliance with Controls 8.15 - 8.17.pdf 25 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 12.02 - How to demonstrate compliance with Controls 8.9, 8.19 _ 8.24.pdf 25 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 04.01 - How to demonstrate compliance with Controls 5.15 - 5.18.pdf 25 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 07.02 - How to demonstrate compliance with Controls 8.13 _ 8.14.pdf 25 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 01.01 - How to demonstrate compliance with Control 5.1.pdf 25 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 12.01 - How to demonstrate compliance with Controls 5.7 _ 8.8.pdf 25 KB
~Get Your Files Here !/Ex_Files_Annex_A_Controls/Exercise Files/PDF files/Handout 13.01 - How to demonstrate compliance with Controls 8.25 - 8.28.pdf 25 KB