[ WebToolTip.com ] Udemy - Auditing ISO 27001 - 2022 - Organizational Controls
File List
- ~Get Your Files Here !/1 - Introduction/1 -Introduction.mp4 46.6 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/11 -5.33 Protection of records.mp4 45.3 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/9 -Control 5.31 – Legal, Statutory, Regulatory, and Contractual Require.mp4 43.0 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/7 -5.29 Information security during disruption.mp4 41.2 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/13 -5.35 Independent review of information security.mp4 40.1 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/5 -5.14 Information transfer.mp4 40.0 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/3 -5.25 Assessment and decision on information security events.mp4 39.4 MB
- ~Get Your Files Here !/2 - Information Security Governance and Direction/2 -Control 5.1 – Policies for Information Security.mp4 38.9 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/15 -5.37 Information systems audit considerations.mp4 38.5 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/9 -5.18 Access rights.mp4 38.1 MB
- ~Get Your Files Here !/5 - Lesson 27 - Supplier Management and Third-Party Risks/4 -5.23 Managing changes to supplier services.mp4 37.6 MB
- ~Get Your Files Here !/3 - Information Security Policy and Strategic Alignment/3 -Control 5.8 Information Security in Project Management.mp4 37.3 MB
- ~Get Your Files Here !/5 - Lesson 27 - Supplier Management and Third-Party Risks/2 -5.21 Managing information security in the ICT supply chain.mp4 37.2 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/4 -5.26 Response to information security incidents.mp4 36.9 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/4 -5.13 Labelling of information.mp4 36.9 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/3 -5.12 Classification of information.mp4 36.8 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/2 -5.11 Return of assets.mp4 36.6 MB
- ~Get Your Files Here !/2 - Information Security Governance and Direction/6 -Control 5.5 Contact with Authorities.mp4 36.2 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/11 -5.20 Addressing information security within supplier agreements.mp4 35.3 MB
- ~Get Your Files Here !/2 - Information Security Governance and Direction/5 -Control 5.4 – Management Responsibilities.mp4 34.4 MB
- ~Get Your Files Here !/2 - Information Security Governance and Direction/3 -Control 5.2 Information Security Roles and Responsibilities.mp4 34.3 MB
- ~Get Your Files Here !/2 - Information Security Governance and Direction/4 -Control 5.3 – Segregation of Duties.mp4 33.1 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/12 -5.34 Privacy and protection of personally identifiable information (PII).mp4 33.0 MB
- ~Get Your Files Here !/5 - Lesson 27 - Supplier Management and Third-Party Risks/3 -5.22 Monitoring and review of supplier services.mp4 32.8 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/6 -5.28 Collection of evidence.mp4 32.5 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/8 -5.17 Authentication information.mp4 32.3 MB
- ~Get Your Files Here !/3 - Information Security Policy and Strategic Alignment/2 -Control 5.7 – Threat Intelligence.mp4 32.1 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/5 -5.27 Learning from information security incidents.mp4 31.9 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/7 -5.16 Identity management.mp4 31.8 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/8 -5.30 ICT readiness for business continuity.mp4 31.7 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/14 -5.36 Compliance with policies, rules and standards for information security.mp4 31.0 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/2 -5.24 Information security incident management planning and preparation.mp4 30.8 MB
- ~Get Your Files Here !/3 - Information Security Policy and Strategic Alignment/4 -Control 5.9 Inventory of Information and Associated Assets.mp4 30.2 MB
- ~Get Your Files Here !/2 - Information Security Governance and Direction/7 -Control 5.6 – Contact with Special Interest Groups.mp4 29.5 MB
- ~Get Your Files Here !/3 - Information Security Policy and Strategic Alignment/5 -Control 5.10 – Acceptable Use of Information and Other Associated Assets.mp4 29.5 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/6 -5.15 Access control.mp4 29.1 MB
- ~Get Your Files Here !/1 - Introduction/2 -Framework and tools.mp4 27.2 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/10 -5.32 Intellectual property rights.mp4 27.2 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/10 -5.19 Information security in supplier relationships.mp4 25.2 MB
- ~Get Your Files Here !/7 - Conclusion/1 -Conclusion.mp4 22.2 MB
- ~Get Your Files Here !/4 - Lesson 16 - Risk and Change Management/1 -Risk and Change Management.mp4 15.3 MB
- ~Get Your Files Here !/3 - Information Security Policy and Strategic Alignment/1 -Information Security Policy and Strategic Alignment.mp4 15.2 MB
- ~Get Your Files Here !/6 - Compliance and Legal Responsibility/1 -Compliance and Legal Responsibility.mp4 14.7 MB
- ~Get Your Files Here !/1 - Introduction/3 -Case Study Company Introduction.mp4 13.6 MB
- ~Get Your Files Here !/5 - Lesson 27 - Supplier Management and Third-Party Risks/1 -Supplier Management and Third-Party Risks.mp4 12.5 MB
- ~Get Your Files Here !/2 - Information Security Governance and Direction/1 -Information Security Governance and Direction.mp4 11.4 MB
- ~Get Your Files Here !/2 - Information Security Governance and Direction/2 -Control 5.xlsx 5.6 KB
- Get Bonus Downloads Here.url 180 bytes
- ~Get Your Files Here !/Bonus Resources.txt 70 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.