ISO/IEC 27001 : Information Security Controls Explained | Udemy


ISO/IEC 27001 : Information Security Controls Explained | Udemy
English | Size: 3.05 GB
Genre: eLearning

What you’ll learn
Learn about information security controls

This course explains the Information Security Controls of ISO/IEC 27001 Annex A. Annex A of ISO 27001 is probably the most famous annex of all the ISO standards – this is because it provides an essential tool for managing information security risks: a list of security controls (or safeguards) that are to be used to improve the security of information assets.

This course will provide you with an understanding of how Annex A is structured. We will go through all the 114 security controls with easy to understand examples.

Annex A is composed of 14 sections:

A.5 Information security policies – controls on how the policies are written and reviewed

A.6 Organization of information security – controls on how the responsibilities are assigned;

A.7 Human resources security – controls prior to employment, during, and after the employment

A.8 Asset management – controls related to inventory of assets and acceptable use; also for information classification and media handling

A.9 Access control – controls for the management of access rights of users, systems and applications, and for the management of user responsibilities

A.10 Cryptography – controls related to encryption and key management

A.11 Physical and environmental security – controls defining secure areas, entry controls, protection against threats, equipment security, secure disposal, Clear Desk and Clear Screen Policy, etc.

A.12 Operational security – lots of controls related to the management of IT production: change management, capacity management, malware, backup, logging, monitoring, installation, vulnerabilities, etc.

A.13 Communications security – controls related to network security, segregation, network services, transfer of information, messaging, etc.

A.14 System acquisition, development and maintenance – controls defining security requirements, and security in development and support processes

A.15 Supplier relationships – controls on what to include in agreements, and how to monitor the suppliers

A.16 Information security incident management – controls for reporting events and weaknesses, defining responsibilities, response procedures, and collection of evidence

A.17 Information security aspects of business continuity management – controls requiring the planning of business continuity, procedures, verification and reviewing, and IT redundancy

A.18 Compliance – controls requiring the identification of applicable laws and regulations, intellectual property protection, personal data protection, and reviews of information security

Who this course is for:
IT employees who want to implement information security controls in their entreprise

nitroflare.com/view/A16DCC88F5A7D36/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part1.rar
nitroflare.com/view/C10457B29E7AFD7/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part2.rar
nitroflare.com/view/1C55BF28BBDA343/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part3.rar
nitroflare.com/view/0388B6BEF7C7DF2/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part4.rar
nitroflare.com/view/D08A773CC3E3CC7/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part5.rar
nitroflare.com/view/A786D41035FBB21/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part6.rar
nitroflare.com/view/12C218F5BE726EB/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part7.rar
nitroflare.com/view/3FDF129F643D702/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part8.rar

rapidgator.net/file/03c9cc6beaa387e04399ab94e37d5d6d/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part1.rar.html
rapidgator.net/file/ca911502f18eb2e5a7d523fd25dbe32f/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part2.rar.html
rapidgator.net/file/cc6af99b020e380c570dddafa246989b/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part3.rar.html
rapidgator.net/file/78eb2e0e6d51ef6515151beb77ac0799/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part4.rar.html
rapidgator.net/file/153825b88216d69a997d877bc666318f/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part5.rar.html
rapidgator.net/file/c3f0900d460885a490b9b0a2c955f97d/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part6.rar.html
rapidgator.net/file/212e9ca1a5d5640b48395770abef3d06/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part7.rar.html
rapidgator.net/file/e15bb6788d78de8e047c11e0f609ad10/UD-ISO-IEC-27001-Information-Security-Controls-Explained.15.11.part8.rar.html

If any links die or problem unrar, send request to
goo.gl/t4uR9G

About WoW Team

I'm WoW Team , I love to share all the video tutorials. If you have a video tutorial, please send me, I'll post on my website. Because knowledge is not limited to, irrespective of qualifications, people join hands to help me.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.