Torrent details for "ISO 27001 2022 Compliant Cybersecurity The Annex A Controls Free…" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
296.0 MB
Info Hash:
DB72DFC8DE9ED8F545F9897E63CA81ECABC3D86E
Added By:
Added:
Oct. 30, 2023, 10:12 p.m.
Stats:
|
(Last updated: May 10, 2025, 11:49 p.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 183 bytes |
| 01 - Introduction to the Annex A controls.mp4 | 3.2 MB |
| 01 - Introduction to the Annex A controls.srt | 1.5 KB |
| 01 - Policies for information security (Control 5.1).mp4 | 9.6 MB |
| 01 - Policies for information security (Control 5.1).srt | 9.0 KB |
| 02 - Roles, responsibilities, and duties (Controls 5.2–5.4).mp4 | 9.9 MB |
| 02 - Roles, responsibilities, and duties (Controls 5.2–5.4).srt | 7.4 KB |
| 03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).mp4 | 10.5 MB |
| 03 - Contacts and project management (Controls 5.5, 5.6, and 5.8).srt | 8.5 KB |
| 01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).mp4 | 10.3 MB |
| 01 - Responsibility for information assets (Controls 5.9, 5.10, 6.7, and 8.1).srt | 8.3 KB |
| 02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).mp4 | 7.8 MB |
| 02 - Asset security procedures (Controls 5.11, 5.14, and 5.37).srt | 6.7 KB |
| 01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).mp4 | 10.3 MB |
| 01 - Classification, labeling, and privacy (Controls 5.12, 5.13, and 5.34).srt | 8.1 KB |
| 02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).mp4 | 12.1 MB |
| 02 - Deletion, masking, DLP, and test data (Controls 8.10–8.12, and 8.33).srt | 9.7 KB |
| 01 - Access management (Controls 5.15–5.18).mp4 | 12.3 MB |
| 01 - Access management (Controls 5.15–5.18).srt | 8.7 KB |
| 02 - System and application access control (Controls 8.2–8.5).mp4 | 11.0 MB |
| 02 - System and application access control (Controls 8.2–8.5).srt | 8.1 KB |
| 01 - Supplier relationships security (Controls 5.19–5.21).mp4 | 9.2 MB |
| 01 - Supplier relationships security (Controls 5.19–5.21).srt | 7.9 KB |
| 02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).mp4 | 9.1 MB |
| 02 - Managing supplier service delivery and cloud services security (Controls 5.22 and 5.23).srt | 6.5 KB |
| 01 - Information security incident management (Controls 5.24–5.28, and 6.8).mp4 | 12.7 MB |
| 01 - Information security incident management (Controls 5.24–5.28, and 6.8).srt | 10.0 KB |
| 02 - Logging and monitoring (Controls 8.15–8.17).mp4 | 9.5 MB |
| 02 - Logging and monitoring (Controls 8.15–8.17).srt | 7.2 KB |
| 01 - Continuity (Controls 5.29, 5.30, and 8.13).mp4 | 11.8 MB |
| 01 - Continuity (Controls 5.29, 5.30, and 8.13).srt | 9.0 KB |
| 02 - Backup and availability (Controls 8.13 and 8.14).mp4 | 6.0 MB |
| 02 - Backup and availability (Controls 8.13 and 8.14).srt | 4.4 KB |
| 01 - Legal and compliance (Controls 5.31–5.33).mp4 | 8.6 MB |
| 01 - Legal and compliance (Controls 5.31–5.33).srt | 6.2 KB |
| 02 - Information security assurance (Control 5.35 and 5.36).mp4 | 7.2 MB |
| 02 - Information security assurance (Control 5.35 and 5.36).srt | 5.2 KB |
| 01 - Prior to employment (Controls 6.1 and 6.2).mp4 | 7.8 MB |
| 01 - Prior to employment (Controls 6.1 and 6.2).srt | 6.1 KB |
| 02 - During employment (Controls 6.3–6.6).mp4 | 11.8 MB |
| 02 - During employment (Controls 6.3–6.6).srt | 10.1 KB |
| 01 - Ensuring authorized access (Controls 7.1–7.3).mp4 | 6.8 MB |
| 01 - Ensuring authorized access (Controls 7.1–7.3).srt | 4.7 KB |
| 02 - Protecting secure areas (Controls 7.4–7.6).mp4 | 6.6 MB |
| 02 - Protecting secure areas (Controls 7.4–7.6).srt | 5.2 KB |
| 03 - Equipment security (Controls 7.7–7.10).mp4 | 8.4 MB |
| 03 - Equipment security (Controls 7.7–7.10).srt | 6.6 KB |
| 04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).mp4 | 9.1 MB |
| 04 - Utilities, cabling, and equipment management (Controls 7.11–7.14).srt | 6.2 KB |
| 01 - Network security management (Controls 8.20–8.23).mp4 | 11.5 MB |
| 01 - Network security management (Controls 8.20–8.23).srt | 8.2 KB |
| 02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).mp4 | 11.3 MB |
| 02 - Protection of information systems (Controls 8.7, 8.18, 8.30, and 8.34).srt | 8.5 KB |
| 01 - Threat and vulnerability management (Controls 5.7 and 8.8).mp4 | 9.1 MB |
| 01 - Threat and vulnerability management (Controls 5.7 and 8.8).srt | 7.5 KB |
| 02 - Secure configuration (Controls 8.9, 8.19, and 8.24).mp4 | 13.6 MB |
| 02 - Secure configuration (Controls 8.9, 8.19, and 8.24).srt | 10.1 KB |
| 01 - Secure development (Controls 8.25–8.28).mp4 | 11.8 MB |
| 01 - Secure development (Controls 8.25–8.28).srt | 9.5 KB |
| 02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).mp4 | 11.2 MB |
| 02 - Testing, separate environments, and change management (Controls 8.29, 8.31, and 8.32).srt | 9.9 KB |
| 01 - Achieving ISO 27001 compliance.mp4 | 4.9 MB |
| 01 - Achieving ISO 27001 compliance.srt | 2.9 KB |
| Bonus Resources.txt | 386 bytes |
| Handout 01.02 - Example roles and responsibilities matrix.xlsx | 82.8 KB |
| Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx | 22.7 KB |
| ~$Handout 14.01 - ISO 27001 Annex A Controls Compliance Checklist.xlsx | 171 bytes |
| Handout 01.01 - How to demonstrate compliance with Control 5.1.pdf | 24.9 KB |
| Handout 01.01 - Suggested Topic-specific Information Security Policies.pdf | 27.2 KB |
| Handout 01.02 - Example roles and responsibilities matrix.pdf | 30.2 KB |
| Handout 01.02 - How to demonstrate compliance with Controls 5.2 - 5.4.pdf | 24.7 KB |
| Handout 01.03 - How to demonstrate compliance with Controls 5.5, 5.6 _ 5.8.pdf | 24.7 KB |
| Handout 02.01 - How to demonstrate compliance with Controls 5.9, 5.10, 6.7 _ 8.1.pdf | 26.6 KB |
| Handout 02.02 - How to demonstrate compliance with Controls 5.11, 5.14 _ 5.37.pdf | 24.4 KB |
| Handout 03.01 - How to demonstrate compliance with Controls 5.12, 5.13 _ 5.34.pdf | 24.8 KB |
| Handout 03.02 - How to demonstrate compliance with Controls 8.10 - 8.12 _ 8.33.pdf | 27.1 KB |
| Handout 04.01 - How to demonstrate compliance with Controls 5.15 - 5.18.pdf | 25.0 KB |
| Handout 04.02 - How to demonstrate compliance with Controls 8.2 - 8.5.pdf | 24.8 KB |
| Handout 05.01 - How to demonstrate compliance with Controls 5.19 - 5.21.pdf | 24.4 KB |
| Handout 05.02 - How to demonstrate compliance with Controls 5.22 _ 5.23.pdf | 24.6 KB |
| Handout 06.01 - How to demonstrate compliance with Controls 5.24 - 5.28 _ 6.8.pdf | 25.5 KB |
| Handout 06.02 - How to demonstrate compliance with Controls 8.15 - 8.17.pdf | 25.2 KB |
| Handout 07.01 - How to demonstrate compliance with Controls 5.29, 5.30 _ 8.6.pdf | 25.3 KB |
| Handout 07.02 - How to demonstrate compliance with Controls 8.13 _ 8.14.pdf | 25.0 KB |
| Handout 08.01 - How to demonstrate compliance with Controls 5.31 - 5.33.pdf | 27.9 KB |
| Handout 08.02 - How to demonstrate compliance with Controls 5.35 _ 5.36.pdf | 24.8 KB |
| Handout 09.01 - How to demonstrate compliance with Controls 6.1 _ 6.2.pdf | 26.6 KB |
| Handout 09.02 - How to demonstrate compliance with Controls 6.3 - 6.6.pdf | 27.3 KB |
| Handout 10.01 - How to demonstrate compliance with Controls 7.1 - 7.3.pdf | 24.3 KB |
| Handout 10.02 - How to demonstrate compliance with Controls 7.4 - 7.6.pdf | 24.7 KB |
| Handout 10.03 - How to demonstrate compliance with Controls 7.7 - 7.10.pdf | 24.4 KB |
| Handout 10.04 - How to demonstrate compliance with Controls 7.11 - 7.14.pdf | 24.3 KB |
| Handout 11.01 - How to demonstrate compliance with Controls 8.20 - 8.23.pdf | 25.4 KB |
| Handout 11.02 - How to demonstrate compliance with Controls 8.7, 8.18, 8.30 _ 8.34.pdf | 26.5 KB |
| Handout 12.01 - How to demonstrate compliance with Controls 5.7 _ 8.8.pdf | 24.9 KB |
| Handout 12.02 - How to demonstrate compliance with Controls 8.9, 8.19 _ 8.24.pdf | 25.1 KB |
| Handout 13.01 - How to demonstrate compliance with Controls 8.25 - 8.28.pdf | 24.9 KB |
Name
DL
Uploader
Size
S/L
Added
-
296.0 MB
[31
/
3]
2023-10-30
| Uploaded by FreeCourseWeb | Size 296.0 MB | Health [ 31 /3 ] | Added 2023-10-30 |
-
559.5 MB
[10
/
0]
2023-07-01
| Uploaded by FreeCourseWeb | Size 559.5 MB | Health [ 10 /0 ] | Added 2023-07-01 |
-
744.5 MB
[11
/
0]
2023-07-01
| Uploaded by FreeCourseWeb | Size 744.5 MB | Health [ 11 /0 ] | Added 2023-07-01 |
-
2.0 GB
[8
/
10]
2023-07-01
| Uploaded by FreeCourseWeb | Size 2.0 GB | Health [ 8 /10 ] | Added 2023-07-01 |
-
3.2 GB
[0
/
16]
2024-01-11
| Uploaded by FreeCourseWeb | Size 3.2 GB | Health [ 0 /16 ] | Added 2024-01-11 |
-
1.5 GB
[14
/
1]
2024-01-01
| Uploaded by FreeCourseWeb | Size 1.5 GB | Health [ 14 /1 ] | Added 2024-01-01 |
-
462.8 MB
[17
/
0]
2025-02-21
| Uploaded by freecoursewb | Size 462.8 MB | Health [ 17 /0 ] | Added 2025-02-21 |
-
533.2 MB
[13
/
2]
2023-06-01
| Uploaded by freecoursewb | Size 533.2 MB | Health [ 13 /2 ] | Added 2023-06-01 |
-
258.0 MB
[1
/
3]
2025-09-26
| Uploaded by freecoursewb | Size 258.0 MB | Health [ 1 /3 ] | Added 2025-09-26 |
NOTE
SOURCE: ISO 27001 2022 Compliant Cybersecurity The Annex A Controls FreeCourseWeb
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


