Torrent details for "Udemy ISO IEC 27001 Information Security Management for Beg" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
2.2 GB
Info Hash:
5A0E0D4826015FAF48D40602DE7A593448F609EF
Added By:
Added:
March 1, 2026, 9:04 a.m.
Stats:
|
(Last updated: March 1, 2026, 9:05 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 1 - ISO 27001 Explained in Practical Language.mp4 | 14.0 MB |
| 2 - Certification Journey from Start to Finish.mp4 | 13.5 MB |
| 3 - Building an Audit-Ready Mindset Early.mp4 | 11.4 MB |
| 4 - Course Roadmap, Capstones, and Resources.mp4 | 11.2 MB |
| 1 - Healthcare and Life Sciences PHI, Validation, and Traceability.mp4 | 12.2 MB |
| 2 - Financial Services SOX, AML, Encryption, and Fraud Controls.mp4 | 12.3 MB |
| 3 - SaaS and IT SDLC, Multi-Tenant Isolation, and SOC Mapping.mp4 | 13.2 MB |
| 4 - Manufacturing and Automotive OT Controls and Change Discipline.mp4 | 14.1 MB |
| 5 - Public Sector and Education Procurement and Records Controls.mp4 | 12.4 MB |
| 6 - Tailoring Templates Without Introducing Scope Creep.mp4 | 10.4 MB |
| 1 - Supplier Tiering, Criticality, and Risk Segmentation.mp4 | 13.0 MB |
| 2 - Onboarding and Offboarding Packs for Vendors.mp4 | 10.8 MB |
| 3 - Third-Party Due Diligence and Audit Playbooks.mp4 | 10.1 MB |
| 4 - Cloud Shared Responsibility and Contract Clauses.mp4 | 13.5 MB |
| 5 - Continuous Monitoring, Attestations, and SOC Reports.mp4 | 11.8 MB |
| 6 - Vendor Nonconformities, Remediation, and Exit Plans.mp4 | 12.9 MB |
| 1 - Practical Risk Frameworks ISO 27005, FAIR-Lite, and Choices.mp4 | 12.2 MB |
| 2 - Incident Playbooks Ransomware, Breach, and Insider Threats.mp4 | 14.1 MB |
| 3 - BIA, BCP, and DR RTO, RPO, and Realistic Testing.mp4 | 12.3 MB |
| 4 - Tabletop Exercises and Simulation Design That Teach.mp4 | 12.2 MB |
| 5 - Notifications, After-Action Reviews, and Lessons Learned.mp4 | 11.6 MB |
| 1 - Visible Leadership Behaviors Auditors Notice Quickly.mp4 | 12.7 MB |
| 2 - Change Management That Sticks Across Teams.mp4 | 12.0 MB |
| 3 - Documentation Without Fatigue or Busywork.mp4 | 11.9 MB |
| 4 - Awareness Programs That People Actually Finish.mp4 | 11.5 MB |
| 5 - Embedding KPIs into Roles and Performance Reviews.mp4 | 12.2 MB |
| 1 - True Cost Models Implementation, Certification, and Hidden Items.mp4 | 12.4 MB |
| 2 - ROI Modeling Risk Reduction, Sales Lift, and Insurance Effects.mp4 | 13.3 MB |
| 3 - In-House, Hybrid, or Consultant Picking the Right Path.mp4 | 12.4 MB |
| 4 - Grants, Incentives, and Budget Phasing Where Applicable.mp4 | 11.6 MB |
| 5 - Integrated Systems for Smarter Cost and Evidence Reuse.mp4 | 13.8 MB |
| 6 - When ISO 27001 Is Not the Right Investment.mp4 | 13.0 MB |
| 7 - Reporting ISO ROI and Avoiding Vanity Metrics.mp4 | 11.9 MB |
| 1 - Choosing DMS, GRC, SIEM, EDR, and Ticketing Tools.mp4 | 11.7 MB |
| 2 - Automating Evidence Capture with APIs and RPA.mp4 | 11.7 MB |
| 3 - Dashboards for Clause 9 Monitoring and Decisions.mp4 | 11.8 MB |
| 4 - Secure Cloud Patterns, Backup, and Immutability.mp4 | 11.9 MB |
| 5 - Continuous Auditing, Assurance-as-Code, and Responsible AI.mp4 | 10.8 MB |
| 1 - Red Flags of Patchwork ISMS Implementations.mp4 | 9.9 MB |
| 2 - Traits of High-Maturity, Risk-Driven Programs.mp4 | 10.6 MB |
| 3 - Internal Audit Center of Excellence and Coaching.mp4 | 11.4 MB |
| 4 - Improvement Pipeline and Effectiveness Verification.mp4 | 10.6 MB |
| 5 - Board-Level Reporting and External Trust Signals.mp4 | 10.3 MB |
| 1 - Readiness Gates and Self-Assessment Scoring.mp4 | 10.6 MB |
| 2 - Running the Audit Day with Confidence and Clarity.mp4 | 10.2 MB |
| 3 - Handling Findings Live and Negotiating Scope.mp4 | 9.4 MB |
| 4 - Rapid Recovery, Re-Audit Planning, and Cost Control.mp4 | 10.6 MB |
| 5 - Lessons Learned and a Stronger Next Cycle.mp4 | 10.0 MB |
| 1 - ISO 27001 Origins, Revisions, and Transition Paths.mp4 | 13.1 MB |
| 10 - How ISO Standards Evolve and Get Updated.mp4 | 11.2 MB |
| 11 - Implementation Wins, Failures, and Key Lessons.mp4 | 11.7 MB |
| 2 - Business Value, Trust Signals, and Risk Reduction.mp4 | 11.4 MB |
| 3 - Annex SL Structure and Clause Flow Logic.mp4 | 11.8 MB |
| 4 - PDCA and Risk-Based Thinking for ISMS.mp4 | 12.8 MB |
| 5 - Mandatory Documents, Records, and Evidence Trails.mp4 | 10.8 MB |
| 6 - Defining an ISMS Scope That Holds Up.mp4 | 11.3 MB |
| 7 - Accreditation Bodies, Certification Bodies, and Roles.mp4 | 12.8 MB |
| 8 - Mapping ISO 27001 to NIST, SOC 2, and GDPR.mp4 | 14.0 MB |
| 9 - Costly Myths and Misconceptions to Avoid.mp4 | 12.5 MB |
| 1 - Clause 4 Issues, Parties, and Defensible Scope.mp4 | 11.2 MB |
| 10 - Clause 8 Operational Control, Change, and Outsourcing.mp4 | 11.9 MB |
| 11 - Clause 8 Running Risk Activities in Daily Operations.mp4 | 11.0 MB |
| 12 - Clause 9 Metrics That Matter and Data Quality.mp4 | 11.0 MB |
| 13 - Clause 9 Internal Audits with Real Value Creation.mp4 | 10.8 MB |
| 14 - Clause 9 Management Review Inputs and Decisions.mp4 | 9.9 MB |
| 15 - Clause 10 Nonconformities, CAPA, and Effectiveness.mp4 | 11.2 MB |
| 16 - Clause 10 Continuous Improvement as a Daily Habit.mp4 | 9.6 MB |
| 2 - Clause 4 Process Interactions and ISMS Boundaries.mp4 | 10.0 MB |
| 3 - Clause 5 Policy Direction, Leadership, and RACI.mp4 | 10.9 MB |
| 4 - Clause 6 Risk Method, Criteria, and Acceptance Rules.mp4 | 11.3 MB |
| 5 - Clause 6 Risk Treatment Plans and Strong SoA.mp4 | 10.6 MB |
| 6 - Clause 6 Security Objectives, KPIs, and Tracking.mp4 | 12.3 MB |
| 7 - Clause 7 Resources, Competence, and Training Records.mp4 | 11.2 MB |
| 8 - Clause 7 Awareness, Communication, and Messaging.mp4 | 12.2 MB |
| 9 - Clause 7 Documented Information Control and Retention.mp4 | 10.5 MB |
| 1 - Learning Objectives.mp4 | 10.0 MB |
| 10 - A.5.9 Inventory of Information and Other Associated Assets.mp4 | 11.4 MB |
| 11 - A.5.10 Acceptable Use of Information and Other Associated Assets.mp4 | 12.8 MB |
| 12 - A.5.11 Return of Assets.mp4 | 10.3 MB |
| 13 - A.5.12 Classification of Information.mp4 | 10.3 MB |
| 14 - A.5.13 Labelling of Information.mp4 | 9.7 MB |
| 15 - A.5.14 Information Transfer.mp4 | 11.2 MB |
| 16 - A.5.15 Access Control.mp4 | 9.8 MB |
| 17 - A.5.16 Identity Management.mp4 | 9.4 MB |
| 18 - A.5.17 Authentication Information.mp4 | 10.0 MB |
| 19 - A.5.18 Access Rights.mp4 | 10.2 MB |
| 2 - A.5.1 Policies for Information Security.mp4 | 10.4 MB |
| 20 - Supplier Management Process.mp4 | 11.4 MB |
| 21 - A.5.19 Information Security in Supplier Relationships.mp4 | 10.3 MB |
| 22 - A.5.20 Addressing Information Security within Supplier Agreements.mp4 | 11.0 MB |
| 23 - A.5.21 Managing Information Security in the ICT Supply Chain.mp4 | 11.0 MB |
| 24 - A.5.22 Monitoring, Review and Change Management of Supplier Services.mp4 | 11.0 MB |
| 25 - A.5.23 Information Security for Use of Cloud Services.mp4 | 11.8 MB |
| 26 - Information Security Incident Management Process.mp4 | 10.8 MB |
| 27 - A.5.24 Information Security Incident Management Planning and Preparation.mp4 | 10.5 MB |
| 28 - A.5.25 Assessment and Decision on Information Security Events.mp4 | 10.1 MB |
| 29 - A.5.26 Response to Information Security Incidents.mp4 | 9.6 MB |
| 3 - A.5.2 Information Security Roles and Responsibilities.mp4 | 12.3 MB |
| 30 - A.5.27 Learning from Information Security Incidents.mp4 | 9.4 MB |
| 31 - A.5.28 Collection of Evidence.mp4 | 8.9 MB |
| 32 - A.5.29 Information Security During Disruption.mp4 | 9.9 MB |
| 33 - A.5.30 ICT Readiness for Business Continuity.mp4 | 9.3 MB |
| 34 - A.5.31 Legal, Statutory, Regulatory and Contractual Requirements.mp4 | 10.5 MB |
| 35 - A.5.32 Intellectual Property Rights.mp4 | 9.5 MB |
| 36 - A.5.33 Protection of Records.mp4 | 9.3 MB |
| 37 - A.5.34 Privacy and Protection of Personal Identifiable Information (PII).mp4 | 9.9 MB |
| 38 - A.5.35 Independent Review of Information Security.mp4 | 10.0 MB |
| 39 - A.5.36 Compliance with Policies, Rules and Standards for Information Security.mp4 | 10.3 MB |
| 4 - A.5.3 Segregation of Duties.mp4 | 10.9 MB |
| 40 - A.5.37 Documented Operating Procedures.mp4 | 10.7 MB |
| 5 - A.5.4 Management Responsibilities.mp4 | 11.3 MB |
| 6 - A.5.5 Contact with Authorities.mp4 | 10.6 MB |
| 7 - A.5.6 Contact with Special Interest Groups.mp4 | 10.6 MB |
| 8 - A.5.7 Threat Intelligence.mp4 | 9.7 MB |
| 9 - A.5.8 Information Security in Project Management.mp4 | 11.2 MB |
| 1 - Learning Objectives.mp4 | 10.8 MB |
| 2 - A.6.1 Screening.mp4 | 9.3 MB |
| 3 - A.6.2 Terms and Conditions of Employment.mp4 | 10.1 MB |
| 4 - A.6.3 Information Security Awareness, Education and Training.mp4 | 10.0 MB |
| 5 - A.6.4 Disciplinary Process.mp4 | 9.3 MB |
| 6 - A.6.5 Responsibilities After Termination or Change of Employment.mp4 | 11.0 MB |
| 7 - A.6.6 Confidentiality or Non-Disclosure Agreements.mp4 | 9.1 MB |
| 8 - A.6.7 Remote Working.mp4 | 10.3 MB |
| 9 - A.6.8 Information Security Event Reporting.mp4 | 8.9 MB |
| 1 - Learning Objectives.mp4 | 11.1 MB |
| 10 - A.7.9 Security of Assets Off-Premises.mp4 | 9.8 MB |
| 11 - A.7.10 Storage Media.mp4 | 9.4 MB |
| 12 - A.7.11 Supporting Utilities.mp4 | 10.1 MB |
| 13 - A.7.12 Cabling Security.mp4 | 8.5 MB |
| 14 - A.7.13 Equipment Maintenance.mp4 | 9.2 MB |
| 15 - A.7.14 Secure Disposal or Re-Use of Equipment.mp4 | 10.6 MB |
| 2 - A.7.1 Physical Security Perimeters.mp4 | 10.2 MB |
| 3 - A.7.2 Physical Entry.mp4 | 8.7 MB |
| 4 - A.7.3 Securing Offices, Rooms and Facilities.mp4 | 10.4 MB |
| 5 - A.7.4 Physical Security Monitoring.mp4 | 10.6 MB |
| 6 - A.7.5 Protecting Against Physical and Environmental Threats.mp4 | 10.7 MB |
| 7 - A.7.6 Working in Secure Areas.mp4 | 10.2 MB |
| 8 - A.7.7 Clear Desk and Clear Screen.mp4 | 9.2 MB |
| 9 - A.7.8 Equipment Siting and Protection.mp4 | 9.9 MB |
| 1 - Learning Objectives.mp4 | 12.0 MB |
| 10 - A.8.9 Configuration Management.mp4 | 10.5 MB |
| 11 - A.8.10 Information Deletion.mp4 | 11.2 MB |
| 12 - A.8.11 Data Masking.mp4 | 10.0 MB |
| 13 - A.8.12 Data Leakage Prevention.mp4 | 9.7 MB |
| 14 - A.8.13 Information Backup.mp4 | 11.1 MB |
| 15 - A.8.14 Redundancy of Information Processing Facilities.mp4 | 11.2 MB |
| 16 - A.8.15 Logging.mp4 | 11.1 MB |
| 17 - A.8.16 Monitoring Activities.mp4 | 9.7 MB |
| 18 - A.8.17 Clock Synchronization.mp4 | 10.5 MB |
| 19 - A.8.18 Use of Privileged Utility Programs.mp4 | 8.5 MB |
| 2 - A.8.1 User End Point Devices.mp4 | 10.5 MB |
| 20 - A.8.19 Installation of Software on Operational Systems.mp4 | 9.0 MB |
| 21 - A.8.20 Networks Security.mp4 | 9.8 MB |
| 22 - A.8.21 Security of Network Services.mp4 | 9.5 MB |
| 23 - A.8.22 Segregation of Networks.mp4 | 8.9 MB |
| 24 - A.8.23 Web Filtering.mp4 | 8.1 MB |
| 25 - A.8.24 Use of Cryptography.mp4 | 8.0 MB |
| 26 - A.8.25 Secure Development Life Cycle.mp4 | 9.7 MB |
| 27 - A.8.26 Application Security Requirements.mp4 | 9.9 MB |
| 28 - A.8.27 Secure System Architecture and Engineering Principles.mp4 | 17.0 MB |
| 29 - A.8.28 Secure Coding.mp4 | 14.6 MB |
| 3 - A.8.2 Privileged Access Rights.mp4 | 11.2 MB |
| 30 - A.8.29 Security Testing in Development and Acceptance.mp4 | 12.8 MB |
| 31 - A.8.30 Outsourced Development.mp4 | 12.3 MB |
| 32 - A.8.31 Separation of Development, Test and Production Environments.mp4 | 13.4 MB |
| 33 - A.8.32 Change Management.mp4 | 12.5 MB |
| 34 - A.8.33 Test Information.mp4 | 12.2 MB |
| 35 - A.8.34 Protection of Information Systems During Audit Testing.mp4 | 11.5 MB |
| 4 - A.8.3 Information Access Restriction.mp4 | 10.6 MB |
| 5 - A.8.4 Access to Source Code.mp4 | 10.7 MB |
| 6 - A.8.5 Secure Authentication.mp4 | 9.7 MB |
| 7 - A.8.6 Capacity Management.mp4 | 10.6 MB |
| 8 - A.8.7 Protection Against Malware.mp4 | 9.7 MB |
| 9 - A.8.8 Management of Technical Vulnerabilities.mp4 | 12.4 MB |
| 1 - Kickoff and Charter Authority, Timeline, and RACI.mp4 | 13.2 MB |
| 10 - Awareness and Competence Role-Based Training Records.mp4 | 12.5 MB |
| 11 - Metrics and Monitoring KPIs, KRIs, and Dashboards.mp4 | 10.8 MB |
| 12 - Internal Audit Program Plan, Samples, and Reports.mp4 | 12.7 MB |
| 13 - Management Review Findings, Decisions, and Actions.mp4 | 11.1 MB |
| 14 - Stage 1 Readiness Document Set and Gap Closure.mp4 | 12.8 MB |
| 15 - Stage 2 Execution Interviews, Trials, and Rapid CAPA.mp4 | 11.7 MB |
| 16 - Surveillance Cycle Keeping the ISMS Living and Effective.mp4 | 10.8 MB |
| 2 - Context and Scope Boundaries, Interfaces, and Stakeholders.mp4 | 13.8 MB |
| 3 - Risk Method and Criteria Scales, Rules, and Options.mp4 | 12.1 MB |
| 4 - Asset and Data Inventory Ownership and Classification.mp4 | 14.6 MB |
| 5 - Risk Assessment Execution Scenarios, Scoring, and Owners.mp4 | 11.7 MB |
| 6 - Risk Treatment and SoA Control Selection and Rationale.mp4 | 12.4 MB |
| 7 - Policies and Procedures Right-Sized and Traceable.mp4 | 11.9 MB |
| 8 - Control Implementation Tech, People, and Process Actions.mp4 | 12.5 MB |
| 9 - Supplier and Cloud Governance Due Diligence and SLAs.mp4 | 11.9 MB |
| 1 - Selecting Certification Bodies and Contract Essentials.mp4 | 11.8 MB |
| 2 - Stage 1 versus Stage 2 What Auditors Emphasize.mp4 | 13.6 MB |
| 3 - Evidence Collection Strategies and Request Lists.mp4 | 11.4 MB |
| 4 - Writing Clear Nonconformities and Strong Evidence.mp4 | 12.2 MB |
| 5 - CAPA Lifecycle Root Cause, Actions, and Verification.mp4 | 11.7 MB |
| 6 - Mock and Shadow Audits for First-Time Success.mp4 | 9.8 MB |
| 7 - Remote and Onsite Audits Etiquette and Storytelling.mp4 | 10.9 MB |
| 8 - Always-Ready Operations and Continuous Assurance.mp4 | 11.6 MB |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
-
462.8 MB
[17
/
0]
2025-02-21
| Uploaded by freecoursewb | Size 462.8 MB | Health [ 17 /0 ] | Added 2025-02-21 |
-
361.2 MB
[0
/
6]
2023-10-23
| Uploaded by freecoursewb | Size 361.2 MB | Health [ 0 /6 ] | Added 2023-10-23 |
-
397.0 MB
[35
/
40]
2023-10-22
| Uploaded by freecoursewb | Size 397.0 MB | Health [ 35 /40 ] | Added 2023-10-22 |
-
1.4 GB
[18
/
12]
2023-10-22
| Uploaded by freecoursewb | Size 1.4 GB | Health [ 18 /12 ] | Added 2023-10-22 |
NOTE
SOURCE: Udemy ISO IEC 27001 Information Security Management for Beg
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


