Torrent details for "Udemy ISO IEC 27002 2022 Information security controls" Log in to bookmark
Controls:
×
Report Torrent
Please select a reason for reporting this torrent:
Your report will be reviewed by our moderation team.
×
Report Information
Loading report information...
This torrent has been reported 0 times.
Report Summary:
| User | Reason | Date |
|---|
Failed to load report information.
×
Success
Your report has been submitted successfully.
Checked by:
Category:
Language:
English
Total Size:
3.8 GB
Info Hash:
B5547B01A28F78261A017E409CA46F845DD5A08B
Added By:
Added:
May 29, 2025, 11:55 a.m.
Stats:
|
(Last updated: May 29, 2025, 11:56 a.m.)
| File | Size |
|---|---|
| Get Bonus Downloads Here.url | 180 bytes |
| 1 - Introduction.en.srt | 4.3 KB |
| 1 - Introduction.mp4 | 18.8 MB |
| 2 - Information security, cybersecurity and privacy.en.srt | 4.9 KB |
| 2 - Information security, cybersecurity and privacy.mp4 | 20.6 MB |
| 3 - The ISO - IEC 27000 series of standards.en.srt | 5.6 KB |
| 3 - The ISO - IEC 27000 series of standards.mp4 | 32.3 MB |
| 4 - An ISMS according to ISO - IEC 27001.en.srt | 4.9 KB |
| 4 - An ISMS according to ISO - IEC 27001.mp4 | 24.9 MB |
| 5 - About ISO - IEC 27002 - Security+controls+and+attributes.pdf | 819.2 KB |
| 5 - About ISO - IEC 27002.en.srt | 8.5 KB |
| 5 - About ISO - IEC 27002.mp4 | 48.9 MB |
| 10 - Contact with authorities.en.srt | 2.1 KB |
| 10 - Contact with authorities.mp4 | 13.8 MB |
| 11 - Contact with special interest groups.en.srt | 2.8 KB |
| 11 - Contact with special interest groups.mp4 | 11.3 MB |
| 12 - Threat intelligence.en.srt | 3.9 KB |
| 12 - Threat intelligence.mp4 | 22.0 MB |
| 13 - Information security in project management.en.srt | 5.4 KB |
| 13 - Information security in project management.mp4 | 31.9 MB |
| 14 - Inventory of information and other associated assets.en.srt | 7.2 KB |
| 14 - Inventory of information and other associated assets.mp4 | 85.1 MB |
| 15 - Acceptable use of information and other associated assets.en.srt | 3.4 KB |
| 15 - Acceptable use of information and other associated assets.mp4 | 22.0 MB |
| 16 - Return of assets.en.srt | 3.0 KB |
| 16 - Return of assets.mp4 | 18.9 MB |
| 17 - Classification of information.en.srt | 6.3 KB |
| 17 - Classification of information.mp4 | 35.8 MB |
| 18 - Labelling of information.en.srt | 2.8 KB |
| 18 - Labelling of information.mp4 | 12.4 MB |
| 19 - Information transfer.en.srt | 6.3 KB |
| 19 - Information transfer.mp4 | 46.6 MB |
| 20 - Access control.en.srt | 10.5 KB |
| 20 - Access control.mp4 | 76.0 MB |
| 21 - Identity management.en.srt | 3.3 KB |
| 21 - Identity management.mp4 | 19.8 MB |
| 22 - Authentication information.en.srt | 7.4 KB |
| 22 - Authentication information.mp4 | 130.5 MB |
| 23 - Access rights.en.srt | 4.6 KB |
| 23 - Access rights.mp4 | 59.8 MB |
| 24 - Information security in supplier relationships.en.srt | 7.1 KB |
| 24 - Information security in supplier relationships.mp4 | 89.1 MB |
| 25 - Addressing information security within supplier agreements.en.srt | 7.4 KB |
| 25 - Addressing information security within supplier agreements.mp4 | 55.7 MB |
| 26 - Managing information security in the ICT supply chain.en.srt | 4.0 KB |
| 26 - Managing information security in the ICT supply chain.mp4 | 90.2 MB |
| 27 - Monitoring, review and change management of supplier services.en.srt | 4.1 KB |
| 27 - Monitoring, review and change management of supplier services.mp4 | 30.0 MB |
| 28 - Information security for use of cloud services.en.srt | 7.0 KB |
| 28 - Information security for use of cloud services.mp4 | 32.6 MB |
| 29 - Information security incident management planning and preparation.en.srt | 6.2 KB |
| 29 - Information security incident management planning and preparation.mp4 | 47.6 MB |
| 30 - Assessment and decision on information security events.en.srt | 2.8 KB |
| 30 - Assessment and decision on information security events.mp4 | 15.3 MB |
| 31 - Response to information security incidents.en.srt | 3.3 KB |
| 31 - Response to information security incidents.mp4 | 21.5 MB |
| 32 - Learning from information security incidents.en.srt | 1.8 KB |
| 32 - Learning from information security incidents.mp4 | 7.7 MB |
| 33 - Collection of evidence.en.srt | 3.9 KB |
| 33 - Collection of evidence.mp4 | 22.6 MB |
| 34 - Information security during disruption.en.srt | 3.3 KB |
| 34 - Information security during disruption.mp4 | 14.5 MB |
| 35 - ICT readiness for business continuity.en.srt | 5.4 KB |
| 35 - ICT readiness for business continuity.mp4 | 36.3 MB |
| 36 - Legal, statutory, regulatory and contractual requirements.en.srt | 4.0 KB |
| 36 - Legal, statutory, regulatory and contractual requirements.mp4 | 21.7 MB |
| 37 - Intellectual property rights.en.srt | 3.2 KB |
| 37 - Intellectual property rights.mp4 | 14.1 MB |
| 38 - Protection of records.en.srt | 2.6 KB |
| 38 - Protection of records.mp4 | 13.3 MB |
| 39 - Privacy and protection of PII.en.srt | 3.3 KB |
| 39 - Privacy and protection of PII.mp4 | 21.0 MB |
| 40 - Independent review of information security.en.srt | 3.2 KB |
| 40 - Independent review of information security.mp4 | 13.0 MB |
| 41 - Conformance with policies, rules and standards for information security.en.srt | 2.3 KB |
| 41 - Conformance with policies, rules and standards for information security.mp4 | 12.4 MB |
| 42 - Documented operating procedures.en.srt | 4.9 KB |
| 42 - Documented operating procedures.mp4 | 27.4 MB |
| 43 - Recapitulation organizational controls.en.srt | 8.8 KB |
| 43 - Recapitulation organizational controls.mp4 | 44.2 MB |
| 6 - Policies for information security.en.srt | 7.6 KB |
| 6 - Policies for information security.mp4 | 42.7 MB |
| 7 - Information security roles and responsibilities.en.srt | 4.5 KB |
| 7 - Information security roles and responsibilities.mp4 | 56.5 MB |
| 8 - Segregation of duties.en.srt | 3.4 KB |
| 8 - Segregation of duties.mp4 | 14.9 MB |
| 9 - Management responsibilities.en.srt | 3.5 KB |
| 9 - Management responsibilities.mp4 | 69.3 MB |
| 44 - Screening.en.srt | 6.3 KB |
| 44 - Screening.mp4 | 34.0 MB |
| 45 - Terms and conditions of employment.en.srt | 3.5 KB |
| 45 - Terms and conditions of employment.mp4 | 20.4 MB |
| 46 - Information security awareness, education and training.en.srt | 5.8 KB |
| 46 - Information security awareness, education and training.mp4 | 29.4 MB |
| 47 - Disciplinary process.en.srt | 2.6 KB |
| 47 - Disciplinary process.mp4 | 9.9 MB |
| 48 - Responsibilities after termination or change of employment.en.srt | 3.8 KB |
| 48 - Responsibilities after termination or change of employment.mp4 | 15.9 MB |
| 49 - Confidentiality or non-disclosure agreements.en.srt | 3.4 KB |
| 49 - Confidentiality or non-disclosure agreements.mp4 | 52.5 MB |
| 50 - Remote working.en.srt | 5.5 KB |
| 50 - Remote working.mp4 | 34.5 MB |
| 51 - Information security event reporting - Information_security_event_reporting.mp4 | 9.4 MB |
| 51 - Information security event reporting.en.srt | 3.7 KB |
| 51 - Information security event reporting.mp4 | 21.8 MB |
| 52 - Recapitulation people controls.en.srt | 2.3 KB |
| 52 - Recapitulation people controls.mp4 | 14.7 MB |
| 53 - Physical security perimeters.en.srt | 4.8 KB |
| 53 - Physical security perimeters.mp4 | 71.2 MB |
| 54 - Physical entry.en.srt | 6.6 KB |
| 54 - Physical entry.mp4 | 126.2 MB |
| 55 - Securing offices, rooms and facilities.en.srt | 1.2 KB |
| 55 - Securing offices, rooms and facilities.mp4 | 5.1 MB |
| 56 - Physical security monitoring.en.srt | 3.0 KB |
| 56 - Physical security monitoring.mp4 | 11.9 MB |
| 57 - Protecting against physical and environmental threats.en.srt | 3.7 KB |
| 57 - Protecting against physical and environmental threats.mp4 | 24.5 MB |
| 58 - Working in secure areas.en.srt | 2.2 KB |
| 58 - Working in secure areas.mp4 | 13.2 MB |
| 59 - Clear desk and clear screen.en.srt | 3.8 KB |
| 59 - Clear desk and clear screen.mp4 | 44.9 MB |
| 60 - Equipment siting and protection.en.srt | 3.8 KB |
| 60 - Equipment siting and protection.mp4 | 19.9 MB |
| 61 - Security of assets off-premises.en.srt | 4.0 KB |
| 61 - Security of assets off-premises.mp4 | 16.0 MB |
| 62 - Storage media.en.srt | 7.3 KB |
| 62 - Storage media.mp4 | 139.0 MB |
| 63 - Supporting utilities.en.srt | 3.3 KB |
| 63 - Supporting utilities.mp4 | 12.5 MB |
| 64 - Cabling security.en.srt | 2.6 KB |
| 64 - Cabling security.mp4 | 41.7 MB |
| 65 - Equipment maintenance.en.srt | 3.6 KB |
| 65 - Equipment maintenance.mp4 | 13.8 MB |
| 66 - Secure disposal or re-use of equipment.en.srt | 3.9 KB |
| 66 - Secure disposal or re-use of equipment.mp4 | 21.7 MB |
| 67 - Recapitulation physical controls.en.srt | 3.3 KB |
| 67 - Recapitulation physical controls.mp4 | 14.6 MB |
| 100 - Test information.en.srt | 3.5 KB |
| 100 - Test information.mp4 | 11.6 MB |
| 101 - Protection of information systems during audit testing.en.srt | 4.5 KB |
| 101 - Protection of information systems during audit testing.mp4 | 31.1 MB |
| 102 - Recapitulation technological controls.en.srt | 9.0 KB |
| 102 - Recapitulation technological controls.mp4 | 30.0 MB |
| 68 - User endpoint devices.en.srt | 9.0 KB |
| 68 - User endpoint devices.mp4 | 33.5 MB |
| 69 - Privileged access rights.en.srt | 5.6 KB |
| 69 - Privileged access rights.mp4 | 21.3 MB |
| 70 - Information access restriction.en.srt | 3.9 KB |
| 70 - Information access restriction.mp4 | 21.7 MB |
| 71 - Access to source code.en.srt | 2.9 KB |
| 71 - Access to source code.mp4 | 15.4 MB |
| 72 - Secure authentication.en.srt | 6.2 KB |
| 72 - Secure authentication.mp4 | 36.0 MB |
| 73 - Capacity management.en.srt | 3.9 KB |
| 73 - Capacity management.mp4 | 23.8 MB |
| 74 - Protection against malware.en.srt | 4.9 KB |
| 74 - Protection against malware.mp4 | 25.9 MB |
| 75 - Management of technical vulnerabilities.en.srt | 8.5 KB |
| 75 - Management of technical vulnerabilities.mp4 | 36.5 MB |
| 76 - Configuration management.en.srt | 4.8 KB |
| 76 - Configuration management.mp4 | 83.8 MB |
| 77 - Information deletion.en.srt | 4.6 KB |
| 77 - Information deletion.mp4 | 14.8 MB |
| 78 - Data masking.en.srt | 4.7 KB |
| 78 - Data masking.mp4 | 16.1 MB |
| 79 - Data leakage prevention.en.srt | 4.4 KB |
| 79 - Data leakage prevention.mp4 | 31.3 MB |
| 80 - Information backup.en.srt | 5.6 KB |
| 80 - Information backup.mp4 | 40.6 MB |
| 81 - Redundancy of information processing facilities.en.srt | 5.2 KB |
| 81 - Redundancy of information processing facilities.mp4 | 30.2 MB |
| 82 - Logging.en.srt | 7.6 KB |
| 82 - Logging.mp4 | 24.0 MB |
| 83 - Monitoring activities.en.srt | 5.0 KB |
| 83 - Monitoring activities.mp4 | 27.2 MB |
| 84 - Clock synchronization.en.srt | 2.6 KB |
| 84 - Clock synchronization.mp4 | 11.5 MB |
| 85 - Use of privileged utility programs.en.srt | 2.8 KB |
| 85 - Use of privileged utility programs.mp4 | 56.3 MB |
| 86 - Installation of software on operational systems.en.srt | 4.3 KB |
| 86 - Installation of software on operational systems.mp4 | 21.6 MB |
| 87 - Networks security.en.srt | 6.1 KB |
| 87 - Networks security.mp4 | 70.9 MB |
| 88 - Security of network services.en.srt | 3.9 KB |
| 88 - Security of network services.mp4 | 83.9 MB |
| 89 - Segregation of networks.en.srt | 3.7 KB |
| 89 - Segregation of networks.mp4 | 18.5 MB |
| 90 - Web filtering.en.srt | 4.0 KB |
| 90 - Web filtering.mp4 | 14.0 MB |
| 91 - Use of cryptography.en.srt | 8.2 KB |
| 91 - Use of cryptography.mp4 | 58.3 MB |
| 92 - Secure development life cycle.en.srt | 4.5 KB |
| 92 - Secure development life cycle.mp4 | 24.0 MB |
| 93 - Application security requirements.en.srt | 9.2 KB |
| 93 - Application security requirements.mp4 | 46.8 MB |
| 94 - Secure system architecture and engineering principles.en.srt | 9.2 KB |
| 94 - Secure system architecture and engineering principles.mp4 | 148.1 MB |
| 95 - Secure coding.en.srt | 6.5 KB |
| 95 - Secure coding.mp4 | 25.8 MB |
| 96 - Security testing in development and acceptance.en.srt | 4.2 KB |
| 96 - Security testing in development and acceptance.mp4 | 58.1 MB |
| 97 - Outsourced development.en.srt | 5.7 KB |
| 97 - Outsourced development.mp4 | 20.3 MB |
| 98 - Separation of development, test and production environments.en.srt | 5.2 KB |
| 98 - Separation of development, test and production environments.mp4 | 20.4 MB |
| 99 - Change management.en.srt | 3.1 KB |
| 99 - Change management.mp4 | 15.4 MB |
| 103 - The certification to ISO - IEC 27001 and ISO - IEC 27002.en.srt | 5.4 KB |
| 103 - The certification to ISO - IEC 27001 and ISO - IEC 27002.mp4 | 67.7 MB |
| 104 - Thank you and good bye! - ISO_27002_Information_security_controls_presentation.pdf | 22.5 MB |
| 104 - Thank you and good bye!.en.srt | 3.5 KB |
| 104 - Thank you and good bye!.mp4 | 12.7 MB |
| 105 - Bonus lecture - My other courses on information security management.en.srt | 9.1 KB |
| 105 - Bonus lecture - My other courses on information security management.mp4 | 170.3 MB |
| about-isoiec-27002autogenerated.vtt | 7.8 KB |
| an-isms-according-to-isoiec-27001autogenerated.vtt | 4.4 KB |
| information-security-cybersecurity-and-privacyautogenerated.vtt | 4.4 KB |
| introductionautogenerated.vtt | 3.9 KB |
| the-isoiec-27000-series-of-standardsautogenerated.vtt | 5.1 KB |
| acceptable-use-of-information-and-other-associated-assetsautogenerated.vtt | 3.1 KB |
| access-controlautogenerated.vtt | 9.5 KB |
| access-rightsautogenerated.vtt | 4.2 KB |
| addressing-information-security-within-supplier-agreementsautogenerated.vtt | 6.7 KB |
| assessment-and-decision-on-information-security-eventsautogenerated.vtt | 2.5 KB |
| authentication-informationautogenerated.vtt | 6.7 KB |
| classification-of-informationautogenerated.vtt | 5.7 KB |
| collection-of-evidenceautogenerated.vtt | 3.6 KB |
| conformance-with-policies-and-standards-for-information-securityautogenerated.vtt | 2.1 KB |
| contact-with-authoritiesautogenerated.vtt | 1.9 KB |
| contact-with-special-interest-groupsautogenerated.vtt | 2.5 KB |
| documented-operating-proceduresautogenerated.vtt | 4.5 KB |
| ict-readiness-for-business-continuityautogenerated.vtt | 4.9 KB |
| identity-managementautogenerated.vtt | 3.1 KB |
| independent-review-of-information-securityautogenerated.vtt | 2.9 KB |
| information-security-during-disruptionautogenerated.vtt | 3.0 KB |
| information-security-for-use-of-cloud-servicesautogenerated.vtt | 6.3 KB |
| information-security-in-project-managementautogenerated.vtt | 4.9 KB |
| information-security-in-supplier-relationshipsautogenerated.vtt | 6.4 KB |
| information-security-incident-management-planning-and-preparationautogenerated.vtt | 5.7 KB |
| information-security-roles-and-responsibilitiesautogenerated.vtt | 4.1 KB |
| information-transferautogenerated.vtt | 5.8 KB |
| intellectual-property-rightsautogenerated.vtt | 2.9 KB |
| inventory-of-information-and-other-associated-assetsautogenerated.vtt | 6.5 KB |
| labelling-of-informationautogenerated.vtt | 2.6 KB |
| learning-from-information-security-incidentsautogenerated.vtt | 1.7 KB |
| legal-statutory-regulatory-and-contractual-requirementsautogenerated.vtt | 3.7 KB |
| management-responsibilitiesautogenerated.vtt | 3.2 KB |
| managing-information-security-in-the-ict-supply-chainautogenerated.vtt | 3.7 KB |
| monitoring-review-and-change-management-of-supplier-servicesautogenerated.vtt | 3.8 KB |
| policies-for-information-securityautogenerated.vtt | 7.0 KB |
| privacy-and-protection-of-piiautogenerated.vtt | 3.0 KB |
| protection-of-recordsautogenerated.vtt | 2.4 KB |
| recapitulation-organizational-controlsautogenerated.vtt | 8.1 KB |
| response-to-information-security-incidentsautogenerated.vtt | 3.1 KB |
| return-of-assetsautogenerated.vtt | 2.8 KB |
| segregation-of-dutiesautogenerated.vtt | 3.1 KB |
| threat-intelligenceautogenerated.vtt | 3.6 KB |
| confidentiality-or-non-disclosure-agreementsautogenerated.vtt | 3.2 KB |
| disciplinary-processautogenerated.vtt | 2.4 KB |
| information-security-awareness-education-and-trainingautogenerated.vtt | 5.2 KB |
| information-security-event-reportingautogenerated.vtt | 3.4 KB |
| recapitulation-people-controlsautogenerated.vtt | 2.1 KB |
| remote-workingautogenerated.vtt | 5.1 KB |
| responsibilities-after-termination-or-change-of-employmentautogenerated.vtt | 3.5 KB |
| screeningautogenerated.vtt | 5.7 KB |
| terms-and-conditions-of-employmentautogenerated.vtt | 3.3 KB |
| cabling-securityautogenerated.vtt | 2.3 KB |
| clear-desk-and-clear-screenautogenerated.vtt | 3.4 KB |
| equipment-maintenanceautogenerated.vtt | 3.3 KB |
| equipment-siting-and-protectionautogenerated.vtt | 3.5 KB |
| physical-entryautogenerated.vtt | 6.0 KB |
| physical-security-monitoringautogenerated.vtt | 2.7 KB |
| physical-security-perimetersautogenerated.vtt | 4.4 KB |
| protecting-against-physical-and-environmental-threatsautogenerated.vtt | 3.4 KB |
| recapitulation-physical-controlsautogenerated.vtt | 3.0 KB |
| secure-disposal-or-re-use-of-equipmentautogenerated.vtt | 3.6 KB |
| securing-offices-rooms-and-facilitiesautogenerated.vtt | 1.1 KB |
| security-of-assets-off-premisesautogenerated.vtt | 3.6 KB |
| storage-mediaautogenerated.vtt | 6.6 KB |
| supporting-utilitiesautogenerated.vtt | 3.0 KB |
| working-in-secure-areasautogenerated.vtt | 2.0 KB |
| access-to-source-codeautogenerated.vtt | 2.6 KB |
| application-security-requirementsautogenerated.vtt | 8.4 KB |
| capacity-managementautogenerated.vtt | 3.6 KB |
| change-managementautogenerated.vtt | 2.9 KB |
| clock-synchronizationautogenerated.vtt | 2.4 KB |
| configuration-managementautogenerated.vtt | 4.4 KB |
| data-leakage-preventionautogenerated.vtt | 4.1 KB |
| data-maskingautogenerated.vtt | 4.3 KB |
| information-access-restrictionautogenerated.vtt | 3.6 KB |
| information-backupautogenerated.vtt | 5.1 KB |
| information-deletionautogenerated.vtt | 4.2 KB |
| installation-of-software-on-operational-systemsautogenerated.vtt | 3.9 KB |
| loggingautogenerated.vtt | 6.9 KB |
| management-of-technical-vulnerabilitiesautogenerated.vtt | 7.8 KB |
| monitoring-activitiesautogenerated.vtt | 4.6 KB |
| networks-securityautogenerated.vtt | 5.5 KB |
| outsourced-developmentautogenerated.vtt | 5.2 KB |
| privileged-access-rightsautogenerated.vtt | 5.1 KB |
| protection-against-malwareautogenerated.vtt | 4.5 KB |
| protection-of-information-systems-during-audit-testingautogenerated.vtt | 4.1 KB |
| recapitulation-technological-controlsautogenerated.vtt | 8.2 KB |
| redundancy-of-information-processing-facilitiesautogenerated.vtt | 4.8 KB |
| secure-authenticationautogenerated.vtt | 5.7 KB |
| secure-codingautogenerated.vtt | 5.9 KB |
| secure-development-life-cycleautogenerated.vtt | 4.1 KB |
| secure-system-architecture-and-engineering-principlesautogenerated.vtt | 8.4 KB |
| security-of-network-servicesautogenerated.vtt | 3.6 KB |
| security-testing-in-development-and-acceptanceautogenerated.vtt | 3.8 KB |
| segregation-of-networksautogenerated.vtt | 3.4 KB |
| separation-of-development-test-and-production-environmentsautogenerated.vtt | 4.7 KB |
| test-informationautogenerated.vtt | 3.2 KB |
| use-of-cryptographyautogenerated.vtt | 7.5 KB |
| use-of-privileged-utility-programsautogenerated.vtt | 2.6 KB |
| user-endpoint-devicesautogenerated.vtt | 8.2 KB |
| web-filteringautogenerated.vtt | 3.6 KB |
| thank-you-and-good-byeautogenerated.vtt | 3.2 KB |
| the-certification-to-isoiec-27001-and-isoiec-27002autogenerated.vtt | 4.9 KB |
| Bonus Resources.txt | 70 bytes |
Name
DL
Uploader
Size
S/L
Added
-
462.8 MB
[17
/
0]
2025-02-21
| Uploaded by freecoursewb | Size 462.8 MB | Health [ 17 /0 ] | Added 2025-02-21 |
-
361.2 MB
[0
/
6]
2023-10-23
| Uploaded by freecoursewb | Size 361.2 MB | Health [ 0 /6 ] | Added 2023-10-23 |
-
397.0 MB
[35
/
40]
2023-10-22
| Uploaded by freecoursewb | Size 397.0 MB | Health [ 35 /40 ] | Added 2023-10-22 |
-
1.4 GB
[18
/
12]
2023-10-22
| Uploaded by freecoursewb | Size 1.4 GB | Health [ 18 /12 ] | Added 2023-10-22 |
NOTE
SOURCE: Udemy ISO IEC 27002 2022 Information security controls
-----------------------------------------------------------------------------------
COVER

-----------------------------------------------------------------------------------
MEDIAINFO
None
×


