ISO/IEC 27001 : Information Security Controls Explained
ISO/IEC 27001 : Information Security Controls Explained
MP4 | Video: h264, 1280x720 | Audio: AAC, 48 KHz, 2 Ch
Genre: eLearning | Language: English | Duration: 32 lectures (7 hour, 4 mins) | Size: 3.05 GB
What you'll learn
Learn about information security controls
Requirements
General knowledge of information security, ISO 27001 Foundation is recommended
Description
This course explains the Information Security Controls of ISO/IEC 27001 Annex A. Annex A of ISO 27001 is probably the most famous annex of all the ISO standards - this is because it provides an essential tool for managing information security risks: a list of security controls (or safeguards) that are to be used to improve the security of information assets.
This course will provide you with an understanding of how Annex A is structured. We will go through all the 114 security controls with easy to understand examples.
Annex A is composed of 14 sections:
A.5 Information security policies - controls on how the policies are written and reviewed
A.6 Organization of information security - controls on how the responsibilities are assigned;
A.7 Human resources security - controls prior to employment, during, and after the employment
A.8 Asset management - controls related to inventory of assets and acceptable use; also for information classification and media handling
A.9 Access control - controls for the management of access rights of users, systems and applications, and for the management of user responsibilities
A.10 Cryptography - controls related to encryption and key management
A.11 Physical and environmental security - controls defining secure areas, entry controls, protection against threats, equipment security, secure disposal, Clear Desk and Clear Screen Policy, etc.
A.12 Operational security - lots of controls related to the management of IT production: change management, capacity management, malware, backup, logging, monitoring, installation, vulnerabilities, etc.
A.13 Communications security - controls related to network security, segregation, network services, transfer of information, messaging, etc.
A.14 System acquisition, development and maintenance - controls defining security requirements, and security in development and support processes
A.15 Supplier relationships - controls on what to include in agreements, and how to monitor the suppliers
A.16 Information security incident management - controls for reporting events and weaknesses, defining responsibilities, response procedures, and collection of evidence
A.17 Information security aspects of business continuity management - controls requiring the planning of business continuity, procedures, verification and reviewing, and IT redundancy
A.18 Compliance - controls requiring the identification of applicable laws and regulations, intellectual property protection, personal data protection, and reviews of information security
Who this course is for:
IT employees who want to implement information security controls in their entreprise
PLEASE SUPPORT ME BY CLICK ONE OF MY LINKS IF YOU WANT BUYING OR EXTENDING YOUR ACCOUNT
http://nitroflare.com/view/0794920EB1BFF65/ISOIEC_27001__Information_Security_Controls_Explained.part1.rar
http://nitroflare.com/view/16EC961620FD7F7/ISOIEC_27001__Information_Security_Controls_Explained.part2.rar
http://nitroflare.com/view/7FC8CE2CC960F85/ISOIEC_27001__Information_Security_Controls_Explained.part3.rar
http://nitroflare.com/view/1AE254D59C218F5/ISOIEC_27001__Information_Security_Controls_Explained.part4.rar
https://rapidgator.net/file/234cd4fd610bc1e7c69f6538268ac160/ISOIEC_27001__Information_Security_Controls_Explained.part1.rar.html
https://rapidgator.net/file/1ebd8ac07d6db1bd152a9f720745210b/ISOIEC_27001__Information_Security_Controls_Explained.part2.rar.html
https://rapidgator.net/file/9d5c1ae8f71699766086a5843d5ef54a/ISOIEC_27001__Information_Security_Controls_Explained.part3.rar.html
https://rapidgator.net/file/b1b1d843dcad560cb5a68ba665db38e5/ISOIEC_27001__Information_Security_Controls_Explained.part4.rar.html
https://uploadgig.com/file/download/efa7720A34577f2C/ISOIEC_27001__Information_Security_Controls_Explained.part1.rar
https://uploadgig.com/file/download/ac6377732C6651Ac/ISOIEC_27001__Information_Security_Controls_Explained.part2.rar
https://uploadgig.com/file/download/8934ed6E103841a5/ISOIEC_27001__Information_Security_Controls_Explained.part3.rar
https://uploadgig.com/file/download/5E28925AcceDdaf5/ISOIEC_27001__Information_Security_Controls_Explained.part4.rar
http://nitroflare.com/view/0794920EB1BFF65/ISOIEC_27001__Information_Security_Controls_Explained.part1.rar
http://nitroflare.com/view/16EC961620FD7F7/ISOIEC_27001__Information_Security_Controls_Explained.part2.rar
http://nitroflare.com/view/7FC8CE2CC960F85/ISOIEC_27001__Information_Security_Controls_Explained.part3.rar
http://nitroflare.com/view/1AE254D59C218F5/ISOIEC_27001__Information_Security_Controls_Explained.part4.rar
https://rapidgator.net/file/234cd4fd610bc1e7c69f6538268ac160/ISOIEC_27001__Information_Security_Controls_Explained.part1.rar.html
https://rapidgator.net/file/1ebd8ac07d6db1bd152a9f720745210b/ISOIEC_27001__Information_Security_Controls_Explained.part2.rar.html
https://rapidgator.net/file/9d5c1ae8f71699766086a5843d5ef54a/ISOIEC_27001__Information_Security_Controls_Explained.part3.rar.html
https://rapidgator.net/file/b1b1d843dcad560cb5a68ba665db38e5/ISOIEC_27001__Information_Security_Controls_Explained.part4.rar.html
https://uploadgig.com/file/download/efa7720A34577f2C/ISOIEC_27001__Information_Security_Controls_Explained.part1.rar
https://uploadgig.com/file/download/ac6377732C6651Ac/ISOIEC_27001__Information_Security_Controls_Explained.part2.rar
https://uploadgig.com/file/download/8934ed6E103841a5/ISOIEC_27001__Information_Security_Controls_Explained.part3.rar
https://uploadgig.com/file/download/5E28925AcceDdaf5/ISOIEC_27001__Information_Security_Controls_Explained.part4.rar
Comments (0)
Users of Guests are not allowed to comment this publication.