ISO/IEC 27002 Information Security Controls
"softddl.org"
14-12-2021, 07:53
-
Share on social networks:
-
Download for free: ISO/IEC
-
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.5 GB | Duration: 6h 43m
Understand the comprehensive set of information security, cybersecurity and privacy controls detailed in ISO/IEC 27002.
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.5 GB | Duration: 6h 43m
Understand the comprehensive set of information security, cybersecurity and privacy controls detailed in ISO/IEC 27002.
What you'll learn
Define and establish information security controls
Implement information security management in an organization
Develop specific controls for different areas and domains
Ensure compliance with ISO/IEC 27001
Required policies and procedures for an ISMS
Description
This course details the information security controls in ISO/IEC 27002:2022.
It is intended to provide an overview of the 93 controls required for an ISMS (Information Security Management System).
The structure of the course includes an introductory section with a presentation of the ISO/IEC 27000 family of international standards, the position and the purpose of ISO/IEC 27002. The introductory section provides definitions for concepts like information security, cybersecurity and privacy and explains what is an ISMS and what it should consist of.
The second section of the course details the 37 Organizational controls in ISO/IEC 27002 including: roles and responsibilities, duties segregation, threat intelligence, information security in project management, information classification and labelling, access control, information transfer, supplier relationships from an information security perspective, ICT continuity, privacy and protection of PII or documented operating procedures as part of an ISMS.
Section three is about security controls that refer to the individuals working for or on behalf of the organization (People controls). It covers aspects like screening, terms and conditions of employment, training and awareness, disciplinary process or remote working.
The next section includes controls that address physical security (Physical controls) including: secure areas, entry controls, clear desk and clear screen, storage media, supporting utilities or the secure re-use and disposal of equipment.
Section number four covers Technological controls that refer to aspects like: the use of endpoint devices, data masking, information deletion, backup, cryptography, logging, networks security, secure development, secure coding, the protection of test information, web filtering, secure authentication, access to source code or the use of privileged utility programs.
The final section of the course provides information on the certification to ISO/IEC 27001 and ISO/IEC 27002 for both organizations and individuals.
Who this course is for:
Information security managers
ISMS auditors and consultants
Information security management practitioners and enthusiasts
Cybersecurity and privacy practitioners
Those interested in the ISO 27k framework
Homepage
https://www.udemy.com/course/isoiec-27002-information-security-controls/
Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me
https://hot4share.com/d54c0bnk03u2/edn13.I.27002..I.s.c..part1.rar.html
https://hot4share.com/exqkgv5hne15/edn13.I.27002..I.s.c..part2.rar.html
https://hot4share.com/762rni51uv5z/edn13.I.27002..I.s.c..part3.rar.html
https://hot4share.com/ocfyh5w52e1a/edn13.I.27002..I.s.c..part4.rar.html
https://hot4share.com/l977mmvqyt51/edn13.I.27002..I.s.c..part5.rar.html
https://uploadgig.com/file/download/726E5aE4f722c701/edn13.I.27002..I.s.c..part1.rar
https://uploadgig.com/file/download/ca5c706423c7D48c/edn13.I.27002..I.s.c..part2.rar
https://uploadgig.com/file/download/7474dF90A8dc619a/edn13.I.27002..I.s.c..part3.rar
https://uploadgig.com/file/download/1bCF271711e13D7E/edn13.I.27002..I.s.c..part4.rar
https://uploadgig.com/file/download/d9B1Cc21d6C343D9/edn13.I.27002..I.s.c..part5.rar
https://rapidgator.net/file/9eb97dc144a57f48335cc2d3d47aa6a7/edn13.I.27002..I.s.c..part1.rar.html
https://rapidgator.net/file/f254b0ab1220e043d9810d24df4a211a/edn13.I.27002..I.s.c..part2.rar.html
https://rapidgator.net/file/ada4fb954971a5c0bc5ec41e20aaf217/edn13.I.27002..I.s.c..part3.rar.html
https://rapidgator.net/file/8d744a9c0a1b7be981509f1d7041d48b/edn13.I.27002..I.s.c..part4.rar.html
https://rapidgator.net/file/0b83e5184b34f98b2a0fdf69d8547f00/edn13.I.27002..I.s.c..part5.rar.html
https://nitro.download/view/6148D2BF4C779D6/edn13.I.27002..I.s.c..part1.rar
https://nitro.download/view/B7097A5DF7E5767/edn13.I.27002..I.s.c..part2.rar
https://nitro.download/view/C5AA33906BEF7F4/edn13.I.27002..I.s.c..part3.rar
https://nitro.download/view/6DFC08CCCAB331A/edn13.I.27002..I.s.c..part4.rar
https://nitro.download/view/6C3AE0B0BACB374/edn13.I.27002..I.s.c..part5.rar
Links are Interchangeable - No Password - Single Extraction
The minimum comment length is 50 characters. comments are moderated