RAR-files |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.rar |
50,000,000 |
01AFBC07 |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r00 |
50,000,000 |
955E389F |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r01 |
50,000,000 |
70285B6B |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r02 |
50,000,000 |
1EFF2DE3 |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r03 |
50,000,000 |
C83F23EE |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r04 |
50,000,000 |
761F1416 |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r05 |
50,000,000 |
5C1A2EB2 |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r06 |
50,000,000 |
50DF1D71 |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r07 |
50,000,000 |
2B064CDD |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r08 |
50,000,000 |
80588D19 |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.the.annex.a.controls-xqzt.r09 |
20,816,285 |
8A10C0FB |
|
Total size: |
520,816,285 |
|
|
Archived
files |
01.01-introduction_to_the_annex_a_controls.mkv
[e095980f9c833eb3]
|
7,599,541 |
CC524FEB |
02.01-management_direction_for_information_security_(clause_a.5.1).mkv
[ea10b47a50191a97]
|
9,835,755 |
436A13F2 |
02.02-information_security_roles_and_responsibilities_and_segregation_of_duties_(clauses_a.6.1.1_and_a.6.1.2).mkv
[d2d90eaaa7b3d2fa]
|
13,568,117 |
F5201B94 |
02.03-contact_with_authorities_and_special_interest_groups_and_information_security_in_project_management_(clauses_a.6.1.3_a.6.1.4_and_a.6.1.5).mkv
[f6f0e5a18d1e42b3]
|
17,726,514 |
3189E795 |
02.04-mobile_device_policy_and_teleworking_(clauses_a.6.2.1_and_a.6.2.2).mkv
[e9a1dec5f6d32ea9]
|
8,949,110 |
33B59EFF |
03.01-human_resources_security_prior_to_employment_(clause_a.7.1).mkv
[e3044cef843c37eb]
|
12,460,631 |
D088B53E |
03.02-human_resources_security_during_employment_(clause_a.7.2).mkv
[2fe6b859eba14c60]
|
13,265,791 |
808412E0 |
03.03-human_resources_security_termination_and_change_of_employment_(clause_a.7.3).mkv
[15867197a4679780]
|
8,566,128 |
4C02D30F |
04.01-asset_management_responsibility_for_assets_(clause_a.8.1).mkv
[cb1ebca75315e63e]
|
13,202,262 |
3113B2EE |
04.02-asset_management_information_classification_(clause_a.8.2).mkv
[1e2f663d84ac2ce7]
|
14,957,064 |
119737AC |
04.03-asset_management_media_handling_(clause_a.8.3).mkv
[4fb0e435a09ebc07]
|
12,765,299 |
3580BB03 |
05.01-access_control_business_requirements_of_access_control_(clause_a.9.1).mkv
[24aa33b53dc07b4f]
|
10,995,215 |
05B7FA95 |
05.02-access_control_user_access_management_and_user_responsibilities_(clauses_a.9.2_and_a.9.3).mkv
[b5bcfdeac70c96d5]
|
28,384,673 |
2D7C3CBF |
05.03-access_control_system_and_application_access_control_(clause_a.9.4).mkv
[d3cdc09354d961f8]
|
24,184,201 |
D8FE1AF9 |
05.04-cryptography_cryptographic_controls_(clause_a.10.1).mkv
[702afde0ea76a49]
|
12,025,046 |
C6A6B8DD |
06.01-physical_and_environmental_security_secure_areas_(clause_a.11.1).mkv
[1360584722add052]
|
18,939,955 |
1A8189AE |
06.02-physical_and_environmental_security_equipment_(clause_a.11.2).mkv
[a0ff77df9b66435d]
|
22,670,208 |
423F99CD |
07.01-operations_security_operational_procedures_and_responsibilities_(clause_a.12.1).mkv
[9da6484759884d93]
|
17,786,000 |
0F547E9A |
07.02-operations_security_protection_from_malware_(clause_a.12.2).mkv
[77438129c04eb8a3]
|
7,314,300 |
7387FA01 |
07.03-operations_security_backup_(clause_a.12.3).mkv
[a44172dbc738f246]
|
7,649,183 |
1C40865A |
07.04-operations_security_logging_and_monitoring_(clause_a.12.4).mkv
[8d8017b78382813f]
|
20,755,638 |
997BA456 |
07.05-operations_security_control_of_operational_software_(clause_a.12.5).mkv
[f0f0fe4771023aad]
|
6,350,427 |
000AEBA8 |
07.06-operations_security_technical_vulnerability_management_(clause_a.12.6).mkv
[66a589349afd91f5]
|
10,536,961 |
3BE6A87A |
07.07-operations_security_information_systems_audit_considerations_(clause_a.12.7).mkv
[83d96080d7f2d195]
|
8,319,346 |
C14429B5 |
08.01-communications_security_network_security_management_(clause_a.13.1).mkv
[a0b2d8908e726661]
|
15,538,254 |
37217FAD |
08.02-communications_security_information_transfer_(clause_a.13.2).mkv
[877793cbc5aeb354]
|
16,337,167 |
7942BE79 |
09.01-system_lifecycle_security_requirements_of_information_systems_(clause_a.14.1).mkv
[cba8766235608b1e]
|
15,870,482 |
4A577E53 |
09.02-system_lifecycle_security_in_development_and_support_processes_(clause_a.14.2).mkv
[d17e1d0ef1d84437]
|
28,019,247 |
6AF045CE |
09.03-system_lifecycle_test_data_(clause_a.14.3).mkv
[3500cfb9c09438e4]
|
8,256,668 |
AE4D75B2 |
10.01-supplier_relationships_information_security_in_supplier_relationships_(clause_a.15.1).mkv
[ee8e798e3d3c67be]
|
13,870,783 |
00F0E8DF |
10.02-supplier_relationships_supplier_service_delivery_management_(clause_a.15.2).mkv
[89df7699fe9c9e8e]
|
10,862,344 |
4D07257D |
11.01-management_of_information_security_incidents_and_improvements__(clause_a.16.1).mkv
[6dc51904b58b9cc8]
|
24,329,825 |
546166BF |
11.02-information_security_continuity_and_redundancies_(clauses_a.17.1_and_a.17.2).mkv
[b5d60e43a4de8e1d]
|
18,582,617 |
FE6DE26D |
12.01-compliance_compliance_with_legal_and_contractual_requirements_(clause_a.18.1).mkv
[96b898e6aa6fd803]
|
22,421,903 |
E212DC0B |
12.02-compliance_information_security_reviews_(clause_a.18.2).mkv
[e3a8c894dcba6d49]
|
13,041,540 |
4951D186 |
13.01-next_steps_for_complying_with_iso_27001.mkv
[8bb37306795a45e1]
|
4,031,495 |
F4F46467 |
Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A.zip |
840,802 |
8ACB1954 |
|
Total size: |
520,810,492 |
|
|