种子简介
种子名称:
[ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
文件类型:
视频
文件数目:
35个文件
文件大小:
1.13 GB
收录时间:
2025-10-1 16:12
已经下载:
3次
资源热度:
10
最近下载:
2025-10-5 00:43
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:ccd1228151d969a6dd2bdd2b086d2d73c2217d98&dn=[ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
[ CourseMega.com ] Linkedin - Building an ISO 27001-Compliant Cybersecurity Program - The Annex A Controls.torrent
~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.mp417.04MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp429.68MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.mp427.92MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp440.68MB
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.mp424.21MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..mp428.52MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp432.8MB
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.mp418.71MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp431.74MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp438.67MB
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp428.95MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.mp428.39MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp457.94MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp453.24MB
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.mp428.5MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp442.68MB
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp454.52MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp444.95MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).mp415.47MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp443.45MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.mp414.84MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.mp425.38MB
~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.mp416.18MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp432.55MB
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp438.81MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp435.46MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp454.62MB
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.mp416.16MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp429.9MB
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.mp424.47MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp452.21MB
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp443.42MB
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp444.38MB
~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).mp427.78MB
~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.mp414.07MB