RAR-files |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.getting.started-xqzt.rar |
50,000,000 |
BFB2CF7A |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.getting.started-xqzt.r00 |
50,000,000 |
84F5F3AB |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.getting.started-xqzt.r01 |
50,000,000 |
AD3BEBB5 |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.getting.started-xqzt.r02 |
50,000,000 |
0800E156 |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.getting.started-xqzt.r03 |
50,000,000 |
AA664474 |
linkedin.learning.building.an.iso.27001-compliant.cybersecurity.program.getting.started-xqzt.r04 |
47,936,742 |
FA27F225 |
|
Total size: |
297,936,742 |
|
|
Archived
files |
01.01-the_international_standard_for_information_security.mkv
[cfced72866fa5178]
|
3,573,873 |
C8ABCD28 |
01.02-who_this_course_is_for_and_prerequisites.mkv
[ef6d126566c5ff3b]
|
2,303,336 |
AE8A95E9 |
02.01-what_is_the_iso_27001_standard.mkv
[c93d4263e916e7a2]
|
13,476,392 |
D0245250 |
02.02-breaking_down_the_iso_27001_standard.mkv
[4f9013b56b14bd50]
|
7,960,354 |
4F55F942 |
02.03-why_build_an_iso_27001-compliant_cybersecurity_program.mkv
[f9943207f51d4481]
|
10,750,488 |
76FD5C59 |
02.04-iso_27001_gaps_and_criticisms.mkv
[7a3759f08ff05e6]
|
14,310,950 |
C495C893 |
03.01-iso_27001_compliance_and_certification.mkv
[39af25510eaa511c]
|
11,815,874 |
E257CAF5 |
03.02-what_to_expect_when_getting_iso_27001_certified.mkv
[2bf3694978fc2f30]
|
17,316,258 |
E25CDBDE |
03.03-building_your_iso_27001_compliance_plan.mkv
[122b0f754b850aeb]
|
20,695,239 |
B43C0A71 |
03.04-begin_the_iso_27001_compliance_process_introduction_to_clauses_4_through_10.mkv
[f66b932ac0f9d59]
|
7,905,442 |
A625BCEA |
04.01-context_of_the_organization_and_needs_of_interested_parties_(clauses_4.1_and_4.2).mkv
[3ffc6b51369b7916]
|
13,683,946 |
D763F009 |
04.02-the_information_security_management_system_(isms)_and_its_scope_(clauses_4.3_and_4.4).mkv
[bbab3a7ac71d1929]
|
16,456,828 |
444E8079 |
05.01-leadership_and_commitment_(clause_5.1).mkv
[4662c75ff05a6ca5]
|
8,931,970 |
7DB9EE38 |
05.02-policy_(clause_5.2).mkv
[d883eb0f5172958f]
|
11,468,587 |
16393AA2 |
05.03-organizational_roles_responsibilities_and_authorities_(clause_5.3).mkv
[8d826cc1623d5979]
|
9,137,790 |
53F6937F |
06.01-information_security_risk_assessment_(clause_6.1.2).mkv
[479c0c98e4bcf30e]
|
23,688,559 |
773216B1 |
06.02-information_security_risk_treatment_(clause_6.1.3).mkv
[c881ad2679e802d1]
|
11,957,238 |
87B34943 |
06.03-information_security_objectives_and_planning_to_achieve_them_(clause_6.2).mkv
[fa28893c6028b924]
|
6,886,413 |
DF6C67BF |
07.01-resources_competence_and_awareness_(clauses_7.1_7.2_and_7.3).mkv
[6d105520b101f631]
|
15,573,404 |
98E562E0 |
07.02-communication_(clause_7.4).mkv
[ad3a6389e9ec800e]
|
7,884,709 |
09BAADF7 |
07.03-documented_information__(clause_7.5).mkv
[508ede782fee1672]
|
10,104,316 |
69D34BEA |
07.04-operational_planning_and_control_risk_assessment_and_risk_treatment_(clauses_8.1_8.2_and_8.3).mkv
[a02a106e2f4d4fcb]
|
10,101,591 |
70BBEDEA |
08.01-monitoring_measurement_analysis_and_evaluation_(clause_9.1).mkv
[2356ff6c80f2b925]
|
10,522,440 |
00A01C08 |
08.02-internal_audit_(clause_9.2).mkv
[d877ed46ab0624f]
|
12,161,377 |
47603463 |
08.03-management_review_(clause_9.3).mkv
[ee67b641c4fd76b1]
|
7,408,442 |
9232C36B |
08.04-corrective_action_and_continual_improvement_(clause_10).mkv
[b26f7315226d72fe]
|
8,205,243 |
700D14B1 |
09.01-next_steps_to_take_with_iso_27001.mkv
[bee6ecaa8aebe6c0]
|
3,042,383 |
1E3AAFE8 |
Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Program.zip |
609,905 |
7D481DDF |
|
Total size: |
297,933,347 |
|
|