Create Tool:
Create Time:1970-01-01 08:00:00
File Size:1159.62 MB
File Count:110
File Hash:ccd1228151d969a6dd2bdd2b086d2d73c2217d98
Get Bonus Downloads Here.url | 180 B |
~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.en.srt | 2.90 KB |
~Get Your Files Here !/01. Introduction/001. Introduction to the Annex A controls.mp4 | 17.04 MB |
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.en.srt | 5.05 KB |
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/002. Management direct.mp4 | 29.68 MB |
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.en.srt | 4.92 KB |
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/003. Information secur.mp4 | 27.92 MB |
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.en.srt | 7.90 KB |
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/004. Contact with auth.mp4 | 40.68 MB |
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.en.srt | 4.47 KB |
~Get Your Files Here !/02. Policies and the Organization of Information Security (Clauses A.5 and A.6)/005. Mobile device pol.mp4 | 24.21 MB |
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..en.srt | 5.22 KB |
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/006. Human resources security Prior to employment (Clause A..mp4 | 28.52 MB |
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..en.srt | 6.72 KB |
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/007. Human resources security During employment (Clause A.7..mp4 | 32.80 MB |
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.en.srt | 3.61 KB |
~Get Your Files Here !/03. Human Resources Security (Clause A.7)/008. Human resources security Termination and change of empl.mp4 | 18.71 MB |
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).en.srt | 5.51 KB |
~Get Your Files Here !/04. Asset Management (Clause A.8)/009. Asset management Responsibility for assets (Clause A.8.1).mp4 | 31.74 MB |
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).en.srt | 7.14 KB |
~Get Your Files Here !/04. Asset Management (Clause A.8)/010. Asset management Information classification (Clause A.8.2).mp4 | 38.67 MB |
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).en.srt | 5.28 KB |
~Get Your Files Here !/04. Asset Management (Clause A.8)/011. Asset management Media handling (Clause A.8.3).mp4 | 28.95 MB |
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.en.srt | 5.75 KB |
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/012. Access control Business requirements o.mp4 | 28.39 MB |
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.en.srt | 10.06 KB |
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/013. Access control User access management.mp4 | 57.94 MB |
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.en.srt | 9.15 KB |
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/014. Access control System and application.mp4 | 53.24 MB |
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.en.srt | 4.78 KB |
~Get Your Files Here !/05. Access Control and Cryptography (Clauses A.9 and A.10)/015. Cryptography Cryptographic controls (C.mp4 | 28.50 MB |
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.en.srt | 7.64 KB |
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/016. Physical and environmental security Secure.mp4 | 42.68 MB |
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.en.srt | 9.88 KB |
~Get Your Files Here !/06. Physical and Environmental Security (Clause A.11)/017. Physical and environmental security Equipme.mp4 | 54.52 MB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.en.srt | 7.80 KB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/018. Operations security Operational procedures and responsibili.mp4 | 44.95 MB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).en.srt | 2.79 KB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/019. Operations security Protection from malware (Clause A.12.2).mp4 | 15.47 MB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/020. Operations security Backup (Clause A.12.3).en.srt | 2.77 KB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).en.srt | 7.81 KB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/021. Operations security Logging and monitoring (Clause A.12.4).mp4 | 43.45 MB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.en.srt | 2.79 KB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/022. Operations security Control of operational software (Clause.mp4 | 14.84 MB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.en.srt | 4.57 KB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/023. Operations security Technical vulnerability management (Cla.mp4 | 25.38 MB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.en.srt | 2.70 KB |
~Get Your Files Here !/07. Operations Security (Clause A.12)/024. Operations security Information systems audit consideration.mp4 | 16.18 MB |
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.en.srt | 6.18 KB |
~Get Your Files Here !/08. Communications Security (Clause A.13)/025. Communications security Network security management (Cl.mp4 | 32.55 MB |
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..en.srt | 6.80 KB |
~Get Your Files Here !/08. Communications Security (Clause A.13)/026. Communications security Information transfer (Clause A..mp4 | 38.81 MB |
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.en.srt | 6.20 KB |
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/027. System lifecycle Security requ.mp4 | 35.46 MB |
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.en.srt | 10.07 KB |
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/028. System lifecycle Security in d.mp4 | 54.62 MB |
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.en.srt | 2.91 KB |
~Get Your Files Here !/09. System Acquisition, Development, and Maintenance (Clause A.14)/029. System lifecycle Test data (Cl.mp4 | 16.16 MB |
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.en.srt | 5.85 KB |
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/030. Supplier relationships Information security in supplier.mp4 | 29.90 MB |
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.en.srt | 4.42 KB |
~Get Your Files Here !/10. Supplier Relationships (Clause A.15)/031. Supplier relationships Supplier service delivery managem.mp4 | 24.47 MB |
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.en.srt | 9.60 KB |
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/032. Management of information security.mp4 | 52.21 MB |
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.en.srt | 7.66 KB |
~Get Your Files Here !/11. Incident Management and Continuity (Clauses A.16 and A.17)/033. Information security continuity an.mp4 | 43.42 MB |
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.en.srt | 8.62 KB |
~Get Your Files Here !/12. Compliance (Clause A.18)/034. Compliance Compliance with legal and contractual requirements (Claus.mp4 | 44.38 MB |
~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).en.srt | 5.06 KB |
~Get Your Files Here !/12. Compliance (Clause A.18)/035. Compliance Information security reviews (Clause A.18.2).mp4 | 27.78 MB |
~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.en.srt | 2.43 KB |
~Get Your Files Here !/13. Conclusion/036. Next steps for complying with ISO 27001.mp4 | 14.07 MB |
~Get Your Files Here !/Bonus Resources.txt | 386 B |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - How to demonstrate compliance with Clause A.5.1_PQA.pdf | 25.71 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.01 - Recommended Lower-Level Information Security Policies_PQA.pdf | 27.34 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.02 - Example roles and responsibilities matrix_PQA.pdf | 30.43 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.02 - How to demonstrate compliance with Clauses A.6.1.1 _ A.6.1.2_PQA.pdf | 25.12 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.03 - How to demonstrate compliance with Clauses A.6.1.3, A.6.1.4, _ A.6.1.5_PQA.pdf | 25.67 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 01.04 - How to demonstrate compliance with Clauses A.6.2.1 _ A.6.2.2_PQA.pdf | 25.29 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.01 - How to demonstrate compliance with Clause A.7.1_PQA.pdf | 25.59 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.02 - How to demonstrate compliance with Clause A.7.2_PQA.pdf | 25.28 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 02.03 - How to demonstrate compliance with Clause A.7.3_PQA.pdf | 25.44 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.01 - How to demonstrate compliance with Clause A.8.1_PQA.pdf | 25.38 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.02 - How to demonstrate compliance with Clause A.8.2_PQA.pdf | 25.30 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 03.03 - How to demonstrate compliance with Clause A.8.3_PQA.pdf | 25.15 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.01 - How to demonstrate compliance with Clause A.9.1_PQA.pdf | 25.04 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.02 - How to demonstrate compliance with Clauses A.9.2 and A.9.3_PQA.pdf | 27.50 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.03 - How to demonstrate compliance with Clause A.9.4_PQA.pdf | 25.86 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 04.04 - How to demonstrate compliance with Clause A.10.1_PQA.pdf | 24.85 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 05.01 - How to demonstrate compliance with Clause A.11.1_PQA.pdf | 25.26 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 05.02 - How to demonstrate compliance with Clause A.11.2_PQA.pdf | 25.26 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.01 - How to demonstrate compliance with Clause A.12.1_PQA.pdf | 25.10 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.02 - How to demonstrate compliance with Clause A.12.2_PQA.pdf | 25.56 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.03 - How to demonstrate compliance with Clause A.12.3_PQA.pdf | 25.38 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.04 - How to demonstrate compliance with Clause A.12.4_PQA.pdf | 25.81 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.05 - How to demonstrate compliance with Clause A.12.5_PQA.pdf | 25.28 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.06 - How to demonstrate compliance with Clause A.12.6_PQA.pdf | 25.62 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 06.07 - How to demonstrate compliance with Clause A.12.7_PQA.pdf | 24.72 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 07.01 - How to demonstrate compliance with Clause A.13.1_PQA.pdf | 25.77 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 07.02 - How to demonstrate compliance with Clause A.13.2_PQA.pdf | 26.05 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 08.01 - How to demonstrate compliance with Clause A.14.1_PQA.pdf | 25.18 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 08.02 - How to demonstrate compliance with Clause A.14.2_PQA.pdf | 27.74 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 08.03 - How to demonstrate compliance with Clause A.14.3_PQA.pdf | 24.73 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 09.01 - How to demonstrate compliance with Clause A.15.1_PQA.pdf | 25.20 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 09.02 - How to demonstrate compliance with Clause A.15.2_PQA.pdf | 25.70 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 10.01 - How to demonstrate compliance with Clause A.16.1_PQA.pdf | 25.95 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 10.02 - How to demonstrate compliance with Clauses A.17.1 _ A.17.2_PQA.pdf | 27.95 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 11.01 - How to demonstrate compliance with Clause A.18.1_PQA.pdf | 29.27 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 11.02 - How to demonstrate compliance with Clause A.18.2_PQA.pdf | 27.34 KB |
~Get Your Files Here !/Ex_Files_Building_ISO_27001_Compliant_Cybersecurity_Annex_A/Exercise Files/Handout 12.01 - Annex A Controls Checklist_PQA.pdf | 218.35 KB |
http://tracker.foreverpirates.co:80/announce |
http://tracker.openbittorrent.com:80/announce |
udp://9.rarbg.me:2720/announce |
udp://9.rarbg.to:2780/announce |
udp://9.rarbg.to:2900/announce |
udp://coppersurfer.tk:6969/announce |
udp://exodus.desync.com:6969/announce |
udp://explodie.org:6969/announce |
udp://ipv4.tracker.harry.lu:80/announce |
udp://open.stealth.si:80/announce |
udp://opentor.org:2710/announce |
udp://opentracker.i2p.rocks:6969/announce |
udp://tracker.cyberia.is:6969/announce |
udp://tracker.internetwarriors.net:1337/announce |
udp://tracker.leechers-paradise.org:6969/announce |
udp://tracker.opentrackr.org:1337/announce |
udp://tracker.tiny-vps.com:6969/announce |
udp://tracker.torrent.eu.org:451/announce |
udp://tracker.zer0day.to:1337/announce |
TorrentBank
Copyright © 2024