Udemy - Auditing ISO 27001 - 2022 - Organizational Controls
- Category Other
- Type Tutorials
- Language English
- Total size 1.4 GB
- Uploaded By freecoursewb
- Downloads 182
- Last checked 2 days ago
- Date uploaded 4 months ago
- Seeders 4
- Leechers 0
Infohash : D4D3D287F7B044A69D18C2D58F90F80D1388717D
Auditing ISO 27001:2022 – Organizational Controls
https://WebToolTip.com
Published 8/2025
Created by Dr. Amar Massoud
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 46 Lectures ( 3h 43m ) | Size: 1.43 GB
Master the audit of governance, risk, compliance, and supplier controls in ISO 27001 Annex A Clause 5 – with checklists
What you'll learn
Audit all 37 Annex A Clause 5 controls with precision
Assess ISMS organizational policies, governance, and risk alignment
Apply audit techniques using real-world scenarios and checklists
Evaluate supplier, compliance, and incident readiness controls effectively
Requirements
Basic understanding of ISO/IEC 27001:2022 structure and principles
Familiarity with management systems and information security terminology
No prior auditing experience required, but useful for practical application
Optional: access to ISO/IEC 27001:2022 standard for deeper engagement
Files:
[ WebToolTip.com ] Udemy - Auditing ISO 27001 - 2022 - Organizational Controls- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1 - Introduction
- 1 -Introduction.mp4 (46.6 MB)
- 2 -Framework and tools.mp4 (27.2 MB)
- 3 -Case Study Company Introduction.mp4 (13.6 MB)
- 1 -Information Security Governance and Direction.mp4 (11.4 MB)
- 2 -Control 5.1 – Policies for Information Security.mp4 (38.9 MB)
- 2 -Control 5.xlsx (5.6 KB)
- 3 -Control 5.2 Information Security Roles and Responsibilities.mp4 (34.3 MB)
- 4 -Control 5.3 – Segregation of Duties.mp4 (33.1 MB)
- 5 -Control 5.4 – Management Responsibilities.mp4 (34.4 MB)
- 6 -Control 5.5 Contact with Authorities.mp4 (36.2 MB)
- 7 -Control 5.6 – Contact with Special Interest Groups.mp4 (29.5 MB)
- 1 -Information Security Policy and Strategic Alignment.mp4 (15.2 MB)
- 2 -Control 5.7 – Threat Intelligence.mp4 (32.1 MB)
- 3 -Control 5.8 Information Security in Project Management.mp4 (37.3 MB)
- 4 -Control 5.9 Inventory of Information and Associated Assets.mp4 (30.2 MB)
- 5 -Control 5.10 – Acceptable Use of Information and Other Associated Assets.mp4 (29.5 MB)
- 1 -Risk and Change Management.mp4 (15.3 MB)
- 10 -5.19 Information security in supplier relationships.mp4 (25.2 MB)
- 11 -5.20 Addressing information security within supplier agreements.mp4 (35.3 MB)
- 2 -5.11 Return of assets.mp4 (36.6 MB)
- 3 -5.12 Classification of information.mp4 (36.8 MB)
- 4 -5.13 Labelling of information.mp4 (36.9 MB)
- 5 -5.14 Information transfer.mp4 (40.0 MB)
- 6 -5.15 Access control.mp4 (29.1 MB)
- 7 -5.16 Identity management.mp4 (31.8 MB)
- 8 -5.17 Authentication information.mp4 (32.3 MB)
- 9 -5.18 Access rights.mp4 (38.1 MB)
- 1 -Supplier Management and Third-Party Risks.mp4 (12.5 MB)
- 2 -5.21 Managing information security in the ICT supply chain.mp4 (37.2 MB)
- 3 -5.22 Monitoring and review of supplier services.mp4 (32.8 MB)
- 4 -5.23 Managing changes to supplier services.mp4 (37.6 MB)
- 1 -Compliance and Legal Responsibility.mp4 (14.7 MB)
- 10 -5.32 Intellectual property rights.mp4 (27.2 MB)
- 11 -5.33 Protection of records.mp4 (45.3 MB)
- 12 -5.34 Privacy and protection of personally identifiable information (PII).mp4 (33.0 MB)
- 13 -5.35 Independent review of information security.mp4 (40.1 MB)
- 14 -5.36 Compliance with policies, rules and standards for information security.mp4 (31.0 MB)
- 15 -5.37 Information systems audit considerations.mp4 (38.5 MB)
- 2 -5.24 Information security incident management planning and preparation.mp4 (30.8 MB)
- 3 -5.25 Assessment and decision on information security events.mp4 (39.4 MB)
- 4 -5.26 Response to information security incidents.mp4 (36.9 MB)
- 5 -5.27 Learning from information security incidents.mp4 (31.9 MB)
- 6 -5.28 Collection of evidence.mp4 (32.5 MB)
- 7 -5.29 Information security during disruption.mp4 (41.2 MB)
- 8 -5.30 ICT readiness for business continuity.mp4 (31.7 MB)
- 9 -Control 5.31 – Legal, Statutory, Regulatory, and Contractual Require.mp4 (43.0 MB)
- 1 -Conclusion.mp4 (22.2 MB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce