Udemy - Auditing ISO 27001 - 2022 - Organizational Controls

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 1.4 GB
  • Uploaded By freecoursewb
  • Downloads 182
  • Last checked 2 days ago
  • Date uploaded 4 months ago
  • Seeders 4
  • Leechers 0

Infohash : D4D3D287F7B044A69D18C2D58F90F80D1388717D



Auditing ISO 27001:2022 – Organizational Controls

https://WebToolTip.com

Published 8/2025
Created by Dr. Amar Massoud
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 46 Lectures ( 3h 43m ) | Size: 1.43 GB

Master the audit of governance, risk, compliance, and supplier controls in ISO 27001 Annex A Clause 5 – with checklists

What you'll learn
Audit all 37 Annex A Clause 5 controls with precision
Assess ISMS organizational policies, governance, and risk alignment
Apply audit techniques using real-world scenarios and checklists
Evaluate supplier, compliance, and incident readiness controls effectively

Requirements
Basic understanding of ISO/IEC 27001:2022 structure and principles
Familiarity with management systems and information security terminology
No prior auditing experience required, but useful for practical application
Optional: access to ISO/IEC 27001:2022 standard for deeper engagement

Files:

[ WebToolTip.com ] Udemy - Auditing ISO 27001 - 2022 - Organizational Controls
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - Introduction
    • 1 -Introduction.mp4 (46.6 MB)
    • 2 -Framework and tools.mp4 (27.2 MB)
    • 3 -Case Study Company Introduction.mp4 (13.6 MB)
    2 - Information Security Governance and Direction
    • 1 -Information Security Governance and Direction.mp4 (11.4 MB)
    • 2 -Control 5.1 – Policies for Information Security.mp4 (38.9 MB)
    • 2 -Control 5.xlsx (5.6 KB)
    • 3 -Control 5.2 Information Security Roles and Responsibilities.mp4 (34.3 MB)
    • 4 -Control 5.3 – Segregation of Duties.mp4 (33.1 MB)
    • 5 -Control 5.4 – Management Responsibilities.mp4 (34.4 MB)
    • 6 -Control 5.5 Contact with Authorities.mp4 (36.2 MB)
    • 7 -Control 5.6 – Contact with Special Interest Groups.mp4 (29.5 MB)
    3 - Information Security Policy and Strategic Alignment
    • 1 -Information Security Policy and Strategic Alignment.mp4 (15.2 MB)
    • 2 -Control 5.7 – Threat Intelligence.mp4 (32.1 MB)
    • 3 -Control 5.8 Information Security in Project Management.mp4 (37.3 MB)
    • 4 -Control 5.9 Inventory of Information and Associated Assets.mp4 (30.2 MB)
    • 5 -Control 5.10 – Acceptable Use of Information and Other Associated Assets.mp4 (29.5 MB)
    4 - Lesson 16 - Risk and Change Management
    • 1 -Risk and Change Management.mp4 (15.3 MB)
    • 10 -5.19 Information security in supplier relationships.mp4 (25.2 MB)
    • 11 -5.20 Addressing information security within supplier agreements.mp4 (35.3 MB)
    • 2 -5.11 Return of assets.mp4 (36.6 MB)
    • 3 -5.12 Classification of information.mp4 (36.8 MB)
    • 4 -5.13 Labelling of information.mp4 (36.9 MB)
    • 5 -5.14 Information transfer.mp4 (40.0 MB)
    • 6 -5.15 Access control.mp4 (29.1 MB)
    • 7 -5.16 Identity management.mp4 (31.8 MB)
    • 8 -5.17 Authentication information.mp4 (32.3 MB)
    • 9 -5.18 Access rights.mp4 (38.1 MB)
    5 - Lesson 27 - Supplier Management and Third-Party Risks
    • 1 -Supplier Management and Third-Party Risks.mp4 (12.5 MB)
    • 2 -5.21 Managing information security in the ICT supply chain.mp4 (37.2 MB)
    • 3 -5.22 Monitoring and review of supplier services.mp4 (32.8 MB)
    • 4 -5.23 Managing changes to supplier services.mp4 (37.6 MB)
    6 - Compliance and Legal Responsibility
    • 1 -Compliance and Legal Responsibility.mp4 (14.7 MB)
    • 10 -5.32 Intellectual property rights.mp4 (27.2 MB)
    • 11 -5.33 Protection of records.mp4 (45.3 MB)
    • 12 -5.34 Privacy and protection of personally identifiable information (PII).mp4 (33.0 MB)
    • 13 -5.35 Independent review of information security.mp4 (40.1 MB)
    • 14 -5.36 Compliance with policies, rules and standards for information security.mp4 (31.0 MB)
    • 15 -5.37 Information systems audit considerations.mp4 (38.5 MB)
    • 2 -5.24 Information security incident management planning and preparation.mp4 (30.8 MB)
    • 3 -5.25 Assessment and decision on information security events.mp4 (39.4 MB)
    • 4 -5.26 Response to information security incidents.mp4 (36.9 MB)
    • 5 -5.27 Learning from information security incidents.mp4 (31.9 MB)
    • 6 -5.28 Collection of evidence.mp4 (32.5 MB)
    • 7 -5.29 Information security during disruption.mp4 (41.2 MB)
    • 8 -5.30 ICT readiness for business continuity.mp4 (31.7 MB)
    • 9 -Control 5.31 – Legal, Statutory, Regulatory, and Contractual Require.mp4 (43.0 MB)
    7 - Conclusion
    • 1 -Conclusion.mp4 (22.2 MB)
    • Bonus Resources.txt (0.1 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
R2-CACHE ☁️ R2 (hit) | CDN: MISS (0s) 📄 torrent 🕐 02 Jan 2026, 02:06:42 am IST ⏰ 27 Jan 2026, 02:06:41 am IST ✅ Valid for 10d 13h 🔄 Refresh Cache