ISO/IEC 27001:2022 Information Security Controls Explained
ISO/IEC 27001:2022 Information Security Controls Explained, available at $64.99, has an average rating of 4.51, with 134 lectures, 8 quizzes, based on 1616 reviews, and has 7345 subscribers.
You will learn about Learn about information security controls This course is ideal for individuals who are IT employees who want to implement information security controls in their entreprise It is particularly useful for IT employees who want to implement information security controls in their entreprise.
Enroll now: ISO/IEC 27001:2022 Information Security Controls Explained
Summary
Title: ISO/IEC 27001:2022 Information Security Controls Explained
Price: $64.99
Average Rating: 4.51
Number of Lectures: 134
Number of Quizzes: 8
Number of Published Lectures: 134
Number of Published Quizzes: 8
Number of Curriculum Items: 142
Number of Published Curriculum Objects: 142
Original Price: $19.99
Quality Status: approved
Status: Live
What You Will Learn
- Learn about information security controls
Who Should Attend
- IT employees who want to implement information security controls in their entreprise
Target Audiences
- IT employees who want to implement information security controls in their entreprise
This course explains the Information Security Controls of ISO/IEC 27001 Annex A. Annex A of ISO 27001 is probably the most famous annex of all the ISO standards – this is because it provides an essential tool for managing information security risks: a list of security controls (or safeguards) that are to be used to improve the security of information assets.
This course will provide you with an understanding of how Annex A is structured. We will go through all the 114 security controls with easy to understand examples.
This course is for students who seek to understand the ISO 27001 Annex A controls and their objectives, as well as how to apply them. It is also help those who want to implement an information security management system in their organisations, in accordance with ISO 27001 standards. Or, this course can simply be for IT security employees who look to to improve information security in their workplace. And finally, If you want to increase your knowledge about securing your company information from the technical, physical, organizational and legal aspect this course is also for you.
The legitimate question you may ask yourself is why should you take this course about ISO 27001 annex A and not another one. The answer is very simple!
This is course is the only one that is fully dedicated to Annex A of the iso 27001 standard
This course is time effective. We know your time is valuable and we do not want to waste it, we give the right information with the right number of sentences and slides. We do not confuse you with a lot of longs sentences and or complicated words. We keep our language simple and accurate.
We teach you by example. For each definition, concept or process we give you easy to understand examples that will help your grasp the meanings.
This course contains a plenty of templates of policies and procedures to use in your ISO 27001 implementation project.
This course is yours, we are here to help and ready to enhance it based on your feedback. So, do not hesitate to ask questions or request clarifications on any slide, definition, concept or process in this course. We will act and change the content accordingly.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Chapter 2: Changes in ISO Annex A:2022
Lecture 1: Changes in ISO Annex A:2022
Chapter 3: 5. Organizational Controls
Lecture 1: Introduction
Lecture 2: 5.1. Information Security Policy
Lecture 3: 5.2. Information Security Roles and Responsibilities
Lecture 4: 5.3. Segregation of Duties
Lecture 5: 5.4. Management Responsibilities
Lecture 6: 5.5 Contact with Authorities
Lecture 7: 5.6 Contact with Special Interest Groups
Lecture 8: 5.7 Threat Intelligence
Lecture 9: 5.8 Information Security in Project Management
Lecture 10: 5.9 Inventory of Information and Other Associated Assets
Lecture 11: 5.10 Acceptable Use of Information and Other Associated Assets
Lecture 12: 5.11 Return of Assets
Lecture 13: 5.12 Classification of Information
Lecture 14: 5.13 Labeling of Information
Lecture 15: 5.14 Information Transfer
Lecture 16: 5.15 Access Control
Lecture 17: 5.16 Identity Management
Lecture 18: 5.17 Authentication Information
Lecture 19: 5.18 Access Rights
Lecture 20: 5.19 Information Security in Supplier Relationships
Lecture 21: 5.20 Addressing Security Within Supplier Agreements
Lecture 22: 5.21 Managing Information Security in the ICT Supply Chain
Lecture 23: 5.22 Monitoring, Review & Change Management of Supplier Services
Lecture 24: 5.25 Assessment and Decision on Information Security Events
Lecture 25: 5.23 Information Security for Use of Cloud Services
Lecture 26: 5.24 Information Security Incident Management Planning and Preparation
Lecture 27: 5.27 Learning from Information Security Incidents
Lecture 28: 5.26 Response to Information Security Incidents
Lecture 29: 5.28 Collection of Evidence
Lecture 30: 5.29 Information Security During Disruption
Lecture 31: 5.30 ICT Readiness for Business Continuity
Lecture 32: 5.31 Statutory, Regulatory and Contractual Requirements
Lecture 33: 5.32 Intellectual Property Rights
Lecture 34: 5.33 Protection of records
Lecture 35: 5.34 Privacy and Protection of PII
Lecture 36: 5.35 Independent Review of Information Security
Lecture 37: 5.36 Compliance with Policies, Rules and Standards for Information Security
Lecture 38: 5.37 Documented operating procedures
Chapter 4: 6. People Controls
Lecture 1: Introduction
Lecture 2: 6.1 Screening
Lecture 3: 6.2 Terms and Conditions of Employment
Lecture 4: 6.3 Information Security Awareness, Education and training
Lecture 5: 6.4 Disciplinary Process
Lecture 6: 6.5 Responsibilities After Termination or Change of Employment
Lecture 7: 6.6 Confidentiality or Non-disclosure Agreements
Lecture 8: 6.7 Remote working
Lecture 9: 6.8 Information Security Event Reporting
Chapter 5: 7. Physical Controls
Lecture 1: Introduction
Lecture 2: 7.1 Physical Security Perimeters
Lecture 3: 7.2 Physical Entry
Lecture 4: 7.4 Physical security monitoring
Lecture 5: 7.3 Securing Offices, Rooms and Facilities
Lecture 6: 7.5 Protecting Against Physical and Environmental Threat
Lecture 7: 7.6 Working in Secure Areas
Lecture 8: 7.7 Clear Desk and Clear Screen
Lecture 9: 7.8 Equipment Siting and Protection
Lecture 10: 7.9 Security of Assets Off-premises
Lecture 11: 7.10 Storage Media
Lecture 12: 7.11 Supporting Utilities
Lecture 13: 7.12 Cabling Security
Lecture 14: 7.13 Equipment maintenance
Lecture 15: 7.14 Secure Disposal or Re-use of Equipment
Chapter 6: 8. Technological Controls
Lecture 1: Introduction
Lecture 2: 8.1 User Endpoint Devices
Lecture 3: 8.2 Privileged access rights
Lecture 4: 8.3 Information Access Restriction
Lecture 5: 8.4 Access To Source Code
Lecture 6: 8.5 Secure Authentication
Lecture 7: 8.6 Capacity Management
Lecture 8: 8.7 Protection Against Malware
Lecture 9: 8.8 Management of Technical Vulnerabilities
Lecture 10: 8.9 Configuration Management
Lecture 11: 8.10 Information Deletion
Lecture 12: 8.11 Data Masking
Lecture 13: 8.12 Data Leakage Prevention
Lecture 14: 8.13 Information Backup
Lecture 15: 8.14 Redundancy of Information Processing Facilities
Lecture 16: 8.15 Logging
Lecture 17: 8.16 Monitoring Activities
Lecture 18: 8.17 Clock Synchronization
Lecture 19: 8.18 Use of Priviledged Utility Program
Lecture 20: 8.19 Installation of Software on Operational Systems
Lecture 21: 8.20 Networks Security
Lecture 22: 8.21 Security of Network Service
Lecture 23: 8.22 Segregation of Networks
Lecture 24: 8.23 Web Filtering
Lecture 25: 8.24 Use of Cryptography
Lecture 26: 8.25 Secure Development Life Cycle
Lecture 27: 8.27 Secure System Architecture and Engineering Principles
Lecture 28: 8.28 Secure Coding
Lecture 29: 8.29 Security Testing in Development and Acceptance
Lecture 30: 8.26 Application Security Requirements
Instructors
-
Dr. Amar Massoud
Specialized in IT certfication trainings
Rating Distribution
- 1 stars: 9 votes
- 2 stars: 35 votes
- 3 stars: 189 votes
- 4 stars: 611 votes
- 5 stars: 772 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024