HOME > IT & Software > ISOIEC 27001-2022 Information Security Controls Explained

ISOIEC 27001-2022 Information Security Controls Explained

SynopsisISO/IEC 27001:2022 Information Security Controls Explained, a...
ISOIEC 27001-2022 Information Security Controls Explained  No.1

ISO/IEC 27001:2022 Information Security Controls Explained, available at $64.99, has an average rating of 4.51, with 134 lectures, 8 quizzes, based on 1616 reviews, and has 7345 subscribers.

You will learn about Learn about information security controls This course is ideal for individuals who are IT employees who want to implement information security controls in their entreprise It is particularly useful for IT employees who want to implement information security controls in their entreprise.

Enroll now: ISO/IEC 27001:2022 Information Security Controls Explained

Summary

Title: ISO/IEC 27001:2022 Information Security Controls Explained

Price: $64.99

Average Rating: 4.51

Number of Lectures: 134

Number of Quizzes: 8

Number of Published Lectures: 134

Number of Published Quizzes: 8

Number of Curriculum Items: 142

Number of Published Curriculum Objects: 142

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Learn about information security controls
  • Who Should Attend

  • IT employees who want to implement information security controls in their entreprise
  • Target Audiences

  • IT employees who want to implement information security controls in their entreprise
  • This course explains the Information Security Controls of ISO/IEC 27001 Annex A. Annex A of ISO 27001 is probably the most famous annex of all the ISO standards – this is because it provides an essential tool for managing information security risks: a list of security controls (or safeguards) that are to be used to improve the security of information assets.

    This course will provide you with an understanding of how Annex A is structured. We will go through all the 114 security controls with easy to understand examples.

    This course is for students who seek to understand the ISO 27001 Annex A controls and their objectives, as well as how to apply them. It is also help those who want to implement an information security management system in their organisations, in accordance with ISO 27001 standards. Or, this course can simply be for IT security employees who look to to improve information security in their workplace. And finally, If you want to increase your knowledge about securing your company information from the technical, physical, organizational and legal aspect this course is also for you.

    The legitimate question you may ask yourself is why should you take this course about ISO 27001 annex A and not another one. The answer is very simple!

    This is course is the only one that is fully dedicated to Annex A of the iso 27001 standard

    This course is time effective. We know your time is valuable and we do not want to waste it, we give the right information with the right number of sentences and slides. We do not confuse you with a lot of longs sentences and or complicated words. We keep our language simple and accurate.

    We teach you by example. For each definition, concept or process we give you easy to understand examples that will help your grasp the meanings.

    This course contains a plenty of templates of policies and procedures to use in your ISO 27001 implementation project.

    This course is yours, we are here to help and ready to enhance it based on your feedback. So, do not hesitate to ask questions or request clarifications on any slide, definition, concept or process in this course. We will act and change the content accordingly.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Chapter 2: Changes in ISO Annex A:2022

    Lecture 1: Changes in ISO Annex A:2022

    Chapter 3: 5. Organizational Controls

    Lecture 1: Introduction

    Lecture 2: 5.1. Information Security Policy

    Lecture 3: 5.2. Information Security Roles and Responsibilities

    Lecture 4: 5.3. Segregation of Duties

    Lecture 5: 5.4. Management Responsibilities

    Lecture 6: 5.5 Contact with Authorities

    Lecture 7: 5.6 Contact with Special Interest Groups

    Lecture 8: 5.7 Threat Intelligence

    Lecture 9: 5.8 Information Security in Project Management

    Lecture 10: 5.9 Inventory of Information and Other Associated Assets

    Lecture 11: 5.10 Acceptable Use of Information and Other Associated Assets

    Lecture 12: 5.11 Return of Assets

    Lecture 13: 5.12 Classification of Information

    Lecture 14: 5.13 Labeling of Information

    Lecture 15: 5.14 Information Transfer

    Lecture 16: 5.15 Access Control

    Lecture 17: 5.16 Identity Management

    Lecture 18: 5.17 Authentication Information

    Lecture 19: 5.18 Access Rights

    Lecture 20: 5.19 Information Security in Supplier Relationships

    Lecture 21: 5.20 Addressing Security Within Supplier Agreements

    Lecture 22: 5.21 Managing Information Security in the ICT Supply Chain

    Lecture 23: 5.22 Monitoring, Review & Change Management of Supplier Services

    Lecture 24: 5.25 Assessment and Decision on Information Security Events

    Lecture 25: 5.23 Information Security for Use of Cloud Services

    Lecture 26: 5.24 Information Security Incident Management Planning and Preparation

    Lecture 27: 5.27 Learning from Information Security Incidents

    Lecture 28: 5.26 Response to Information Security Incidents

    Lecture 29: 5.28 Collection of Evidence

    Lecture 30: 5.29 Information Security During Disruption

    Lecture 31: 5.30 ICT Readiness for Business Continuity

    Lecture 32: 5.31 Statutory, Regulatory and Contractual Requirements

    Lecture 33: 5.32 Intellectual Property Rights

    Lecture 34: 5.33 Protection of records

    Lecture 35: 5.34 Privacy and Protection of PII

    Lecture 36: 5.35 Independent Review of Information Security

    Lecture 37: 5.36 Compliance with Policies, Rules and Standards for Information Security

    Lecture 38: 5.37 Documented operating procedures

    Chapter 4: 6. People Controls

    Lecture 1: Introduction

    Lecture 2: 6.1 Screening

    Lecture 3: 6.2 Terms and Conditions of Employment

    Lecture 4: 6.3 Information Security Awareness, Education and training

    Lecture 5: 6.4 Disciplinary Process

    Lecture 6: 6.5 Responsibilities After Termination or Change of Employment

    Lecture 7: 6.6 Confidentiality or Non-disclosure Agreements

    Lecture 8: 6.7 Remote working

    Lecture 9: 6.8 Information Security Event Reporting

    Chapter 5: 7. Physical Controls

    Lecture 1: Introduction

    Lecture 2: 7.1 Physical Security Perimeters

    Lecture 3: 7.2 Physical Entry

    Lecture 4: 7.4 Physical security monitoring

    Lecture 5: 7.3 Securing Offices, Rooms and Facilities

    Lecture 6: 7.5 Protecting Against Physical and Environmental Threat

    Lecture 7: 7.6 Working in Secure Areas

    Lecture 8: 7.7 Clear Desk and Clear Screen

    Lecture 9: 7.8 Equipment Siting and Protection

    Lecture 10: 7.9 Security of Assets Off-premises

    Lecture 11: 7.10 Storage Media

    Lecture 12: 7.11 Supporting Utilities

    Lecture 13: 7.12 Cabling Security

    Lecture 14: 7.13 Equipment maintenance

    Lecture 15: 7.14 Secure Disposal or Re-use of Equipment

    Chapter 6: 8. Technological Controls

    Lecture 1: Introduction

    Lecture 2: 8.1 User Endpoint Devices

    Lecture 3: 8.2 Privileged access rights

    Lecture 4: 8.3 Information Access Restriction

    Lecture 5: 8.4 Access To Source Code

    Lecture 6: 8.5 Secure Authentication

    Lecture 7: 8.6 Capacity Management

    Lecture 8: 8.7 Protection Against Malware

    Lecture 9: 8.8 Management of Technical Vulnerabilities

    Lecture 10: 8.9 Configuration Management

    Lecture 11: 8.10 Information Deletion

    Lecture 12: 8.11 Data Masking

    Lecture 13: 8.12 Data Leakage Prevention

    Lecture 14: 8.13 Information Backup

    Lecture 15: 8.14 Redundancy of Information Processing Facilities

    Lecture 16: 8.15 Logging

    Lecture 17: 8.16 Monitoring Activities

    Lecture 18: 8.17 Clock Synchronization

    Lecture 19: 8.18 Use of Priviledged Utility Program

    Lecture 20: 8.19 Installation of Software on Operational Systems

    Lecture 21: 8.20 Networks Security

    Lecture 22: 8.21 Security of Network Service

    Lecture 23: 8.22 Segregation of Networks

    Lecture 24: 8.23 Web Filtering

    Lecture 25: 8.24 Use of Cryptography

    Lecture 26: 8.25 Secure Development Life Cycle

    Lecture 27: 8.27 Secure System Architecture and Engineering Principles

    Lecture 28: 8.28 Secure Coding

    Lecture 29: 8.29 Security Testing in Development and Acceptance

    Lecture 30: 8.26 Application Security Requirements

    Instructors

  • ISOIEC 27001-2022 Information Security Controls Explained  No.2
    Dr. Amar Massoud
    Specialized in IT certfication trainings
  • Rating Distribution

  • 1 stars: 9 votes
  • 2 stars: 35 votes
  • 3 stars: 189 votes
  • 4 stars: 611 votes
  • 5 stars: 772 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!