搜索
[ DevCourseWeb.com ] Udemy - Iso 27001 Lead Implementer
磁力链接/BT种子名称
[ DevCourseWeb.com ] Udemy - Iso 27001 Lead Implementer
磁力链接/BT种子简介
种子哈希:
87e2833b4c424c753def20925ac1127a01b0617c
文件大小:
2.03G
已经下载:
7943
次
下载速度:
极快
收录时间:
2023-12-26
最近下载:
2024-11-06
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:87E2833B4C424C753DEF20925AC1127A01B0617C
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
브이아이피
蹭奶
ssni-143-u
cristianotsshow
浙江聊天室
李梓璐
perfetti sconosciuti
强烈推荐睡
家庭老夫妻
ebn-002
prison break s04
diabeł stróż
fh18
vivien doll russian
小胖历险记第
a片
bt
男子3人
腔肉
pt-137
vec-055
调教打电话
刚起床
ankk084
外甥小鸡
泄密
裸 家族
fate stay night
粉底
ultrafilms
文件列表
~Get Your Files Here !/2 - Fundamentals/7 - International Standards.mp4
93.7 MB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/39 - Risk Fundamentals.mp4
77.6 MB
~Get Your Files Here !/2 - Fundamentals/5 - What is a Management System.mp4
77.6 MB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/30 - 62 Information Security objectives.mp4
71.6 MB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/43 - 613 Information Security Risk Treatment.mp4
67.8 MB
~Get Your Files Here !/5 - Step 2 Determine Scope/26 - 43 Determining the scope of the ISMS.mp4
58.0 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/45 - Annex A.mp4
47.8 MB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/37 - A513 Labelling of information.mp4
46.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/58 - A513 Labelling of information.mp4
46.6 MB
~Get Your Files Here !/3 - ISOIEC 270012022/13 - How to implement ISO 27001.mp4
44.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/57 - A512 Classification of information.mp4
42.1 MB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/35 - A512 Classification of information.mp4
42.0 MB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/42 - 612 Information Security Risk Assessment.mp4
40.9 MB
~Get Your Files Here !/3 - ISOIEC 270012022/15 - 75 Documented Information.mp4
40.8 MB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/34 - A59 Inventory of information and other associated assets.mp4
40.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/54 - A59 Inventory of information and other associated assets.mp4
40.1 MB
~Get Your Files Here !/2 - Fundamentals/8 - ISO 27000 Family of Standards.mp4
34.3 MB
~Get Your Files Here !/2 - Fundamentals/2 - Information Assets.mp4
33.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/44 - What is a Control.mp4
33.0 MB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/146 - 91 Monitoring Measurement Analysis and Evaluation.mp4
30.5 MB
~Get Your Files Here !/13 - Step 9 Improvement/151 - 102 Nonconformity and corrective action.mp4
29.8 MB
~Get Your Files Here !/2 - Fundamentals/9 - Navigating the Standards ISO 27001 and the ISO 27000 Family.mp4
29.4 MB
~Get Your Files Here !/5 - Step 2 Determine Scope/25 - 42 Understanding the needs and expectations of interested parties.mp4
28.4 MB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/31 - 52 Policy.mp4
27.5 MB
~Get Your Files Here !/2 - Fundamentals/6 - Information Security Management Systems ISMS.mp4
27.3 MB
~Get Your Files Here !/5 - Step 2 Determine Scope/24 - 41 Understanding the organization and its context.mp4
27.2 MB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/33 - Overview.mp4
22.9 MB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/144 - Overview.mp4
22.5 MB
~Get Your Files Here !/4 - Step 1 Management Support/17 - 51 Leadership and Commitment.mp4
22.1 MB
~Get Your Files Here !/2 - Fundamentals/4 - CIA Triad.mp4
21.4 MB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/41 - Risk Management Process and ISOIEC 27005.mp4
21.4 MB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/148 - 93 Management Review.mp4
21.2 MB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/147 - 92 Internal Audit.mp4
20.2 MB
~Get Your Files Here !/3 - ISOIEC 270012022/12 - Table of Contents.mp4
19.8 MB
~Get Your Files Here !/1 - Introduction/1 - Introduction.mp4
19.4 MB
~Get Your Files Here !/5 - Step 2 Determine Scope/23 - Overview.mp4
18.7 MB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/29 - Overview.mp4
17.8 MB
~Get Your Files Here !/2 - Fundamentals/3 - What is Information Security.mp4
16.2 MB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/38 - Overview.mp4
15.2 MB
~Get Your Files Here !/4 - Step 1 Management Support/20 - 72 Competence.mp4
15.2 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/53 - A58 Information security in project management.mp4
14.4 MB
~Get Your Files Here !/13 - Step 9 Improvement/150 - 101 Continual Improvement.mp4
14.4 MB
~Get Your Files Here !/4 - Step 1 Management Support/19 - 71 Resources.mp4
14.3 MB
~Get Your Files Here !/4 - Step 1 Management Support/18 - 53 Organisational Roles Responsibilities and Authorities.mp4
13.7 MB
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/141 - Overview.mp4
13.1 MB
~Get Your Files Here !/10 - Step 6 Information Security Risk Assessment/139 - Overview.mp4
12.9 MB
~Get Your Files Here !/10 - Step 6 Information Security Risk Assessment/140 - 82 Information security risk assessment.mp4
11.4 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/131 - A827 Secure system architecture and engineering principles.mp4
11.3 MB
~Get Your Files Here !/3 - ISOIEC 270012022/11 - Purpose.mp4
10.9 MB
~Get Your Files Here !/4 - Step 1 Management Support/21 - 73 Awareness.mp4
10.9 MB
~Get Your Files Here !/14 - Step 10 Certification Audit/152 - Overview.mp4
10.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/114 - A810 Information deletion.mp4
10.0 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/132 - A828 Secure coding.mp4
9.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/110 - A86 Capacity management.mp4
9.6 MB
~Get Your Files Here !/13 - Step 9 Improvement/149 - Overview.mp4
9.5 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/46 - A51 Policies for information security.mp4
9.5 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/113 - A89 Configuration management.mp4
9.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/109 - A85 Secure authentication.mp4
8.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/123 - A819 Installation of software on operational systems.mp4
8.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/120 - A816 Monitoring activities.mp4
8.7 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/111 - A87 Protection against malware.mp4
8.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/119 - A815 Logging.mp4
8.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/64 - A519 Information security in supplier relationships.mp4
8.4 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/85 - A63 Information security awareness education and training.mp4
8.2 MB
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/142 - 83 Information security risk treatment.mp4
8.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/117 - A813 Information backup.mp4
7.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/126 - A822 Segregation of networks.mp4
7.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/135 - A831 Separation of development test and production environments.mp4
7.8 MB
~Get Your Files Here !/14 - Step 10 Certification Audit/153 - Certification Process.mp4
7.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/128 - A824 Use of cryptography.mp4
7.5 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/112 - A88 Management of technical vulnerabilities.mp4
7.4 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/75 - A530 ICT readiness for business continuity.mp4
7.4 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/65 - A520 Addressing information security within supplier agreements.mp4
7.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/115 - A811 Data masking.mp4
7.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/100 - A710 Storage media.mp4
7.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/68 - A523 Information security for use of cloud services.mp4
7.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/116 - A812 Data leakage prevention.mp4
7.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/124 - A820 Networks security.mp4
7.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/106 - A82 Privileged access rights.mp4
7.1 MB
~Get Your Files Here !/4 - Step 1 Management Support/22 - 74 Communication_DV.mp4
7.0 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/78 - A533 Protection of records.mp4
7.0 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/118 - A814 Redundancy of information processing facilities.mp4
6.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/130 - A826 Application security requirements.mp4
6.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/47 - A52 Information security roles and responsibilities.mp4
6.8 MB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/40 - 61 Actions to address risks and opportunities.mp4
6.7 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/107 - A83 Information access restriction.mp4
6.7 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/134 - A830 Outsourced development.mp4
6.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/69 - A524 Information security incident management planning and preparation.mp4
6.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/89 - A67 Remote working.mp4
6.4 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/49 - A54 Management responsibilities.mp4
6.4 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/108 - A84 Access to source code.mp4
6.4 MB
~Get Your Files Here !/5 - Step 2 Determine Scope/28 - 44 Information Security Management System.mp4
6.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/55 - A510 Acceptable use of information and other associated assets.mp4
6.2 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/60 - A515 Access control.mp4
6.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/62 - A517 Authentication information.mp4
6.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/76 - A531 Legal statutory regulatory and contractual requirements.mp4
6.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/133 - A829 Security testing in development and acceptance.mp4
6.0 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/105 - A81 User end point devices.mp4
5.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/122 - A818 Use of privileged utility programs.mp4
5.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/48 - A53 Segregation of duties.mp4
5.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/121 - A817 Clock synchronization.mp4
5.8 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/125 - A821 Security of network services.mp4
5.8 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/87 - A65 Responsibilities after termination or change of employment.mp4
5.8 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/97 - A77 Clear desk and clear screen.mp4
5.8 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/136 - A832 Change management.mp4
5.8 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/88 - A66 Confidentiality or nondisclosure agreements.mp4
5.7 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/129 - A825 Secure development life cycle.mp4
5.7 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/84 - A62 Terms and conditions of employment.mp4
5.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/67 - A522 Monitoring review and change management of supplier services.mp4
5.5 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/127 - A823 Web filtering.mp4
5.4 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/99 - A79 Security of assets offpremises.mp4
5.3 MB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/145 - What is Compliance.mp4
5.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/56 - A511 Return of assets.mp4
5.2 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/138 - A834 Protection of information systems during audit testing.mp4
5.2 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/101 - A711 Supporting utilities.mp4
5.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/77 - A532 Intellectual property rights.mp4
5.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/71 - A526 Response to information security incidents.mp4
5.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/104 - A714 Secure disposal or reuse of equipment.mp4
5.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/102 - A712 Cabling security.mp4
5.0 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/52 - A57 Threat intelligence.mp4
4.9 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/95 - A75 Protecting against physical and environmental threats.mp4
4.8 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/50 - A55 Contact with authorities.mp4
4.7 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/94 - A74 Physical security monitoring.mp4
4.7 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/81 - A536 Compliance with policies rules and standards for information security.mp4
4.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/80 - A535 Independent review of information security.mp4
4.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/59 - A514 Information transfer.mp4
4.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/103 - A713 Equipment maintenance.mp4
4.5 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/72 - A527 Learning from information security incidents.mp4
4.5 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/91 - A71 Physical security perimeters.mp4
4.5 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/73 - A528 Collection of evidence.mp4
4.4 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/137 - A833 Test information.mp4
4.4 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/66 - A521 Managing information security in the information and communication techno.mp4
4.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/90 - A68 Information security event reporting.mp4
4.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/92 - A72 Physical entry.mp4
4.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/79 - A534 Privacy and protection of personal identifiable information PII.mp4
4.2 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/93 - A73 Securing offices rooms and facilities.mp4
4.1 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/96 - A76 Working in secure areas.mp4
4.0 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/51 - A56 Contact with special interest groups.mp4
3.8 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/86 - A64 Disciplinary process.mp4
3.7 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/61 - A516 Identity management.mp4
3.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/63 - A518 Access rights.mp4
3.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/98 - A78 Equipment siting and protection.mp4
3.6 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/83 - A61 Screening.mp4
3.5 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/82 - A537 Documented operating procedures.mp4
3.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/74 - A529 Information security during disruption.mp4
3.3 MB
~Get Your Files Here !/9 - Annex A Information Security Controls/70 - A525 Assessment and decision on information security events.mp4
2.8 MB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/contents.xml
547.0 kB
~Get Your Files Here !/2 - Fundamentals/8 - List-ISO27000-Family.pdf
353.3 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO-27005.pdf
340.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/contents.xml
331.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/44 - Control-Mapping.pdf
303.1 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO27000-Family.pdf
274.3 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO27002-2022.pdf
265.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/QuickLook/Preview.jpg
257.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO-27005.mindnode/QuickLook/Preview.jpg
226.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/contents.xml
224.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO-27005.mindnode/resources/30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
217.7 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
217.7 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
217.7 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
217.7 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
217.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/resources/30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
217.7 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO27000-Family.mm
214.4 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/QuickLook/Preview.jpg
195.0 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/QuickLook/Preview.jpg
194.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/QuickLook/Preview.jpg
175.8 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO27001-2022.pdf
170.8 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO-IEC-27000-2018.pdf
169.0 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/QuickLook/Preview.jpg
142.5 kB
~Get Your Files Here !/2 - Fundamentals/ISO-27005.mindnode/resources/8CA72E2A-5F53-4676-9049-D28FD65F9953.jpg
114.0 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/contents.xml
104.5 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/350098FC-7672-4362-B423-E046D57DA474.png
102.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/350098FC-7672-4362-B423-E046D57DA474.png
102.1 kB
~Get Your Files Here !/3 - ISOIEC 270012022/14 - ISO27001-Implementation-Project.xlsx
95.8 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/147 - ISO19011-Audit-Workflow.png
86.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/contents.xml
83.0 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO27002-2022.mm
80.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/44 - ISO-IEC-27002.mm
80.5 kB
~Get Your Files Here !/2 - Fundamentals/ISO-27005.mindnode/contents.xml
54.8 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/🧠.pdf
52.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/resources/🧠.pdf
52.4 kB
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/143 - SoA.docx
49.9 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/🏠.pdf
49.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/resources/🏠.pdf
49.6 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO27001-2022.mm
41.8 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/36 - Information-Classification-Policy.docx
41.1 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/32 - IS-Policy.docx
37.2 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/27 - Scope.docx
34.7 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/👨🏻.pdf
34.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/resources/👨🏻.pdf
34.4 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/74069372-F849-4EED-8B35-A1DD0B48C90C.pdf
31.2 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/74069372-F849-4EED-8B35-A1DD0B48C90C.pdf
31.2 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/F9E6FCBF-10D9-4094-B4B8-FA7E90800472.pdf
31.2 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/2E52C9FE-0A9B-4373-AD26-F2133DB3D238.pdf
31.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/2E52C9FE-0A9B-4373-AD26-F2133DB3D238.pdf
31.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/63160CDE-A099-492D-BC8A-30031E95A39B.pdf
31.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/636C4B2C-DB60-43B7-B1C7-F6E213D5AEA9.pdf
30.8 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/17CE8675-E9F6-4019-A449-C7AD7E7AEC0E.pdf
30.8 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/636C4B2C-DB60-43B7-B1C7-F6E213D5AEA9.pdf
30.8 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO-IEC-27000-2018.mm
30.5 kB
~Get Your Files Here !/3 - ISOIEC 270012022/15 - 75 Documented Information Hindi.srt
30.4 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/6EBA958D-D7A6-445A-8EB5-0E5A5A555DCA.pdf
29.8 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/6EBA958D-D7A6-445A-8EB5-0E5A5A555DCA.pdf
29.8 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/2C031473-E690-44EB-928C-0464968F5994.jpg
27.0 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/2C031473-E690-44EB-928C-0464968F5994.jpg
27.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/resources/2C031473-E690-44EB-928C-0464968F5994.jpg
27.0 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/💻.pdf
26.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/resources/💻.pdf
26.1 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/30 - 62 Information Security objectives Hindi.srt
25.7 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/34 - A59 Inventory of information and other associated assets Hindi.srt
24.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/54 - A59 Inventory of information and other associated assets Hindi.srt
24.2 kB
~Get Your Files Here !/2 - Fundamentals/10 - ISO-27005.mm
23.1 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/43 - 613 Information Security Risk Treatment Hindi.srt
21.5 kB
~Get Your Files Here !/13 - Step 9 Improvement/151 - 102 Nonconformity and corrective action Hindi.srt
20.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/44 - What is a Control Hindi.srt
19.8 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/31 - 52 Policy Hindi.srt
19.5 kB
~Get Your Files Here !/3 - ISOIEC 270012022/15 - 75 Documented Information Arabic.srt
19.4 kB
~Get Your Files Here !/4 - Step 1 Management Support/18 - 53 Organisational Roles Responsibilities and Authorities Hindi.srt
17.5 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/26 - 43 Determining the scope of the ISMS Hindi.srt
17.1 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/25 - 42 Understanding the needs and expectations of interested parties Hindi.srt
17.1 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/147 - 92 Internal Audit Hindi.srt
16.3 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/30 - 62 Information Security objectives Arabic.srt
16.1 kB
~Get Your Files Here !/4 - Step 1 Management Support/17 - 51 Leadership and Commitment Hindi.srt
15.9 kB
~Get Your Files Here !/3 - ISOIEC 270012022/15 - 75 Documented Information English.srt
15.8 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/39 - Risk Fundamentals Hindi.srt
15.8 kB
~Get Your Files Here !/2 - Fundamentals/6 - Information Security Management Systems ISMS Hindi.srt
15.3 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/34 - A59 Inventory of information and other associated assets Arabic.srt
15.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/54 - A59 Inventory of information and other associated assets Arabic.srt
15.0 kB
~Get Your Files Here !/4 - Step 1 Management Support/20 - 72 Competence Hindi.srt
15.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/45 - Annex A Hindi.srt
14.8 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/35 - A512 Classification of information Hindi.srt
14.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/57 - A512 Classification of information Hindi.srt
14.6 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/43 - 613 Information Security Risk Treatment Arabic.srt
13.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/53 - A58 Information security in project management Hindi.srt
13.7 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/24 - 41 Understanding the organization and its context Hindi.srt
13.6 kB
~Get Your Files Here !/2 - Fundamentals/9 - Navigating the Standards ISO 27001 and the ISO 27000 Family Hindi.srt
13.1 kB
~Get Your Files Here !/13 - Step 9 Improvement/151 - 102 Nonconformity and corrective action Arabic.srt
13.1 kB
~Get Your Files Here !/3 - ISOIEC 270012022/12 - Table of Contents Hindi.srt
13.1 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/30 - 62 Information Security objectives English.srt
12.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/44 - What is a Control Arabic.srt
12.5 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/37 - A513 Labelling of information Hindi.srt
12.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/58 - A513 Labelling of information Hindi.srt
12.4 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/31 - 52 Policy Arabic.srt
12.3 kB
~Get Your Files Here !/13 - Step 9 Improvement/150 - 101 Continual Improvement Hindi.srt
12.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/54 - A59 Inventory of information and other associated assets English.srt
12.1 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/34 - A59 Inventory of information and other associated assets English.srt
12.1 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/41 - Risk Management Process and ISOIEC 27005 Hindi.srt
11.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/131 - A827 Secure system architecture and engineering principles Hindi.srt
11.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/132 - A828 Secure coding Hindi.srt
11.3 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/25 - 42 Understanding the needs and expectations of interested parties Arabic.srt
11.2 kB
~Get Your Files Here !/14 - Step 10 Certification Audit/153 - Certification Process Hindi.srt
11.2 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/146 - 91 Monitoring Measurement Analysis and Evaluation Hindi.srt
11.0 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/43 - 613 Information Security Risk Treatment English.srt
10.9 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/26 - 43 Determining the scope of the ISMS Arabic.srt
10.7 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/38 - Overview Hindi.srt
10.6 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/39 - Risk Fundamentals Arabic.srt
10.6 kB
~Get Your Files Here !/4 - Step 1 Management Support/18 - 53 Organisational Roles Responsibilities and Authorities Arabic.srt
10.6 kB
~Get Your Files Here !/2 - Fundamentals/7 - International Standards Hindi.srt
10.6 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/33 - Overview Hindi.srt
10.5 kB
~Get Your Files Here !/4 - Step 1 Management Support/16 - Overview Hindi.srt
10.5 kB
~Get Your Files Here !/13 - Step 9 Improvement/151 - 102 Nonconformity and corrective action English.srt
10.4 kB
~Get Your Files Here !/4 - Step 1 Management Support/17 - 51 Leadership and Commitment Arabic.srt
10.3 kB
~Get Your Files Here !/4 - Step 1 Management Support/19 - 71 Resources Hindi.srt
10.3 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/31 - 52 Policy English.srt
10.2 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/147 - 92 Internal Audit Arabic.srt
10.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/114 - A810 Information deletion Hindi.srt
10.1 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/148 - 93 Management Review Hindi.srt
10.1 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/144 - Overview Hindi.srt
9.8 kB
~Get Your Files Here !/4 - Step 1 Management Support/20 - 72 Competence Arabic.srt
9.7 kB
~Get Your Files Here !/2 - Fundamentals/6 - Information Security Management Systems ISMS Arabic.srt
9.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/44 - What is a Control English.srt
9.4 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/35 - A512 Classification of information Arabic.srt
9.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/57 - A512 Classification of information Arabic.srt
9.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/110 - A86 Capacity management Hindi.srt
9.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/45 - Annex A Arabic.srt
9.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/113 - A89 Configuration management Hindi.srt
9.3 kB
~Get Your Files Here !/3 - ISOIEC 270012022/11 - Purpose Hindi.srt
9.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/119 - A815 Logging Hindi.srt
9.0 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/24 - 41 Understanding the organization and its context Arabic.srt
8.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/111 - A87 Protection against malware Hindi.srt
8.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/123 - A819 Installation of software on operational systems Hindi.srt
8.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/120 - A816 Monitoring activities Hindi.srt
8.9 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/25 - 42 Understanding the needs and expectations of interested parties English.srt
8.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/109 - A85 Secure authentication Hindi.srt
8.8 kB
~Get Your Files Here !/4 - Step 1 Management Support/18 - 53 Organisational Roles Responsibilities and Authorities English.srt
8.6 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/147 - 92 Internal Audit Spanish.srt
8.6 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/26 - 43 Determining the scope of the ISMS English.srt
8.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/85 - A63 Information security awareness education and training Hindi.srt
8.6 kB
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/141 - Overview Hindi.srt
8.5 kB
~Get Your Files Here !/2 - Fundamentals/9 - Navigating the Standards ISO 27001 and the ISO 27000 Family Arabic.srt
8.5 kB
~Get Your Files Here !/4 - Step 1 Management Support/21 - 73 Awareness Hindi.srt
8.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/117 - A813 Information backup Hindi.srt
8.5 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/147 - 92 Internal Audit Portuguese.srt
8.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/106 - A82 Privileged access rights Hindi.srt
8.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/53 - A58 Information security in project management Arabic.srt
8.4 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/37 - A513 Labelling of information Arabic.srt
8.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/58 - A513 Labelling of information Arabic.srt
8.2 kB
~Get Your Files Here !/4 - Step 1 Management Support/17 - 51 Leadership and Commitment English.srt
8.2 kB
~Get Your Files Here !/3 - ISOIEC 270012022/12 - Table of Contents Arabic.srt
8.1 kB
~Get Your Files Here !/10 - Step 6 Information Security Risk Assessment/139 - Overview Hindi.srt
8.1 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/39 - Risk Fundamentals English.srt
8.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/126 - A822 Segregation of networks Hindi.srt
8.0 kB
~Get Your Files Here !/13 - Step 9 Improvement/150 - 101 Continual Improvement Arabic.srt
8.0 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/23 - Overview Hindi.srt
7.9 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/147 - 92 Internal Audit English.srt
7.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/128 - A824 Use of cryptography Hindi.srt
7.9 kB
~Get Your Files Here !/4 - Step 1 Management Support/20 - 72 Competence English.srt
7.8 kB
~Get Your Files Here !/2 - Fundamentals/6 - Information Security Management Systems ISMS English.srt
7.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/57 - A512 Classification of information English.srt
7.7 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/35 - A512 Classification of information English.srt
7.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/89 - A67 Remote working Hindi.srt
7.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/46 - A51 Policies for information security Hindi.srt
7.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/100 - A710 Storage media Hindi.srt
7.7 kB
~Get Your Files Here !/10 - Step 6 Information Security Risk Assessment/140 - 82 Information security risk assessment Hindi.srt
7.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/135 - A831 Separation of development test and production environments Hindi.srt
7.6 kB
~Get Your Files Here !/14 - Step 10 Certification Audit/153 - Certification Process Arabic.srt
7.5 kB
~Get Your Files Here !/4 - Step 1 Management Support/22 - 74 Communication Hindi.srt
7.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/45 - Annex A English.srt
7.4 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/146 - 91 Monitoring Measurement Analysis and Evaluation Arabic.srt
7.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/116 - A812 Data leakage prevention Hindi.srt
7.4 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/41 - Risk Management Process and ISOIEC 27005 Arabic.srt
7.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/112 - A88 Management of technical vulnerabilities Hindi.srt
7.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/124 - A820 Networks security Hindi.srt
7.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/118 - A814 Redundancy of information processing facilities Hindi.srt
7.2 kB
~Get Your Files Here !/13 - Step 9 Improvement/149 - Overview Hindi.srt
7.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/64 - A519 Information security in supplier relationships Hindi.srt
7.2 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/24 - 41 Understanding the organization and its context English.srt
7.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/108 - A84 Access to source code Hindi.srt
7.1 kB
~Get Your Files Here !/2 - Fundamentals/7 - International Standards Arabic.srt
7.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/115 - A811 Data masking Hindi.srt
7.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/131 - A827 Secure system architecture and engineering principles Arabic.srt
7.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/132 - A828 Secure coding Arabic.srt
7.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/134 - A830 Outsourced development Hindi.srt
6.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/78 - A533 Protection of records Hindi.srt
6.8 kB
~Get Your Files Here !/4 - Step 1 Management Support/19 - 71 Resources Arabic.srt
6.8 kB
~Get Your Files Here !/2 - Fundamentals/9 - Navigating the Standards ISO 27001 and the ISO 27000 Family English.srt
6.7 kB
~Get Your Files Here !/3 - ISOIEC 270012022/12 - Table of Contents English.srt
6.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/53 - A58 Information security in project management English.srt
6.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/130 - A826 Application security requirements Hindi.srt
6.7 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/148 - 93 Management Review Arabic.srt
6.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/107 - A83 Information access restriction Hindi.srt
6.7 kB
~Get Your Files Here !/2 - Fundamentals/ISO-27005.mindnode/style.mindnodestyle/contents.xml
6.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/style.mindnodestyle/contents.xml
6.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/style.mindnodestyle/contents.xml
6.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/style.mindnodestyle/contents.xml
6.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/style.mindnodestyle/contents.xml
6.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/style.mindnodestyle/contents.xml
6.6 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/38 - Overview Arabic.srt
6.6 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/33 - Overview Arabic.srt
6.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/75 - A530 ICT readiness for business continuity Hindi.srt
6.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/114 - A810 Information deletion Arabic.srt
6.5 kB
~Get Your Files Here !/4 - Step 1 Management Support/16 - Overview Arabic.srt
6.5 kB
~Get Your Files Here !/13 - Step 9 Improvement/150 - 101 Continual Improvement English.srt
6.5 kB
~Get Your Files Here !/14 - Step 10 Certification Audit/153 - Certification Process Spanish.srt
6.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/65 - A520 Addressing information security within supplier agreements Hindi.srt
6.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/68 - A523 Information security for use of cloud services Hindi.srt
6.4 kB
~Get Your Files Here !/14 - Step 10 Certification Audit/153 - Certification Process Portuguese.srt
6.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/122 - A818 Use of privileged utility programs Hindi.srt
6.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/84 - A62 Terms and conditions of employment Hindi.srt
6.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/133 - A829 Security testing in development and acceptance Hindi.srt
6.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/136 - A832 Change management Hindi.srt
6.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/48 - A53 Segregation of duties Hindi.srt
6.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/47 - A52 Information security roles and responsibilities Hindi.srt
6.2 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/29 - Overview Hindi.srt
6.2 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/230398DE-5DFD-4597-8F69-9724A9B3D80F.pdf
6.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/230398DE-5DFD-4597-8F69-9724A9B3D80F.pdf
6.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/B2EF4303-2B9B-4C1F-9296-B4C3589F95AE.pdf
6.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/58 - A513 Labelling of information English.srt
6.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/105 - A81 User end point devices Hindi.srt
6.1 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/37 - A513 Labelling of information English.srt
6.1 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/144 - Overview Arabic.srt
6.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/110 - A86 Capacity management Arabic.srt
6.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/97 - A77 Clear desk and clear screen Hindi.srt
6.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/121 - A817 Clock synchronization Hindi.srt
6.0 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/146 - 91 Monitoring Measurement Analysis and Evaluation Spanish.srt
6.0 kB
~Get Your Files Here !/14 - Step 10 Certification Audit/153 - Certification Process English.srt
6.0 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/146 - 91 Monitoring Measurement Analysis and Evaluation Portuguese.srt
5.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/127 - A823 Web filtering Hindi.srt
5.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/99 - A79 Security of assets offpremises Hindi.srt
5.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/88 - A66 Confidentiality or nondisclosure agreements Hindi.srt
5.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/111 - A87 Protection against malware Arabic.srt
5.9 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/41 - Risk Management Process and ISOIEC 27005 English.srt
5.8 kB
~Get Your Files Here !/3 - ISOIEC 270012022/11 - Purpose Arabic.srt
5.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/129 - A825 Secure development life cycle Hindi.srt
5.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/119 - A815 Logging Arabic.srt
5.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/113 - A89 Configuration management Arabic.srt
5.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/62 - A517 Authentication information Hindi.srt
5.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/109 - A85 Secure authentication Arabic.srt
5.6 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/40 - 61 Actions to address risks and opportunities Hindi.srt
5.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/102 - A712 Cabling security Hindi.srt
5.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/101 - A711 Supporting utilities Hindi.srt
5.6 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/146 - 91 Monitoring Measurement Analysis and Evaluation English.srt
5.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/125 - A821 Security of network services Hindi.srt
5.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/131 - A827 Secure system architecture and engineering principles English.srt
5.5 kB
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/141 - Overview Arabic.srt
5.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/55 - A510 Acceptable use of information and other associated assets Hindi.srt
5.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/49 - A54 Management responsibilities Hindi.srt
5.5 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/148 - 93 Management Review Spanish.srt
5.5 kB
~Get Your Files Here !/2 - Fundamentals/7 - International Standards English.srt
5.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/87 - A65 Responsibilities after termination or change of employment Hindi.srt
5.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/132 - A828 Secure coding English.srt
5.5 kB
~Get Your Files Here !/4 - Step 1 Management Support/19 - 71 Resources English.srt
5.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/120 - A816 Monitoring activities Arabic.srt
5.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/60 - A515 Access control Hindi.srt
5.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/69 - A524 Information security incident management planning and preparation Hindi.srt
5.4 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/33 - Overview English.srt
5.4 kB
~Get Your Files Here !/4 - Step 1 Management Support/16 - Overview English.srt
5.4 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/148 - 93 Management Review Portuguese.srt
5.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/123 - A819 Installation of software on operational systems Arabic.srt
5.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/85 - A63 Information security awareness education and training Arabic.srt
5.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/117 - A813 Information backup Arabic.srt
5.4 kB
~Get Your Files Here !/4 - Step 1 Management Support/21 - 73 Awareness Arabic.srt
5.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/138 - A834 Protection of information systems during audit testing Hindi.srt
5.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/92 - A72 Physical entry Hindi.srt
5.2 kB
~Get Your Files Here !/10 - Step 6 Information Security Risk Assessment/139 - Overview Arabic.srt
5.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/46 - A51 Policies for information security Arabic.srt
5.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/77 - A532 Intellectual property rights Hindi.srt
5.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/114 - A810 Information deletion English.srt
5.1 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/148 - 93 Management Review English.srt
5.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/94 - A74 Physical security monitoring Hindi.srt
5.1 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/38 - Overview English.srt
5.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/126 - A822 Segregation of networks Arabic.srt
5.1 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/144 - Overview English.srt
5.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/100 - A710 Storage media Arabic.srt
5.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/89 - A67 Remote working Arabic.srt
5.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/71 - A526 Response to information security incidents Hindi.srt
5.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/67 - A522 Monitoring review and change management of supplier services Hindi.srt
5.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/96 - A76 Working in secure areas Hindi.srt
5.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/137 - A833 Test information Hindi.srt
5.0 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/23 - Overview Arabic.srt
5.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/104 - A714 Secure disposal or reuse of equipment Hindi.srt
5.0 kB
~Get Your Files Here !/10 - Step 6 Information Security Risk Assessment/140 - 82 Information security risk assessment Arabic.srt
4.9 kB
~Get Your Files Here !/4 - Step 1 Management Support/22 - 74 Communication Arabic.srt
4.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/76 - A531 Legal statutory regulatory and contractual requirements Hindi.srt
4.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/56 - A511 Return of assets Hindi.srt
4.9 kB
~Get Your Files Here !/3 - ISOIEC 270012022/11 - Purpose English.srt
4.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/91 - A71 Physical security perimeters Hindi.srt
4.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/115 - A811 Data masking Arabic.srt
4.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/106 - A82 Privileged access rights Arabic.srt
4.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/128 - A824 Use of cryptography Arabic.srt
4.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/135 - A831 Separation of development test and production environments Arabic.srt
4.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/90 - A68 Information security event reporting Hindi.srt
4.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/52 - A57 Threat intelligence Hindi.srt
4.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/116 - A812 Data leakage prevention Arabic.srt
4.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/64 - A519 Information security in supplier relationships Arabic.srt
4.7 kB
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/142 - 83 Information security risk treatment Hindi.srt
4.7 kB
~Get Your Files Here !/13 - Step 9 Improvement/149 - Overview Arabic.srt
4.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/103 - A713 Equipment maintenance Hindi.srt
4.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/110 - A86 Capacity management English.srt
4.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/108 - A84 Access to source code Arabic.srt
4.7 kB
~Get Your Files Here !/2 - Fundamentals/ISO-27005.mindnode/resources/59005285-60AE-4806-9B1F-93439F4E0C11.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/0528992C-A6F5-4343-BBA1-C3F9CFD5BAAA.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/08B1D283-9F18-476C-B73C-E13928846BEA.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/10377B85-00DB-4B13-A190-CD614C8DD7E2.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/18798775-E5DB-4C2F-8749-382740D49616.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/1A2BE2E7-4E7C-4EDD-8C4B-045CED96020E.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/207386B1-FEB2-4AD9-B12C-428E22BAD2C9.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/2AA5E1FE-068A-4DBF-8211-FCF9549C0519.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/3381CB9B-F48A-4A4B-B12E-0476A6357110.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/3434510E-BB70-4293-9912-5FF03CF08EF3.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/40553571-DD0D-4AB3-A308-7D62020F22BF.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/59005285-60AE-4806-9B1F-93439F4E0C11.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/5EC68EC3-F05A-4BDA-8D4E-4DE5F804FFB4.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/67473046-9DD6-4D67-B3B4-3DC76B6FF9A8.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/6DEA44AA-4F15-4C83-94D4-18B6113D2FFF.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/77DDED84-962C-4DC0-A8FE-62A4EA704160.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/81895468-0E8D-48B9-B7BA-DD0075B8E6B6.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/85858A54-4743-4649-A3A6-676175B0B7DA.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/8C0D478A-8222-4BB2-BB6B-329A0680AC51.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/9115FDAC-7099-4F2F-920D-B0DB77F50EA0.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/ABA35DA4-0452-440C-9858-A20E1BEBF121.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/B382AFE7-C7E4-479F-A532-17266A1E600F.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/C5DEBC17-82E8-4329-BC7E-9D5FEED3DE54.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/C9D63CC6-7CC5-46FD-9DB3-1C830312650A.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/DA544E28-91EB-466C-9732-7BF7C9354153.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/DE9961F2-5E07-4CEE-9376-A1BBA900C101.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/01C33937-5113-4C80-A7C4-EE3A6EF104CB.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/0B82686A-285C-47D5-9342-0E454F8F670F.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/0E1E294F-0DCD-4F91-B57D-31472DB62473.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/20F7443E-27B3-46DC-B1E6-865AD4A6194B.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/218ED60D-6DA5-4C4E-BF5D-2E1943F7C27F.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/269622ED-D39E-41A0-A163-41A399EAD9A5.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/4CED5F60-486F-47E3-9D1D-40243E157FEA.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/5C5D0289-006B-4613-80E6-D3E5365AABE5.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/7AB85354-251F-40BB-A121-0FCC4BA2E004.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/91FF2F37-3F72-420B-AB10-CB9ACACEB958.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/B1C46227-05CB-422B-ADA1-EE8D1CA1DE50.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/BE82FA25-6959-4E16-827C-E820CF79B45D.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/CA9D634C-170B-40CD-BA98-E2BA94CCC94C.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/CDDD7176-1903-448D-BEAC-2594BD9A617F.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/E39DE290-487D-4519-81CE-230DA7CD1AE8.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/F0FFE884-0CAE-41A3-B25F-62A7C44D2D18.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/01C33937-5113-4C80-A7C4-EE3A6EF104CB.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/0B82686A-285C-47D5-9342-0E454F8F670F.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/0E1E294F-0DCD-4F91-B57D-31472DB62473.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/20F7443E-27B3-46DC-B1E6-865AD4A6194B.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/218ED60D-6DA5-4C4E-BF5D-2E1943F7C27F.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/269622ED-D39E-41A0-A163-41A399EAD9A5.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/4CED5F60-486F-47E3-9D1D-40243E157FEA.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/5C5D0289-006B-4613-80E6-D3E5365AABE5.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/7AB85354-251F-40BB-A121-0FCC4BA2E004.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/85858A54-4743-4649-A3A6-676175B0B7DA.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/91FF2F37-3F72-420B-AB10-CB9ACACEB958.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/B1C46227-05CB-422B-ADA1-EE8D1CA1DE50.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/BE82FA25-6959-4E16-827C-E820CF79B45D.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/CA9D634C-170B-40CD-BA98-E2BA94CCC94C.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/CDDD7176-1903-448D-BEAC-2594BD9A617F.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/E39DE290-487D-4519-81CE-230DA7CD1AE8.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/F0FFE884-0CAE-41A3-B25F-62A7C44D2D18.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/0528992C-A6F5-4343-BBA1-C3F9CFD5BAAA.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/08B1D283-9F18-476C-B73C-E13928846BEA.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/10377B85-00DB-4B13-A190-CD614C8DD7E2.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/18798775-E5DB-4C2F-8749-382740D49616.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/1A2BE2E7-4E7C-4EDD-8C4B-045CED96020E.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/207386B1-FEB2-4AD9-B12C-428E22BAD2C9.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/2AA5E1FE-068A-4DBF-8211-FCF9549C0519.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/3381CB9B-F48A-4A4B-B12E-0476A6357110.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/40553571-DD0D-4AB3-A308-7D62020F22BF.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/5EC68EC3-F05A-4BDA-8D4E-4DE5F804FFB4.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/67473046-9DD6-4D67-B3B4-3DC76B6FF9A8.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/6DEA44AA-4F15-4C83-94D4-18B6113D2FFF.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/77DDED84-962C-4DC0-A8FE-62A4EA704160.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/81895468-0E8D-48B9-B7BA-DD0075B8E6B6.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/8C0D478A-8222-4BB2-BB6B-329A0680AC51.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/9115FDAC-7099-4F2F-920D-B0DB77F50EA0.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/ABA35DA4-0452-440C-9858-A20E1BEBF121.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/C5DEBC17-82E8-4329-BC7E-9D5FEED3DE54.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/C9D63CC6-7CC5-46FD-9DB3-1C830312650A.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/DA544E28-91EB-466C-9732-7BF7C9354153.pdf
4.6 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/DE9961F2-5E07-4CEE-9376-A1BBA900C101.pdf
4.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/resources/85858A54-4743-4649-A3A6-676175B0B7DA.pdf
4.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/112 - A88 Management of technical vulnerabilities Arabic.srt
4.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/124 - A820 Networks security Arabic.srt
4.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/95 - A75 Protecting against physical and environmental threats Hindi.srt
4.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/75 - A530 ICT readiness for business continuity Arabic.srt
4.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/98 - A78 Equipment siting and protection Hindi.srt
4.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/50 - A55 Contact with authorities Hindi.srt
4.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/118 - A814 Redundancy of information processing facilities Arabic.srt
4.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/113 - A89 Configuration management English.srt
4.4 kB
~Get Your Files Here !/4 - Step 1 Management Support/21 - 73 Awareness English.srt
4.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/109 - A85 Secure authentication English.srt
4.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/119 - A815 Logging English.srt
4.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/134 - A830 Outsourced development Arabic.srt
4.3 kB
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/141 - Overview English.srt
4.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/97 - A77 Clear desk and clear screen Arabic.srt
4.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/78 - A533 Protection of records Arabic.srt
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/BF9F4E9C-9059-42BB-B700-613C0F8FB378.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/BF9F4E9C-9059-42BB-B700-613C0F8FB378.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/BF9F4E9C-9059-42BB-B700-613C0F8FB378.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/94A9D4A2-057F-40A6-896C-8272B9734FB8.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/D174EFF5-B690-41CD-BFC1-991EACC857A3.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/D174EFF5-B690-41CD-BFC1-991EACC857A3.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/D174EFF5-B690-41CD-BFC1-991EACC857A3.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/94A9D4A2-057F-40A6-896C-8272B9734FB8.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/29CCAB36-58FF-4297-85A2-953F6EE8B553.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/29CCAB36-58FF-4297-85A2-953F6EE8B553.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/29CCAB36-58FF-4297-85A2-953F6EE8B553.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/BBDE222B-2863-4889-8AF9-C060AA97C764.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/BBDE222B-2863-4889-8AF9-C060AA97C764.pdf
4.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/BBDE222B-2863-4889-8AF9-C060AA97C764.pdf
4.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/93 - A73 Securing offices rooms and facilities Hindi.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/73 - A528 Collection of evidence Hindi.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/68 - A523 Information security for use of cloud services Arabic.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/111 - A87 Protection against malware English.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/123 - A819 Installation of software on operational systems English.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/120 - A816 Monitoring activities English.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/83 - A61 Screening Hindi.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/65 - A520 Addressing information security within supplier agreements Arabic.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/46 - A51 Policies for information security English.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/130 - A826 Application security requirements Arabic.srt
4.2 kB
~Get Your Files Here !/10 - Step 6 Information Security Risk Assessment/139 - Overview English.srt
4.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/85 - A63 Information security awareness education and training English.srt
4.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/86 - A64 Disciplinary process Hindi.srt
4.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/84 - A62 Terms and conditions of employment Arabic.srt
4.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/117 - A813 Information backup English.srt
4.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/81 - A536 Compliance with policies rules and standards for information security Hindi.srt
4.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/107 - A83 Information access restriction Arabic.srt
4.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/88 - A66 Confidentiality or nondisclosure agreements Arabic.srt
4.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/126 - A822 Segregation of networks English.srt
4.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/136 - A832 Change management Arabic.srt
4.0 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/23 - Overview English.srt
4.0 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/29 - Overview Arabic.srt
4.0 kB
~Get Your Files Here !/4 - Step 1 Management Support/22 - 74 Communication English.srt
4.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/59 - A514 Information transfer Hindi.srt
4.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/127 - A823 Web filtering Arabic.srt
3.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/121 - A817 Clock synchronization Arabic.srt
3.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/47 - A52 Information security roles and responsibilities Arabic.srt
3.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/133 - A829 Security testing in development and acceptance Arabic.srt
3.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/105 - A81 User end point devices Arabic.srt
3.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/61 - A516 Identity management Hindi.srt
3.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/66 - A521 Managing information security in the information and communication techno Hindi.srt
3.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/135 - A831 Separation of development test and production environments English.srt
3.9 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/145 - What is Compliance Hindi.srt
3.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/72 - A527 Learning from information security incidents Hindi.srt
3.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/89 - A67 Remote working English.srt
3.8 kB
~Get Your Files Here !/10 - Step 6 Information Security Risk Assessment/140 - 82 Information security risk assessment English.srt
3.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/102 - A712 Cabling security Arabic.srt
3.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/80 - A535 Independent review of information security Hindi.srt
3.8 kB
~Get Your Files Here !/14 - Step 10 Certification Audit/152 - Overview Hindi.srt
3.8 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/28 - 44 Information Security Management System Hindi.srt
3.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/122 - A818 Use of privileged utility programs Arabic.srt
3.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/100 - A710 Storage media English.srt
3.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/128 - A824 Use of cryptography English.srt
3.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/99 - A79 Security of assets offpremises Arabic.srt
3.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/106 - A82 Privileged access rights English.srt
3.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/60 - A515 Access control Arabic.srt
3.7 kB
~Get Your Files Here !/13 - Step 9 Improvement/149 - Overview English.srt
3.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/64 - A519 Information security in supplier relationships English.srt
3.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/125 - A821 Security of network services Arabic.srt
3.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/124 - A820 Networks security English.srt
3.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/116 - A812 Data leakage prevention English.srt
3.6 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/40 - 61 Actions to address risks and opportunities Arabic.srt
3.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/112 - A88 Management of technical vulnerabilities English.srt
3.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/48 - A53 Segregation of duties Arabic.srt
3.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/49 - A54 Management responsibilities Arabic.srt
3.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/101 - A711 Supporting utilities Arabic.srt
3.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/62 - A517 Authentication information Arabic.srt
3.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/118 - A814 Redundancy of information processing facilities English.srt
3.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/55 - A510 Acceptable use of information and other associated assets Arabic.srt
3.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/63 - A518 Access rights Hindi.srt
3.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/115 - A811 Data masking English.srt
3.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/129 - A825 Secure development life cycle Arabic.srt
3.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/79 - A534 Privacy and protection of personal identifiable information PII Hindi.srt
3.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/87 - A65 Responsibilities after termination or change of employment Arabic.srt
3.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/108 - A84 Access to source code English.srt
3.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/134 - A830 Outsourced development English.srt
3.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/130 - A826 Application security requirements English.srt
3.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/94 - A74 Physical security monitoring Arabic.srt
3.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/69 - A524 Information security incident management planning and preparation Arabic.srt
3.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/92 - A72 Physical entry Arabic.srt
3.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/78 - A533 Protection of records English.srt
3.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/84 - A62 Terms and conditions of employment English.srt
3.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/47 - A52 Information security roles and responsibilities English.srt
3.3 kB
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/29 - Overview English.srt
3.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/138 - A834 Protection of information systems during audit testing Arabic.srt
3.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/107 - A83 Information access restriction English.srt
3.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/90 - A68 Information security event reporting Arabic.srt
3.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/77 - A532 Intellectual property rights Arabic.srt
3.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/91 - A71 Physical security perimeters Arabic.srt
3.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/65 - A520 Addressing information security within supplier agreements English.srt
3.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/88 - A66 Confidentiality or nondisclosure agreements English.srt
3.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/133 - A829 Security testing in development and acceptance English.srt
3.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/68 - A523 Information security for use of cloud services English.srt
3.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/56 - A511 Return of assets Arabic.srt
3.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/103 - A713 Equipment maintenance Arabic.srt
3.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/137 - A833 Test information Arabic.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/70 - A525 Assessment and decision on information security events Hindi.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/75 - A530 ICT readiness for business continuity English.srt
3.0 kB
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/40 - 61 Actions to address risks and opportunities English.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/71 - A526 Response to information security incidents Arabic.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/97 - A77 Clear desk and clear screen English.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/121 - A817 Clock synchronization English.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/99 - A79 Security of assets offpremises English.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/96 - A76 Working in secure areas Arabic.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/76 - A531 Legal statutory regulatory and contractual requirements Arabic.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/67 - A522 Monitoring review and change management of supplier services Arabic.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/52 - A57 Threat intelligence Arabic.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/82 - A537 Documented operating procedures Hindi.srt
3.0 kB
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/142 - 83 Information security risk treatment Arabic.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/95 - A75 Protecting against physical and environmental threats Arabic.srt
3.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/51 - A56 Contact with special interest groups Hindi.srt
2.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/136 - A832 Change management English.srt
2.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/105 - A81 User end point devices English.srt
2.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/127 - A823 Web filtering English.srt
2.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/104 - A714 Secure disposal or reuse of equipment Arabic.srt
2.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/122 - A818 Use of privileged utility programs English.srt
2.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/125 - A821 Security of network services English.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/102 - A712 Cabling security English.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/49 - A54 Management responsibilities English.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/101 - A711 Supporting utilities English.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/87 - A65 Responsibilities after termination or change of employment English.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/50 - A55 Contact with authorities Arabic.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/55 - A510 Acceptable use of information and other associated assets English.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/93 - A73 Securing offices rooms and facilities Arabic.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/74 - A529 Information security during disruption Hindi.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/48 - A53 Segregation of duties English.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/129 - A825 Secure development life cycle English.srt
2.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/60 - A515 Access control English.srt
2.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/62 - A517 Authentication information English.srt
2.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/83 - A61 Screening Arabic.srt
2.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/69 - A524 Information security incident management planning and preparation English.srt
2.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/98 - A78 Equipment siting and protection Arabic.srt
2.6 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/28 - 44 Information Security Management System Arabic.srt
2.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/86 - A64 Disciplinary process Arabic.srt
2.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/66 - A521 Managing information security in the information and communication techno Arabic.srt
2.6 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/145 - What is Compliance Arabic.srt
2.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/92 - A72 Physical entry English.srt
2.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/91 - A71 Physical security perimeters English.srt
2.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/104 - A714 Secure disposal or reuse of equipment English.srt
2.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/73 - A528 Collection of evidence Arabic.srt
2.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/77 - A532 Intellectual property rights English.srt
2.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/59 - A514 Information transfer Arabic.srt
2.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/80 - A535 Independent review of information security Arabic.srt
2.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/72 - A527 Learning from information security incidents Arabic.srt
2.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/81 - A536 Compliance with policies rules and standards for information security Arabic.srt
2.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/90 - A68 Information security event reporting English.srt
2.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/71 - A526 Response to information security incidents English.srt
2.4 kB
~Get Your Files Here !/14 - Step 10 Certification Audit/152 - Overview Arabic.srt
2.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/94 - A74 Physical security monitoring English.srt
2.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/103 - A713 Equipment maintenance English.srt
2.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/56 - A511 Return of assets English.srt
2.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/138 - A834 Protection of information systems during audit testing English.srt
2.4 kB
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/142 - 83 Information security risk treatment English.srt
2.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/137 - A833 Test information English.srt
2.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/61 - A516 Identity management Arabic.srt
2.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/76 - A531 Legal statutory regulatory and contractual requirements English.srt
2.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/79 - A534 Privacy and protection of personal identifiable information PII Arabic.srt
2.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/67 - A522 Monitoring review and change management of supplier services English.srt
2.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/95 - A75 Protecting against physical and environmental threats English.srt
2.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/96 - A76 Working in secure areas English.srt
2.3 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/52 - A57 Threat intelligence English.srt
2.2 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/50 - A55 Contact with authorities English.srt
2.2 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/145 - What is Compliance Spanish.srt
2.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/83 - A61 Screening English.srt
2.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/93 - A73 Securing offices rooms and facilities English.srt
2.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/80 - A535 Independent review of information security English.srt
2.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/51 - A56 Contact with special interest groups Arabic.srt
2.1 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/28 - 44 Information Security Management System English.srt
2.1 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/145 - What is Compliance Portuguese.srt
2.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/73 - A528 Collection of evidence English.srt
2.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/63 - A518 Access rights Arabic.srt
2.0 kB
~Get Your Files Here !/12 - Step 8 Performance Evaluation/145 - What is Compliance English.srt
2.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/59 - A514 Information transfer English.srt
2.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/86 - A64 Disciplinary process English.srt
2.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/98 - A78 Equipment siting and protection English.srt
2.0 kB
~Get Your Files Here !/14 - Step 10 Certification Audit/152 - Overview English.srt
2.0 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/81 - A536 Compliance with policies rules and standards for information security English.srt
1.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/72 - A527 Learning from information security incidents English.srt
1.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/70 - A525 Assessment and decision on information security events Arabic.srt
1.9 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/61 - A516 Identity management English.srt
1.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/82 - A537 Documented operating procedures Arabic.srt
1.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/66 - A521 Managing information security in the information and communication techno English.srt
1.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/74 - A529 Information security during disruption Arabic.srt
1.8 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/79 - A534 Privacy and protection of personal identifiable information PII English.srt
1.7 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/51 - A56 Contact with special interest groups English.srt
1.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/63 - A518 Access rights English.srt
1.6 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/70 - A525 Assessment and decision on information security events English.srt
1.5 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/82 - A537 Documented operating procedures English.srt
1.4 kB
~Get Your Files Here !/3 - ISOIEC 270012022/14 - Download the Project Plan.html
1.4 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/74 - A529 Information security during disruption English.srt
1.4 kB
~Get Your Files Here !/7 - Step 4 Inventory of Assets/36 - Download your information classification policy.html
1.3 kB
~Get Your Files Here !/5 - Step 2 Determine Scope/27 - Download your Scope Template.html
1.3 kB
~Get Your Files Here !/2 - Fundamentals/ISO-27005.mindnode/resources/6F2A7688-1963-4E6D-B303-1013955A6035.png
1.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/6F2A7688-1963-4E6D-B303-1013955A6035.png
1.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/resources/BA1D27D3-1BD3-4EA8-8534-1CA4688FFAE9.png
1.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/resources/6F2A7688-1963-4E6D-B303-1013955A6035.png
1.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/6F2A7688-1963-4E6D-B303-1013955A6035.png
1.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/resources/BA1D27D3-1BD3-4EA8-8534-1CA4688FFAE9.png
1.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/resources/6F2A7688-1963-4E6D-B303-1013955A6035.png
1.1 kB
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/resources/BA1D27D3-1BD3-4EA8-8534-1CA4688FFAE9.png
1.1 kB
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/viewState.plist
779 Bytes
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/viewState.plist
768 Bytes
~Get Your Files Here !/2 - Fundamentals/ISO-27005.mindnode/viewState.plist
767 Bytes
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/viewState.plist
739 Bytes
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/viewState.plist
726 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/viewState.plist
644 Bytes
~Get Your Files Here !/2 - Fundamentals/10 - Download your Mind Maps.html
535 Bytes
~Get Your Files Here !/11 - Step 7 Information Security Risk Treatment/143 - Download your Statement of Applicability SoA.html
452 Bytes
~Get Your Files Here !/2 - Fundamentals/ISO-27005.mindnode/style.mindnodestyle/metadata.plist
394 Bytes
~Get Your Files Here !/2 - Fundamentals/ISO27000_Family.mindnode/style.mindnodestyle/metadata.plist
394 Bytes
~Get Your Files Here !/2 - Fundamentals/ISO27001-2022.mindnode/style.mindnodestyle/metadata.plist
394 Bytes
~Get Your Files Here !/2 - Fundamentals/ISO27002-2022.mindnode/style.mindnodestyle/metadata.plist
394 Bytes
~Get Your Files Here !/2 - Fundamentals/ISO_IEC 27000_2018.mindnode/style.mindnodestyle/metadata.plist
394 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/ISO_IEC 27002.mindnode/style.mindnodestyle/metadata.plist
394 Bytes
~Get Your Files Here !/Bonus Resources.txt
386 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/QuickLook/_Preview.jpg
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/_QuickLook
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/_resources
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/_style.mindnodestyle
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/_viewState.plist
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/resources/_30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/resources/_59005285-60AE-4806-9B1F-93439F4E0C11.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/resources/_6F2A7688-1963-4E6D-B303-1013955A6035.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/resources/_8CA72E2A-5F53-4676-9049-D28FD65F9953.jpg
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/style.mindnodestyle/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO-27005.mindnode/style.mindnodestyle/_metadata.plist
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/QuickLook/_Preview.jpg
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/_QuickLook
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/_resources
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/_style.mindnodestyle
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/_viewState.plist
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_0528992C-A6F5-4343-BBA1-C3F9CFD5BAAA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_08B1D283-9F18-476C-B73C-E13928846BEA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_10377B85-00DB-4B13-A190-CD614C8DD7E2.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_18798775-E5DB-4C2F-8749-382740D49616.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_1A2BE2E7-4E7C-4EDD-8C4B-045CED96020E.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_207386B1-FEB2-4AD9-B12C-428E22BAD2C9.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_29CCAB36-58FF-4297-85A2-953F6EE8B553.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_2AA5E1FE-068A-4DBF-8211-FCF9549C0519.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_2C031473-E690-44EB-928C-0464968F5994.jpg
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_3381CB9B-F48A-4A4B-B12E-0476A6357110.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_3434510E-BB70-4293-9912-5FF03CF08EF3.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_350098FC-7672-4362-B423-E046D57DA474.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_40553571-DD0D-4AB3-A308-7D62020F22BF.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_59005285-60AE-4806-9B1F-93439F4E0C11.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_5EC68EC3-F05A-4BDA-8D4E-4DE5F804FFB4.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_67473046-9DD6-4D67-B3B4-3DC76B6FF9A8.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_6DEA44AA-4F15-4C83-94D4-18B6113D2FFF.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_6EBA958D-D7A6-445A-8EB5-0E5A5A555DCA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_6F2A7688-1963-4E6D-B303-1013955A6035.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_77DDED84-962C-4DC0-A8FE-62A4EA704160.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_81895468-0E8D-48B9-B7BA-DD0075B8E6B6.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_85858A54-4743-4649-A3A6-676175B0B7DA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_8C0D478A-8222-4BB2-BB6B-329A0680AC51.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_9115FDAC-7099-4F2F-920D-B0DB77F50EA0.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_94A9D4A2-057F-40A6-896C-8272B9734FB8.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_ABA35DA4-0452-440C-9858-A20E1BEBF121.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_B382AFE7-C7E4-479F-A532-17266A1E600F.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_BA1D27D3-1BD3-4EA8-8534-1CA4688FFAE9.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_BBDE222B-2863-4889-8AF9-C060AA97C764.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_BF9F4E9C-9059-42BB-B700-613C0F8FB378.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_C5DEBC17-82E8-4329-BC7E-9D5FEED3DE54.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_C9D63CC6-7CC5-46FD-9DB3-1C830312650A.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_D174EFF5-B690-41CD-BFC1-991EACC857A3.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_DA544E28-91EB-466C-9732-7BF7C9354153.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_DE9961F2-5E07-4CEE-9376-A1BBA900C101.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_🏠.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_👨🏻.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_💻.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/resources/_🧠.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/style.mindnodestyle/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27000_Family.mindnode/style.mindnodestyle/_metadata.plist
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/QuickLook/_Preview.jpg
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/_QuickLook
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/_resources
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/_style.mindnodestyle
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/_viewState.plist
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_01C33937-5113-4C80-A7C4-EE3A6EF104CB.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_0B82686A-285C-47D5-9342-0E454F8F670F.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_0E1E294F-0DCD-4F91-B57D-31472DB62473.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_20F7443E-27B3-46DC-B1E6-865AD4A6194B.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_218ED60D-6DA5-4C4E-BF5D-2E1943F7C27F.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_230398DE-5DFD-4597-8F69-9724A9B3D80F.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_269622ED-D39E-41A0-A163-41A399EAD9A5.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_29CCAB36-58FF-4297-85A2-953F6EE8B553.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_2E52C9FE-0A9B-4373-AD26-F2133DB3D238.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_4CED5F60-486F-47E3-9D1D-40243E157FEA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_5C5D0289-006B-4613-80E6-D3E5365AABE5.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_636C4B2C-DB60-43B7-B1C7-F6E213D5AEA9.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_6F2A7688-1963-4E6D-B303-1013955A6035.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_74069372-F849-4EED-8B35-A1DD0B48C90C.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_7AB85354-251F-40BB-A121-0FCC4BA2E004.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_91FF2F37-3F72-420B-AB10-CB9ACACEB958.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_B1C46227-05CB-422B-ADA1-EE8D1CA1DE50.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_BBDE222B-2863-4889-8AF9-C060AA97C764.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_BE82FA25-6959-4E16-827C-E820CF79B45D.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_BF9F4E9C-9059-42BB-B700-613C0F8FB378.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_CA9D634C-170B-40CD-BA98-E2BA94CCC94C.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_CDDD7176-1903-448D-BEAC-2594BD9A617F.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_D174EFF5-B690-41CD-BFC1-991EACC857A3.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_E39DE290-487D-4519-81CE-230DA7CD1AE8.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/resources/_F0FFE884-0CAE-41A3-B25F-62A7C44D2D18.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/style.mindnodestyle/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27001-2022.mindnode/style.mindnodestyle/_metadata.plist
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/QuickLook/_Preview.jpg
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/_QuickLook
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/_resources
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/_style.mindnodestyle
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/_viewState.plist
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_01C33937-5113-4C80-A7C4-EE3A6EF104CB.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_0B82686A-285C-47D5-9342-0E454F8F670F.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_0E1E294F-0DCD-4F91-B57D-31472DB62473.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_17CE8675-E9F6-4019-A449-C7AD7E7AEC0E.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_20F7443E-27B3-46DC-B1E6-865AD4A6194B.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_218ED60D-6DA5-4C4E-BF5D-2E1943F7C27F.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_230398DE-5DFD-4597-8F69-9724A9B3D80F.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_269622ED-D39E-41A0-A163-41A399EAD9A5.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_29CCAB36-58FF-4297-85A2-953F6EE8B553.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_2C031473-E690-44EB-928C-0464968F5994.jpg
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_2E52C9FE-0A9B-4373-AD26-F2133DB3D238.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_4CED5F60-486F-47E3-9D1D-40243E157FEA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_5C5D0289-006B-4613-80E6-D3E5365AABE5.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_63160CDE-A099-492D-BC8A-30031E95A39B.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_636C4B2C-DB60-43B7-B1C7-F6E213D5AEA9.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_6F2A7688-1963-4E6D-B303-1013955A6035.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_74069372-F849-4EED-8B35-A1DD0B48C90C.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_7AB85354-251F-40BB-A121-0FCC4BA2E004.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_85858A54-4743-4649-A3A6-676175B0B7DA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_91FF2F37-3F72-420B-AB10-CB9ACACEB958.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_B1C46227-05CB-422B-ADA1-EE8D1CA1DE50.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_B2EF4303-2B9B-4C1F-9296-B4C3589F95AE.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_BA1D27D3-1BD3-4EA8-8534-1CA4688FFAE9.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_BBDE222B-2863-4889-8AF9-C060AA97C764.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_BE82FA25-6959-4E16-827C-E820CF79B45D.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_BF9F4E9C-9059-42BB-B700-613C0F8FB378.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_CA9D634C-170B-40CD-BA98-E2BA94CCC94C.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_CDDD7176-1903-448D-BEAC-2594BD9A617F.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_D174EFF5-B690-41CD-BFC1-991EACC857A3.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_E39DE290-487D-4519-81CE-230DA7CD1AE8.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_F0FFE884-0CAE-41A3-B25F-62A7C44D2D18.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/resources/_F9E6FCBF-10D9-4094-B4B8-FA7E90800472.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/style.mindnodestyle/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO27002-2022.mindnode/style.mindnodestyle/_metadata.plist
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/QuickLook/_Preview.jpg
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/_QuickLook
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/_resources
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/_style.mindnodestyle
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/_viewState.plist
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_0528992C-A6F5-4343-BBA1-C3F9CFD5BAAA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_08B1D283-9F18-476C-B73C-E13928846BEA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_10377B85-00DB-4B13-A190-CD614C8DD7E2.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_18798775-E5DB-4C2F-8749-382740D49616.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_1A2BE2E7-4E7C-4EDD-8C4B-045CED96020E.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_207386B1-FEB2-4AD9-B12C-428E22BAD2C9.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_2AA5E1FE-068A-4DBF-8211-FCF9549C0519.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_3381CB9B-F48A-4A4B-B12E-0476A6357110.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_350098FC-7672-4362-B423-E046D57DA474.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_40553571-DD0D-4AB3-A308-7D62020F22BF.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_5EC68EC3-F05A-4BDA-8D4E-4DE5F804FFB4.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_67473046-9DD6-4D67-B3B4-3DC76B6FF9A8.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_6DEA44AA-4F15-4C83-94D4-18B6113D2FFF.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_6EBA958D-D7A6-445A-8EB5-0E5A5A555DCA.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_6F2A7688-1963-4E6D-B303-1013955A6035.png
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_77DDED84-962C-4DC0-A8FE-62A4EA704160.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_81895468-0E8D-48B9-B7BA-DD0075B8E6B6.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_8C0D478A-8222-4BB2-BB6B-329A0680AC51.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_9115FDAC-7099-4F2F-920D-B0DB77F50EA0.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_94A9D4A2-057F-40A6-896C-8272B9734FB8.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_ABA35DA4-0452-440C-9858-A20E1BEBF121.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_C5DEBC17-82E8-4329-BC7E-9D5FEED3DE54.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_C9D63CC6-7CC5-46FD-9DB3-1C830312650A.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_DA544E28-91EB-466C-9732-7BF7C9354153.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/resources/_DE9961F2-5E07-4CEE-9376-A1BBA900C101.pdf
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/style.mindnodestyle/_contents.xml
221 Bytes
~Get Your Files Here !/2 - Fundamentals/__MACOSX/ISO_IEC 27000_2018.mindnode/style.mindnodestyle/_metadata.plist
221 Bytes
Get Bonus Downloads Here.url
182 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/QuickLook/_Preview.jpg
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/_QuickLook
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/_contents.xml
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/_resources
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/_style.mindnodestyle
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/_viewState.plist
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/resources/_2C031473-E690-44EB-928C-0464968F5994.jpg
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/resources/_30CFBBF9-8D21-482A-9A35-893F0C92E2C5.png
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/resources/_85858A54-4743-4649-A3A6-676175B0B7DA.pdf
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/resources/_BA1D27D3-1BD3-4EA8-8534-1CA4688FFAE9.png
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/resources/_🏠.pdf
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/resources/_👨🏻.pdf
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/resources/_💻.pdf
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/resources/_🧠.pdf
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/style.mindnodestyle/_contents.xml
178 Bytes
~Get Your Files Here !/9 - Annex A Information Security Controls/__MACOSX/ISO_IEC 27002.mindnode/style.mindnodestyle/_metadata.plist
178 Bytes
~Get Your Files Here !/2 - Fundamentals/2 - Quiz Management System Standards.html
82 Bytes
~Get Your Files Here !/2 - Fundamentals/8 - ISOIEC 270002018.txt
68 Bytes
~Get Your Files Here !/6 - Step 3 Define Information Security Policy/32 - Download your Information Security Policy.html
57 Bytes
~Get Your Files Here !/8 - Step 5 Risk Management Methodology/41 - ISOIEC 270052018.txt
39 Bytes
~Get Your Files Here !/2 - Fundamentals/7 - isoorg.txt
29 Bytes
~Get Your Files Here !/4 - Step 1 Management Support/16 - Overview.mp4
0 Bytes
~Get Your Files Here !/4 - Step 1 Management Support/22 - 74 Communication.mp4
0 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>