Home Search Profile

ISO 27001:2022 Masterclass: Lead Implementer & Auditor Pro

Focused View

15:30:58

  • 1 -Course Introduction.mp4
    06:44
  • 2 -Introduction to ISO 27001 Standard.mp4
    14:31
  • 3 -Inter-relation between ISO 27000 Family of Standards.mp4
    05:54
  • 4 -Key ISO Standards.mp4
    09:42
  • 5 -What is the Management System.mp4
    11:35
  • 1 -STEP 1 # Obtaining Management Support, Setting up the Project Management.mp4
    04:37
  • 2 -STEP 2 # Define the Scope, Develop the HLP, and Risk Assessment and RTP.mp4
    08:41
  • 3 -STEP 3 # Writing the SoA (Statement of Applicability).mp4
    05:36
  • 4 -STEP 4 # Control Evaluation & Implementation and Awareness.mp4
    11:01
  • 5 -STEP 5 # Operating and Monitoring the Management System.mp4
    03:38
  • 6 -STEP 6 # Internal Audit, Management Review and Addressing Nonconformities.mp4
    06:55
  • 1 -Information Security, Confidentiality, Integrity, and Availability (CIA Triad).mp4
    07:15
  • 2 -Key Security Principals.mp4
    08:41
  • 3 -Why Security Governance is Crucial.mp4
    07:10
  • 4 -Clause 4 Context of the Organization.mp4
    14:12
  • 5 -Organizational Structure.mp4
    04:10
  • 6 -Relation between Departments.mp4
    06:21
  • 7 -Separation of Duties.mp4
    05:21
  • 8 -Strategy and Plans.mp4
    05:24
  • 9 -Legal and Regulatory Requirements.mp4
    04:00
  • 10 -Security Standards and Regulations.mp4
    12:11
  • 12 -Governance and Management.mp4
    07:13
  • 13 -Management Buy-In.mp4
    04:46
  • 14 -Clause 6 Planning.mp4
    09:54
  • 15 -Gap Analysis.mp4
    07:27
  • 16 -Project Managment and PMO.mp4
    07:02
  • 17 -Project Scheduling Tools.mp4
    08:33
  • 18 -RACI Matrix.mp4
    04:48
  • 19 -Owner, Custodian.mp4
    04:49
  • 1 -Risk Management.mp4
    10:12
  • 2 -Risk Terminologies.mp4
    06:50
  • 3 -Risk Identification.mp4
    06:48
  • 4 -Risk Analysis.mp4
    08:52
  • 5 -Risk Evaluation and Response.mp4
    12:43
  • 6 -ISO 31K & 27005.mp4
    06:36
  • 7 -Security Controls Overview.mp4
    11:26
  • 8 -Acquiring New Control, Process and Procedures and POC.mp4
    06:05
  • 9 -Control Objective.mp4
    07:22
  • 10 -Control Selection & Implementation.mp4
    08:03
  • 11 -Control Documentation.mp4
    07:38
  • 12 -Asset Management.mp4
    06:51
  • 13 -Asset Lifecycle.mp4
    09:32
  • 1 -Clause 7 Support.mp4
    06:18
  • 2 -Policies.mp4
    04:46
  • 3 -Standards.mp4
    04:18
  • 4 -Procedures and Guidelines.mp4
    04:24
  • 5 -Development and Review of Policies.mp4
    06:47
  • 6 -Importance of resources, competence, and awareness.mp4
    08:30
  • 7 -ISMS Documentation.mp4
    03:48
  • 8 -Documented information and control of documents.mp4
    03:25
  • 9 -Communication requirements within the organization.mp4
    04:24
  • 10 -Structure and requirements for Management System documentation.mp4
    03:48
  • 1 -Clause 8 Operation of the Management System.mp4
    08:56
  • 2 -Managing external vendors and service providers.mp4
    14:04
  • 3 -Supply Chain Risk Management.mp4
    09:47
  • 4 -Personnel Security - HR Security.mp4
    11:11
  • 5 -Security Awareness Training.mp4
    04:55
  • 6 -HR Policy.mp4
    05:28
  • 7 -Building Incident Response Program.mp4
    15:25
  • 8 -Operational Logs Management.mp4
    09:46
  • 9 -Threat Intelligence and CERT.mp4
    05:58
  • 10 -Network Security Management Policies.mp4
    07:30
  • 11 -Network Segmenation.mp4
    08:38
  • 12 -Firewalls.mp4
    09:13
  • 13 -Sandbox.mp4
    03:53
  • 14 -Content Filtering.mp4
    11:20
  • 15 -WAF.mp4
    05:21
  • 16 -SSL Decryption.mp4
    08:20
  • 17 -Network Access and BYOD Policies.mp4
    07:04
  • 18 -Internet Access, Email & Remote access Policy.mp4
    07:06
  • 19 -Patch Management.mp4
    04:54
  • 20 -Configuration Management.mp4
    07:15
  • 21 -Change Management.mp4
    11:05
  • 22 -Financial, Portfolio and Capacity Management.mp4
    06:42
  • 23 -Server, Software, Backup Policies.mp4
    06:52
  • 24 -Identity Access Management.mp4
    08:46
  • 25 -Privileged Access Management.mp4
    05:14
  • 26 -User Account, Password and Access Control Policies.mp4
    07:55
  • 27 -Data Lifecycle.mp4
    03:44
  • 28 -Data Classification.mp4
    12:11
  • 29 -Building Data Governance Program.mp4
    06:40
  • 30 -Data Protection Measures.mp4
    06:47
  • 31 -Data Leakage Prevention.mp4
    07:37
  • 32 -Digital Rights Management.mp4
    08:13
  • 33 -Data Protection, Encryption, Classification Policies.mp4
    08:19
  • 34 -Data Disposal.mp4
    04:39
  • 35 -Data Privacy Overview.mp4
    11:01
  • 36 -Privacy Policy.mp4
    04:58
  • 1 -What is BIA, DRP, BCP.mp4
    17:21
  • 2 -Understand RPO & RTO.mp4
    09:08
  • 3 -Recovery Sites.mp4
    05:47
  • 4 -Business Continuity Policy.mp4
    08:59
  • 1 -Physical Security.mp4
    22:33
  • 2 -Data Center Security.mp4
    05:21
  • 3 -Environmental Controls.mp4
    19:10
  • 4 -Clear Desk, AUP & Physical Security Policy.mp4
    07:21
  • 1 -Software Development Process.mp4
    12:08
  • 2 -Software Development Methodologies.mp4
    07:35
  • 3 -Use Case, Abuse Case and SRTM.mp4
    08:44
  • 4 -Software Functional Testing.mp4
    12:43
  • 5 -Software Security Testing.mp4
    09:18
  • 1 -Clause 9 Performance Evaluation.mp4
    05:58
  • 2 -Information System Auditing.mp4
    05:29
  • 3 -Internal and External Auditing.mp4
    01:53
  • 4 -Audit Committee and Charter.mp4
    04:26
  • 5 -Audit Process.mp4
    03:03
  • 6 -Conducting Audit.mp4
    04:44
  • 7 -Collecting Evidences.mp4
    05:37
  • 8 -Evaluation of Controls.mp4
    05:42
  • 9 -Sampling.mp4
    07:01
  • 10 -Audit Reporting.mp4
    05:52
  • 11 -Certification vs Accreditation.mp4
    06:00
  • 1 -Clause 10 Improvement.mp4
    04:39
  • 2 -Understanding nonconformities and corrective actions.mp4
    09:31
  • 3 -Control Monitoring and Evaluation.mp4
    08:23
  • 4 -Identifying and monitoring KPIs.mp4
    05:34
  • 5 -Risk Monitoring and Reporting.mp4
    09:23
  • 6 -The Continues Monitoring Program.mp4
    07:39
  • 7 -Quality Controls and Quality Assurance.mp4
    06:49
  • 8 -Performance Evaluation and PDCA.mp4
    01:18
  • 9 -Preparing for certification audits.mp4
    05:11
  • 10 -Navigating certification stages and maintaining compliance.mp4
    06:14
  • More details


    Course Overview

    Comprehensive ISO 27001:2022 training covering ISMS implementation, risk management, and audit techniques to achieve and maintain compliance with international standards.

    What You'll Learn

    • End-to-end ISMS implementation methodology
    • Advanced risk assessment and treatment strategies
    • Professional audit techniques and certification preparation

    Who This Is For

    • Information security professionals
    • Compliance officers and IT managers
    • Aspiring ISO 27001 auditors and consultants

    Key Benefits

    • Master both implementation and auditing perspectives
    • Practical templates for documentation and controls
    • Real-world case studies and scenarios

    Curriculum Highlights

    1. ISMS Fundamentals & Implementation Framework
    2. Risk Management & Security Controls
    3. Audit Processes & Certification Maintenance
    Focused display
    Category
    • language english
    • Training sessions 122
    • duration 15:30:58
    • English subtitles has
    • Release Date 2025/04/26

    Courses related to ISO 27001