Autoplay
Autocomplete
Previous Lesson
Complete and Continue
ISO/IEC 27001:2022 Lead Implementer
Training Overview
Description of Training
Introduction
Introduction (2:34)
ISO27001:2022 (8:03)
ISO 27001:2022 Standards
ISMS Documentation
CIA Triad (3:11)
Information Security vs IT Security (1:35)
ISMS (6:38)
PDCA Approach (6:30)
Important Factors (4:57)
ISO 27001 Benefits (6:08)
Basics Concepts
Project Deliverables (5:02)
First Project - Hospital (5:58)
The planning phase (2:56)
Legal Requirements (2:45)
Scope Document Sample (5:16)
ISMS Scope (6:43)
Interested Parties (1:48)
Leadership and commitment- (5:17)
Security Policy Framework (24:53)
Organizational Roles - Responsibilities (4:28)
Information Security Objectives (2:38)
Resources (2:28)
Resources Example (4:56)
Competences (2:09)
Competences Sample Document (2:41)
Awareness (4:45)
Awareness Resources (6:25)
Awareness Effectiveness (7:19)
Communication (1:00)
Statement of Applicability (1:04)
Documented information (8:54)
Risk Management
Risk Management Methodology (2:30)
Introduction to Risk management (3:47)
Risk Management Documentation (4:42)
Risk Management Process (2:19)
Risk Assessment (4:06)
Risk Analysis and Evaluation (6:37)
Risk Assessment Document (6:52)
Risk Treatment (7:08)
Risk Acceptance Document (3:04)
Statement of Applicability Document (1:30)
Risk Treatment Plan (0:44)
DO ISMS
Formulating the Risk Assessment Plan (4:31)
Risk Treatment Plan Document (7:26)
Operational Planning and Control (3:43)
Managing Outsourcing (5:02)
NDA Sample (1:21)
Controlling Changes (5:47)
Change Request Sample (3:16)
Check and Act ISMS
Monitoring-Measurement-Analysis-Evaluation (5:57)
ISO27001:2022 (8:03)
Incident Management Evaluation Sample (7:33)
Monitored and Measured (4:03)
Internal Audit (8:23)
Internal Audit Report Sample (11:01)
Management Review (3:05)
Continual Improvement (2:25)
Nonconformities and Corrective Actions (6:06)
Annex A Controls
ISO27001:2022 (8:03)
Information Asset Register_Part1 (14:40)
Information Asset Register_Part2 (11:22)
Vulnerability Management (10:06)
VA Report (7:18)
Emergency VA (4:03)
Information Protection (2:55)
Use Case – Implementing Data Classification and DLP (1:50)
Microsoft Compliance Tool (3:30)
Data Classification and Labeling (6:29)
Create a Label (12:06)
DLP Implementation (13:58)
Protection Against Malware (4:37)
Enterprise AV Management (6:55)
Network Security (3:38)
Threat Intelligence (11:08)
Incident Management (10:31)
IOC Report (4:43)
Information Security Awareness (4:38)
Job function awarenes (8:32)
IS Awareness Effectivenes (6:31)
Social Engineering Campaign (5:54)
Disaster Recovery Plan-DRP (3:40)
BCP and DRP (3:01)
BIA (4:56)
MTD-RTO-RPO (9:10)
Restoration Plan and Testing (10:53)
BIA
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock