Tags
Language
Tags
August 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Auditing Iso 27001:2022 – Technical Controls

    Posted By: ELK1nG
    Auditing Iso 27001:2022 – Technical Controls

    Auditing Iso 27001:2022 – Technical Controls
    Published 8/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.81 GB | Duration: 4h 58m

    Step-by-step auditing of ISO 27001:2022 Annex A technical controls for endpoints, data, networks, and secure development

    What you'll learn

    Audit ISO 27001:2022 Annex A technical controls step-by-step.

    Evaluate policies, evidence, and configurations against ISO requirements.

    Identify security gaps and create risk-based remediation plans.

    Prepare audit reports and executive briefings for certification readiness.

    Requirements

    Basic knowledge of information security or IT systems is helpful.

    Familiarity with ISO 27001) is useful.

    No specialized tools needed; templates and checklists are provided.

    Description

    Unlock the skills to confidently audit ISO/IEC 27001:2022 technical controls.This course provides a complete, step-by-step guide to auditing the 34 Annex A Clause 8 technical controls of ISO/IEC 27001:2022. Covering areas from endpoint security and privileged access to cryptography, network security, and secure software development, it equips you with practical tools, checklists, and methodologies to evaluate compliance and identify risks. This course contains the use of artificial intelligence.Modern organizations face threats ranging from malware infections to misconfigured cloud systems and insecure application development. As an auditor or security professional, your role is not only to confirm compliance but also to highlight risks, evaluate evidence, and recommend improvements. This course bridges the gap between theory and practice, ensuring you can perform robust audits in real-world environments.You’ll learn how to:Audit user endpoints, privileged access rights, and secure authentication.Evaluate controls for capacity, malware, vulnerability, and configuration management.Assess data lifecycle security, including secure deletion, masking, backups, and redundancy.Review logging, monitoring, and privileged utilities to ensure accountability.Verify network and cryptographic security through segregation, filtering, and encryption.Audit secure development practices, including SDLC, coding standards, outsourced development, and change management.Each module includes practical audit checklists, real-world scenarios, and step-by-step examples using a model company (InfoSure Ltd.). You’ll also complete assignments designed to simulate real audits, culminating in a capstone project that integrates all 34 controls into one comprehensive audit exercise.By the end of this course, you will be able to:Apply structured audit methodologies to technical controls.Collect and evaluate evidence such as policies, logs, system configs, and test results.Identify risks, gaps, and partial compliance in information security systems.Deliver actionable remediation roadmaps and management briefings.Whether you are an auditor, CISO, ISMS manager, compliance professional, or IT administrator, this course provides the knowledge and tools to audit technical controls with confidence and prepare organizations for ISO 27001 certification success.

    Overview

    Section 1: Introduction

    Lecture 1 Introduction

    Lecture 2 Introducing the Model Company - InfoSure Ltd

    Section 2: Identity and Access Management

    Lecture 3 Identity and Access Management

    Lecture 4 Control 8.1 – User Endpoint Devices

    Lecture 5 Control 8.2 – Privileged Access Rights

    Lecture 6 Control 8.3 – Information Access Restriction

    Lecture 7 Control 8.4 – Access to Source Code

    Lecture 8 Control 8.5 – Secure Authentication

    Section 3: Capacity, Malware, and Vulnerability Management

    Lecture 9 Capacity, Malware, and Vulnerability Management

    Lecture 10 Control 8.6 – Capacity Management

    Lecture 11 Control 8.7 – Protection Against Malware

    Lecture 12 Control 8.8 – Management of Technical Vulnerabilities

    Lecture 13 Control 8.9 – Configuration Management

    Section 4: Data Lifecycle Security

    Lecture 14 Data Lifecycle Security

    Lecture 15 Control 8.10 – Information Deletion

    Lecture 16 Control 8.11 – Data Masking

    Lecture 17 Control 8.12 – Data Leakage Prevention

    Lecture 18 Control 8.13 – Information Backup

    Lecture 19 Control 8.14 – Redundancy of Information Processing Facilities

    Section 5: Logging, Monitoring, and Utilities

    Lecture 20 Logging, Monitoring, and Utilities

    Lecture 21 Control 8.15 – Logging

    Lecture 22 Control 8.16 – Monitoring Activities

    Lecture 23 Control 8.17 – Clock Synchronisation

    Lecture 24 Control 8.18 – Use of Privileged Utility Programs

    Lecture 25 Control 8.19 – Installation of Software on Operational Systems

    Section 6: Network and Cryptographic Security

    Lecture 26 Network and Cryptographic Security

    Lecture 27 Control 8.20 – Network Security

    Lecture 28 Control 8.21: Security of Network Services

    Lecture 29 8.22 – Segregation of Networks

    Lecture 30 Control 8.23: Web Filtering

    Lecture 31 Control 8.24: Use of Cryptography

    Section 7: Secure Development Practices

    Lecture 32 Secure Development Practices

    Lecture 33 Control 8.25 – Secure Development Life Cycle

    Lecture 34 Control 8.26 – Application Security Requirements

    Lecture 35 Control 8.27 – Secure Systems Architecture and Engineering Principles

    Lecture 36 Control 8.28 – Secure Coding

    Lecture 37 Control 8.29 – Security Testing in Development and Acceptance

    Lecture 38 Control 8.30 – Outsourced Development

    Lecture 39 Control 8.31 – Separation of Development, Test and Production Environments

    Lecture 40 Control 8.32 – Change Management

    Lecture 41 Control 8.33 – Test Information

    Section 8: Audit-Specific Technology Protections

    Lecture 42 Control 8.34 – Protection of Information Systems During Audit Testing

    Section 9: Conclusion

    Lecture 43 Conclusion

    Information security auditors and IT compliance professionals.,CISOs, ISMS managers, and risk or governance specialists.,IT managers, cloud security professionals, and system administrators.,Consultants preparing organizations for ISO 27001 certification audits.