加入書籤:
|
|
商品編號: | DUE3982 |
|
商品名稱: | Udemy線上課程 精通 ISO/IEC 27001 Controls for Information Security 資訊安全控制 講師:Michael Tang 影音教學 中文發音 繁體中文(DVD版) |
|
商品分類: | Udemy線上課程綜合教學 |
|
語系版本: | 中文發音 繁體中文版 | |
官方網站: | https://xyz88.app | |
運行平台: | 官方原版畫質MP4檔,沒有任何平台限制,終身使用 | |
更新日期: | 2025-06-01 |
|
光碟片數: | 1片DVD光碟 |
|
銷售價格: | $200元 |
|
|
|
Udemy線上課程 精通 ISO/IEC 27001 Controls for Information Security 資訊安全控制 講師:Michael Tang 影音教學 中文發音 繁體中文(DVD版)
在數位化的時代,保護敏感資訊是全球企業的首要任務。
ISO/IEC 27001 是全球公認的資訊安全管理系統(ISMS)標準,而附錄 A 是其安全控制框架的核心。
本課程將幫助您全面掌握 ISO/IEC 27001:2022 附錄 A 的 93 項控制措施。
無論您是 IT 專業人士、經理、稽覈員,還是企業主,本課程都將帶您深入瞭解每項控制措施,提供實用的洞察與可行的策略。
您將學到什麼理解 ISO/IEC 27001:2022 附錄 A 控制措施的目的與架構。
學會如何將這些控制措施與組織的風險管理策略結合。
探索實際案例,學習如何實施和監控安全控制措施。
掌握保持合規與通過稽覈的最佳實踐。
瞭解 2022 年版本中新增與修訂的控制措施。
為什麼選擇這門課程?
實用導向:透過實際案例和範例獲取實用知識。
專家指導:由擁有豐富 ISO 27001 實施與稽覈經驗的行業專家授課。
稽覈準備:為 ISO/IEC 27001 認證稽覈奠定堅實基礎。
適用廣泛:將課程知識應用於任何行業或組織規模。
In today’s digital age, securing sensitive information is a top priority for organizations worldwide. ISO/IEC 27001 is the globally recognized standard for Information Security Management Systems (ISMS), and Annex A is the cornerstone of its security controls framework.
This comprehensive course will equip you with the knowledge and skills needed to understand, implement, and manage the 93 controls in ISO/IEC 27001:2022 Annex A. Whether you’re an IT professional, manager, auditor, or business owner, this course is designed to guide you through every aspect of the controls, providing practical insights and actionable strategies.
What You Will LearnUnderstand the purpose and structure of ISO/IEC 27001:2022 Annex A controls.Learn how to align these controls with your organization’s risk management strategy.Explore real-world examples of implementing and monitoring security controls.Discover best practices for maintaining compliance and passing audits.Stay up-to-date with new and revised controls introduced in the 2022 version.
Why Enroll in This Course?
Practical Focus: Gain hands-on knowledge through real-world case studies and examples.
Expert Guidance: Learn from industry professionals with extensive experience in ISO 27001 implementation and auditing.
Certification Preparation: Build a strong foundation to ace ISO/IEC 27001 certification audits.
Scalable Knowledge: Apply the principles and controls to any industry or organization size.
01 - 課程介紹 Course introduction
001 課程介紹 Course introduction.mp4
02 - A.5 組織控制 (37 項目) Organizational Controls
001 A.5.1 資訊安全政策 (Information security policies).mp4
002 A.5.2 資訊安全角色與責任 (Information security roles and responsibilities).mp4
003 A.5.3 隔離職責 (Segregation of duties).mp4
004 A.5.4 Management responsibilities (管理責任).mp4
005 A.5.5 Contact with authorities (與主管機關的聯繫).mp4
006 A.5.6 Contact with special interest groups (與特定利益團體的聯繫).mp4
007 A.5.7 Threat intelligence (威脅情報).mp4
008 A.5.8 Information security in project management (專案管理中的資訊安全).mp4
009 A.5.9 Inventory of information and other associated assets (資訊及相關資產的清單).mp4
010 A.5.10 Acceptable use of information and other associated assets (資訊及相關資產的可接受使用).mp4
011 A.5.11 Return of assets (資產歸還).mp4
012 A.5.12 Classification of information (資訊分類).mp4
013 A.5.13 Labelling of information (資訊標籤).mp4
014 A.5.14 Information transfer (資訊傳輸).mp4
015 A.5.15 Access control (存取控制).mp4
016 A.5.16 Identity management (身份管理).mp4
017 A.5.17 Authentication information (認證資訊).mp4
018 A.5.18 Access rights (存取權限).mp4
019 A.5.19 Security of supplier relationships (供應商關係的安全).mp4
020 A.5.20 Addressing information security within supplier agreements (供應商協議中的資訊安全).mp4
021 A.5.21 Managing information security in the ICT supply chain (ICT 供應鏈中的資訊安全管理).mp4
022 A.5.22 Monitoring, review, and change management of supplier services (供應商服務的監控、.mp4
023 A.5.23 Information security for use of cloud services (雲端服務的資訊安全).mp4
024 A.5.24 Information security incident management planning and preparation (資訊安全事件.mp4
025 A.5.25 Assessment and decision on information security events (資訊安全事件的評估與決策).mp4
026 A.5.26 Response to information security incidents (資訊安全事件的應對).mp4
027 A.5.27 Learning from information security incidents (從資訊安全事件中學習).mp4
028 A.5.28 Collection of evidence (證據收集).mp4
029 A.5.29 Information security during disruption (營運中斷期間的資訊安全).mp4
030 A.5.30 ICT readiness for business continuity (業務連續性的 ICT 準備).mp4
031 A.5.31 Legal, statutory, regulatory, and contractual requirements (法律、法規與契約要求).mp4
032 A.5.32 Intellectual property rights (知識產權管理).mp4
033 A.5.33 Protection of records (記錄的保護).mp4
034 A.5.34 Privacy and protection of personally identifiable information (個人識別信息的隱私與.mp4
035 A.5.35 Independent review of information security (資訊安全的獨立審查).mp4
036 A.5.36 Compliance with policies, rules, and standards for information security.mp4
037 A.5.37 Documented operating procedures (文件化操作流程).mp4
03 - A.6 People Controls (人員控制)
001 A.6.1 Screening (人員篩選).mp4
002 A.6.2 Terms and conditions of employment (聘用條款與條件).mp4
003 A.6.3 Information security awareness, education, and training (資訊安全意識、教育與訓練).mp4
004 A.6.4 Disciplinary process (紀律處分流程).mp4
005 A.6.5 Responsibilities after termination or change of employment (離職或職位變更後的責任.mp4
006 A.6.6 Confidentiality or nondisclosure agreements (保密或非披露協議).mp4
007 A.6.7 Remote working (遠端工作).mp4
008 A.6.8 Information security event reporting (資訊安全事件報告).mp4
04 - A.7 Physical Controls (實體控制)
001 A.7.1 Physical security perimeter (實體安全邊界).mp4
002 A.7.2 Physical entry (實體進入).mp4
003 A.7.3 Securing offices, rooms, and facilities (保護辦公室、房間和設施).mp4
004 A.7.4 Physical security monitoring (實體安全監控).mp4
005 A.7.5 Protecting against physical and environmental threats (防範實體和環境威脅).mp4
006 A.7.6 Working in secure areas (在安全區域內工作).mp4
007 A.7.7 Clear desk and clear screen (清桌和清屏).mp4
008 A.7.8 Equipment siting and protection (設備擺放與保護).mp4
009 A.7.9 Security of assets off-premises (場外資產的安全).mp4
010 A.7.10 Storage media (儲存媒體).mp4
011 A.7.11 Supporting utilities (支持性設施).mp4
012 A.7.12 Cabling security (電纜安全).mp4
013 A.7.13 Equipment maintenance (設備維護).mp4
014 A.7.14 Secure disposal or re-use of equipment (設備的安全處置或再利用).mp4
05 - A.8 Technological Controls (技術控制)
001 A.8.1 User end point devices (用戶端設備).mp4
002 A.8.2 Privileged access rights (特權訪問權限).mp4
003 A.8.3 Information access restriction (信息訪問限制).mp4
004 A.8.4 Access to source code (源代碼訪問).mp4
005 A.8.5 Secure authentication (安全認證).mp4
006 A.8.6 Capacity management (容量管理).mp4
007 A.8.7 Protection against malware (防範惡意軟件).mp4
008 A.8.8 Management of technical vulnerabilities (技術漏洞管理).mp4
009 A.8.9 Configuration management (配置管理).mp4
010 A.8.10 Information deletion (信息刪除).mp4
011 A.8.11 Data masking (數據遮蔽).mp4
012 A.8.12 Data leakage prevention (數據洩漏防護).mp4
013 A.8.13 Information backup (信息備份).mp4
014 A.8.14 Redundancy of information processing facilities (信息處理設施的冗餘性).mp4
015 A.8.15 Logging (日誌記錄).mp4
016 A.8.16 Monitoring activities (活動監控).mp4
017 A.8.17 Clock synchronization (時鐘同步).mp4
018 A.8.18 Use of privileged utility programs (特權實用程序的使用).mp4
019 A.8.19 Installation of software on operational systems (運行系統上的軟件安裝).mp4
020 A.8.20 Networks security (網絡安全).mp4
021 A.8.21 Security of network services (網絡服務的安全性).mp4
022 A.8.22 Segregation of networks (網絡隔離).mp4
023 A.8.23 Web filtering (網絡過濾).mp4
024 A.8.24 Use of cryptography (加密技術的使用).mp4
025 A.8.25 Secure development life cycle (安全開發生命周期).mp4
026 A.8.26 Application security requirements (應用安全需求).mp4
027 A.8.27 Secure system architecture and engineering principles (安全系統架構與工程原則).mp4
028 A.8.28 Secure coding (安全編碼).mp4
029 A.8.29 Security testing in development and acceptance (開發與驗收中的安全測試).mp4
030 A.8.30 Outsourced development (外包開發).mp4
031 A.8.31 Separation of development, test and production environments 開發、測試與運行環境的隔離.mp4
032 A.8.32 Change management (變更管理).mp4
033 A.8.33 Test information (測試信息).mp4
034 A.8.34 Protection of information systems during audit testing (審核測試中的信息系統保護).mp4
|
|