Autoplay
Autocomplete
Previous Lesson
Complete and Continue
2025 ISO 27001 Lead Implementer
Domain 1
1.1 Security Governance (3:37)
1.1 Security Governance
1.2 Security Models (2:18)
1.2 Security Models
1.3 professional Ethics (4:32)
1.3 Professional Ethics
1.4 Security Documentation (2:47)
1.4 Security Documentation
1.5 Threat Modeling (5:16)
1.5 Threat Modeling
1.6 Acquisition Strategy and practice (5:11)
1.6 Acquisition Strategy and Practice
1.7 Information security policy (3:08)
1.7 information security policy
1.8 Security Awareness and Training (3:43)
1.8 Security Awareness and Training
1.9 Overview of ISO Frameworks (6:52)
1.9 Overview of ISO Frameworks
Domain 2
2.1 Information Asset Management (4:05)
2.1 information asset management
2.2 Privacy Protection (4:06)
2.2 Privacy Protection
2.3 Asset Retention (5:17)
2.3 Asset Retention
2.4 Data Security Controls (4:02)
2.4 Data Security Controls
2.5 Secure Data Handling (5:04)
2.5 Secure Data Handling
2.6 Asset Classification (4:14)
2.6 Asset Classification
2.7 Risk Management (4:32)
2.7 Risk management
Domain 3
3.1 Risk Scenario (7:49)
3.1 Risk Scenario
3.2 Risk Appetite and Tolerance (5:41)
3.2 Risk Appetite and Tolerance
3.3 Third-Party Risk Management (6:36)
3.3 Third-Party Risk Management
3.4 Reporting Risk (5:45)
3.4 Reporting Risk
3.5 BCP (5:48)
3.5 BCP
3.6 Gap Analysis (7:30)
3.6 Gap Analysis
3.7 IT Governance Frameworks (6:36)
3.7 IT Governance Frameworks
Domain 4
4.1 Security in the Engineering Lifecycle (5:49)
4.1 Security in the Engineering Lifecycle
4.2 System Component Security- Part 1 (5:15)
4.2 System Component Security- Part 1
4.2 System Component Security - Part 2 (3:44)
4.2 System Component Security - Part 2
4.2 System Component security - part 3 (4:18)
4.2 System Component Security - Part 3
4.3 Enterprise Risk Management (7:02)
4.3 Enterprise Risk Management
4.4 Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems (6:52)
4.4 Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems
4.5 Patch and Vulnerability Management (8:04)
4.5 Patch and Vulnerability Management
4.6 Cryptography Basics - Part 1 (3:05)
4.6 Cryptography Basics - Part 1
4.6 Cryptography Basics - Part 2 (0:53)
4.6 Cryptography Basics - Part 2
4.6 Cryptography Basics - Part 3 (1:55)
4.6 Cryptography Basics - Part 3
4.7 Symmetric vs. Asymmetric Cryptography (2:34)
4.7 Symmetric vs. Asymmetric Cryptography
4.8 Cryptography Applications (Digital Rights Management, Hishing)
4.8 Cryptography Applications (Digital Rights Management, Hishing) (6:55)
4.9 Cryptography Applications (PKI,Digital Certificates and Signature)
4.9 Cryptography Applications (PKI,Digital Certificates and Signature) (4:52)
4.10 Design and Architecture Vulnerability Mitigation- Part 1 (5:27)
4.10 Design and Architecture Vulnerability Mitigation- Part 1
4.10 Design and Architecture Vulnerability Mitigation - Part 2 (5:29)
4.10 Design and Architecture Vulnerability Mitigation - Part 2
4.10 Design and Architecture Vulnerability Mitigation - Part 3 (5:44)
4.10 Design and Architecture Vulnerability Mitigation - Part 3
Domain 5
5.1 Logging and Monitoring (4:18)
5.1 Logging and Monitoring
5.2 Control Monitoring (3:18)
5.2 Control Monitoring
5.3 Audits (4:18)
5.3 Audits
5.4 Post-Incident Reviews and Lessons Learned (3:53)
5.4 Post-Incident Reviews and Lessons Learned
5.5 Reporting Risk (5:45)
5.5 Reporting Risk
5.6 Key Performance Indicators (KPIs) (5:16)
5.6 Key Performance Indicators (KPIs)
Domain 6
6.1 Identifying Opportunities for Continual Improvement (4:03)
6.1 Identifying Opportunities for Continual Improvement
6.2 Implementing Corrective and Preventive Actions (5:24)
6.2 Implementing Corrective and Preventive Actions
6.3 Aligning ISMS Improvements with Organizational Strategy (6:27)
6.3 Aligning ISMS Improvements with Organizational Strategy
6.4 Statement of Applicability (SOA) (5:08)
6.4 Statement of Applicability (SOA)
Domain 7
7.1 Understanding the Certification Process (5:53)
7.1 Understanding the Certification Process
7.2 Preparing ISMS Documentation for Certification (5:52)
7.2 Preparing ISMS Documentation for Certification
7.3 Conducting Pre-Audit and Readiness Assessment (5:21)
7.3 Conducting Pre-Audit and Readiness Assessment
7.4 Managing Stage 1 and Stage 2 Certification Audits (5:43)
7.4 Managing Stage 1 and Stage 2 Certification Audits
7.5 Addressing Nonconformities Identified During Certification Audits (5:41)
7.5 Addressing Nonconformities Identified During Certification Audits
7.6 Finalizing the Certification Process (4:54)
7.6 Finalizing the Certification Process
Teach online with
4.10 Design and Architecture Vulnerability Mitigation- Part 1
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock