только у нас скачать шаблон dle скачивать рекомендуем

Фото видео монтаж » Видео уроки » Become A Certified Information System Auditor - Domain 5

Become A Certified Information System Auditor - Domain 5

Become A Certified Information System Auditor - Domain 5
Free Download Become A Certified Information System Auditor - Domain 5
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.26 GB | Duration: 6h 16m
ISACA CISA Boot-camp Training | Domain 5 | Protection of Information Assets + Practice test


What you'll learn
Understand information security concepts, principles, and practices.
Evaluate the effectiveness of information security risk management processes, including risk assessment, treatment, and monitoring.
Understand the principles of identity and access management (IAM) and evaluate the adequacy of related controls.
Understand the principles of cryptography and evaluate the adequacy of related controls.
Understand the principles of network security and evaluate the adequacy of related controls.
Understand the principles of application security and evaluate the adequacy of related controls.
Understand the principles of physical and environmental security and evaluate the adequacy of related controls.
Requirements
No previous knowledge requirements in the subject is required, everything will be explained in details
As the course discuss technology and topics related to it, however no additional software is needed to practice as the course does not include programming or IT Labs
Description
Welcome to the Certified Information Systems Auditor (CISA) course!In this course, you will learn the essential skills and knowledge required to become a successful information systems auditor. The CISA certification is a globally recognized certification for professionals who audit, control, monitor, and assess information technology and business systems.----------------------------The Certified Information Systems Auditor (CISA) certification's Domain 5 focuses on Protection of Information Assets. The learning objectives of this domain are:Understand information security concepts, principles, and practices.Evaluate the effectiveness of information security governance frameworks, including policies, standards, procedures, and guidelines.Evaluate the effectiveness of information security risk management processes, including risk assessment, treatment, and monitoring.Evaluate the effectiveness of information security program management, including strategy development, planning, and implementation.Understand the principles of access controls and evaluate the adequacy of related controls.Understand the principles of identity and access management (IAM) and evaluate the adequacy of related controls.Understand the principles of cryptography and evaluate the adequacy of related controls.Understand the principles of network security and evaluate the adequacy of related controls.Understand the principles of application security and evaluate the adequacy of related controls.Understand the principles of physical and environmental security and evaluate the adequacy of related controls.Understand the principles of business continuity and disaster recovery planning and evaluate the effectiveness of related controls.Understand the principles of legal, regulatory, and ethical considerations related to information security and evaluate the adequacy of related controls.----------------------------The focus of Domain 5 is the evaluation of controls for protecting information assets. The syllabus covers:Logical security controlsPhysical and environmental security controlsInformation managementEvaluating the effectiveness of the overall security system----------------------------This course is one of 4 courses that cover all what you need to pass CISA Course 1 (Domain 1) Information Systems Auditing Process: This domain covers the fundamental concepts, principles, and processes involved in conducting an audit of information systems.Practice test 250q that covers entire domain 1 Course 2 ( Domains 2,3)Governance and Management of IT: This domain covers the governance and management of information technology and how it aligns with the business objectives and strategy.Information Systems Acquisition, Development, and Implementation: This domain covers the process of acquiring, developing, and implementing information systems, including project management, system development life cycle (SDLC), and change management.Course 3 (Domain 4) Information Systems Operations, Maintenance, and Support: This domain covers the ongoing operations and maintenance of information systems, including incident management, problem management, and service management.Course 4 (Domain 5) ---> (This Course) Protection of Information Assets: This domain covers the protection of information assets through the implementation of security controls and risk management.----------------------------Throughout this course, you will gain practical experience through hands-on exercises and case studies that will help you to understand the concepts better. By the end of this course, you will have the knowledge and skills required to pass the CISA exam and become a successful information systems auditor.Soif you're looking to enhance your career in the field of information systems auditing or simply want to improve your knowledge and skills in this area, then this course is perfect for you. Join us now and take the first step towards becoming a certified information systems auditor.
Overview
Section 1: CISA Domain 5 | Protection of Information Assets
Lecture 1 Domain Overiew and Key Security concepts
Lecture 2 Information Security vs Cybersecurity
Lecture 3 Understand Information System Architecture
Lecture 4 Cyber Threats 101
Lecture 5 Cyber Attacks Methods and Techniques DeepDive (BONUS)
Lecture 6 Security Vulnerabilities and How it can be Exploited
Lecture 7 Auditor's Guide for Ethical Hacking Overview and How Penetration testing work
Lecture 8 Cybersecurity Frameworks
Lecture 9 Personnel Security and Protecting Organization's assets
Lecture 10 Data Classification and Data Life Cycle
Lecture 11 Physical Security and Environmental Protection - Part 1
Lecture 12 Physical Security and Environmental Protection - Part 2
Lecture 13 Malware and how to counter it
Lecture 14 Authentication Authorization and Accounting - AAA
Lecture 15 Authentication
Lecture 16 Strong Authentication and Biometric based Authentication Factors
Lecture 17 Authorization and Accounting and Auditing
Lecture 18 Network Security controls and services Part 1
Lecture 19 Network Security controls and services Part 2
Lecture 20 Cryptography Basics
Lecture 21 Symmetric Encryption Overview
Lecture 22 Asymmetric Encryption Overview
Lecture 23 Public Key Infrastructure and Digital Certificate Overview
Lecture 24 Understand Hashing and Digital Signature
Lecture 25 The Encryption and Cryptography Use Cases
IT Auditors,System Administrators,Accountants who want to gain IT Auditing Skills,Any one want a proper way to go for CISA Exam,Security Associates and Professionals

https://www.udemy.com/course/cisa-dom5/





Links are Interchangeable - Single Extraction
Poproshajka




Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.