Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Become A Certified Information System Auditor | Domain 5

Posted By: ELK1nG
Become A Certified Information System Auditor | Domain 5

Become A Certified Information System Auditor | Domain 5
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.26 GB | Duration: 6h 16m

ISACA CISA Boot-camp Training | Domain 5 | Protection of Information Assets + Practice test

What you'll learn

Understand information security concepts, principles, and practices.

Evaluate the effectiveness of information security risk management processes, including risk assessment, treatment, and monitoring.

Understand the principles of identity and access management (IAM) and evaluate the adequacy of related controls.

Understand the principles of cryptography and evaluate the adequacy of related controls.

Understand the principles of network security and evaluate the adequacy of related controls.

Understand the principles of application security and evaluate the adequacy of related controls.

Understand the principles of physical and environmental security and evaluate the adequacy of related controls.

Requirements

No previous knowledge requirements in the subject is required, everything will be explained in details

As the course discuss technology and topics related to it, however no additional software is needed to practice as the course does not include programming or IT Labs

Description

Welcome to the Certified Information Systems Auditor (CISA) course!In this course, you will learn the essential skills and knowledge required to become a successful information systems auditor. The CISA certification is a globally recognized certification for professionals who audit, control, monitor, and assess information technology and business systems.––––––––––––––The Certified Information Systems Auditor (CISA) certification's Domain 5 focuses on Protection of Information Assets. The learning objectives of this domain are:Understand information security concepts, principles, and practices.Evaluate the effectiveness of information security governance frameworks, including policies, standards, procedures, and guidelines.Evaluate the effectiveness of information security risk management processes, including risk assessment, treatment, and monitoring.Evaluate the effectiveness of information security program management, including strategy development, planning, and implementation.Understand the principles of access controls and evaluate the adequacy of related controls.Understand the principles of identity and access management (IAM) and evaluate the adequacy of related controls.Understand the principles of cryptography and evaluate the adequacy of related controls.Understand the principles of network security and evaluate the adequacy of related controls.Understand the principles of application security and evaluate the adequacy of related controls.Understand the principles of physical and environmental security and evaluate the adequacy of related controls.Understand the principles of business continuity and disaster recovery planning and evaluate the effectiveness of related controls.Understand the principles of legal, regulatory, and ethical considerations related to information security and evaluate the adequacy of related controls.––––––––––––––The focus of Domain 5 is the evaluation of controls for protecting information assets. The syllabus covers:Logical security controlsPhysical and environmental security controlsInformation managementEvaluating the effectiveness of the overall security system––––––––––––––This course is one of 4 courses that cover all what you need to pass CISA  Course 1  (Domain 1) Information Systems Auditing Process: This domain covers the fundamental concepts, principles, and processes involved in conducting an audit of information systems.Practice test 250q that covers entire domain 1 Course 2 ( Domains 2,3)Governance and Management of IT: This domain covers the governance and management of information technology and how it aligns with the business objectives and strategy.Information Systems Acquisition, Development, and Implementation: This domain covers the process of acquiring, developing, and implementing information systems, including project management, system development life cycle (SDLC), and change management.Course 3 (Domain 4) Information Systems Operations, Maintenance, and Support: This domain covers the ongoing operations and maintenance of information systems, including incident management, problem management, and service management.Course 4 (Domain 5) –-> (This Course) Protection of Information Assets: This domain covers the protection of information assets through the implementation of security controls and risk management.––––––––––––––Throughout this course, you will gain practical experience through hands-on exercises and case studies that will help you to understand the concepts better. By the end of this course, you will have the knowledge and skills required to pass the CISA exam and become a successful information systems auditor.Soif you're looking to enhance your career in the field of information systems auditing or simply want to improve your knowledge and skills in this area, then this course is perfect for you. Join us now and take the first step towards becoming a certified information systems auditor.

Overview

Section 1: CISA Domain 5 | Protection of Information Assets

Lecture 1 Domain Overiew and Key Security concepts

Lecture 2 Information Security vs Cybersecurity

Lecture 3 Understand Information System Architecture

Lecture 4 Cyber Threats 101

Lecture 5 Cyber Attacks Methods and Techniques DeepDive (BONUS)

Lecture 6 Security Vulnerabilities and How it can be Exploited

Lecture 7 Auditor's Guide for Ethical Hacking Overview and How Penetration testing work

Lecture 8 Cybersecurity Frameworks

Lecture 9 Personnel Security and Protecting Organization's assets

Lecture 10 Data Classification and Data Life Cycle

Lecture 11 Physical Security and Environmental Protection - Part 1

Lecture 12 Physical Security and Environmental Protection - Part 2

Lecture 13 Malware and how to counter it

Lecture 14 Authentication Authorization and Accounting - AAA

Lecture 15 Authentication

Lecture 16 Strong Authentication and Biometric based Authentication Factors

Lecture 17 Authorization and Accounting and Auditing

Lecture 18 Network Security controls and services Part 1

Lecture 19 Network Security controls and services Part 2

Lecture 20 Cryptography Basics

Lecture 21 Symmetric Encryption Overview

Lecture 22 Asymmetric Encryption Overview

Lecture 23 Public Key Infrastructure and Digital Certificate Overview

Lecture 24 Understand Hashing and Digital Signature

Lecture 25 The Encryption and Cryptography Use Cases

IT Auditors,System Administrators,Accountants who want to gain IT Auditing Skills,Any one want a proper way to go for CISA Exam,Security Associates and Professionals