How To Perform An Information Security Audit

LeeAndro

Trusted Editor
Trusted Editor
Joined
Jun 11, 2022
Messages
215,110
Reaction score
1
Points
38
dee4721a6dd49a26a848c0a5296b54a5.png

Published 11/2022MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 5.64 GB | Duration: 7h 13m

What you need to know to perform information security audits

What you'll learn
Understand how to properly plan engagements by deteing their objectives, criteria and scope.​


Know how to create working papers to document an audit and learn about different ways to staff an audit.
Learn how to collect engagement information and then analyze and evaluate it. Learn how to supervise engagements.
Learn how to communicate engagement results and the process of acceptance of risks. Learn how to monitor progress on the implementation status of internal audit
Know about which threats to information security should be assessed, including threats to the integrity of data, confidentiality and the availability of data.
Be able to evaluate privacy risks, risks from smart devices, insider threats, illicit software threats and cybersecurity threats amongst others.
Be able to evaluate risks by using the Asset-Threat-Vulnerability triangle.
Know about the different types of information security controls, including IT general controls.
Be able to put in place a solid governance over information security, such as by putting in place IT management and governance controls.
Be able to implement the segregation of IT duties and IT departmentalization, an information security framework and cybersecurity governance and policies.
Be able to apply the Three Lines of Defense Model in cybersecurity.
Learn about controls such as identity access management and authentication, encryption and firewalls, data privacy and protection controls.
Know about application and access controls, technical IT infrastructure controls, external connections controls and 3rd party information security controls.

Requirements
No prior experience or knowledge is required.

Description
We are glad to bring you a course to learn how to perform information security audits.This course is ideal for:IT and information security professionals who wish to learn techniques on how to assess the security of their information and the vulnerability of their information systems; and Auditors or others perfog assessments who wish to learn more about perfog information security audits.The course will give you the knowledge and tools necessary to perform information security audits, starting from how to plan them, how to perform and how to report on the results of the engagement. It will teach you about which threats to assess and which controls should be put in place.It is taught by Adrian Resag, an experienced and CISA certified information security auditor who has decades of experience evaluating information security, IT and ISO 27001 in many organizations.The course covers:perfog Information Security AuditsPlanning EngagementsUnderstand how to properly plan engagements by deteing their objectives, criteria and scope. Know how to create working papers to document an audit and learn about different ways to staff an audit.Perfog EngagementsLearn how to collect engagement information and then analyze and evaluate it. Learn how to supervise engagements.Communicating Progress and ResultsLearn how to communicate engagement results and the process of acceptance of risks. Learn how to monitor progress on the implementation status of internal audit recommendations.Information Security Threats and ControlsThreats to information securityKnow about which threats to information security should be assessed, including threats to the integrity of data, confidentiality and the availability of data.Be able to evaluate privacy risks, risks from smart devices, insider threats, illicit software threats and cybersecurity threats amongst others.Be able to evaluate risks by using the Asset-Threat-Vulnerability triangle.Controls over information securityKnow about the different types of information security controls, including IT general controls.Be able to put in place a solid governance over information security, such as by putting in place IT management and governance controls.Be able to implement the segregation of IT duties and IT departmentalization, an information security framework and cybersecurity governance and policies.Be able to apply the Three Lines of Defense Model in cybersecurity.Learn about controls such as identity access management and authentication, encryption and firewalls, data privacy and protection controls.Know about application and access controls, technical IT infrastructure controls, external connections controls and 3rd party information security controls.

Overview
Section 1: Information Security Threats and Controls

Lecture 1 Information Security

Lecture 2 Data Integrity, Confidentiality and Data Availability

Lecture 3 IT General Controls

Lecture 4 Segregation of IT Duties

Lecture 5 Question on Segregation of IT Duties

Lecture 6 Threats and Controls to Physical Security

Lecture 7 Question on Threats and Controls to Physical Security

Lecture 8 Question on Threats and Controls to Physical Security

Lecture 9 Identity Access Management

Lecture 10 Access and Authorization Controls - Risks

Lecture 11 Identity Access Management - Activities

Lecture 12 Authentication

Lecture 13 IT Departmentalization

Lecture 14 Question on IT Departmentalization 1

Lecture 15 Question on IT Departmentalization 2

Lecture 16 Types of Information Security Controls

Lecture 17 Encryption

Lecture 18 Firewalls

Lecture 19 Data Privacy and Protection

Lecture 20 Data Protection Framework

Lecture 21 Question on Data Protection Framework

Lecture 22 Smart Devices and Their Risks

Lecture 23 Question on Smart Devices and Their Risks

Lecture 24 Question on Data Protection Framework

Lecture 25 Asset-Threat-Vulnerability Triangle

Lecture 26 Cybersecurity Risks

Lecture 27 Cybersecurity Threats

Lecture 28 Question on Cybersecurity Threats 1

Lecture 29 Question on Cybersecurity Threats 2

Lecture 30 Question on Cybersecurity Threats 3

Lecture 31 Question on Cybersecurity Threats 4

Lecture 32 IT Management and Governance Controls Against Cybersecurity Threats

Lecture 33 Application and Access Controls

Lecture 34 Technical IT Infrastructure Controls

Lecture 35 External Connections Controls

Lecture 36 Verifying 3rd Party Information Security

Lecture 37 Illicit Software Use

Lecture 38 Insider Threat

Lecture 39 Question on Insider Threat

Lecture 40 Question on Data Privacy and Protection

Lecture 41 Cybersecurity Governance and Policies

Lecture 42 Information Security Framework

Lecture 43 The Three Lines of Defense Model in Cybersecurity

Lecture 44 Question on Cybersecurity Governance and Policies

Section 2: Perfog Information Security Audits

Lecture 45 Engagement Planning

Lecture 46 Engagement Scope

Lecture 47 Engagement Objectives

Lecture 48 Questions on Engagement Objectives

Lecture 49 Coverage of Significant Risks

Lecture 50 Questions on Coverage of Significant Risks

Lecture 51 Engagement Work Programs

Lecture 52 Questions on Engagement Work Programs

Lecture 53 Workflow of an Engagement

Lecture 54 Audit Techniques for Gathering Information

Lecture 55 Walkthroughs

Lecture 56 Questions on Walkthroughs

Lecture 57 Interview Approaches and Skills

Lecture 58 Process Maps and Benchmarking

Lecture 59 Risk-Control Matrix

Lecture 60 Building a Risk-Control Matrix

Lecture 61 Engagement Supervision

Lecture 62 Performance Appraisals

Lecture 63 Supervision Best Practices

Lecture 64 Reviewing Working Papers

Lecture 65 Questions on Reviewing Working Papers

Lecture 66 Communicating Engagement Results

Lecture 67 Quality of Communications

Lecture 68 Communicating Progress

Lecture 69 Best Practices on Communicating Recommendations

Lecture 70 Communicating Recommendations

Lecture 71 Internal Audit Opinions

Lecture 72 Questions on Internal Audit Opinions

Lecture 73 Acceptance of Risk

Lecture 74 Monitoring Progress

Lecture 75 Questions on Monitoring Progress

Current or future IT and information security professionals who wish to learn techniques on how to assess the security of their information and the vulnerability of their information systems.,Auditors or others perfog assessments who wish to learn more about perfog information security audits.

HomePage:
Code:
https://www.udemy.com/course/how-to-perform-an-information-security-audit/



DOWNLOAD
Code:
https://1dl.net/xxz6g6tbbdd9/FIvFvWTv__How_to_Per.part1.rar.html
https://1dl.net/11yjnmp702vq/FIvFvWTv__How_to_Per.part2.rar.html
https://1dl.net/vt77twwidkq8/FIvFvWTv__How_to_Per.part3.rar.html
https://1dl.net/hm8a6w1xzhpc/FIvFvWTv__How_to_Per.part4.rar.html
https://1dl.net/ab1rswwg6bap/FIvFvWTv__How_to_Per.part5.rar.html
https://1dl.net/bdglmq3ipdur/FIvFvWTv__How_to_Per.part6.rar.html



 

Feel free to post your How To Perform An Information Security Audit Free Download, torrent, subtitles, free download, quality, NFO, Dangerous How To Perform An Information Security Audit Torrent Download, free premium downloads movie, game, mp3 download, crack, serial, keygen.

Top Bottom