Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk

CISA    |    Expert
  • 14 videos | 46m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 124 users Rating 4.5 of 124 users (124)
In this 14-video course, discover how identifying IT asset risks and applying appropriate data privacy standards helps keep sensitive data from unauthorized entities, while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered course include: how the CIA triad (confidentiality, integrity, and availability) enhances IT security; understanding examples of personally identifiable information (PII) and protected health information (PHI); how General Data Protection Regulation (GDPR) assures data privacy; and how to align data protection policies with GDPR. Then learn how Payment Card Industry Data Security Standard (PCI DSS) protects cardholder information; how to identify network devices with insufficient antimalware protection with the free Spiceworks tool; and how Hypertext Transfer Protocol Secure Health Insurance Portability and Accountability Act (HIPAA) protects sensitive medical information. Next, learn how Federal Risk and Authorization Management Program (FedRAMP) standards secure US Government information systems; how to determine the annualized loss expectancy (ALE) value with an online ALE calculator; and how to scan a network by using Network Mapper (Nmap) to determine which devices are present. Finally, map IT solutions to data privacy requirements.

WHAT YOU WILL LEARN

  • Define how the cia triad enhances it security
    Recognize examples of personally identifiable information
    Recognize examples of protected health information
    Describe how gdpr assures data privacy
    Align data protection policies with gdpr
    Describe how pci dss protects cardholder information
    Identify network devices with insufficient antimalware protection using the free spiceworks tool
  • Describe how hipaa protects sensitive medical information
    Describe how fedramp standards are used to secure u.s. government information systems
    Recognize the importance of identifying assets that have the most value to a specific organization
    Determine the ale value using an online ale calculator
    Scan a network using nmap to determine which devices are present
    Map it solutions to data privacy requirements

IN THIS COURSE

  • 1m 40s
  • 4m 32s
    In this video, you will learn how the CIA triad enhances IT security. FREE ACCESS
  • Locked
    3.  PII
    3m 10s
    Upon completion of this video, you will be able to recognize examples of Personally Identifiable Information. FREE ACCESS
  • Locked
    4.  PHI
    2m 44s
    After completing this video, you will be able to recognize examples of Protected Health Information. FREE ACCESS
  • Locked
    5.  GDPR
    3m 14s
    Upon completion of this video, you will be able to describe how GDPR assures data privacy. FREE ACCESS
  • Locked
    6.  GDPR Compliance
    3m 6s
    In this video, you will learn how to align data protection policies with GDPR. FREE ACCESS
  • Locked
    7.  PCI DSS
    4m 41s
    After completing this video, you will be able to describe how the PCI DSS protects cardholder information. FREE ACCESS
  • Locked
    8.  PCI DSS Compliance
    3m 14s
    In this video, you will learn how to identify network devices with insufficient antimalware protection using the free Spiceworks tool. FREE ACCESS
  • Locked
    9.  HIPAA
    2m 19s
    Upon completion of this video, you will be able to describe how HIPAA protects sensitive medical information. FREE ACCESS
  • Locked
    10.  FedRAMP
    3m 54s
    Upon completion of this video, you will be able to describe how FedRAMP standards are used to secure U.S. government information systems. FREE ACCESS
  • Locked
    11.  Assets and Risks
    5m 47s
    After completing this video, you will be able to recognize the importance of identifying assets that have the most value to a specific organization. FREE ACCESS
  • Locked
    12.  Annualized Loss Expectancy
    2m 55s
    To find out how to determine the ALE value, use an online ALE calculator. FREE ACCESS
  • Locked
    13.  Network Inventory
    2m 10s
    During this video, you will learn how to scan a network using Nmap to determine which devices are present. FREE ACCESS
  • Locked
    14.  Exercise: Mitigate Data Privacy Risks
    2m 38s
    Learn how to map IT solutions to data privacy requirements. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.6 of 30 users Rating 4.6 of 30 users (30)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 185 users Rating 4.6 of 185 users (185)
Rating 4.5 of 439 users Rating 4.5 of 439 users (439)
Rating 4.4 of 196 users Rating 4.4 of 196 users (196)