Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
CISA 2019
| Expert
- 14 videos | 46m 4s
- Includes Assessment
- Earns a Badge
In this 14-video course, discover how identifying IT asset risks and applying appropriate data privacy standards helps keep sensitive data from unauthorized entities, while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered course include: how the CIA triad (confidentiality, integrity, and availability) enhances IT security; understanding examples of personally identifiable information (PII) and protected health information (PHI); how General Data Protection Regulation (GDPR) assures data privacy; and how to align data protection policies with GDPR. Then learn how Payment Card Industry Data Security Standard (PCI DSS) protects cardholder information; how to identify network devices with insufficient antimalware protection with the free Spiceworks tool; and how Hypertext Transfer Protocol Secure Health Insurance Portability and Accountability Act (HIPAA) protects sensitive medical information. Next, learn how Federal Risk and Authorization Management Program (FedRAMP) standards secure US Government information systems; how to determine the annualized loss expectancy (ALE) value with an online ALE calculator; and how to scan a network by using Network Mapper (Nmap) to determine which devices are present. Finally, map IT solutions to data privacy requirements.
WHAT YOU WILL LEARN
-
define how the CIA triad enhances IT securityrecognize examples of Personally Identifiable Informationrecognize examples of Protected Health Informationdescribe how GDPR assures data privacyalign data protection policies with GDPRdescribe how PCI DSS protects cardholder informationidentify network devices with insufficient antimalware protection using the free Spiceworks tool
-
describe how HIPAA protects sensitive medical informationdescribe how FedRAMP standards are used to secure U.S. government information systemsrecognize the importance of identifying assets that have the most value to a specific organizationdetermine the ALE value using an online ALE calculatorscan a network using Nmap to determine which devices are presentmap IT solutions to data privacy requirements
IN THIS COURSE
-
1m 40s
-
4m 32s
-
3m 10s
-
2m 44s
-
3m 14s
-
3m 6s
-
4m 41s
-
3m 14s
-
2m 19s
-
3m 54s
-
5m 47s
-
2m 55s
-
2m 10s
-
2m 38s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.