Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection

  • 15 Videos | 1h 12m 4s
  • Includes Assessment
  • Earns a Badge
Likes 23 Likes 23
Security technicians must determine which security controls most effectively protect assets at a reasonable cost. Explore IT maturity models, and endpoint, Internet of Things (IoT), and mobile device security in this 15-video course. Key concepts covered here include: how IT maturity models provide assessments as to whether technology effectively meets business needs; how to map security hardware and software to the Open Systems Interconnection model (OSI model); and how to enable requirements for complex passwords and user account intruder detection. Next, learn to configure endpoint antimalware policy settings centrally with System Center Configuration Manager (SCCM); how to determine when data loss prevention (DLP) solutions are needed for data privacy; and why IoT devices are generally considered unsecure. Learn to use the shodan.io site to locate vulnerable IoT devices; use techniques such as network isolation and changing default settings to harden IoT and mobile devices; and manually harden an Android smartphone. Finally, learn how to configure SCCM policies to ensure mobile device security compliance and compare OSI Layer 3 and Layer 7 security solutions. This course helps learners prepare for the ISACA Certified Information Systems Auditor  (CISA) certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize how an IT maturity model provides an assessment as to whether technology is effectively meeting business needs
    align business needs with secured technological solutions
    map security hardware and software to the OSI model
    enable requirements for complex passwords and user account intruder detection
    configure endpoint antimalware policy settings centrally using SCCM
    determine when DLP solutions should be used for data privacy
    describe why IoT devices are generally considered to be unsecure
  • browse the shodan.io site to locate vulnerable IoT devices
    use techniques such as network isolation and changing default settings to harden IoT devices
    harden mobile devices
    manually harden an Android smartphone
    configure Microsoft SCCM policies to ensure mobile device security compliance
    identify how users can unwittingly install malicious apps on mobile devices
    compare OSI Layer 3 and Layer 7 security solutions, provide mitigation recommendations, list common IoT devices, and describe how to harden mobile devices

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.