Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
Expert
- 15 videos | 1h 5m 34s
- Includes Assessment
- Earns a Badge
Security technicians must determine which security controls most effectively protect assets at a reasonable cost. Explore IT maturity models, and endpoint, Internet of Things (IoT), and mobile device security in this 15-video course. Key concepts covered here include: how IT maturity models provide assessments as to whether technology effectively meets business needs; how to map security hardware and software to the Open Systems Interconnection model (OSI model); and how to enable requirements for complex passwords and user account intruder detection. Next, learn to configure endpoint antimalware policy settings centrally with System Center Configuration Manager (SCCM); how to determine when data loss prevention (DLP) solutions are needed for data privacy; and why IoT devices are generally considered unsecure. Learn to use the shodan.io site to locate vulnerable IoT devices; use techniques such as network isolation and changing default settings to harden IoT and mobile devices; and manually harden an Android smartphone. Finally, learn how to configure SCCM policies to ensure mobile device security compliance and compare OSI Layer 3 and Layer 7 security solutions. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize how an IT maturity model provides an assessment as to whether technology is effectively meeting business needsalign business needs with secured technological solutionsmap security hardware and software to the OSI modelenable requirements for complex passwords and user account intruder detectionconfigure endpoint antimalware policy settings centrally using SCCMdetermine when DLP solutions should be used for data privacydescribe why IoT devices are generally considered to be unsecure
-
browse the shodan.io site to locate vulnerable IoT devicesuse techniques such as network isolation and changing default settings to harden IoT devicesharden mobile devicesmanually harden an Android smartphoneconfigure Microsoft SCCM policies to ensure mobile device security complianceidentify how users can unwittingly install malicious apps on mobile devicescompare OSI Layer 3 and Layer 7 security solutions, provide mitigation recommendations, list common IoT devices, and describe how to harden mobile devices
IN THIS COURSE
-
2m 54s
-
4m 25s
-
4m 9s
-
5m 39s
-
6m 47s
-
3m 53s
-
4m 30s
-
3m 51s
-
2m 7s
-
3m 57s
-
6m 19s
-
2m 58s
-
4m 53s
-
4m 55s
-
4m 17s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.