Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection

Expert
  • 15 videos | 1h 5m 34s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 62 users Rating 4.6 of 62 users (62)
Security technicians must determine which security controls most effectively protect assets at a reasonable cost. Explore IT maturity models, and endpoint, Internet of Things (IoT), and mobile device security in this 15-video course. Key concepts covered here include: how IT maturity models provide assessments as to whether technology effectively meets business needs; how to map security hardware and software to the Open Systems Interconnection model (OSI model); and how to enable requirements for complex passwords and user account intruder detection. Next, learn to configure endpoint antimalware policy settings centrally with System Center Configuration Manager (SCCM); how to determine when data loss prevention (DLP) solutions are needed for data privacy; and why IoT devices are generally considered unsecure. Learn to use the shodan.io site to locate vulnerable IoT devices; use techniques such as network isolation and changing default settings to harden IoT and mobile devices; and manually harden an Android smartphone. Finally, learn how to configure SCCM policies to ensure mobile device security compliance and compare OSI Layer 3 and Layer 7 security solutions. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize how an it maturity model provides an assessment as to whether technology is effectively meeting business needs
    Align business needs with secured technological solutions
    Map security hardware and software to the osi model
    Enable requirements for complex passwords and user account intruder detection
    Configure endpoint antimalware policy settings centrally using sccm
    Determine when dlp solutions should be used for data privacy
    Describe why iot devices are generally considered to be unsecure
  • Browse the shodan.io site to locate vulnerable iot devices
    Use techniques such as network isolation and changing default settings to harden iot devices
    Harden mobile devices
    Manually harden an android smartphone
    Configure microsoft sccm policies to ensure mobile device security compliance
    Identify how users can unwittingly install malicious apps on mobile devices
    Compare osi layer 3 and layer 7 security solutions, provide mitigation recommendations, list common iot devices, and describe how to harden mobile devices

IN THIS COURSE

  • 2m 54s
  • 4m 25s
    Upon completion of this video, you will be able to recognize how an IT maturity model provides an assessment of whether technology is effectively meeting business needs. FREE ACCESS
  • Locked
    3.  Organizational Security Policies
    4m 9s
    In this video, you will learn how to align business needs with secured technological solutions. FREE ACCESS
  • Locked
    4.  Security and the OSI Model
    5m 39s
    During this video, you will learn how to map security hardware and software to the seven-layer OSI model. FREE ACCESS
  • Locked
    5.  Password Security
    6m 47s
    In this video, find out how to enable requirements for complex passwords and user account intruder detection. FREE ACCESS
  • Locked
    6.  Endpoint Security
    3m 53s
    Find out how to configure endpoint antimalware policy settings centrally using System Center Configuration Manager. FREE ACCESS
  • Locked
    7.  Data Loss Prevention
    4m 30s
    Find out how to determine when DLP solutions should be used for data privacy. FREE ACCESS
  • Locked
    8.  IoT Devices
    3m 51s
    After completing this video, you will be able to describe why IoT devices are generally considered to be insecure. FREE ACCESS
  • Locked
    9.  Vulnerable IoT Devices
    2m 7s
    In this video, find out how to browse the Shodan.io site to locate vulnerable IoT devices. FREE ACCESS
  • Locked
    10.  IoT Security
    3m 57s
    In this video, you will use techniques such as network isolation and changing default settings to secure IoT devices. FREE ACCESS
  • Locked
    11.  Mobile Device Access Control
    6m 19s
    In this video, learn how to secure mobile devices. FREE ACCESS
  • Locked
    12.  Mobile Device Hardening
    2m 58s
    In this video, you will learn how to harden an Android smartphone manually. FREE ACCESS
  • Locked
    13.  Mobile Device Policies
    4m 53s
    In this video, learn how to configure Microsoft SCCM policies to ensure compliance with mobile device security. FREE ACCESS
  • Locked
    14.  Malicious Mobile Apps in App Stores
    4m 55s
    In this video, you will identify how users can unwittingly install malicious apps on mobile devices. FREE ACCESS
  • Locked
    15.  Exercise: Implement Security Controls
    4m 17s
    In this video, you will compare OSI Layer 3 and Layer 7 security solutions, provide mitigation recommendations, list common IoT devices, and describe how to harden mobile devices. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 17 users Rating 4.8 of 17 users (17)
Rating 4.7 of 266 users Rating 4.7 of 266 users (266)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 96 users Rating 4.4 of 96 users (96)
Rating 4.7 of 44 users Rating 4.7 of 44 users (44)
Rating 4.6 of 1774 users Rating 4.6 of 1774 users (1774)