Information Asset Security

CISA 2016    |    Expert
  • 20 videos | 1h 8m 24s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 26 users Rating 4.2 of 26 users (26)
It is vital that an organization's policies protect all information assets. Explore IS security best practices, including environmental and physical access controls.

WHAT YOU WILL LEARN

  • Identify best practices for auditing information security management frameworks
    Identify best practices for auditing logical access
    Distinguish between different security testing techniques when auditing information security management frameworks
    Identify investigation techniques and best practices when auditing information security management frameworks
    Identify characteristics and best practices for auditing remote access, auditing internet points of presence, and performing network penetration tests
    Identify characteristics and best practices for performing full network assessment reviews, and auditing network change development and authorization, and unauthorized changes activities
    Identify environmental issues and exposures
    Distinguish between different controls for environmental exposures
    Identify best practices for auditing environmental controls
    Identify physical access issues and exposures, and controls for mitigating threats
  • Identify best practices for auditing physical access
    Identify mobile computing information security best practices
    Identify peer-to-peer computing information security best practices
    Identify instant messaging information security best practices
    Identify social media information security best practices
    Identify cloud computing information security best practices
    Identify characteristics and best practices for data leak prevention
    Identify challenges and considerations for data leak prevention techniques and practices
    Identify end-user security risks and controls
    Identify best practices for auditing information security management frameworks and mobile, social, and cloud asset protection

IN THIS COURSE

  • 4m 25s
    In this video, find out how to identify best practices for auditing information security management frameworks. FREE ACCESS
  • 2m 56s
    Find out how to identify best practices for auditing logical access. FREE ACCESS
  • Locked
    3.  Security Testing Techniques
    3m 33s
    In this video, find out how to distinguish between different security testing techniques when auditing information security management frameworks. FREE ACCESS
  • Locked
    4.  Investigation Techniques
    5m 36s
    Learn how to identify investigation techniques and best practices when auditing information security management frameworks. FREE ACCESS
  • Locked
    5.  Auditing Remote Access Part 1
    7m 1s
    Find out how to identify characteristics and best practices for auditing remote access, auditing internet points of presence, and performing network penetration tests. FREE ACCESS
  • Locked
    6.  Auditing Remote Access Part 2
    2m 27s
    In this video, find out how to identify characteristics and best practices for performing full network assessment reviews, auditing network change development and authorization, and unauthorized changes activities. FREE ACCESS
  • Locked
    7.  Environmental Issues and Exposures
    2m 12s
    In this video, you will learn how to identify environmental issues and exposures. FREE ACCESS
  • Locked
    8.  Environmental Exposure Controls
    4m 28s
    In this video, learn how to distinguish between different controls for environmental exposures. FREE ACCESS
  • Locked
    9.  Auditing Environmental Controls
    2m 27s
    In this video, find out how to identify best practices for auditing environmental controls. FREE ACCESS
  • Locked
    10.  Physical Access Exposures and Controls
    4m 11s
    In this video, find out how to identify physical access issues and exposures, and what controls you can put in place to mitigate threats. FREE ACCESS
  • Locked
    11.  Auditing Physical Access
    1m 21s
    Learn how to identify best practices for auditing physical access. FREE ACCESS
  • Locked
    12.  Mobile Computing
    6m 29s
    In this video, you will learn about mobile computing information security best practices. FREE ACCESS
  • Locked
    13.  Peer-to-peer Computing
    2m 31s
    In this video, learn how to identify information security best practices for peer-to-peer computing. FREE ACCESS
  • Locked
    14.  Instant Messaging
    1m 49s
    Learn how to identify best practices for instant messaging security. FREE ACCESS
  • Locked
    15.  Social Media
    3m 21s
    Find out how to identify social media information security best practices. FREE ACCESS
  • Locked
    16.  Cloud Computing
    2m 10s
    In this video, you will learn how to identify best practices for cloud computing information security. FREE ACCESS
  • Locked
    17.  Data Leak Prevention
    3m 22s
    In this video, learn how to identify characteristics and best practices for preventing data leaks. FREE ACCESS
  • Locked
    18.  DLP Risk, Limitations, and Considerations
    3m
    In this video, learn how to identify challenges and considerations for data leak prevention techniques and practices. FREE ACCESS
  • Locked
    19.  End-user Computing Security Risk and Controls
    1m 53s
    In this video, you will learn how to identify end-user security risks and the corresponding controls. FREE ACCESS
  • Locked
    20.  Exercise: Auditing Information Security Practices
    3m 15s
    During this video, you will learn how to identify best practices for auditing information security management frameworks and mobile, social, and cloud asset protection. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.0 of 7 users Rating 4.0 of 7 users (7)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Rating 4.3 of 23 users Rating 4.3 of 23 users (23)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 925 users Rating 4.4 of 925 users (925)
Rating 4.5 of 8 users Rating 4.5 of 8 users (8)
Rating 4.4 of 59 users Rating 4.4 of 59 users (59)