Information Asset Security

CISA 2016    |    Expert
  • 20 Videos | 1h 17m 54s
  • Includes Assessment
  • Earns a Badge
Likes 20 Likes 20
It is vital that an organization's policies protect all information assets. Explore IS security best practices, including environmental and physical access controls.

WHAT YOU WILL LEARN

  • identify best practices for auditing information security management frameworks
    identify best practices for auditing logical access
    distinguish between different security testing techniques when auditing information security management frameworks
    identify investigation techniques and best practices when auditing information security management frameworks
    identify characteristics and best practices for auditing remote access, auditing internet points of presence, and performing network penetration tests
    identify characteristics and best practices for performing full network assessment reviews, and auditing network change development and authorization, and unauthorized changes activities
    identify environmental issues and exposures
    distinguish between different controls for environmental exposures
    identify best practices for auditing environmental controls
    identify physical access issues and exposures, and controls for mitigating threats
  • identify best practices for auditing physical access
    identify mobile computing information security best practices
    identify peer-to-peer computing information security best practices
    identify instant messaging information security best practices
    identify social media information security best practices
    identify cloud computing information security best practices
    identify characteristics and best practices for data leak prevention
    identify challenges and considerations for data leak prevention techniques and practices
    identify end-user security risks and controls
    identify best practices for auditing information security management frameworks and mobile, social, and cloud asset protection

IN THIS COURSE

  • Playable
    1. 
    Auditing IS Management Frameworks Best Practices
    4m 25s
    UP NEXT
  • Playable
    2. 
    Auditing Logical Access
    2m 56s
  • Locked
    3. 
    Security Testing Techniques
    3m 33s
  • Locked
    4. 
    Investigation Techniques
    5m 36s
  • Locked
    5. 
    Auditing Remote Access Part 1
    7m 1s
  • Locked
    6. 
    Auditing Remote Access Part 2
    2m 27s
  • Locked
    7. 
    Environmental Issues and Exposures
    2m 12s
  • Locked
    8. 
    Environmental Exposure Controls
    4m 28s
  • Locked
    9. 
    Auditing Environmental Controls
    2m 27s
  • Locked
    10. 
    Physical Access Exposures and Controls
    4m 11s
  • Locked
    11. 
    Auditing Physical Access
    1m 21s
  • Locked
    12. 
    Mobile Computing
    6m 29s
  • Locked
    13. 
    Peer-to-peer Computing
    2m 31s
  • Locked
    14. 
    Instant Messaging
    1m 49s
  • Locked
    15. 
    Social Media
    3m 21s
  • Locked
    16. 
    Cloud Computing
    2m 10s
  • Locked
    17. 
    Data Leak Prevention
    3m 22s
  • Locked
    18. 
    DLP Risk, Limitations, and Considerations
    3m
  • Locked
    19. 
    End-user Computing Security Risk and Controls
    1m 53s
  • Locked
    20. 
    Exercise: Auditing Information Security Practices
    3m 15s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 16 Likes 16  
Likes 17 Likes 17