Information Security Management

CISA 2016    |    Expert
  • 14 Videos | 53m 51s
  • Includes Assessment
  • Earns a Badge
Likes 38 Likes 38
A key component IS auditing professionals evaluate is an organization's IS management activities. Discover key IS management elements, roles, responsibilities and risk factors, and information security control design best practices.

WHAT YOU WILL LEARN

  • recognize the task and knowledge statements of domain 5
    identify characteristics and key elements of information security management and information security management systems
    distinguish between the different information security roles and responsibilities
    identify characteristics and best practices of classifying information assets
    identify fraud risk factors in information security management
    identify characteristics of controls, control standards and frameworks, and control monitoring and effectiveness practices
    identify characteristics and best practices of system access permission activities
  • recognize characteristics of mandatory and discretionary access controls
    identify privacy principles, and the IS auditor's role
    identify the critical success factors of information security management and awareness, training and education best practices
    identify best practices for information security activities involving external parties
    identify best practices for human resources activities with third parties
    identify characteristics of computer crime issues and exposures, and best practices for avoiding negative impacts
    identify best practices for security incident handling and response activities

IN THIS COURSE

  • Playable
    1. 
    Domain 5 Overview
    1m 43s
    UP NEXT
  • Playable
    2. 
    IS Management Key Elements
    2m 20s
  • Locked
    3. 
    IS Management Roles and Responsibilities
    3m 40s
  • Locked
    4. 
    Classifying Information Assets
    2m 41s
  • Locked
    5. 
    Fraud Risk Factors
    2m 48s
  • Locked
    6. 
    Information Security Control Design
    5m 48s
  • Locked
    7. 
    System Access Permission
    3m 30s
  • Locked
    8. 
    Mandatory and Discretionary Access Controls
    2m 13s
  • Locked
    9. 
    Privacy Principles and the IS Auditor Role
    3m 27s
  • Locked
    10. 
    IS Management Critical Success Factors
    3m 39s
  • Locked
    11. 
    Information Security and External Parties
    5m 37s
  • Locked
    12. 
    HR Security and Third Parties
    3m 12s
  • Locked
    13. 
    Computer Crime Issues and Exposures
    9m 9s
  • Locked
    14. 
    Security Incident Handling and Response
    4m 3s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 60 Likes 60  
Likes 2025 Likes 2025  
Likes 287 Likes 287