Information Security Management

CISA 2016    |    Expert
  • 14 videos | 53m 51s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 75 users Rating 4.6 of 75 users (75)
A key component IS auditing professionals evaluate is an organization's IS management activities. Discover key IS management elements, roles, responsibilities and risk factors, and information security control design best practices.

WHAT YOU WILL LEARN

  • Recognize the task and knowledge statements of domain 5
    Identify characteristics and key elements of information security management and information security management systems
    Distinguish between the different information security roles and responsibilities
    Identify characteristics and best practices of classifying information assets
    Identify fraud risk factors in information security management
    Identify characteristics of controls, control standards and frameworks, and control monitoring and effectiveness practices
    Identify characteristics and best practices of system access permission activities
  • Recognize characteristics of mandatory and discretionary access controls
    Identify privacy principles, and the is auditor's role
    Identify the critical success factors of information security management and awareness, training and education best practices
    Identify best practices for information security activities involving external parties
    Identify best practices for human resources activities with third parties
    Identify characteristics of computer crime issues and exposures, and best practices for avoiding negative impacts
    Identify best practices for security incident handling and response activities

IN THIS COURSE

  • 1m 43s
    After completing this video, you will be able to recognize the task and knowledge statements of domain 5. FREE ACCESS
  • 2m 20s
    Find out how to identify characteristics and key elements of information security management and information security management systems. FREE ACCESS
  • Locked
    3.  IS Management Roles and Responsibilities
    3m 40s
    In this video, you will learn how to distinguish between the different information security roles and responsibilities. FREE ACCESS
  • Locked
    4.  Classifying Information Assets
    2m 41s
    Learn how to identify characteristics and best practices for classifying information assets. FREE ACCESS
  • Locked
    5.  Fraud Risk Factors
    2m 48s
    In this video, find out how to identify risk factors for fraud in information security management. FREE ACCESS
  • Locked
    6.  Information Security Control Design
    5m 48s
    During this video, you will learn how to identify characteristics of controls, control standards and frameworks, and control monitoring and effectiveness practices. FREE ACCESS
  • Locked
    7.  System Access Permission
    3m 30s
    In this video, you will identify characteristics and best practices of system access permission activities. FREE ACCESS
  • Locked
    8.  Mandatory and Discretionary Access Controls
    2m 13s
    Upon completion of this video, you will be able to recognize characteristics of mandatory and discretionary access controls. FREE ACCESS
  • Locked
    9.  Privacy Principles and the IS Auditor Role
    3m 27s
    In this video, you will learn how to identify privacy principles and the IS auditor's role. FREE ACCESS
  • Locked
    10.  IS Management Critical Success Factors
    3m 39s
    In this video, you will learn how to identify the critical success factors of information security management, awareness, training, and education best practices. FREE ACCESS
  • Locked
    11.  Information Security and External Parties
    5m 37s
    Learn how to identify best practices for information security activities involving external parties. FREE ACCESS
  • Locked
    12.  HR Security and Third Parties
    3m 12s
    In this video, learn how to identify best practices for human resources activities with outside organizations. FREE ACCESS
  • Locked
    13.  Computer Crime Issues and Exposures
    9m 9s
    Learn how to identify characteristics of computer crime issues and exposures, and best practices for avoiding negative impacts. FREE ACCESS
  • Locked
    14.  Security Incident Handling and Response
    4m 3s
    In this video, learn how to identify best practices for security incident handling and response activities. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 27 users Rating 4.4 of 27 users (27)
Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.2 of 26 users Rating 4.2 of 26 users (26)
Rating 4.6 of 403 users Rating 4.6 of 403 users (403)
Rating 4.4 of 519 users Rating 4.4 of 519 users (519)