Information Security Management

CISA 2016
  • 14 Videos | 1h 51s
  • Includes Assessment
  • Earns a Badge
Likes 24 Likes 24
A key component IS auditing professionals evaluate is an organization's IS management activities. Discover key IS management elements, roles, responsibilities and risk factors, and information security control design best practices.

WHAT YOU WILL LEARN

  • recognize the task and knowledge statements of domain 5
    identify characteristics and key elements of information security management and information security management systems
    distinguish between the different information security roles and responsibilities
    identify characteristics and best practices of classifying information assets
    identify fraud risk factors in information security management
    identify characteristics of controls, control standards and frameworks, and control monitoring and effectiveness practices
    identify characteristics and best practices of system access permission activities
  • recognize characteristics of mandatory and discretionary access controls
    identify privacy principles, and the IS auditor's role
    identify the critical success factors of information security management and awareness, training and education best practices
    identify best practices for information security activities involving external parties
    identify best practices for human resources activities with third parties
    identify characteristics of computer crime issues and exposures, and best practices for avoiding negative impacts
    identify best practices for security incident handling and response activities

IN THIS COURSE

  • Playable
    1. 
    Domain 5 Overview
    1m 43s
    UP NEXT
  • Playable
    2. 
    IS Management Key Elements
    2m 20s
  • Locked
    3. 
    IS Management Roles and Responsibilities
    3m 40s
  • Locked
    4. 
    Classifying Information Assets
    2m 41s
  • Locked
    5. 
    Fraud Risk Factors
    2m 48s
  • Locked
    6. 
    Information Security Control Design
    5m 48s
  • Locked
    7. 
    System Access Permission
    3m 30s
  • Locked
    8. 
    Mandatory and Discretionary Access Controls
    2m 13s
  • Locked
    9. 
    Privacy Principles and the IS Auditor Role
    3m 27s
  • Locked
    10. 
    IS Management Critical Success Factors
    3m 39s
  • Locked
    11. 
    Information Security and External Parties
    5m 37s
  • Locked
    12. 
    HR Security and Third Parties
    3m 12s
  • Locked
    13. 
    Computer Crime Issues and Exposures
    9m 9s
  • Locked
    14. 
    Security Incident Handling and Response
    4m 3s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 0 Likes 0  
Likes 0 Likes 0  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 463 Likes 463  
COURSE IS Auditing
Likes 37 Likes 37