Protection of Information Assets

CISA 2016
  • 8 Videos | 28m 35s
  • Includes Assessment
  • Earns a Badge
Likes 14 Likes 14
A key component IS auditing professionals evaluate is an organization's logical access practices. Explore best practices for identification, authentication, authorization, and confidential information handling activities.

WHAT YOU WILL LEARN

  • identify logical access exposures
    identify best practices for enterprise IT environment familiarization
    identify characteristics of paths of logical access and general points of entry
    identify logical access control software
  • identify best practices for identification and authentication activities
    distinguish between different authorization issues and challenges
    identify best practices for storing, retrieving, transporting, and disposing confidential information
    identify best practices for information security management and logical access

IN THIS COURSE

  • Playable
    1. 
    Logical Access Exposures
    2m 12s
    UP NEXT
  • Playable
    2. 
    IT Environment Familiarization
    3m 8s
  • Locked
    3. 
    Paths of Logical Access
    1m 54s
  • Locked
    4. 
    Logical Access Control Software
    2m 18s
  • Locked
    5. 
    Identification and Authentication
    7m 12s
  • Locked
    6. 
    Authorization Issues
    3m 17s
  • Locked
    7. 
    Handling Confidential Information
    3m 8s
  • Locked
    8. 
    Exercise: Logical Access Best Practices
    1m 57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

COURSE SOLID & GRASP
Likes 3218 Likes 3218  
Likes 22 Likes 22  
Likes 18 Likes 18