Protection of Information Assets

CISA 2016    |    Expert
  • 8 Videos | 25m 5s
  • Includes Assessment
  • Earns a Badge
Likes 17 Likes 17
A key component IS auditing professionals evaluate is an organization's logical access practices. Explore best practices for identification, authentication, authorization, and confidential information handling activities.

WHAT YOU WILL LEARN

  • identify logical access exposures
    identify best practices for enterprise IT environment familiarization
    identify characteristics of paths of logical access and general points of entry
    identify logical access control software
  • identify best practices for identification and authentication activities
    distinguish between different authorization issues and challenges
    identify best practices for storing, retrieving, transporting, and disposing confidential information
    identify best practices for information security management and logical access

IN THIS COURSE

  • Playable
    1. 
    Logical Access Exposures
    2m 12s
    UP NEXT
  • Playable
    2. 
    IT Environment Familiarization
    3m 8s
  • Locked
    3. 
    Paths of Logical Access
    1m 54s
  • Locked
    4. 
    Logical Access Control Software
    2m 18s
  • Locked
    5. 
    Identification and Authentication
    7m 12s
  • Locked
    6. 
    Authorization Issues
    3m 17s
  • Locked
    7. 
    Handling Confidential Information
    3m 8s
  • Locked
    8. 
    Exercise: Logical Access Best Practices
    1m 57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

COURSE IS Controls
Likes 18 Likes 18  
Likes 20 Likes 20