Protection of Information Assets
CISA 2016
| Expert
- 8 Videos | 25m 5s
- Includes Assessment
- Earns a Badge
A key component IS auditing professionals evaluate is an organization's logical access practices. Explore best practices for identification, authentication, authorization, and confidential information handling activities.
WHAT YOU WILL LEARN
-
identify logical access exposuresidentify best practices for enterprise IT environment familiarizationidentify characteristics of paths of logical access and general points of entryidentify logical access control software
-
identify best practices for identification and authentication activitiesdistinguish between different authorization issues and challengesidentify best practices for storing, retrieving, transporting, and disposing confidential informationidentify best practices for information security management and logical access
IN THIS COURSE
-
1.Logical Access Exposures2m 12sUP NEXT
-
2.IT Environment Familiarization3m 8s
-
3.Paths of Logical Access1m 54s
-
4.Logical Access Control Software2m 18s
-
5.Identification and Authentication7m 12s
-
6.Authorization Issues3m 17s
-
7.Handling Confidential Information3m 8s
-
8.Exercise: Logical Access Best Practices1m 57s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.