Protection of Information Assets

CISA 2016    |    Expert
  • 8 videos | 25m 5s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 59 users Rating 4.4 of 59 users (59)
A key component IS auditing professionals evaluate is an organization's logical access practices. Explore best practices for identification, authentication, authorization, and confidential information handling activities.

WHAT YOU WILL LEARN

  • Identify logical access exposures
    Identify best practices for enterprise it environment familiarization
    Identify characteristics of paths of logical access and general points of entry
    Identify logical access control software
  • Identify best practices for identification and authentication activities
    Distinguish between different authorization issues and challenges
    Identify best practices for storing, retrieving, transporting, and disposing confidential information
    Identify best practices for information security management and logical access

IN THIS COURSE

  • 2m 12s
    In this video, you will learn how to identify logical access exposures. FREE ACCESS
  • 3m 8s
    In this video, find out how to identify best practices for familiarizing yourself with an enterprise IT environment. FREE ACCESS
  • Locked
    3.  Paths of Logical Access
    1m 54s
    In this video, you will identify characteristics of paths of logical access and general points of entry. FREE ACCESS
  • Locked
    4.  Logical Access Control Software
    2m 18s
    In this video, you will learn how to identify logical access control software. FREE ACCESS
  • Locked
    5.  Identification and Authentication
    7m 12s
    Find out how to identify best practices for identification and authentication activities. FREE ACCESS
  • Locked
    6.  Authorization Issues
    3m 17s
    In this video, find out how to distinguish between different authorization issues and challenges. FREE ACCESS
  • Locked
    7.  Handling Confidential Information
    3m 8s
    During this video, you will learn how to identify best practices for storing, retrieving, transporting, and disposing of confidential information. FREE ACCESS
  • Locked
    8.  Exercise: Logical Access Best Practices
    1m 57s
    In this video, learn how to identify best practices for information security management and logical access control. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 519 users Rating 4.4 of 519 users (519)
Rating 4.3 of 59 users Rating 4.3 of 59 users (59)
Rating 4.6 of 16 users Rating 4.6 of 16 users (16)