17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
How To Perform An Information Security Audit
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
We are glad to bring you a course to learn how to perform information security audits.
This course is ideal for:
IT and information security professionals who wish to learn techniques on how to assess the security of their information and the vulnerability of their information systems; and
Auditors or others performing assessments who wish to learn more about performing information security audits.
The course will give you the knowledge and tools necessary to perform information security audits, starting from how to plan them, how to perform and how to report on the results of the engagement. It will teach you about which threats to assess and which controls should be put in place.
It is taught by Adrian Resag, an experienced and CISA certified information security auditor who has decades of experience evaluating information security, IT and ISO 27001 in many organizations.
The course covers:
Performing Information Security Audits
Planning Engagements
Understand how to properly plan engagements by determining their objectives, criteria and scope.
Know how to create working papers to document an audit and learn about different ways to staff an audit.
Performing Engagements
Learn how to collect engagement information and then analyze and evaluate it. Learn how to supervise engagements.
Communicating Progress and Results
Learn how to communicate engagement results and the process of acceptance of risks. Learn how to monitor progress on the implementation status of internal audit recommendations.
Information Security Threats and Controls
Threats to information security
Know about which threats to information security should be assessed, including threats to the integrity of data, confidentiality and the availability of data.
Be able to evaluate privacy risks, risks from smart devices, insider threats, illicit software threats and cybersecurity threats amongst others.
Be able to evaluate risks by using the Asset-Threat-Vulnerability triangle.
Controls over information security
Know about the different types of information security controls, including IT general controls.
Be able to put in place a solid governance over information security, such as by putting in place IT management and governance controls.
Be able to implement the segregation of IT duties and IT departmentalization, an information security framework and cybersecurity governance and policies.
Be able to apply the Three Lines of Defense Model in cybersecurity.
Learn about controls such as identity access management and authentication, encryption and firewalls, data privacy and protection controls.
Know about application and access controls, technical IT infrastructure controls, external connections controls and 3rd party information security controls.
Who this course is for:
Current or future IT and information security professionals who wish to learn techniques on how to assess the security of their information and the vulnerability of their information systems.
Auditors or others performing assessments who wish to learn more about performing information security audits.
Requirements
No prior experience or knowledge is required.
Last Updated 11/2022
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
.pad/0
19.3 KB
.pad/1
427.9 KB
.pad/10
819.7 KB
.pad/11
542.5 KB
.pad/12
957.4 KB
.pad/13
984.2 KB
.pad/14
232.6 KB
.pad/15
717.4 KB
.pad/16
666.5 KB
.pad/17
494.5 KB
.pad/18
978.8 KB
.pad/19
170.4 KB
.pad/2
403.8 KB
.pad/20
851.7 KB
.pad/21
750.3 KB
.pad/22
399 KB
.pad/23
474.9 KB
.pad/24
374.5 KB
.pad/25
723.2 KB
.pad/26
1007.7 KB
.pad/27
328.4 KB
.pad/28
278.9 KB
.pad/29
533.3 KB
.pad/3
163.4 KB
.pad/30
214.9 KB
.pad/31
712.5 KB
.pad/32
112.4 KB
.pad/33
424 KB
.pad/34
237.4 KB
.pad/35
977.9 KB
.pad/36
556.4 KB
.pad/37
318.5 KB
.pad/38
672.5 KB
.pad/39
429.7 KB
.pad/4
874.2 KB
.pad/40
92.5 KB
.pad/41
462.7 KB
.pad/42
791.4 KB
.pad/43
825 KB
.pad/44
526.4 KB
.pad/45
774.8 KB
.pad/46
73.8 KB
.pad/47
101.6 KB
.pad/5
728.7 KB
.pad/6
343.9 KB
.pad/7
70.4 KB
.pad/8
477 KB
.pad/9
591.7 KB
TutsNode.net.txt
63 B
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/1 - Information Security.mp4
72.5 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/10 - Access and Authorization Controls Risks.mp4
114.3 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/11 - Identity Access Management Activities.mp4
102.3 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/13 - IT Departmentalization.mp4
96.6 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/16 - Types of Information Security Controls.mp4
189.8 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/18 - Firewalls.mp4
76.9 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/19 - Data Privacy and Protection.mp4
97.5 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/2 - Data Integrity Confidentiality and Data Availability.mp4
39.9 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/20 - Data Protection Framework.mp4
151.1 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/22 - Smart Devices and Their Risks.mp4
101.6 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/25 - AssetThreatVulnerability Triangle.mp4
61.6 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/27 - Cybersecurity Threats.mp4
415 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/3 - IT General Controls.mp4
144.3 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/32 - IT Management and Governance Controls Against Cybersecurity Threats.mp4
110.2 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/33 - Application and Access Controls.mp4
110.8 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/35 - External Connections Controls.mp4
51.2 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/36 - Verifying 3rd Party Information Security.mp4
95.3 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/37 - Illicit Software Use.mp4
126.5 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/38 - Insider Threat.mp4
125.1 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/4 - Segregation of IT Duties.mp4
84.5 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/41 - Cybersecurity Governance and Policies.mp4
95 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/42 - Information Security Framework.mp4
81.3 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/43 - The Three Lines of Defense Model in Cybersecurity.mp4
56.9 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/6 - Threats and Controls to Physical Security.mp4
113 MB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/9 - Identity Access Management.mp4
42.2 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/45 - Engagement Planning.mp4
94.7 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/46 - Engagement Scope.mp4
113.5 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/47 - Engagement Objectives.mp4
39.3 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/49 - Coverage of Significant Risks.mp4
92.7 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/51 - Engagement Work Programs.mp4
230.6 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/52 - Questions on Engagement Work Programs.mp4
70.3 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/53 - Workflow of an Engagement.mp4
244.6 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/54 - Audit Techniques for Gathering Information.mp4
74.8 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/55 - Walkthroughs.mp4
71.7 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/57 - Interview Approaches and Skills.mp4
121 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/58 - Process Maps and Benchmarking.mp4
142.7 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/59 - RiskControl Matrix.mp4
137.5 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/60 - Building a RiskControl Matrix.mp4
51.5 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/61 - Engagement Supervision.mp4
129.4 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/63 - Supervision Best Practices.mp4
119.8 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/64 - Reviewing Working Papers.mp4
45.2 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/66 - Communicating Engagement Results.mp4
83.8 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/67 - Quality of Communications.mp4
128.2 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/68 - Communicating Progress.mp4
39.9 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/69 - Best Practices on Communicating Recommendations.mp4
118.3 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/71 - Internal Audit Opinions.mp4
74 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/72 - Questions on Internal Audit Opinions.mp4
42.5 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/73 - Acceptance of Risk.mp4
75.6 MB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/74 - Monitoring Progress.mp4