Companies Home Search Profile

Cyber Security Audit Champion

Focused View

Omair Arfeen

2:40:22

2 View
  • 1 - Introduction.mp4
    02:25
  • 2 - Important Guidance.mp4
    01:25
  • 3 - How to use the Cybersecurity Audit Program.mp4
    02:41
  • 4 - Complete Audit Program File.html
  • 4 - Cybersecurity-Audit-Program.xlsx
  • 5 - Cybersecurity Governance Audit.mp4
    06:39
  • 6 - Cybersecurity Governance Audit Program.html
  • 6 - Domain-1-Cybersecurity-Governance.xlsx
  • 7 - Cybersecurity Application Security Audit.mp4
    03:00
  • 8 - Cybersecurity Application Security Audit Program.html
  • 8 - Domain-2-Application-Security.xlsx
  • 9 - Cybersecurity Cloud Security Audit.mp4
    06:28
  • 10 - Cybersecurity Cloud Security Audit Program.html
  • 10 - Domain-3-Cloud-Security.xlsx
  • 11 - Cybersecurity Change and Patch Management Audit.mp4
    16:03
  • 12 - Cybersecurity Change and Patch Management Audit Porgram.html
  • 12 - Domain-4-Change-and-Patch-Management.xlsx
  • 13 - Cybersecurity Data Privacy.mp4
    15:45
  • 14 - Cybersecurity Data Privacy Audit Porgram.html
  • 14 - Domain-5-Data-Privacy.xlsx
  • 15 - Cybersecurity Data Protection.mp4
    05:43
  • 16 - Cybersecurity Data Protection Audit Program.html
  • 16 - Domain-6-Data-Protection.xlsx
  • 17 - Cybersecurity Endpoint Security.mp4
    11:28
  • 18 - Cybersecurity Endpoint Security Audit Program.html
  • 18 - Domain-7-Endpoint-Security.xlsx
  • 19 - Cybersecurity Identity and Access Management.mp4
    10:18
  • 20 - Cybersecurity Identity and Access Management Audit Program.html
  • 20 - Domain-8-Identity-and-Access-Management.xlsx
  • 21 - Cybersecurity Incident Handling and Response.mp4
    16:53
  • 22 - Cybersecurity Incident Handling and Response Audit Program.html
  • 22 - Domain-9-Incident-Handling-and-Response.xlsx
  • 23 - Cybersecurity Operations Technology Security Monitoring.mp4
    07:42
  • 24 - Cybersecurity Operations Technology Security Monitoring Audit Program.html
  • 24 - Domain-10-Operations-Technology-Security-Monitoring.xlsx
  • 25 - Cybersecurity Internet of Things IoT.mp4
    12:54
  • 26 - Cybersecurity Internet of Things IoT Audit Program.html
  • 26 - Domain-11-Internet-of-Things-IoT.xlsx
  • 27 - Cybersecurity Network Security.mp4
    15:44
  • 28 - Cybersecurity Network Security Audit Program.html
  • 28 - Domain-12-Network-Security.xlsx
  • 29 - Cybersecurity Recovery and Continuity.mp4
    10:32
  • 30 - Cybersecurity Recovery and Continuity Audit Program.html
  • 30 - Domain-13-Recovery-and-Continuity.xlsx
  • 31 - Cybersecurity Security Monitoring and Operations.mp4
    14:42
  • 32 - Cybersecurity Security Monitoring and Operations Audit Program.html
  • 32 - Domain-14-Security-Monitoring-and-Operations.xlsx
  • Description


    Cybersecurity audit

    What You'll Learn?


    • Identify and comprehend the various security controls implemented within an organization
    • Understand the importance of policies in maintaining a secure environment and ensuring employee awareness and compliance
    • Gain insights into the organization's security architecture and design principles
    • Assess the security of the organization's network infrastructure
    • Evaluate the effectiveness of security awareness programs
    • Assess the security posture of third-party vendors and partners
    • Understand and undertake controls for Cybersecurity Governance, Application Security, Cloud Security, Change and Patch Management, Data Privacy, Data Protection
    • Understand and undertake controls for Endpoint Security, Identity and Access Management, Incident Handling
    • Understand and undertake controls for Operations Technology Security Monitoring, Internet of Things (IoT), Network Security,
    • Understand and undertake controls for Recovery and Continuity, Security Monitoring and Operations

    Who is this for?


  • Internal Auditor
  • IT Auditors
  • External Auditors
  • Information Technology Officers
  • CISO
  • What You Need to Know?


  • Basic Audit Knowledge is desirable
  • No need of technical IT Audit knowledge. You will learn everything in this course for cybersecurity audit
  • More details


    Description

    This comprehensive training course is designed to equip Internal Auditors,  cybersecurity professionals with the knowledge and skills necessary to conduct thorough audits across various domains critical to a robust cybersecurity posture. Participants will delve into key areas such as cybersecurity governance, application security, cloud security, change and patch management, data privacy, data protection, endpoint security, identity and access management, incident handling, operations technology security monitoring, Internet of Things (IoT), network security, recovery and continuity, and security monitoring and operations.

    Key Domains Covered:

    1. Cybersecurity Governance:

      • Explore the principles and practices of establishing effective cybersecurity governance frameworks.

      • Learn to assess and enhance organizational cybersecurity policies and procedures.

    2. Application Security:

      • Analyze and evaluate the security measures in place for applications, focusing on secure coding practices and vulnerability management.

    3. Cloud Security:

      • Understand the unique challenges and solutions associated with securing cloud-based infrastructures and services.

    4. Change and Patch Management:

      • Explore best practices for managing changes and implementing timely patching to mitigate vulnerabilities.

    5. Data Privacy and Protection:

      • Delve into regulations and standards governing data privacy and protection, and assess the organization's compliance.

    6. Endpoint Security:

      • Evaluate the security controls and measures implemented to safeguard endpoints and user devices.

    7. Identity and Access Management:

      • Understand the importance of controlling access to systems and data, and assess the effectiveness of identity and access management practices.

    8. Incident Handling:

      • Develop skills for identifying, responding to, and mitigating the impact of security incidents.

    9. Operations Technology Security Monitoring:

      • Explore security monitoring techniques tailored for operational technology environments.

    10. Internet of Things (IoT):

      • Assess the security implications and risks associated with IoT devices and ecosystems.

    11. Network Security:

      • Evaluate the security architecture and controls implemented to protect the organization's network infrastructure.

    12. Recovery and Continuity:

      • Explore strategies for disaster recovery and business continuity planning to ensure resilience in the face of cyber incidents.

    13. Security Monitoring and Operations:

      • Learn effective techniques for continuous security monitoring and optimizing security operations.

    Methodology:

    • Lectures with explanation

    • Hands-on practical examples

    • Audit Programs

    • Quizzes

    This training course is ideal for cybersecurity professionals, auditors, and IT professionals seeking to enhance their expertise in assessing and improving cybersecurity measures across diverse organizational domains. Upon completion, participants will be equipped with the skills needed to conduct comprehensive cybersecurity audits and contribute to the ongoing security and resilience of their organizations.

    Who this course is for:

    • Internal Auditor
    • IT Auditors
    • External Auditors
    • Information Technology Officers
    • CISO

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Omair Arfeen
    Omair Arfeen
    Instructor's Courses
    Omair Arfeen is an organized, confident, and an efficient professional working as a Internal Audit Supervisor / Junior Manager in the Transportation and Supply Chain Logistic sector who is responsible for all Internal Audits including Operational, Financial Audits, IT, Fraud and Special Assignments since December 2014. Before he was working as Senior Supervisor Auditor in Deloitte’s IT Risk Service, Audit and Assurance in Karachi, Pakistan since November 2010 and have one and half year of experience at BST Services as an Accountant and Assistant Internal Auditor. He has total 13+ years of working experience. He has served as Acting Internal Audit Manager and Corporate Risk Manager.He holds a Master’s in Business Administration (MBA) Degree in Finance with CGPA 3.65. Also, he is a Certified Internal Auditor (CIA), Chartered Accountant (CA) - Finalist, Certified Information Systems Auditor (CISA), Certified Internal Control Auditor (CICA), Associate Forensic Accountant (AFA) and Certified Forensic Expert (CFE), Microsoft IT Security Expert (MS-SCI).Currently he is doing his PhD in Smart Internal Auditing Techniques. Internal Audit is his passion and his aim is to bring simplicity and automation in the internal audit.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 17
    • duration 2:40:22
    • Release Date 2024/04/13