Companies Home Search Profile

IT Audit: Cybersecurity Audit Project

Focused View

Alexander Shafe

2:40:05

19 View
  • 1 - Introduction.mp4
    01:09
  • 2 - Understanding Information Security.mp4
    04:34
  • 3 - Understanding Cybersecurity.mp4
    02:45
  • 4 - Information Security vs Cybersecurity.mp4
    01:53
  • 5 - Information Security Principles.mp4
    03:24
  • 6 - Cybersecurity Organizational Structure.mp4
    03:14
  • 7 - IT Audit Introduction.mp4
    01:45
  • 8 - Types of IT Audit.mp4
    02:19
  • 9 - Internal vs External Auditor.mp4
    01:49
  • 10 - Types of IT Audit II.mp4
    03:19
  • 11 - Introduction to Cybersecurity Audit.mp4
    03:23
  • 12 - Internal Audit Team Roles Responsibilities.mp4
    03:06
  • 13 - Performing Cybersecurity Audit.mp4
    04:18
  • 14 - IT Auditors Cybersecurity Auditors Skillset.mp4
    01:46
  • 15 - Understanding Controls.mp4
    02:55
  • 16 - Types of IT Controls.mp4
    02:09
  • 17 - Cybersecurity Controls.mp4
    02:44
  • 18 - Identifying Control Weakness.mp4
    00:53
  • 19 - Control Design.mp4
    02:38
  • 20 - Control Effectiveness.mp4
    01:28
  • 21 - Control Gap.mp4
    01:16
  • 22 - Cybersecurity Frameworks.mp4
    02:45
  • 23 - NIST Framework.mp4
    01:58
  • 24 - ISO 27001 Framework.mp4
    02:24
  • 25 - CIS Framework.mp4
    01:32
  • 26 - Internal Auditors Frameworks.mp4
    04:19
  • 27 - HIPPA.mp4
    03:48
  • 28 - PCI DSS.mp4
    02:31
  • 29 - Frameworks Standards.mp4
    01:13
  • 30 - Cybersecurity Audit Process.mp4
    02:09
  • 31 - Planning Phase.mp4
    05:13
  • 32 - Fieldwork Phase.mp4
    02:49
  • 33 - Reporting Phase.mp4
    01:19
  • 34 - FollowUp Phase.mp4
    00:59
  • 35 - IT Audit Team.mp4
    01:24
  • 36 - Planning.mp4
    05:36
  • 37 - Fieldwork.mp4
    04:39
  • 38 - Testing Technical Controls.mp4
    00:46
  • 39 - Identity Access Management IAM.mp4
    01:28
  • 40 - Password Configuration Testing.mp4
    04:25
  • 41 - Access Provisioning Testing.mp4
    04:33
  • 42 - Access Deprovisioning Testing.mp4
    02:31
  • 43 - Privileged User Access Testing.mp4
    02:53
  • 44 - Segregation of Duties SOD Testing.mp4
    02:13
  • 45 - Data Integrity Testing.mp4
    03:01
  • 46 - Vulnerability Assessment Testing.mp4
    02:07
  • 47 - Patch Management Testing.mp4
    00:58
  • 48 - Firewalls Intrusion Detection Testing.mp4
    00:58
  • 49 - Endpoint Testing.mp4
    00:58
  • 50 - Network Testing.mp4
    01:15
  • 51 - Business Continuity Plan Testing.mp4
    01:39
  • 52 - Change Management Testing.mp4
    01:59
  • 53 - Incident Management Testing.mp4
    02:36
  • 54 - Operational Controls.mp4
    00:31
  • 55 - Policies Procedures Testing.mp4
    01:39
  • 56 - Risk Assessment Management Testing.mp4
    04:16
  • 57 - Security Awareness Training Testing.mp4
    03:09
  • 58 - Vendor Management Testing.mp4
    01:41
  • 59 - Physical Access Testing.mp4
    00:43
  • 60 - Reporting Phase.mp4
    00:39
  • 61 - Cybersecurity Audit Testing Outcomes.mp4
    01:11
  • 62 - Reporting Test Results.mp4
    02:23
  • 63 - Reporting Control Deficiency.mp4
    02:55
  • 64 - FollowUp Phase.mp4
    01:24
  • 65 - Course-Coupons.docx
  • 65 - Next Steps.mp4
    04:22
  • 66 - IT Audit Certifications.mp4
    02:54
  • 67 - Conclusion.mp4
    00:33
  • Description


    Perform Cybersecurity Audit | Information Security Audit | IT Audit

    What You'll Learn?


    • How to conduct a Cybersecurity Audit
    • IT Audit process - Planning, Fieldwork, Reporting & Follow-Up
    • Cybersecurity & Information Security
    • Testing Operational and Technical Cybersecurity Controls
    • Cybersecurity Frameworks & Standards
    • IT Audit Certifications

    Who is this for?


  • Students, Professionals, Starting or Changing career into IT
  • Students & professionals learning about Cybersecurity & IT Audit
  • IT Auditors, IT Control Testers, IT Security Analyst, IT Compliance Analyst
  • Risk Analyst, Cyber Security Analyst, Information Security Analyst, IT professionals
  • What You Need to Know?


  • Laptop, Desktop required to view and participate in lessons
  • Enthusiastic about learning about Cybersecurity Audit and IT Audit process
  • No prior Audit Experience required
  • Knowledge of IT Audit beneficial but not required
  • This course does not require any prior knowledge or specific academic background
  • More details


    Description

    The Cybersecurity Audit fundamental course is designed to equip students and professionals with the knowledge and skills needed to assess, audit, and ensure compliance with cybersecurity standards, regulations, and best practices. In today's evolving threat landscape, organizations need experts who can critically examine and validate their security measures to protect against data breaches and cyberattacks.

    What you will learn:

    Upon completion of this course, students will be able to:

    • Conduct comprehensive cybersecurity audits to assess an organization's security posture.

    • Test the design and operating effectiveness of cybersecurity controls

    • Ensure compliance with relevant regulations and industry standards.

    • Identify security vulnerabilities, risks, and weaknesses within an organization's IT infrastructure.

    • Develop effective audit reports and recommendations for improving cybersecurity.

    • Prepare for certifications such as Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM).

    Who is this course for:

    • Students, IT Professionals, Starting or Changing career into IT

    • Students & professionals learning about Cybersecurity & IT Audit

    • IT Auditors

    • IT Control Testers

    • IT Security Analyst

    • IT Compliance Analyst

    • Cyber Security Analyst

    • Information Security Analyst

    • Risk Analyst

    • IT professionals

    Course Requirements

    This course does not require any prior knowledge or specific academic background. However below are things needed for the best outcome from this course.

    • Laptop, Desktop required to view and participate in lessons

    • Enthusiastic about learning about Cybersecurity Audit and IT Audit process

    • Knowledge of IT Audit beneficial but not required

    • No prior Audit Experience required

    • Other materials necessary for learning will be provided


    Who this course is for:

    • Students, Professionals, Starting or Changing career into IT
    • Students & professionals learning about Cybersecurity & IT Audit
    • IT Auditors, IT Control Testers, IT Security Analyst, IT Compliance Analyst
    • Risk Analyst, Cyber Security Analyst, Information Security Analyst, IT professionals

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Alexander Shafe
    Alexander Shafe
    Instructor's Courses
    Hello there,My name is Alex and I'm glad to be here with you. I have experience as an IT Security Consultant, Data Consultant, Data Analyst and Database Administrator.My goal is to make your learning efficient, smooth and equip you with the skillset you need to start or transition into any data related field.My courses are hands-on and thoughtfully designed to cut through the chase; teaching you what you need to know from beginner to advanced level. I am confident that by the end of the course you will feel confident in your skillset and ready to explore the many possibilities out there. Happy learning.Alex
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 67
    • duration 2:40:05
    • Release Date 2023/12/16