Companies Home Search Profile

Protection of Information Assets: Information Asset Security and Control

Focused View

Kevin Henry

3:27:00

0 View
  • 1 -Course Overview.mp4
    01:37
  • 2 -Protection of Information Assets Information Asset Security and Control.mp4
    02:18
  • 3 -Security and Privacy Principles.mp4
    08:04
  • 4 -Auditing Information Protection and Security.mp4
    06:04
  • 5 -Privacy and Data Classification.mp4
    08:20
  • 6 -Data Encryption Assessment.mp4
    10:19
  • 7 -Asymmetric Algorithms.mp4
    07:09
  • 8 -Message Integrity.mp4
    08:47
  • 9 -PKI.mp4
    07:43
  • 10 -Auditing Security Implementations.mp4
    09:15
  • 11 -Identity and Access Management.mp4
    11:07
  • 12 -Authentication.mp4
    12:22
  • 13 -Authorization.mp4
    05:19
  • 14 -Access Control Theory and Implementations.mp4
    07:51
  • 15 -Single Sign-on.mp4
    11:30
  • 16 -Securing Information Technologies.mp4
    10:41
  • 17 -Network Communications.mp4
    11:24
  • 18 -Creating Networks.mp4
    07:46
  • 19 -Network Security and Administration.mp4
    07:42
  • 20 -Firewalls.mp4
    06:15
  • 21 -Auditing Web and Virtual Environments.mp4
    10:25
  • 22 -Virtualization and the Cloud.mp4
    14:10
  • 23 -Auditing Wireless Security.mp4
    09:05
  • 24 -Telephony.mp4
    08:36
  • 25 -Domain Summary.mp4
    03:11
  • Description


    The auditor must be knowledgeable in information security concepts and implementation. This course will teach you to audit a cybersecurity program needed for the Certified Information Systems Auditor examination.

    What You'll Learn?


      All IT systems need to be secured and the auditor must know how to assess the deployment of security in all types of systems and technologies. In this course, Protection of Information Assets: Information Asset Security and Control, you’ll learn to assess the effectiveness and adequacy of the security program. First, you’ll explore IT security frameworks and principles. Next, you’ll discover how to audit the security of various information technologies. Finally, you’ll learn how to audit security and data protection. When you’re finished with this course, you’ll have the skills and knowledge of protection of information assets needed for the Certified Information Systems Auditor examination.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Kevin Henry is a well-known and respected educator and lecturer in the fields of information security and audit. Kevin uses his more than 30 years of practical experience as a network technician, computer programmer, and information systems auditor to deliver outstanding presentations that make each topic interesting, relevant, and useful. Often described by students as "The best instructor I have ever had," Kevin has the ability to provide quality instruction that engages the audience and provides guidance on how to implement a successful program when they return to their workplace.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 25
    • duration 3:27:00
    • level preliminary
    • Release Date 2025/01/16

    Courses related to Information Security