Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Become A Certified Information System Auditor | Domain 5

Alexhost
OP
O 0

oaxino

Alpha and Omega
Member
Access
Joined
Nov 24, 2022
Messages
30,703
Reaction score
887
Points
113
Age
35
Location
japanse
grants
₲103,664
2 years of service

85dbdcd7a60cc8e2598f33977c95aa6d.jpeg

Become A Certified Information System Auditor | Domain 5
Published 5/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.26 GB | Duration: 6h 16m

ISACA CISA Boot-camp Training | Domain 5 | Protection of Information Assets + Practice test​

What you'll learn
Understand information security concepts, principles, and practices.
Evaluate the effectiveness of information security risk management processes, including risk assessment, treatment, and monitoring.
Understand the principles of identity and access management (IAM) and evaluate the adequacy of related controls.
Understand the principles of cryptography and evaluate the adequacy of related controls.
Understand the principles of network security and evaluate the adequacy of related controls.
Understand the principles of application security and evaluate the adequacy of related controls.
Understand the principles of physical and environmental security and evaluate the adequacy of related controls.
Requirements
No previous knowledge requirements in the subject is required, everything will be explained in details
As the course discuss technology and topics related to it, however no additional software is needed to practice as the course does not include programming or IT Labs
Description
Welcome to the Certified Information Systems Auditor (CISA) course!In this course, you will learn the essential skills and knowledge required to become a successful information systems auditor. The CISA certification is a globally recognized certification for professionals who audit, control, monitor, and assess information technology and business systems.----------------------------The Certified Information Systems Auditor (CISA) certification's Domain 5 focuses on Protection of Information Assets. The learning objectives of this domain are:Understand information security concepts, principles, and practices.Evaluate the effectiveness of information security governance frameworks, including policies, standards, procedures, and guidelines.Evaluate the effectiveness of information security risk management processes, including risk assessment, treatment, and monitoring.Evaluate the effectiveness of information security program management, including strategy development, planning, and implementation.Understand the principles of access controls and evaluate the adequacy of related controls.Understand the principles of identity and access management (IAM) and evaluate the adequacy of related controls.Understand the principles of cryptography and evaluate the adequacy of related controls.Understand the principles of network security and evaluate the adequacy of related controls.Understand the principles of application security and evaluate the adequacy of related controls.Understand the principles of physical and environmental security and evaluate the adequacy of related controls.Understand the principles of business continuity and disaster recovery planning and evaluate the effectiveness of related controls.Understand the principles of legal, regulatory, and ethical considerations related to information security and evaluate the adequacy of related controls.----------------------------The focus of Domain 5 is the evaluation of controls for protecting information assets. The syllabus covers:Logical security controlsPhysical and environmental security controlsInformation managementEvaluating the effectiveness of the overall security system----------------------------This course is one of 4 courses that cover all what you need to pass CISA Course 1 (Domain 1) Information Systems Auditing Process: This domain covers the fundamental concepts, principles, and processes involved in conducting an audit of information systems.Practice test 250q that covers entire domain 1 Course 2 ( Domains 2,3)Governance and Management of IT: This domain covers the governance and management of information technology and how it aligns with the business objectives and strategy.Information Systems Acquisition, Development, and Implementation: This domain covers the process of acquiring, developing, and implementing information systems, including project management, system development life cycle (SDLC), and change management.Course 3 (Domain 4) Information Systems Operations, Maintenance, and Support: This domain covers the ongoing operations and maintenance of information systems, including incident management, problem management, and service management.Course 4 (Domain 5) ---> (This Course) Protection of Information Assets: This domain covers the protection of information assets through the implementation of security controls and risk management.----------------------------Throughout this course, you will gain practical experience through hands-on exercises and case studies that will help you to understand the concepts better. By the end of this course, you will have the knowledge and skills required to pass the CISA exam and become a successful information systems auditor.Soif you're looking to enhance your career in the field of information systems auditing or simply want to improve your knowledge and skills in this area, then this course is perfect for you. Join us now and take the first step towards becoming a certified information systems auditor.
Overview
Section 1: CISA Domain 5 | Protection of Information Assets
Lecture 1 Domain Overiew and Key Security concepts
Lecture 2 Information Security vs Cybersecurity
Lecture 3 Understand Information System Architecture
Lecture 4 Cyber Threats 101
Lecture 5 Cyber Attacks Methods and Techniques DeepDive (BONUS)
Lecture 6 Security Vulnerabilities and How it can be Exploited
Lecture 7 Auditor's Guide for Ethical Hacking Overview and How Penetration testing work
Lecture 8 Cybersecurity Frameworks
Lecture 9 Personnel Security and Protecting Organization's assets
Lecture 10 Data Classification and Data Life Cycle
Lecture 11 Physical Security and Environmental Protection - Part 1
Lecture 12 Physical Security and Environmental Protection - Part 2
Lecture 13 Malware and how to counter it
Lecture 14 Authentication Authorization and Accounting - AAA
Lecture 15 Authentication
Lecture 16 Strong Authentication and Biometric based Authentication Factors
Lecture 17 Authorization and Accounting and Auditing
Lecture 18 Network Security controls and services Part 1
Lecture 19 Network Security controls and services Part 2
Lecture 20 Cryptography Basics
Lecture 21 Symmetric Encryption Overview
Lecture 22 Asymmetric Encryption Overview
Lecture 23 Public Key Infrastructure and Digital Certificate Overview
Lecture 24 Understand Hashing and Digital Signature
Lecture 25 The Encryption and Cryptography Use Cases
IT Auditors,System Administrators,Accountants who want to gain IT Auditing Skills,Any one want a proper way to go for CISA Exam,Security Associates and Professionals

b7de3837e1e66ba3256c90d6e391545a.jpeg

Download link

rapidgator.net:
You must reply in thread to view hidden text.

uploadgig.com:
You must reply in thread to view hidden text.

nitroflare.com:
You must reply in thread to view hidden text.

1dl.net:
You must reply in thread to view hidden text.
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
651,861
Reaction score
7,993
Points
83
grants
₲58,553
2 years of service
oaxino salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 
Top Bottom