Details for this torrent 

How to Perform an Information Security Audit
Type:
Other > Other
Files:
151
Size:
5.68 GiB (6095506192 Bytes)
Uploaded:
2022-12-30 05:22:59 GMT
By:
tuts756 Trusted
Seeders:
1
Leechers:
2
Comments
0  

Info Hash:
285F47AC66F8DD9011BA5592D44983E455FA9D50




(Problems with magnets links are fixed by upgrading your torrent client!)
Description

We are glad to bring you a course to learn how to perform information security audits.

This course is ideal for:

    IT and information security professionals who wish to learn techniques on how to assess the security of their information and the vulnerability of their information systems; and
    Auditors or others performing assessments who wish to learn more about performing information security audits.

The course will give you the knowledge and tools necessary to perform information security audits, starting from how to plan them, how to perform and how to report on the results of the engagement. It will teach you about which threats to assess and which controls should be put in place.

It is taught by Adrian Resag, an experienced and CISA certified information security auditor who has decades of experience evaluating information security, IT and ISO 27001 in many organizations.

The course covers:

Performing Information Security Audits

Planning Engagements

    Understand how to properly plan engagements by determining their objectives, criteria and scope.
    Know how to create working papers to document an audit and learn about different ways to staff an audit.

Performing Engagements

    Learn how to collect engagement information and then analyze and evaluate it. Learn how to supervise engagements.

Communicating Progress and Results

    Learn how to communicate engagement results and the process of acceptance of risks. Learn how to monitor progress on the implementation status of internal audit recommendations.

Information Security Threats and Controls

Threats to information security

    Know about which threats to information security should be assessed, including threats to the integrity of data, confidentiality and the availability of data.
    Be able to evaluate privacy risks, risks from smart devices, insider threats, illicit software threats and cybersecurity threats amongst others.
    Be able to evaluate risks by using the Asset-Threat-Vulnerability triangle.

Controls over information security

    Know about the different types of information security controls, including IT general controls.
    Be able to put in place a solid governance over information security, such as by putting in place IT management and governance controls.
    Be able to implement the segregation of IT duties and IT departmentalization, an information security framework and cybersecurity governance and policies.
    Be able to apply the Three Lines of Defense Model in cybersecurity.
    Learn about controls such as identity access management and authentication, encryption and firewalls, data privacy and protection controls.
    Know about application and access controls, technical IT infrastructure controls, external connections controls and 3rd party information security controls.

Who this course is for:

    Current or future IT and information security professionals who wish to learn techniques on how to assess the security of their information and the vulnerability of their information systems.
    Auditors or others performing assessments who wish to learn more about performing information security audits.

Requirements

    No prior experience or knowledge is required.

Last Updated 11/2022

[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/27 - Cybersecurity Threats.mp4414.98 MiB
TutsNode.net.txt63 B
[TGx]Downloaded from torrentgalaxy.to .txt585 B
.pad/019.31 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/53 - Workflow of an Engagement.mp4244.58 MiB
.pad/1427.95 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/51 - Engagement Work Programs.mp4230.61 MiB
.pad/2403.76 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/16 - Types of Information Security Controls.mp4189.84 MiB
.pad/3163.44 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/20 - Data Protection Framework.mp4151.15 MiB
.pad/4874.18 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/3 - IT General Controls.mp4144.29 MiB
.pad/5728.67 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/58 - Process Maps and Benchmarking.mp4142.66 MiB
.pad/6343.94 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/74 - Monitoring Progress.mp4141.93 MiB
.pad/770.38 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/59 - RiskControl Matrix.mp4137.53 MiB
.pad/8476.97 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/61 - Engagement Supervision.mp4129.42 MiB
.pad/9591.7 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/67 - Quality of Communications.mp4128.2 MiB
.pad/10819.66 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/37 - Illicit Software Use.mp4126.47 MiB
.pad/11542.54 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/38 - Insider Threat.mp4125.07 MiB
.pad/12957.43 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/57 - Interview Approaches and Skills.mp4121.04 MiB
.pad/13984.2 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/63 - Supervision Best Practices.mp4119.77 MiB
.pad/14232.64 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/69 - Best Practices on Communicating Recommendations.mp4118.3 MiB
.pad/15717.39 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/10 - Access and Authorization Controls Risks.mp4114.35 MiB
.pad/16666.54 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/46 - Engagement Scope.mp4113.52 MiB
.pad/17494.47 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/6 - Threats and Controls to Physical Security.mp4113.04 MiB
.pad/18978.8 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/33 - Application and Access Controls.mp4110.83 MiB
.pad/19170.39 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/32 - IT Management and Governance Controls Against Cybersecurity Threats.mp4110.17 MiB
.pad/20851.74 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/11 - Identity Access Management Activities.mp4102.27 MiB
.pad/21750.25 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/22 - Smart Devices and Their Risks.mp4101.61 MiB
.pad/22398.95 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/19 - Data Privacy and Protection.mp497.54 MiB
.pad/23474.86 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/13 - IT Departmentalization.mp496.63 MiB
.pad/24374.48 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/36 - Verifying 3rd Party Information Security.mp495.29 MiB
.pad/25723.17 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/41 - Cybersecurity Governance and Policies.mp495.02 MiB
.pad/261007.74 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/45 - Engagement Planning.mp494.68 MiB
.pad/27328.39 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/49 - Coverage of Significant Risks.mp492.73 MiB
.pad/28278.85 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/4 - Segregation of IT Duties.mp484.48 MiB
.pad/29533.3 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/66 - Communicating Engagement Results.mp483.79 MiB
.pad/30214.94 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/42 - Information Security Framework.mp481.3 MiB
.pad/31712.49 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/18 - Firewalls.mp476.89 MiB
.pad/32112.42 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/73 - Acceptance of Risk.mp475.59 MiB
.pad/33424.02 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/54 - Audit Techniques for Gathering Information.mp474.77 MiB
.pad/34237.36 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/71 - Internal Audit Opinions.mp474.04 MiB
.pad/35977.95 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/1 - Information Security.mp472.46 MiB
.pad/36556.43 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/55 - Walkthroughs.mp471.69 MiB
.pad/37318.55 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/52 - Questions on Engagement Work Programs.mp470.34 MiB
.pad/38672.48 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/25 - AssetThreatVulnerability Triangle.mp461.58 MiB
.pad/39429.67 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/43 - The Three Lines of Defense Model in Cybersecurity.mp456.91 MiB
.pad/4092.51 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/60 - Building a RiskControl Matrix.mp451.55 MiB
.pad/41462.66 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/35 - External Connections Controls.mp451.23 MiB
.pad/42791.37 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/64 - Reviewing Working Papers.mp445.19 MiB
.pad/43825.02 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/72 - Questions on Internal Audit Opinions.mp442.49 MiB
.pad/44526.44 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/9 - Identity Access Management.mp442.24 MiB
.pad/45774.8 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/2 - Data Integrity Confidentiality and Data Availability.mp439.93 MiB
.pad/4673.79 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/68 - Communicating Progress.mp439.9 MiB
.pad/47101.57 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/47 - Engagement Objectives.mp439.32 MiB
.pad/48695.86 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/50 - Questions on Coverage of Significant Risks.mp439.2 MiB
.pad/49815.41 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/34 - Technical IT Infrastructure Controls.mp439.05 MiB
.pad/50970.34 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/70 - Communicating Recommendations.mp439.01 MiB
.pad/511010.58 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/17 - Encryption.mp438.07 MiB
.pad/52956.69 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/24 - Question on Data Protection Framework.mp434.71 MiB
.pad/53296.14 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/62 - Performance Appraisals.mp430.63 MiB
.pad/54378.05 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/23 - Question on Smart Devices and Their Risks.mp430.18 MiB
.pad/55838.36 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/14 - Question on IT Departmentalization 1.mp428.86 MiB
.pad/56143.77 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/75 - Questions on Monitoring Progress.mp428.52 MiB
.pad/57487.07 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/56 - Questions on Walkthroughs.mp425.56 MiB
.pad/58449.58 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/26 - Cybersecurity Risks.mp422.15 MiB
.pad/59865.39 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/15 - Question on IT Departmentalization 2.mp422.11 MiB
.pad/60909.08 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/5 - Question on Segregation of IT Duties.mp417.26 MiB
.pad/61753.24 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/44 - Question on Cybersecurity Governance and Policies.mp417.22 MiB
.pad/62794.32 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/65 - Questions on Reviewing Working Papers.mp416.43 MiB
.pad/63583.42 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/40 - Question on Data Privacy and Protection.mp414.79 MiB
.pad/64210.29 KiB
[TutsNode.net] - How to Perform an Information Security Audit/2 - Performing Information Security Audits/48 - Questions on Engagement Objectives.mp414.64 MiB
.pad/65367.04 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/8 - Question on Threats and Controls to Physical Security.mp414.19 MiB
.pad/66826.52 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/7 - Question on Threats and Controls to Physical Security.mp412.95 MiB
.pad/6755.74 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/21 - Question on Data Protection Framework.mp412.61 MiB
.pad/68401.17 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/12 - Authentication.mp411.95 MiB
.pad/6948.96 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/29 - Question on Cybersecurity Threats 2.mp47.75 MiB
.pad/70255.67 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/30 - Question on Cybersecurity Threats 3.mp46.35 MiB
.pad/71668.04 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/31 - Question on Cybersecurity Threats 4.mp44.62 MiB
.pad/72387.03 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/39 - Question on Insider Threat.mp43.32 MiB
.pad/73696.54 KiB
[TutsNode.net] - How to Perform an Information Security Audit/1 - Information Security Threats and Controls/28 - Question on Cybersecurity Threats 1.mp43.13 MiB