Information Systems Asset Protection: Asset Security
Offered By: Pluralsight
Course Description
Overview
This course will provide you with one of the most important responsibilities of an information systems' auditor - the evaluation of whether the assets of the organization are adequately protected.
Adequately protecting the assets of an organization is a must in the role of an information systems' auditor. In this course, Information Systems Asset Protection: Asset Security, you will learn the essential skills required by information systems' auditors to evaluate the protection of the many assets of the organization. First, you will explore a review of asset security frameworks. Next, you will discover how to protect data through privacy and data classification. Finally, you will take a look at the review of encryption algorithms and implementation to ensure that data is protected in storage and transit. When you are finished with this course, you will have a solid knowledge of how to review the protection of assets and security frameworks.
Adequately protecting the assets of an organization is a must in the role of an information systems' auditor. In this course, Information Systems Asset Protection: Asset Security, you will learn the essential skills required by information systems' auditors to evaluate the protection of the many assets of the organization. First, you will explore a review of asset security frameworks. Next, you will discover how to protect data through privacy and data classification. Finally, you will take a look at the review of encryption algorithms and implementation to ensure that data is protected in storage and transit. When you are finished with this course, you will have a solid knowledge of how to review the protection of assets and security frameworks.
Syllabus
- Course Overview 1min
- Asset Security Frameworks 22mins
- Privacy and Data Classification 20mins
- Data Encryption Assessment 12mins
Taught by
Kevin Henry
Related Courses
Information Security and Risk Management in ContextUniversity of Washington via Coursera Designing and Executing Information Security Strategies
University of Washington via Coursera Intro to Information Security
Georgia Institute of Technology via Udacity Information Security and Risk Management: An Overview
University of Washington via Canvas Network Information Security- II
Indian Institute of Technology Madras via Swayam