Information Systems Asset Protection: Asset Security
Offered By: Pluralsight
Course Description
Overview
This course will provide you with one of the most important responsibilities of an information systems' auditor - the evaluation of whether the assets of the organization are adequately protected.
Adequately protecting the assets of an organization is a must in the role of an information systems' auditor. In this course, Information Systems Asset Protection: Asset Security, you will learn the essential skills required by information systems' auditors to evaluate the protection of the many assets of the organization. First, you will explore a review of asset security frameworks. Next, you will discover how to protect data through privacy and data classification. Finally, you will take a look at the review of encryption algorithms and implementation to ensure that data is protected in storage and transit. When you are finished with this course, you will have a solid knowledge of how to review the protection of assets and security frameworks.
Adequately protecting the assets of an organization is a must in the role of an information systems' auditor. In this course, Information Systems Asset Protection: Asset Security, you will learn the essential skills required by information systems' auditors to evaluate the protection of the many assets of the organization. First, you will explore a review of asset security frameworks. Next, you will discover how to protect data through privacy and data classification. Finally, you will take a look at the review of encryption algorithms and implementation to ensure that data is protected in storage and transit. When you are finished with this course, you will have a solid knowledge of how to review the protection of assets and security frameworks.
Syllabus
- Course Overview 1min
- Asset Security Frameworks 22mins
- Privacy and Data Classification 20mins
- Data Encryption Assessment 12mins
Taught by
Kevin Henry
Related Courses
Introduction to Data Analytics for BusinessUniversity of Colorado Boulder via Coursera Digital and the Everyday: from codes to cloud
NPTEL via Swayam Systems and Application Security
(ISC)² via Coursera Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn Teaching Impacts of Technology: Data Collection, Use, and Privacy
University of California, San Diego via Coursera