YoVDO

Information Systems Asset Protection: Monitoring

Offered By: Pluralsight

Tags

Cybersecurity Courses Database Security Courses IT Risk Management Courses Information Systems Control Courses

Course Description

Overview

Auditors must be able to review and assess the controls put in place to instigate IT risk. This course will help you learn the techniques and methodologies used to gain insight into control effectiveness.

Learning about the techniques and methodologies used to gain insight into control effectiveness is essential for an auditor to instigate IT risk. In this course, Information Systems Asset Protection: Monitoring, you will learn how to develop the skills necessary to observe and analyze information systems' controls. First, you will discover how to measure compliance and audit IT system configurations. Then, you will examine the maturity of the change control process. Finally, you will learn how to assess the security and reliability of databases. When you are finished with this course, you will have essential skills necessary to provide technical audits of Information systems and their implementation.

Syllabus

  • Course Overview 1min
  • System Attacks 40mins
  • Security Testing and Monitoring 23mins
  • Investigating Incidents 25mins

Taught by

Kevin Henry

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network