Information Systems Asset Protection: Securing System Components
Offered By: Pluralsight
Course Description
Overview
This course will provide you with the knowledge needed to audit the many different components that secure information systems. The IT auditor needs a diverse range of skills and expertise as addressed in this course to evaluate systems' security.
The IT auditor needs a diverse range of skills and expertise as addressed in this course to evaluate systems' security. In this course, Information Systems Asset Protection: Securing System Components, you will learn how to audit the security functionality of the many different components of information systems - ranging from networks and storage to end point devices and applications. This knowledge is essential for the auditor to be able to evaluate and report on the effective and secure operation of information systems. First, you will learn about identity and access management. Then, you will address network security. Finally, you will explore physical and environmental security and examining applications and virtual environments. When you are finished with this course, you will have the knowledge necessary to provide skilled audits of information systems' security.
The IT auditor needs a diverse range of skills and expertise as addressed in this course to evaluate systems' security. In this course, Information Systems Asset Protection: Securing System Components, you will learn how to audit the security functionality of the many different components of information systems - ranging from networks and storage to end point devices and applications. This knowledge is essential for the auditor to be able to evaluate and report on the effective and secure operation of information systems. First, you will learn about identity and access management. Then, you will address network security. Finally, you will explore physical and environmental security and examining applications and virtual environments. When you are finished with this course, you will have the knowledge necessary to provide skilled audits of information systems' security.
Syllabus
- Course Overview 1min
- Identity and Access Management 58mins
- Network and End-point Security 49mins
- Physical and Environmental Security 16mins
- Auditing Web and Virtual Environments 54mins
Taught by
Kevin Henry
Related Courses
Essential Google Cloud Infrastructure: Core ServicesGoogle Cloud via Coursera Essential Cloud Infrastructure: Core Services en EspaƱol
Google Cloud via Coursera Managing Security in Google Cloud
Google Cloud via Coursera Deploying SAP on Google Cloud
Google Cloud via Coursera TOTAL: CompTIA CySA+ Cybersecurity Analyst (CS0-003)
Udemy