Information Systems Auditor: Protection of Information Assets

This course addresses the fifth of the five chapters induced in the CISA examination. It instructs the auditor on how to audit information technology assets.
Course info
Level
Intermediate
Updated
Aug 19, 2016
Duration
6h 26m
Table of contents
Description
Course info
Level
Intermediate
Updated
Aug 19, 2016
Duration
6h 26m
Description

Many people assigned to work on an IT audit do not have extensive familiarity with actual IT equipment and processes. This course, Information Systems Auditor: Protection of Information Assets, will help you to understand the functions, risks and security challenges related to auditing the various types of systems in use today. This module addresses cloud computing, encryption, physical security, disaster recovery and many other areas. By the end of this course, you'll be more prepared for the CISA examination than ever and you'll understand how to securely audit IT assets.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
Communications and Network Security
Intermediate
2h 59m
18 Sep 2018
Physical Security
Intermediate
1h 19m
6 Aug 2018
Cryptography Application
Intermediate
2h 22m
3 Aug 2018
More courses by Kevin Henry
Transcript
Transcript

Hi everyone, my name is Kevin Henry a CISA and welcome to my course Information Systems Auditor – Protection of Information Assets This is the fifth of five courses that will prepare you for ISACA’s CISA (Certified Information Systems Auditor) Examination I am a Security Evangelist at Team Cymru. Auditing provides management with key insight into the efficiency and effectiveness of their business processes, and this course looks specifically the protection of the information assets of the organization. For many organizations, information is the most valuable asset the organization posses, and as auditors we must be able to provide management with assurance that the information and information systems of the organization are being adequately protected. Through this course, you will benefit from learning the techniques and skills necessary to conduct audit of IT technologies and ensure that the investment made in IT security is effective. Some of the major topics that we will cover include:1. Encryption 2. Data loss prevention 3. Physical Security 4. Cloud Security By the end of this course you’ll be familiar with the content in The fifth domain of the CISA examination and be knowledgeable in the areas of IT audit necessary to be an effective IT auditor. Before beginning the course you should be familiar with Pluralsight’s first four courses on the CISA: Information Systems Auditor examination – the process of IT Audit, Governance and Management and Systems Acquisition and Development and IT Operations and Maintenance.I hope you’ll join me on this journey to learn about IT audit with the Information Systems Auditor – Protection of IT Assets course, at Pluralsight.