Information Systems Asset Protection: Monitoring
Auditors must be able to review and assess the controls put in place to instigate IT risk. This course will help you learn the techniques and methodologies used to gain insight into control effectiveness.
Learning about the techniques and methodologies used to gain insight into control effectiveness is essential for an auditor to instigate IT risk. In this course, Information Systems Asset Protection: Monitoring, you will learn how to develop the skills necessary to observe and analyze information systems’ controls. First, you will discover how to measure compliance and audit IT system configurations. Then, you will examine the maturity of the change control process. Finally, you will learn how to assess the security and reliability of databases. When you are finished with this course, you will have essential skills necessary to provide technical audits of Information systems and their implementation.
Author Name: Kevin Henry
Author Description:
Kevin Henry is a well-known and respected educator and lecturer in the fields of information security and audit. Kevin uses his more than 30 years of practical experience as a network technician, computer programmer, and information systems auditor to deliver outstanding presentations that make each topic interesting, relevant, and useful. Often described by students as “The best instructor I have ever had,” Kevin has the ability to provide quality instruction that engages the audience and provi… more
Table of Contents
- Course Overview
1min - System Attacks
40mins - Security Testing and Monitoring
23mins - Investigating Incidents
25mins
There are no reviews yet.