Information Systems Asset Protection: Asset Security

This course will provide you with one of the most important responsibilities of an information systems' auditor - the evaluation of whether the assets of the organization are adequately protected.
Course info
Level
Intermediate
Updated
Apr 13, 2020
Duration
56m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 13, 2020
Duration
56m
Description

Adequately protecting the assets of an organization is a must in the role of an information systems' auditor. In this course, Information Systems Asset Protection: Asset Security, you will learn the essential skills required by information systems' auditors to evaluate the protection of the many assets of the organization. First, you will explore a review of asset security frameworks. Next, you will discover how to protect data through privacy and data classification. Finally, you will take a look at the review of encryption algorithms and implementation to ensure that data is protected in storage and transit. When you are finished with this course, you will have a solid knowledge of how to review the protection of assets and security frameworks.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
CCSP®: Cloud Data and Security Lifecycle
Intermediate
2h 9m
May 12, 2020
CCSP®: Cloud Architecture and Concepts
Intermediate
1h 54m
May 9, 2020
More courses by Kevin Henry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hi, everyone. My name is Kevin Henry and information Security auditor, consultant and educator. I look forward to sharing knowledge and experience is with you. Welcome to my course on information systems, asset protection, asset security. This course will provide you with an essential understanding of the process of auditing asset security organizations invest substantial amounts in I T assets and systems, and the role of the auditor is to ensure that those assets are provided the appropriate level of protection. The auditor must know the topics of asset security frameworks, privacy and data classifications and data encryption assessment. By the end of this course, you'll be knowledgeable in the methods of auditing the protection of the assets of the organization. I hope you'll join me on this journey to learn about these core concepts of auditing assets security and how this can help you in your role and career through this course at Pearl site.