Information Systems Asset Protection: Monitoring

Auditors must be able to review and assess the controls put in place to instigate IT risk. This course will help you learn the techniques and methodologies used to gain insight into control effectiveness.
Course info
Level
Intermediate
Updated
May 1, 2020
Duration
1h 30m
Table of contents
Description
Course info
Level
Intermediate
Updated
May 1, 2020
Duration
1h 30m
Description

Learning about the techniques and methodologies used to gain insight into control effectiveness is essential for an auditor to instigate IT risk. In this course, Information Systems Asset Protection: Monitoring, you will learn how to develop the skills necessary to observe and analyze information systems' controls. First, you will discover how to measure compliance and audit IT system configurations. Then, you will examine the maturity of the change control process. Finally, you will learn how to assess the security and reliability of databases. When you are finished with this course, you will have essential skills necessary to provide technical audits of Information systems and their implementation.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
CCSP®: Cloud Data and Security Lifecycle
Intermediate
2h 9m
May 12, 2020
CCSP®: Cloud Architecture and Concepts
Intermediate
1h 54m
May 9, 2020
More courses by Kevin Henry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name is Kevin Henry, an information security auditor, consultant, and educator. I look forward to sharing knowledge and experiences with you. Welcome to my course on Information Systems Asset Protection: Monitoring. This course will provide you with an essential understanding of the process of auditing and evaluating the monitoring of information systems security controls. Information Systems Auditor is required to evaluate the effectiveness of various controls used to secure information systems. This course addresses the auditing of the monitoring processes used by the organization, including the topics of system attacks, security testing and monitoring, and investigating incidents. By the end of this course, you'll be knowledgeable with the skill of evaluating systems controls and monitoring. I hope you'll join me on this journey to learn about these core concepts of auditing and monitoring security controls and how this course can help you in your role and career through this course at Pluralsight.