This course will provide you with the knowledge needed to audit the many different components that secure information systems. The IT auditor needs a diverse range of skills and expertise as addressed in this course to evaluate systems' security.
The IT auditor needs a diverse range of skills and expertise as addressed in this course to evaluate systems' security. In this course, Information Systems Asset Protection: Securing System Components, you will learn how to audit the security functionality of the many different components of information systems - ranging from networks and storage to end point devices and applications. This knowledge is essential for the auditor to be able to evaluate and report on the effective and secure operation of information systems. First, you will learn about identity and access management. Then, you will address network security. Finally, you will explore physical and environmental security and examining applications and virtual environments. When you are finished with this course, you will have the knowledge necessary to provide skilled audits of information systems' security.
Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.
Course Overview [Autogenerated] Hi, everyone. My name is Kevin Henry and Information Security auditor, consultant and educator. I look forward to sharing knowledge and experiences with you. Welcome to my course on information systems, asset protection, assets security. This course will provide you with an essential understanding of the process of auditing asset security organizations invest substantial amounts in IT assets and systems, and the role of the auditor is to ensure that those assets are provided appropriate level of protection. These auditor must know the topics of assets, security frameworks, privacy and data classification and data encryption assessment. By the end of this course, you'll be knowledgeable in the methods of auditing the protection of the assets of the organization. I hope you'll join me on this journey to learn about these core concepts of auditing asset security and how this can help you in your role and career through this course at Pluralsight.