Information Systems Asset Protection: Securing System Components

This course will provide you with the knowledge needed to audit the many different components that secure information systems. The IT auditor needs a diverse range of skills and expertise as addressed in this course to evaluate systems' security.
Course info
Level
Intermediate
Updated
Apr 25, 2020
Duration
2h 59m
Table of contents
Description
Course info
Level
Intermediate
Updated
Apr 25, 2020
Duration
2h 59m
Description

The IT auditor needs a diverse range of skills and expertise as addressed in this course to evaluate systems' security. In this course, Information Systems Asset Protection: Securing System Components, you will learn how to audit the security functionality of the many different components of information systems - ranging from networks and storage to end point devices and applications. This knowledge is essential for the auditor to be able to evaluate and report on the effective and secure operation of information systems. First, you will learn about identity and access management. Then, you will address network security. Finally, you will explore physical and environmental security and examining applications and virtual environments. When you are finished with this course, you will have the knowledge necessary to provide skilled audits of information systems' security.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
CCSP®: Cloud Data and Security Lifecycle
Intermediate
2h 9m
May 12, 2020
CCSP®: Cloud Architecture and Concepts
Intermediate
1h 54m
May 9, 2020
More courses by Kevin Henry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hi, everyone. My name is Kevin Henry and Information Security auditor, consultant and educator. I look forward to sharing knowledge and experiences with you. Welcome to my course on information systems, asset protection, assets security. This course will provide you with an essential understanding of the process of auditing assets. Security organizations invest substantial amounts in I T assets and systems, and the role of the auditor is to ensure that those assets were provided the appropriate level of protection. The auditor must know the topics of assets, security frameworks, privacy and data classification and data encryption assessment. By the end of this course, you'll be knowledgeable in the methods of auditing the protection of the assets of the organization. I hope you'll join me on this journey to learn about these core concepts of auditing assets security and how this can help you in your role and career through this course at rural site