Many people assigned to work on an IT audit do not have extensive familiarity with actual IT equipment and processes. This course, Information Systems Auditor: Protection of Information Assets, will help you to understand the functions, risks and security challenges related to auditing the various types of systems in use today. This module addresses cloud computing, encryption, physical security, disaster recovery and many other areas. By the end of this course, you'll be more prepared for the CISA examination than ever and you'll understand how to securely audit IT assets.
Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.
Course Overview Hi everyone. My name is Kevin Henry, a Certified Information Systems Auditor, and welcome to my course, Information Systems Auditor: Protection of Information Assets. This is the fifth of five courses that will prepare you for ISACA's CISA, the Certified Information Systems Auditor examination. I work as a security evangelist and auditor at team Cymru. Auditing provides management with key insight into the efficiency and effectiveness of their business processes, and this course looks specifically at the protection of the information assets of the organization. For many organizations, information is the most valuable asset the organization possesses, and as auditors, we must be able to provide management with assurance that the information and information systems of the organization are being adequately protected. Throughout this course, you'll benefit from learning the techniques and skills necessary to conduct audits of IT technologies and ensure that the investment your organization has made in IT security is effective. Some of the major topics we will cover include encryption, data loss prevention, physical security, and cloud security. By the end of this course, you'll be familiar with the content in the fifth domain of the CISA examination, and be knowledgeable in the areas of IT audit necessary to be an effective IT auditor. Before beginning this course, you should be familiar with Pluralsight's first four courses on the CISA: The Process of IT Audit, Governance and Management, Systems Acquisition and Development, and IT Operations and Maintenance. I hope you'll join me in this journey to learn about IT audit with Information Systems Auditor: Protection of IT Assets course at Pluralsight.