Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware

Expert
  • 16 videos | 1h 5m 4s
  • Includes Assessment
  • Earns a Badge
Rating 4.8 of 53 users Rating 4.8 of 53 users (53)
Explore the variety of methods through which stored data can be secured and made highly available, despite realization of malware threats, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: distinguishing between data and information how they are secured; how to define the relationship between big data and the value of data analytics; and listing methods of securing a storage area network (SAN). Next, learn to enable password authentication for Internet Small Computer Systems Interface (iSCSI) target access; to recognize common security options available with cloud storage; and to ensure that decommissioned storage media do not contain retrievable data artifacts. You will learn how to deploy Structured Query Language (SQL) Database in the Azure cloud; how to implement a database replication strategy; how to protect data with the Windows backup feature; and how to protect data by backing it up to the cloud. Finally, learn how to identify the various forms of social engineering and the related security risks, and how to implement controls that provide data availability.

WHAT YOU WILL LEARN

  • Distinguish between data and information and describe how they are secured
    Define the relationship between big data and the value of data analytics
    List methods of securing a san
    Enable password authentication for iscsi target access
    Recognize common security options available with cloud storage
    Ensure that decommissioned storage media does not contain retrievable data artifacts
    Identify common database hardening techniques
    Deploy microsoft sql database in the azure cloud
  • Implement a database replication strategy
    Identify data availability strategies, including whether security controls are still in place after data recovery
    Protect data using the windows backup feature
    Protect data by backing it up to the cloud
    Distinguish between malware types
    Identify the various forms of social engineering and the related security risks
    Implement controls that provide data availability

IN THIS COURSE

  • 1m 57s
  • 2m 31s
    In this video, you will learn the difference between data and information and how they are secured. FREE ACCESS
  • Locked
    3.  Big Data, Data Analytics, and Reporting
    2m 57s
    During this video, you will learn about the relationship between big data and the value of data analytics. FREE ACCESS
  • Locked
    4.  Storage Area Network Security
    4m 24s
    Upon completion of this video, you will be able to list methods of securing a storage area network. FREE ACCESS
  • Locked
    5.  Secure an iSCSI SAN
    6m 22s
    In this video, you will learn how to enable password authentication for access to an iSCSI target. FREE ACCESS
  • Locked
    6.  Cloud Storage Security
    3m 39s
    Upon completion of this video, you will be able to recognize common security options available with cloud storage. FREE ACCESS
  • Locked
    7.  Storage Media Disposal
    1m 45s
    In this video, learn how to ensure that decommissioned storage media does not contain any retrievable data artifacts. FREE ACCESS
  • Locked
    8.  Database Security
    4m 50s
    During this video, you will learn how to identify common database hardening techniques. FREE ACCESS
  • Locked
    9.  Cloud-Based Microsoft SQL Databases
    4m
    During this video, you will learn how to deploy a Microsoft SQL Database in the Azure cloud. FREE ACCESS
  • Locked
    10.  Database Availability
    2m 43s
    In this video, you will learn how to implement a database replication strategy. FREE ACCESS
  • Locked
    11.  Data Backup and Restore Strategies
    5m 48s
    In this video, you will learn how to identify data availability strategies, including whether security controls are still in place after data recovery. FREE ACCESS
  • Locked
    12.  On-Premises Data Backup
    5m 11s
    In this video, you will learn how to protect data using the Windows Backup feature. FREE ACCESS
  • Locked
    13.  Cloud-Based Data Backup
    4m 21s
    In this video, find out how to protect data by backing it up to the cloud. FREE ACCESS
  • Locked
    14.  Malware Types
    4m 6s
    Find out how to distinguish between different types of malware. FREE ACCESS
  • Locked
    15.  Social Engineering
    6m 44s
    During this video, you will learn how to identify the various forms of social engineering and the related security risks. FREE ACCESS
  • Locked
    16.  Exercise: Storage Security and Malware Prevention
    3m 46s
    During this video, you will learn how to implement controls that provide data availability. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 3.7 of 3 users Rating 3.7 of 3 users (3)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.5 of 84 users Rating 4.5 of 84 users (84)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 20 users Rating 4.7 of 20 users (20)
Rating 4.5 of 990 users Rating 4.5 of 990 users (990)
Rating 4.7 of 53 users Rating 4.7 of 53 users (53)