Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
Expert
- 15 videos | 1h 5m 34s
- Includes Assessment
- Earns a Badge
Security technicians must determine which security controls most effectively protect assets at a reasonable cost. Explore IT maturity models, and endpoint, Internet of Things (IoT), and mobile device security in this 15-video course. Key concepts covered here include: how IT maturity models provide assessments as to whether technology effectively meets business needs; how to map security hardware and software to the Open Systems Interconnection model (OSI model); and how to enable requirements for complex passwords and user account intruder detection. Next, learn to configure endpoint antimalware policy settings centrally with System Center Configuration Manager (SCCM); how to determine when data loss prevention (DLP) solutions are needed for data privacy; and why IoT devices are generally considered unsecure. Learn to use the shodan.io site to locate vulnerable IoT devices; use techniques such as network isolation and changing default settings to harden IoT and mobile devices; and manually harden an Android smartphone. Finally, learn how to configure SCCM policies to ensure mobile device security compliance and compare OSI Layer 3 and Layer 7 security solutions. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize how an it maturity model provides an assessment as to whether technology is effectively meeting business needsAlign business needs with secured technological solutionsMap security hardware and software to the osi modelEnable requirements for complex passwords and user account intruder detectionConfigure endpoint antimalware policy settings centrally using sccmDetermine when dlp solutions should be used for data privacyDescribe why iot devices are generally considered to be unsecure
-
Browse the shodan.io site to locate vulnerable iot devicesUse techniques such as network isolation and changing default settings to harden iot devicesHarden mobile devicesManually harden an android smartphoneConfigure microsoft sccm policies to ensure mobile device security complianceIdentify how users can unwittingly install malicious apps on mobile devicesCompare osi layer 3 and layer 7 security solutions, provide mitigation recommendations, list common iot devices, and describe how to harden mobile devices
IN THIS COURSE
-
2m 54s
-
4m 25sUpon completion of this video, you will be able to recognize how an IT maturity model provides an assessment of whether technology is effectively meeting business needs. FREE ACCESS
-
4m 9sIn this video, you will learn how to align business needs with secured technological solutions. FREE ACCESS
-
5m 39sDuring this video, you will learn how to map security hardware and software to the seven-layer OSI model. FREE ACCESS
-
6m 47sIn this video, find out how to enable requirements for complex passwords and user account intruder detection. FREE ACCESS
-
3m 53sFind out how to configure endpoint antimalware policy settings centrally using System Center Configuration Manager. FREE ACCESS
-
4m 30sFind out how to determine when DLP solutions should be used for data privacy. FREE ACCESS
-
3m 51sAfter completing this video, you will be able to describe why IoT devices are generally considered to be insecure. FREE ACCESS
-
2m 7sIn this video, find out how to browse the Shodan.io site to locate vulnerable IoT devices. FREE ACCESS
-
3m 57sIn this video, you will use techniques such as network isolation and changing default settings to secure IoT devices. FREE ACCESS
-
6m 19sIn this video, learn how to secure mobile devices. FREE ACCESS
-
2m 58sIn this video, you will learn how to harden an Android smartphone manually. FREE ACCESS
-
4m 53sIn this video, learn how to configure Microsoft SCCM policies to ensure compliance with mobile device security. FREE ACCESS
-
4m 55sIn this video, you will identify how users can unwittingly install malicious apps on mobile devices. FREE ACCESS
-
4m 17sIn this video, you will compare OSI Layer 3 and Layer 7 security solutions, provide mitigation recommendations, list common IoT devices, and describe how to harden mobile devices. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.