CISSP 2024: Security Audit & Controls Testing
CISSP 2024
| Expert
- 12 videos | 34m 6s
- Includes Assessment
- Earns a Badge
A security audit is a comprehensive assessment of an organization's information systems. Typically, they measure the systems and applications against an audit checklist of industry best practices, externally established standards, and/or federal regulations. In this course, differentiate internal, external, and third-party auditing and learn about locations for auditing and controls testing, the purpose of a vulnerability assessment, and the basics of penetration testing. Next, explore log reviews and log data, code review and testing techniques, and compare synthetic transactions, benchmark, and misuse case testing. Finally, examine coverage analysis concepts, compare interface testing methods, and discover the purpose of compliance checks. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDifferentiate internal, external, and third-party auditingOutline auditing and controls testing locations, such as on-premises, cloud, and hybridRecognize the purpose and elements of a vulnerability assessmentIdentify what penetration testing is and the basics of threat huntingOutline details about log reviews and log data
-
Identify code review and testing techniques, including sast, dast, iast, and code repository securityDifferentiate synthetic transactions, benchmark, and misuse case testingOutline the purpose of coverage analysisIdentify interface testing methods, including user interface, network interface, and api testingRecognize the purpose of compliance checksSummarize the key concepts covered in this course
IN THIS COURSE
-
39sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
3m 12sUpon completion of this video, you will be able to differentiate internal, external, and third-party auditing. FREE ACCESS
-
8m 16sAfter completing this video, you will be able to outline auditing and controls testing locations, such as on-premises, cloud, and hybrid. FREE ACCESS
-
2m 40sThrough this video, you will be able to recognize the purpose and elements of a vulnerability assessment. FREE ACCESS
-
3m 40sIn this video, we will identify what penetration testing is and the basics of threat hunting. FREE ACCESS
-
1m 39sUpon completion of this video, you will be able to outline details about log reviews and log data. FREE ACCESS
-
4m 46sAfter completing this video, you will be able to identify code review and testing techniques, including SAST, DAST, IAST, and code repository security. FREE ACCESS
-
2m 21sThrough this video, you will be able to differentiate synthetic transactions, benchmark, and misuse case testing. FREE ACCESS
-
1m 22sIn this video, we will outline the purpose of coverage analysis. FREE ACCESS
-
2m 11sUpon completion of this video, you will be able to identify interface testing methods, including user interface, network interface, and API testing. FREE ACCESS
-
2m 41sAfter completing this video, you will be able to recognize the purpose of compliance checks. FREE ACCESS
-
40sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.