CISSP 2024: Security Audit & Controls Testing

CISSP 2024    |    Expert
  • 12 videos | 34m 6s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
A security audit is a comprehensive assessment of an organization's information systems. Typically, they measure the systems and applications against an audit checklist of industry best practices, externally established standards, and/or federal regulations. In this course, differentiate internal, external, and third-party auditing and learn about locations for auditing and controls testing, the purpose of a vulnerability assessment, and the basics of penetration testing. Next, explore log reviews and log data, code review and testing techniques, and compare synthetic transactions, benchmark, and misuse case testing. Finally, examine coverage analysis concepts, compare interface testing methods, and discover the purpose of compliance checks. This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Differentiate internal, external, and third-party auditing
    Outline auditing and controls testing locations, such as on-premises, cloud, and hybrid
    Recognize the purpose and elements of a vulnerability assessment
    Identify what penetration testing is and the basics of threat hunting
    Outline details about log reviews and log data
  • Identify code review and testing techniques, including sast, dast, iast, and code repository security
    Differentiate synthetic transactions, benchmark, and misuse case testing
    Outline the purpose of coverage analysis
    Identify interface testing methods, including user interface, network interface, and api testing
    Recognize the purpose of compliance checks
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 39s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 3m 12s
    Upon completion of this video, you will be able to differentiate internal, external, and third-party auditing. FREE ACCESS
  • Locked
    3.  Locations for Auditing and Controls Testing
    8m 16s
    After completing this video, you will be able to outline auditing and controls testing locations, such as on-premises, cloud, and hybrid. FREE ACCESS
  • Locked
    4.  Vulnerability Assessment
    2m 40s
    Through this video, you will be able to recognize the purpose and elements of a vulnerability assessment. FREE ACCESS
  • Locked
    5.  Penetration Testing
    3m 40s
    In this video, we will identify what penetration testing is and the basics of threat hunting. FREE ACCESS
  • Locked
    6.  Log Reviews
    1m 39s
    Upon completion of this video, you will be able to outline details about log reviews and log data. FREE ACCESS
  • Locked
    7.  Code Review and Testing Techniques
    4m 46s
    After completing this video, you will be able to identify code review and testing techniques, including SAST, DAST, IAST, and code repository security. FREE ACCESS
  • Locked
    8.  Synthetic Transactions, Benchmark, and Misuse Case Testing
    2m 21s
    Through this video, you will be able to differentiate synthetic transactions, benchmark, and misuse case testing. FREE ACCESS
  • Locked
    9.  Coverage Analysis
    1m 22s
    In this video, we will outline the purpose of coverage analysis. FREE ACCESS
  • Locked
    10.  Interface Testing
    2m 11s
    Upon completion of this video, you will be able to identify interface testing methods, including user interface, network interface, and API testing. FREE ACCESS
  • Locked
    11.  Compliance Checks
    2m 41s
    After completing this video, you will be able to recognize the purpose of compliance checks. FREE ACCESS
  • Locked
    12.  Course Summary
    40s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.2 of 6 users Rating 4.2 of 6 users (6)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)