Information Asset Security
CISA 2016
| Expert
- 20 videos | 1h 8m 24s
- Includes Assessment
- Earns a Badge
It is vital that an organization's policies protect all information assets. Explore IS security best practices, including environmental and physical access controls.
WHAT YOU WILL LEARN
-
Identify best practices for auditing information security management frameworksIdentify best practices for auditing logical accessDistinguish between different security testing techniques when auditing information security management frameworksIdentify investigation techniques and best practices when auditing information security management frameworksIdentify characteristics and best practices for auditing remote access, auditing internet points of presence, and performing network penetration testsIdentify characteristics and best practices for performing full network assessment reviews, and auditing network change development and authorization, and unauthorized changes activitiesIdentify environmental issues and exposuresDistinguish between different controls for environmental exposuresIdentify best practices for auditing environmental controlsIdentify physical access issues and exposures, and controls for mitigating threats
-
Identify best practices for auditing physical accessIdentify mobile computing information security best practicesIdentify peer-to-peer computing information security best practicesIdentify instant messaging information security best practicesIdentify social media information security best practicesIdentify cloud computing information security best practicesIdentify characteristics and best practices for data leak preventionIdentify challenges and considerations for data leak prevention techniques and practicesIdentify end-user security risks and controlsIdentify best practices for auditing information security management frameworks and mobile, social, and cloud asset protection
IN THIS COURSE
-
4m 25sIn this video, find out how to identify best practices for auditing information security management frameworks. FREE ACCESS
-
2m 56sFind out how to identify best practices for auditing logical access. FREE ACCESS
-
3m 33sIn this video, find out how to distinguish between different security testing techniques when auditing information security management frameworks. FREE ACCESS
-
5m 36sLearn how to identify investigation techniques and best practices when auditing information security management frameworks. FREE ACCESS
-
7m 1sFind out how to identify characteristics and best practices for auditing remote access, auditing internet points of presence, and performing network penetration tests. FREE ACCESS
-
2m 27sIn this video, find out how to identify characteristics and best practices for performing full network assessment reviews, auditing network change development and authorization, and unauthorized changes activities. FREE ACCESS
-
2m 12sIn this video, you will learn how to identify environmental issues and exposures. FREE ACCESS
-
4m 28sIn this video, learn how to distinguish between different controls for environmental exposures. FREE ACCESS
-
2m 27sIn this video, find out how to identify best practices for auditing environmental controls. FREE ACCESS
-
4m 11sIn this video, find out how to identify physical access issues and exposures, and what controls you can put in place to mitigate threats. FREE ACCESS
-
1m 21sLearn how to identify best practices for auditing physical access. FREE ACCESS
-
6m 29sIn this video, you will learn about mobile computing information security best practices. FREE ACCESS
-
2m 31sIn this video, learn how to identify information security best practices for peer-to-peer computing. FREE ACCESS
-
1m 49sLearn how to identify best practices for instant messaging security. FREE ACCESS
-
3m 21sFind out how to identify social media information security best practices. FREE ACCESS
-
2m 10sIn this video, you will learn how to identify best practices for cloud computing information security. FREE ACCESS
-
3m 22sIn this video, learn how to identify characteristics and best practices for preventing data leaks. FREE ACCESS
-
3mIn this video, learn how to identify challenges and considerations for data leak prevention techniques and practices. FREE ACCESS
-
1m 53sIn this video, you will learn how to identify end-user security risks and the corresponding controls. FREE ACCESS
-
3m 15sDuring this video, you will learn how to identify best practices for auditing information security management frameworks and mobile, social, and cloud asset protection. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.