Information Security Management
CISA 2016
| Expert
- 14 videos | 53m 51s
- Includes Assessment
- Earns a Badge
A key component IS auditing professionals evaluate is an organization's IS management activities. Discover key IS management elements, roles, responsibilities and risk factors, and information security control design best practices.
WHAT YOU WILL LEARN
-
Recognize the task and knowledge statements of domain 5Identify characteristics and key elements of information security management and information security management systemsDistinguish between the different information security roles and responsibilitiesIdentify characteristics and best practices of classifying information assetsIdentify fraud risk factors in information security managementIdentify characteristics of controls, control standards and frameworks, and control monitoring and effectiveness practicesIdentify characteristics and best practices of system access permission activities
-
Recognize characteristics of mandatory and discretionary access controlsIdentify privacy principles, and the is auditor's roleIdentify the critical success factors of information security management and awareness, training and education best practicesIdentify best practices for information security activities involving external partiesIdentify best practices for human resources activities with third partiesIdentify characteristics of computer crime issues and exposures, and best practices for avoiding negative impactsIdentify best practices for security incident handling and response activities
IN THIS COURSE
-
1m 43sAfter completing this video, you will be able to recognize the task and knowledge statements of domain 5. FREE ACCESS
-
2m 20sFind out how to identify characteristics and key elements of information security management and information security management systems. FREE ACCESS
-
3m 40sIn this video, you will learn how to distinguish between the different information security roles and responsibilities. FREE ACCESS
-
2m 41sLearn how to identify characteristics and best practices for classifying information assets. FREE ACCESS
-
2m 48sIn this video, find out how to identify risk factors for fraud in information security management. FREE ACCESS
-
5m 48sDuring this video, you will learn how to identify characteristics of controls, control standards and frameworks, and control monitoring and effectiveness practices. FREE ACCESS
-
3m 30sIn this video, you will identify characteristics and best practices of system access permission activities. FREE ACCESS
-
2m 13sUpon completion of this video, you will be able to recognize characteristics of mandatory and discretionary access controls. FREE ACCESS
-
3m 27sIn this video, you will learn how to identify privacy principles and the IS auditor's role. FREE ACCESS
-
3m 39sIn this video, you will learn how to identify the critical success factors of information security management, awareness, training, and education best practices. FREE ACCESS
-
5m 37sLearn how to identify best practices for information security activities involving external parties. FREE ACCESS
-
3m 12sIn this video, learn how to identify best practices for human resources activities with outside organizations. FREE ACCESS
-
9m 9sLearn how to identify characteristics of computer crime issues and exposures, and best practices for avoiding negative impacts. FREE ACCESS
-
4m 3sIn this video, learn how to identify best practices for security incident handling and response activities. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.