Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

CISA Cert Prep: 5 Information Asset Protection for IS Auditors

Description

Prepare for the CISA exam. Study topics from domain five: asset protection.

Tags

Syllabus

Syllabus IntroductionWelcome1. Introduction to Information SecurityInformation security conceptsAnatomy of a cyberattackSocial engineeringInformation security domains2. Security ControlsData securityAccess control modelsSingle sign-onCentralized access controlNetwork security: FirewallsAuthentication protocolsVPNs and tunnelingDomain names systemCryptography overview: Part 1Cryptography overview: Part 2Cryptography: Hash algorithms and digital signaturesCryptography: Public key infrastructure and certificatesPBX and VOIP securitySecure protocolsWireless securityInternet of Things and endpoint securityThird-party vendor controlsPhysical and environmental securitySecurity assessment and testingEvidence collection and forensics3. Attacks and CountermeasuresCyberattacks and countermeasures4. Attestation AuditsConducting service organization control (SOC) auditsConclusionNext steps Read more


CISA Cert Prep: 5 Information Asset Protection for IS Auditors

Affiliate notice

Prepare for the CISA exam. Study topics from domain five: asset protection.

Syllabus IntroductionWelcome1. Introduction to Information SecurityInformation security conceptsAnatomy of a cyberattackSocial engineeringInformation security domains2. Security ControlsData securityAccess control modelsSingle sign-onCentralized access controlNetwork security: FirewallsAuthentication protocolsVPNs and tunnelingDomain names systemCryptography overview: Part 1Cryptography overview: Part 2Cryptography: Hash algorithms and digital signaturesCryptography: Public key infrastructure and certificatesPBX and VOIP securitySecure protocolsWireless securityInternet of Things and endpoint securityThird-party vendor controlsPhysical and environmental securitySecurity assessment and testingEvidence collection and forensics3. Attacks and CountermeasuresCyberattacks and countermeasures4. Attestation AuditsConducting service organization control (SOC) auditsConclusionNext steps Read more