COURSES
Cybersecurity
OUR COURSES SERIES
Cybersecurity Course Directory
- Information Systems Audit and Control Association
- Systems Security
- Information Security
- Certified Information Systems Security Professional (CISSP)
- Information Security
- Information Systems Audit and Control Association
- Systems Security
- Business Continuity Planning Bootcamp
- CCSP Bootcamp
- Certified Cloud Security Professional (CCSP)
- Certified Ethical Hacker
- Certified Information Security Manager (CISM)
- Certified Information Systems Auditor (CISA)
- Certified Information Systems Auditor (CISA) Bootcamp
- Certified Information Systems Security Professional (CISSP) Bootcamp
- Certified Secure Software Lifecycle Professional (CSSLP)
- Cybersecurity
- Ethical Hacking
- General
- Information Security Manager
- Information Security Operations
- Information Systems Auditing
- Mobile Security Administration
- OWASP
- Penetration Testing
- Security Core Concepts
- Systems Security Certified Practitioner (SSCP)
Information Systems Audit and Control Association
Course Name | Course Type | Syllabus |
---|---|---|
CISM 2020: Information Security & Business Process Alignment | Course | View details Course Syllabus | Print Syllabus CISM 2020: Information Security & Business Process AlignmentOverview/Description: Proper IT governance starts with aligning IT solutions with business processes. In this course youll explore how to identify the relationship between IT security and business objectives. Youll examine in detail how various regulations and security standards such as HIPAA GDPR and PCI DSS can influence an organizations IT security decisions going through seven of such regulations one-by-one. Next youll examine the cloud services Infrastructure as a Service (IaaS) Platform as a Service (PaaS) and Software as a Service (SaaS) to determine how responsibility is divided between provider and consumer. Lastly youll investigate several public cloud providers security accreditations. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_01_enus |
CISM 2020: Managing IT Risk | Course | View details Course Syllabus | Print Syllabus CISM 2020: Managing IT RiskOverview/Description: Using on-premises and cloud computing IT environments introduces an element of risk. In this course youll explore risk management concepts including gap analysis and SWOT as well as strategies to manage risk such as applying risk treatments and creating a risk register. <<Additionally youll outline data governance and examine the responsibilities of specific data roles including the data owner and data custodian. Youll then work with data classification using Amazon Macie and Microsoft FSRM. <<Moving on youll learn how to tag cloud resources and carry out cloud risk assessments. Youll explore how to determine if specific security controls are worth implementing to protect assets. Lastly youll investigate how to establish a security awareness program through the organization. <<This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_02_enus |
CISM 2020: Cryptography & PKI | Course | View details Course Syllabus | Print Syllabus CISM 2020: Cryptography & PKIOverview/Description: Securing data at rest and in transit over a network is accomplished through the use of cryptography. In this course youll explore the concepts of hashing and encryption. Youll start by studying how cryptography addresses IT security before gaining hands-on experience generating file hashes and encrypting data at rest. Some of the methods youll practice will be using Microsoft EFS and AxCrypt to protect files Microsoft BitLocker to protect disk volumes PuTTYgen to generate key pairs and wiping disk data. Moving along youll examine and work with PKI certificate authorities deploying and requesting both Microsoft and AWS certificate authorities. This course is part of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_03_enus |
CISM 2020: TCP/IP Configuration | Course | View details Course Syllabus | Print Syllabus CISM 2020: TCP/IP ConfigurationOverview/Description: Modern computing uses IPv4 and increasingly IPv6. In this course youll explore IPv4 and IPv6 configuration details in preparation for configuring IT services to support business processes. Youll work with DNS name resolution and DHCP. Youll identify the role played by various network infrastructure devices such as routers and switches. Furthermore youll capture and analyze network traffic using Wireshark. By the end of this course some of the skills youll acquire will be to recognize the connection between OSI model layers from TCP/IP protocols set up TCP/IP both manually and with DHCP and configure DNS using Azure AWS and GoDaddy. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_04_enus |
CISM 2020: Network Infrastructure Security | Course | View details Course Syllabus | Print Syllabus CISM 2020: Network Infrastructure SecurityOverview/Description: Various laws regulations and security best practices require network traffic coming in and out of IT services to be controlled. In this course youll learn how to implement techniques to ensure the precious IT assets within your organizations network are secure. Youll begin by exploring what the IPsec network security protocol does and how employed. Youll then examine various types of firewalls and decipher when they should be used. Next youll work with correctly setting up Windows Defender Firewall Linux firewall settings and cloud-based packet filtering rules. Lastly youll practice hardening a Wi-Fi network and forging network traffic. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_05_enus |
CISM 2020: Identity & Access Management | Course | View details Course Syllabus | Print Syllabus CISM 2020: Identity & Access ManagementOverview/Description: Information security managers must consider the security risks and potential impact of user access to resources. In this course youll explore how to manage and assign user authentication and authorization to use resources for various cloud and local services. Youll start by distinguishing between authentication and authorization. Next youll assign file system permissions in Windows and Linux. Youll then practice assigning permissions policies to AWS users. Lastly youll enable multifactor authentication and single sign-on for AWS users. By the end of this course youll be able to create and manage Microsoft AD Linux and AWS users and groups and set up various types of permissions for them. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_06_enus |
CISM 2020: Server Roles | Course | View details Course Syllabus | Print Syllabus CISM 2020: Server RolesOverview/Description: Servers provide many different types of functionality that must be adequately secured. To qualify as a Certified Information Security Manager youll need to know how to securely manage and deploy Windows and Linux cloud-based servers both on-premises and remotely in addition to encrypting a virtual machine. In this course youll begin by examining various server roles when they should be used and how to secure them. Next youll deploy Windows and Linux servers in the cloud and manage them from an on-premises environment. Lastly youll assign SQL Server roles and encrypt an on-premises VMware workstation virtual machine. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_07_enus |
CISM 2020: IT Security Policies | Course | View details Course Syllabus | Print Syllabus CISM 2020: IT Security PoliciesOverview/Description: IT security policies guide how IT services are deployed and managed in an organization. To achieve certification in information security management youll need to demonstrate a clear understanding of what policies exist and where and how to implement them. In this course youll explore various types of security policies starting with those for securing change and patch management. Youll then investigate some network and host security hardening techniques. Youll move on to practice hardening Windows and Linux servers as well as a network printer and passwords. Youll then examine how to detect social engineering scams and deal with malware infections. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_08_enus |
CISM 2020: Detecting Security Anomalies | Course | View details Course Syllabus | Print Syllabus CISM 2020: Detecting Security AnomaliesOverview/Description: Information security managers must have the most efficient tools to detect potential security incidents at their disposal. In this course youll explore several tools that can be used to detect anomalies and learn how to take action to mitigate these anomalies. Youll learn to differentiate intrusion detection from intrusion prevention before using Snort for network anomaly detection. Youll then examine how honeypots provide insight related to malicious user techniques. Next youll analyze various types of Windows logs before working with logging in Linux. Lastly youll configure data loss prevention in the cloud view compliance reports and outline how SIEM and SOAR can be used for incident detection and response. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_09_enus |
CISM 2020: Security Testing | Course | View details Course Syllabus | Print Syllabus CISM 2020: Security TestingOverview/Description: Periodic security testing sheds light on an organizations current security posture. As an information security manager you should know how to accurately and thoroughly assess the condition of an organizations IT security. In this course youll learn the concepts and practices involved in this process. Youll start by examining how physical security can influence IT services. Next youll explore the benefits and techniques involved in network scanning vulnerability assessments and penetration testing. Youll round off the course by analyzing cloud-based security recommendations. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_10_enus |
CISM 2020: Digital Forensics | Course | View details Course Syllabus | Print Syllabus CISM 2020: Digital ForensicsOverview/Description: Information security managers may be called upon to aid in the gathering and preservation of digital evidence. To achieve certification-level knowledge you should be savvy in terms of the techniques requirements and potential hurdles involved in gathering digital evidence. In this course youll explore several digital forensic techniques such as order of volatility chain of custody and data immutability. Youll also examine common digital forensic hardware and software tools. To round off the course youll gain hands-on experience using steganography hard disk image creation and data recovery using Autopsy in Kali Linux. Youll then investigate common web application attacks and secure coding practices. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_11_enus |
CISM 2020: Business Continuity | Course | View details Course Syllabus | Print Syllabus CISM 2020: Business ContinuityOverview/Description: Information security managers must plan for inevitable business disruptions knowing how best to minimize the impact of these disruptions on business processes and learn from them to prepare for future incidences. In this course youll explore techniques to reduce the chances of disruptions plan for the inevitable and learn from past occurrences. Youll start by examining personnel hiring and skills management and how this relates to IT governance. Next youll investigate the concept of high availability configurations before delving into data replication load balancing and data backups. Youll also practice some associated techniques. Lastly youll learn how to craft disaster recovery and incident response plans along with post-incident reviews. This course is one of a collection of courses that prepares learners for the Certified Information Security Manager (CISM) certification. Course Number: it_spcism2020_12_enus |
Certified Information Systems Auditor (CISA) 2019: Information System Auditing | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Information System AuditingOverview/Description: Discover keys to conducting a successful audit its driving processes and its underlying IT solutions in this 15-video course. Examine controls and audit reporting while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered here include: how information systems (IS) auditing shows whether IT solutions meet business objectives efficiently and effectively; the expectations of conduct for CISA-certified individuals; and how auditing standards provide guidance for conducting efficient audits. Learn about various types of documentation when preparing an IS audit; how to identify client needs that map to business objectives; and different categories of security controls including internal business process controls IT controls and sampling types. You will learn about control objectives required to secure organizational assets along with the controls themselves; planning for audit funding personnel and related items; scheduling audit phases; and how to report serious discoveries including fraud or serious IT vulnerabilities. Finally see how to generate audit reports including existing controls which have passed or failed communication with stakeholders after audit recommendations are reported; and how IS auditing identifies weak security controls. Course Number: it_spcisa19_01_enus |
Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: IT Management FrameworksOverview/Description: Explore how IT management frameworks provide a structured approach to managing and auditing IT assets and how risk assessments often drive the IS audit in this 11-video course helping learners prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 11-video course include: how IT governance provides a structured approach to ensuring IT solutions are aligned with business goals including outsourced tasks; how Control Objectives for Information and Related Technologies (COBIT) can ensure business objectives are met by aligning appropriate IT processes; and how Information Technology Infrastructure Library (ITIL) practices can streamline IT service delivery. Learn how International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) standards can result in proper IT governance; how risk management can improve business operations; how to map various risk treatments to threats; and how the Business Model for Information Security (BMIS) encompasses information security planning implementation and management. Finally learn how the Information Technology Assurance Framework (ITAF) is an assurance that an audit is done properly; the purpose of IT balanced scorecards; and how to map common framework characteristics to IS audits. Course Number: it_spcisa19_02_enus |
Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Data Privacy & RiskOverview/Description: In this 14-video course discover how identifying IT asset risks and applying appropriate data privacy standards helps keep sensitive data from unauthorized entities while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered course include: how the CIA triad (confidentiality integrity and availability) enhances IT security; understanding examples of personally identifiable information (PII) and protected health information (PHI); how General Data Protection Regulation (GDPR) assures data privacy; and how to align data protection policies with GDPR. Then learn how Payment Card Industry Data Security Standard (PCI DSS) protects cardholder information; how to identify network devices with insufficient antimalware protection with the free Spiceworks tool; and how Hypertext Transfer Protocol Secure Health Insurance Portability and Accountability Act (HIPAA) protects sensitive medical information. Next learn how Federal Risk and Authorization Management Program (FedRAMP) standards secure US Government information systems; how to determine the annualized loss expectancy (ALE) value with an online ALE calculator; and how to scan a network by using Network Mapper (Nmap) to determine which devices are present. Finally map IT solutions to data privacy requirements. Course Number: it_spcisa19_03_enus |
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: IAM & Data ClassificationOverview/Description: Explore how multifactor authentication (MFA) and role-based access control lessen risks of system compromise and privilege abuse and how data classification uses tags to organize data while preparing for the ISACA Certified Information Systems Auditor (CISA) exam in this 16-video course. Key concepts covered include: authentication categories and how authorization follows; how to create Active Directory (AD) users and groups on-premises; and how to create Azure AD users and groups. Learn how MFA enhances security; how to enable MFA for Azure AD users; how to assign built-in Azure roles to AD groups; and how to assign built-in Amazon Web Services (AWS) policies. Next study the role of identity federation across organizations including single sign-on (SSO) and learn how resource tagging aids in tracking and granting permissions. Learn to configure shared folder and New Technology File System (NTFS) Windows file system permission as well as standard Linux file system permissions. Finally learn to classify Windows Server files with metadata; to use resource and AD attributes to conditionally grant file system permissions; and to create and manage authentication accounts and data tags. Course Number: it_spcisa19_04_enus |
Certified Information Systems Auditor (CISA) 2019: Performance & Management | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Performance & ManagementOverview/Description: Efficient delivery of IT systems includes cost reduction and optimized system performance. In this 15-video course discover how a structured approach for implementing changes and patches can reduce security incidents and downtime in preparation for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered here include: how performance is related to service level agreements (SLAs) and differences between SLAs and operational level agreements; how to establish a baseline of normal performance and monitor performance metrics in Windows and Linux environments; and how to monitor performance metrics in a cloud computing environment. Next learn how to configure cloud-based alerting; about enterprise change and configuration management procedures and terms such as content management system (CMS) configuration management database (CMDB) and configuration item (CI); and enterprise vulnerability management procedures. Learn how to configure which administrators can manage Group Policy Objects (GPOs); how to configure application deployment centrally with System Center Configuration Manager (SCCM); configure Windows patch deployment centrally with SCCM; how to configure Ubuntu Linux to check for updates; and how to tweak IT system performance and implement controlled changes centrally. Course Number: it_spcisa19_05_enus |
Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: PKI & Data ProtectionOverview/Description: Explore how public key infrastructure (PKI) provides a hierarchy of digital security certificates used to secure data and authenticate users and devices and how data are protected with encryption and file integrity verification as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: how cryptography protects data; distinguishing between asymmetric and symmetric encryption; steps in the PKI certificate lifecycle; and how to deploy a private Microsoft CA (certificate authority). Next learn about configuring customized PKI certificate templates; how Transport Layer Security (TLS) and Internet Protocol Security (IPsec) secure network communications; disabling SSLv3 (secure sockets layer) on clients and servers; and configuring an Internet Information Services (IIS) website with a PKI certificate. Then learn about client PKI certificates for website access; how to protect data at rest with Windows Encrypting File System (EFS); and how to protect data at rest with Windows BitLocker. Finally learn to use SHA-256 (secure hash algorithm) hashing to verify file integrity; and work with PKI certificates to secure data in transit and at rest. Course Number: it_spcisa19_06_enus |
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Virtualization & CloudOverview/Description: Explore how virtualization provides efficient hardware usage and security boundaries and how cloud computing tracks pooled IT resource usage and charges fees accordingly as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts in this 14-video course include: when to use various virtualization technologies; how to distinguish differences between Type 1 and Type 2 hypervisors; how to install Microsoft Hyper-V hypervisor; and how to configure a Hyper-V virtual network switch. Learn how to create a virtual machine (VM) hosted on Hyper-V; how to secure virtualized environments through dedicated management interfaces patching and changing default configurations; and to understand the National Institute of Standards and Technology (NIST) standard characteristics of cloud computing. Next learn about map cloud service offerings to business needs; cloud-based security solutions such as the Azure Security Center distributed denial-of-service (DDoS) mitigation and Azure network security groups; and how to deploy a Windows VM and a Linux VM in the Azure cloud. Finally learn to identify cloud services that require endpoint security and to map security solutions to use of virtualization and cloud computing. Course Number: it_spcisa19_07_enus |
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Data Storage & MalwareOverview/Description: Explore the variety of methods through which stored data can be secured and made highly available despite realization of malware threats as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: distinguishing between data and information how they are secured; how to define the relationship between big data and the value of data analytics; and listing methods of securing a storage area network (SAN). Next learn to enable password authentication for Internet Small Computer Systems Interface (iSCSI) target access; to recognize common security options available with cloud storage; and to ensure that decommissioned storage media do not contain retrievable data artifacts. You will learn how to deploy Structured Query Language (SQL) Database in the Azure cloud; how to implement a database replication strategy; how to protect data with the Windows backup feature; and how to protect data by backing it up to the cloud. Finally learn how to identify the various forms of social engineering and the related security risks and how to implement controls that provide data availability. Course Number: it_spcisa19_09_enus |
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: System Design & AnalysisOverview/Description: This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam and you will explore systems planning testing integration and delivery to ensure timely delivery of system changes or entire new solutions for security planning. First you will explore IT system planning including the system development life cycle and learn how technicians can evaluate IT solutions to align with business needs. You will examine how IT solutions will require a feasibility analysis to determine whether those solutions can be used or if a new IT solution must be built. You will see that testing and continuous delivery ensures and maintain the stability and security of the solution. This course covers QA (quality assurance) and why QA needs to be adapted for different organizations based on compliance with laws and regulations relevant to their business. Finally this course examines IT solution deployment including continuous integration and delivery infrastructure deployment system migration and data conversion and how to perform a cloud migration assessment. Course Number: it_spcisa19_11_enus |
Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Testing & VulnerabilityOverview/Description: This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam and explores auditor responsibilities such as identifying network and host weaknesses reporting them to stakeholders and suggesting recommendations to improve an organizations security. Learn to distinguish between white black and gray box testing and then explore the benefits of periodic scans for identifying vulnerabilities. Learn how to use pen tests and evaluate environmental and physical security controls. Next learn how to use Nessus a free remote security scanning tool. This course demonstrates how to forge TCP (transmission control protocol) network traffic by using the hping3 tool in Kali Linux. This course demonstrates the OWASP (open-source web application security scanner) ZAP (zed attack proxy) tool to identify web app vulnerabilities. You will learn how to secure traffic by using IPSec (internet security protocol) configure a cloud-based jump box and about honey pots. Next learn to secure assets with physical controls and the eavesdropping risk of drones. Finally learners will be able to identify different types of fire suppression systems. Course Number: it_spcisa19_12_enus |
Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Digital Evidence GatheringOverview/Description: This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam a professional certification that allows information system (IS) auditors to properly follow the IS audit process in risk management. You will learn how to identify assets and threats hardening IT computing environments performing IT forensics and auditing tasks. This course explores the importance of gathering handling and storing digital evidence to ensure its admissible in a court of law. Because chain-of-custody laws vary around the world it is important to know how the evidence was gathered where it was stored and who had access to the evidence. Learners will explore digital forensics chain of custody order of volatility and hard disk imaging. You will see a list of common digital forensic hardware and software and IT component collection as evidence. Finally this course demonstrates how to use tools in Kali Linux such as the autopsy forensic browser tool to view user data and how to retrieve data from an image. Course Number: it_spcisa19_13_enus |
Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Continuous MonitoringOverview/Description: This course explores the importance of continuously monitoring business processes and the applicable supporting IT solutions. You will learn how information system (IS) auditing can identify and assist in continuous process improvement. In this course learners will acquire knowledge of the skills necessary to audit monitoring solutions and business processes. You will explore how to establish baselines to easily detect anomalies. Then learn how to set a baseline for specific systems like a web server its normal performance and the servers normal pattern of network. This course will list various sampling types such as attribute variables and statistical and discovery sampling which play a role in the audit process. You will learn how to filter logs and enable centralized log collection. Next explore how to work with optimal settings for packet capturing placement and for intrusion detection and intrusion prevention systems. This course covers new malware variance new hardware and software vulnerabilities as well as other events that impact processes or IT infrastructure such as the flooding of a data center. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam. Course Number: it_spcisa19_14_enus |
Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Scenario-Based PracticeOverview/Description: This course explores how to apply the information systems (IS) audit process to ensure adequate risk mitigation for audit planning security control selection travelling user vulnerability mitigation Wi-Fi hardening and proper PKI (public key infrastructure) key implementation. Learn the importance of having a ISACA CISA (Certified Information Systems Auditor) certification which indicates you are a professional with the skills necessary as an IT security analyst in performing an IS audit. An IS auditor must have knowledge of the type of business being audited and need to be able to identify the security posture of an organization within a given specific scenario that falls within the audit scope. When auditing a business you first look at the type of business its use of technology and related security. This course uses real-world business scenarios that include for example a marketing company and a financial institution. These scenarios cover how to identify audit planning errors security control cost effectiveness determining Wi-Fi weaknesses determining how keys should be used and compensating control selection. Course Number: it_spcisa19_15_enus |
Information Security Governance Part I | Course | View details Course Syllabus | Print Syllabus Information Security Governance Part IOverview/Description: Explore the information security strategy techniques and best practices for a governance framework to meet your organizational goals and objectives. Course Number: it_spcesm_01_enus |
Information Security Governance Part II | Course | View details Course Syllabus | Print Syllabus Information Security Governance Part IIOverview/Description: Examine the roles and security responsibilities of organizational staff as well as effective communication and reporting techniques needed as part of an effective security governance framework. Course Number: it_spcesm_02_enus |
Information Risk Management Part I | Course | View details Course Syllabus | Print Syllabus Information Risk Management Part IOverview/Description: Discover how to implement an effective information risk management strategy for your organization including how to recognize information asset classification ownership and threats vulnerabilities and exposures. Course Number: it_spcesm_03_enus |
Information Risk Management Part II | Course | View details Course Syllabus | Print Syllabus Information Risk Management Part IIOverview/Description: Explore risk assessment and analysis methodologies such as risk treatment risk response and gap analysis techniques that can be used as part of your organization’s risk management strategy. Course Number: it_spcesm_04_enus |
Information Security Program Development Part I | Course | View details Course Syllabus | Print Syllabus Information Security Program Development Part IOverview/Description: Create an effective information security program by examining the security technologies available as well as techniques and best practices involved in meeting security regulations standards and guidelines. Course Number: it_spcesm_05_enus |
Information Security Program Development Part II | Course | View details Course Syllabus | Print Syllabus Information Security Program Development Part IIOverview/Description: Information security is only effective if everyone involved is on-board and properly trained. Discover how to develop security awareness and training programs and how to implement and test the effectiveness of security controls. Course Number: it_spcesm_06_enus |
Information Security Incident Management Part I | Course | View details Course Syllabus | Print Syllabus Information Security Incident Management Part IOverview/Description: Explore the fundamentals of security incident management including methods for classifying incidents roles responsibilities and training for incident response team members and notification and escalation processes. Course Number: it_spcesm_07_enus |
Information Security Incident Management Part II | Course | View details Course Syllabus | Print Syllabus Information Security Incident Management Part IIOverview/Description: Security incidents can have a huge cost factor on an organization. Examine incident logging analyzing and documenting as well as techniques for responding to and recovering from information security incidents. Course Number: it_spcesm_08_enus |
Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: Digital Asset ProtectionOverview/Description: Security technicians must determine which security controls most effectively protect assets at a reasonable cost. Explore IT maturity models and endpoint Internet of Things (IoT) and mobile device security in this 15-video course. Key concepts covered here include: how IT maturity models provide assessments as to whether technology effectively meets business needs; how to map security hardware and software to the Open Systems Interconnection model (OSI model); and how to enable requirements for complex passwords and user account intruder detection. Next learn to configure endpoint antimalware policy settings centrally with System Center Configuration Manager (SCCM); how to determine when data loss prevention (DLP) solutions are needed for data privacy; and why IoT devices are generally considered unsecure. Learn to use the shodan.io site to locate vulnerable IoT devices; use techniques such as network isolation and changing default settings to harden IoT and mobile devices; and manually harden an Android smartphone. Finally learn how to configure SCCM policies to ensure mobile device security compliance and compare OSI Layer 3 and Layer 7 security solutions. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam. Course Number: it_spcisa19_08_enus |
Certified Information Systems Auditor (CISA) 2019: BCP & Network Security | Course | View details Course Syllabus | Print Syllabus Certified Information Systems Auditor (CISA) 2019: BCP & Network SecurityOverview/Description: This course addresses why and how organizations must have a Disaster Recovery Plan (DRP) for resiliency in the face of malicious attacks as well as natural and man-made disasters. The DRP is part of the overall Business Continuity Plan (BCP) which ensures the ongoing functionality of business processes. In this course you will learn a variety of disaster planning strategies as well as network security configurations order when planning for business disruptions. Learners will explore the auditing process and what IS auditors need to consider as the audit objective and the audit scope and which may include reviewing business continuity plans within the organization. This course identifies common redundant array of independent disks (RAID)-level characteristics and you will learn how to configure RAID 5 in Windows Server 2016. You will learn how to configure Microsoft Azure cloud computing and SQL database georedundancy. Finally the course explores numerous network security topics such as wired and wireless network security and network threat mitigation through configuration of firewalls. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam. Course Number: it_spcisa19_10_enus |