Information Systems Auditor: Protection of Information Assets

This course addresses the fifth of the five chapters induced in the CISA examination. It instructs the auditor on how to audit information technology assets.
Course info
Level
Intermediate
Updated
Aug 19, 2016
Duration
6h 26m
Table of contents
Description
Course info
Level
Intermediate
Updated
Aug 19, 2016
Duration
6h 26m
Description

Many people assigned to work on an IT audit do not have extensive familiarity with actual IT equipment and processes. This course, Information Systems Auditor: Protection of Information Assets, will help you to understand the functions, risks and security challenges related to auditing the various types of systems in use today. This module addresses cloud computing, encryption, physical security, disaster recovery and many other areas. By the end of this course, you'll be more prepared for the CISA examination than ever and you'll understand how to securely audit IT assets.

About the author
About the author

Kevin Henry is a passionate mentor and educator in the fields of information security and audit. Mixing experience with knowledge, Kevin delivers effective training programs for companies and individuals worldwide. A frequent speaker at prestigious conferences, Kevin is known for a clear understandable manner of imparting practical information and explaining difficult topics.

More from the author
Communications and Network Security
Intermediate
2h 59m
18 Sep 2018
Physical Security
Intermediate
1h 19m
6 Aug 2018
Cryptography Application
Intermediate
2h 22m
3 Aug 2018
More courses by Kevin Henry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi everyone. My name is Kevin Henry, a Certified Information Systems Auditor, and welcome to my course, Information Systems Auditor: Protection of Information Assets. This is the fifth of five courses that will prepare you for ISACA's CISA, the Certified Information Systems Auditor examination. I work as a security evangelist and auditor at team Cymru. Auditing provides management with key insight into the efficiency and effectiveness of their business processes, and this course looks specifically at the protection of the information assets of the organization. For many organizations, information is the most valuable asset the organization possesses, and as auditors, we must be able to provide management with assurance that the information and information systems of the organization are being adequately protected. Throughout this course, you'll benefit from learning the techniques and skills necessary to conduct audits of IT technologies and ensure that the investment your organization has made in IT security is effective. Some of the major topics we will cover include encryption, data loss prevention, physical security, and cloud security. By the end of this course, you'll be familiar with the content in the fifth domain of the CISA examination, and be knowledgeable in the areas of IT audit necessary to be an effective IT auditor. Before beginning this course, you should be familiar with Pluralsight's first four courses on the CISA: The Process of IT Audit, Governance and Management, Systems Acquisition and Development, and IT Operations and Maintenance. I hope you'll join me in this journey to learn about IT audit with Information Systems Auditor: Protection of IT Assets course at Pluralsight.