How to Perform an Information Security Audit

Add your review
  • All prices mentioned above are in United States dollar.
  • This product is available at Udemy.
  • At udemy.com you can purchase How to Perform an Information Security Audit for only $44.99
  • The lowest price of How to Perform an Information Security Audit was obtained on March 13, 2025 2:06 am.

$44.99

Best deal at: udemy.comudemy.com
Buy for best price
Set Lowest Price Alert
×
Notify me, when price drops
Set Alert for Product: How to Perform an Information Security Audit - $44.99
Add to wishlistAdded to wishlistRemoved from wishlist 0
Last updated on March 13, 2025 2:06 am
How to Perform an Information Security Audit
How to Perform an Information Security Audit

Description

-

Didn't find the right price? Set price alert below

Set Alert for Product: How to Perform an Information Security Audit - $44.99

How to Perform an Information Security Audit

★★★★★
$44.99  in stock
Udemy.com
as of March 13, 2025 2:06 am

What you need to know to perform information security audits

Created by: Adrian Resag, QIAL, CMIIA, CIA, CISA, CRMA, CFSA, GRCP, CIMA Adv Dip MA
Founder of the Risk Governance Institute
Rating:4.51 (39reviews)     299students enrolled

What Will I Learn?

  • Understand how to properly plan engagements by determining their objectives, criteria and scope.
  • Know how to create working papers to document an audit and learn about different ways to staff an audit.
  • Learn how to collect engagement information and then analyze and evaluate it. Learn how to supervise engagements.
  • Learn how to communicate engagement results and the process of acceptance of risks. Learn how to monitor progress on the implementation status of internal audit
  • Know about which threats to information security should be assessed, including threats to the integrity of data, confidentiality and the availability of data.
  • Be able to evaluate privacy risks, risks from smart devices, insider threats, illicit software threats and cybersecurity threats amongst others.
  • Be able to evaluate risks by using the Asset-Threat-Vulnerability triangle.
  • Know about the different types of information security controls, including IT general controls.
  • Be able to put in place a solid governance over information security, such as by putting in place IT management and governance controls.
  • Be able to implement the segregation of IT duties and IT departmentalization, an information security framework and cybersecurity governance and policies.
  • Be able to apply the Three Lines of Defense Model in cybersecurity.
  • Learn about controls such as identity access management and authentication, encryption and firewalls, data privacy and protection controls.
  • Know about application and access controls, technical IT infrastructure controls, external connections controls and 3rd party information security controls.

Requirements

  • No prior experience or knowledge is required.

Target audience

  • Current or future IT and information security professionals who wish to learn techniques on how to assess the security of their information and the vulnerability of their information systems.
  • Auditors or others performing assessments who wish to learn more about performing information security audits.

How to Perform an Information Security Audit Videos

Price History

-

Reviews (0)

User Reviews

0.0 out of 5
0
0
0
0
0
Write a review

There are no reviews yet.

Be the first to review “How to Perform an Information Security Audit”

Your email address will not be published. Required fields are marked *

Best Sellers News