This course offers an in-depth exploration of information security auditing principles, tailored for professionals preparing for the CISA certification. Starting with an overview of frameworks, standards, and guidelines, you will understand their critical role in protecting information assets. The course outlines the responsibilities of IS auditors in evaluating security baselines and implementing effective data privacy practices. Key modules focus on physical and environmental controls, ensuring that you are equipped to audit diverse aspects of information systems security, from infrastructure protection to compliance requirements.


Protection of Information Assets
包含在 中
您将学到什么
Analyze and apply IS management frameworks and security baselines
Audit identity and access management controls and assess authorization risks
Implement and evaluate data loss prevention (DLP) systems and audit network security measures
Apply cryptographic principles and manage PKI for secure information exchanges
您将获得的技能
- Cybersecurity
- Security Testing
- Data Security
- Vulnerability Scanning
- Information Assurance
- Data Loss Prevention
- Network Security
- Security Controls
- Authorization (Computing)
- Computer Security Incident Management
- Information Privacy
- Cyber Risk
- Cloud Security
- Identity and Access Management
- Cryptography
- Cloud Computing
- Encryption
- Penetration Testing
要了解的详细信息

添加到您的领英档案
4 项作业
了解顶级公司的员工如何掌握热门技能

积累特定领域的专业知识
- 向行业专家学习新概念
- 获得对主题或工具的基础理解
- 通过实践项目培养工作相关技能
- 获得可共享的职业证书

该课程共有4个模块
In this module, we will cover the foundational elements necessary for safeguarding information assets. You will learn about implementing security frameworks, defining roles for effective management, establishing security baselines, and ensuring compliance with data privacy regulations.
涵盖的内容
6个视频2篇阅读材料
In this module, we will delve into the critical areas of access control and data protection. You will learn how to secure physical and logical access to assets, implement effective logging and monitoring practices, and utilize identity management systems to protect sensitive information.
涵盖的内容
6个视频1个作业
In this module, we will explore advanced network security techniques, encryption strategies, and the complexities of securing virtual and cloud environments. You will gain practical knowledge on securing network infrastructures, managing encryption systems, and protecting cloud-based assets.
涵盖的内容
7个视频
In this module, we will focus on proactive and reactive measures for managing security risks. You will learn about conducting effective security training, testing security controls, managing incidents, and handling digital forensics to ensure comprehensive protection of information assets.
涵盖的内容
7个视频1篇阅读材料3个作业
获得职业证书
将此证书添加到您的 LinkedIn 个人资料、简历或履历中。在社交媒体和绩效考核中分享。
位教师

提供方
从 Computer Security and Networks 浏览更多内容
- 状态:免费试用
Packt
- 状态:免费试用
- 状态:免费试用
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
更多问题
提供助学金,