Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Security technicians must determine which security controls most effectively protect assets at a reasonable cost. Explore IT maturity models, and endpoint, Internet of Things (IoT), and mobile device security in this 15-video course. Key concepts covered here include: how IT maturity models provide assessments as to whether technology effectively meets business needs; how to map security hardware and software to the Open Systems Interconnection model (OSI model); and how to enable requirements for complex passwords and user account intruder detection. Next, learn to configure endpoint antimalware policy settings centrally with System Center Configuration Manager (SCCM); how to determine when data loss prevention (DLP) solutions are needed for data privacy; and why IoT devices are generally considered unsecure. Learn to use the shodan.io site to locate vulnerable IoT devices; use techniques such as network isolation and changing default settings to harden IoT and mobile devices; and manually harden an Android smartphone. Finally, learn how to configure SCCM policies to ensure mobile device security compliance and compare OSI Layer 3 and Layer 7 security solutions. This course helps learners prepare for the ISACA Certified Information Systems AuditorĀ  (CISA) certification exam.



Expected Duration (hours)
1.1

Lesson Objectives

Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection

  • discover the key concepts covered in this course
  • recognize how an IT maturity model provides an assessment as to whether technology is effectively meeting business needs
  • align business needs with secured technological solutions
  • map security hardware and software to the OSI model
  • enable requirements for complex passwords and user account intruder detection
  • configure endpoint antimalware policy settings centrally using SCCM
  • determine when DLP solutions should be used for data privacy
  • describe why IoT devices are generally considered to be unsecure
  • browse the shodan.io site to locate vulnerable IoT devices
  • use techniques such as network isolation and changing default settings to harden IoT devices
  • harden mobile devices
  • manually harden an Android smartphone
  • configure Microsoft SCCM policies to ensure mobile device security compliance
  • identify how users can unwittingly install malicious apps on mobile devices
  • compare OSI Layer 3 and Layer 7 security solutions, provide mitigation recommendations, list common IoT devices, and describe how to harden mobile devices
  • Course Number:
    it_spcisa19_08_enus

    Expertise Level
    Expert