Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore the variety of methods through which stored data can be secured and made highly available, despite realization of malware threats, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: distinguishing between data and information how they are secured; how to define the relationship between big data and the value of data analytics; and listing methods of securing a storage area network (SAN). Next, learn to enable password authentication for Internet Small Computer Systems Interface (iSCSI) target access; to recognize common security options available with cloud storage; and to ensure that decommissioned storage media do not contain retrievable data artifacts. You will learn how to deploy Structured Query Language (SQL) Database in the Azure cloud; how to implement a database replication strategy; how to protect data with the Windows backup feature; and how to protect data by backing it up to the cloud. Finally, learn how to identify the various forms of social engineering and the related security risks, and how to implement controls that provide data availability.



Expected Duration (hours)
1.1

Lesson Objectives

Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware

  • Course Overview
  • distinguish between data and information and describe how they are secured
  • define the relationship between big data and the value of data analytics
  • list methods of securing a SAN
  • enable password authentication for iSCSI target access
  • recognize common security options available with cloud storage
  • ensure that decommissioned storage media does not contain retrievable data artifacts
  • identify common database hardening techniques
  • deploy Microsoft SQL Database in the Azure cloud
  • implement a database replication strategy
  • identify data availability strategies, including whether security controls are still in place after data recovery
  • protect data using the Windows Backup feature
  • protect data by backing it up to the cloud
  • distinguish between malware types
  • identify the various forms of social engineering and the related security risks
  • implement controls that provide data availability
  • Course Number:
    it_spcisa19_09_enus

    Expertise Level
    Expert