![]() |
Cybersecurity Audit School 2024 - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Cybersecurity Audit School 2024 (/Thread-Cybersecurity-Audit-School-2024) |
Cybersecurity Audit School 2024 - OneDDL - 11-14-2024 ![]() Free Download Cybersecurity Audit School 2024 Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 11.69 GB | Duration: 18h 30m "Enhancing Auditors' Roles in Cyber Risk Management and Control Assessment" What you'll learn Be able to identify and assess cybersecurity risks specific to their organization. Understand how to implement and evaluate cybersecurity controls. Recognize the auditor's role in the cybersecurity landscape and how to collaborate with cybersecurity teams. Gain practical experience through scenarios that reinforce theoretical concepts. Requirements Participants are expected to have the following foundational knowledge and skills before enrolling in the course 1. Basic Understanding of Auditing Principles: Familiarity with auditing concepts, processes, and methodologies is essential. 2. Introductory Knowledge of Cybersecurity: A general understanding of cybersecurity terms, concepts, and common threats is beneficial. 3. Experience with Risk Management: Prior experience or coursework related to risk assessment and management will enhance comprehension of course material. 4. Familiarity with Regulatory Standards: Awareness of industry standards and regulations related to cybersecurity, such as GDPR, HIPAA, or PCI-DSS, is advantageous. While these prerequisites are recommended, a strong desire to learn and engage with cybersecurity topics will also support participants' success in the course. Description In an era of increasing cyber threats, auditors must go beyond traditional roles and understand the complexities of cybersecurity. This course equips participants with the knowledge and skills to effectively contribute to their organization's cybersecurity efforts. Attendees will explore the risks associated with cyberattacks, learn how to design and implement robust controls, and understand compliance with industry standards and regulations.Key topics include effective control frameworks, identifying warning signs of potential incidents, and employing investigative techniques to analyze cybersecurity breaches.By the end of the course, attendees will be empowered to assess the effectiveness of cybersecurity controls and understand their crucial role as members of their organization's "Cyber Defense Team." This comprehensive program is essential for auditors aiming to enhance their contributions to safeguarding organizational data and infrastructure. Join us to build your expertise in cybersecurity and ensure your organization is well-prepared to face evolving threats.Key Topics:Cybersecurity Fundamentals: Overview of key concepts, terminology, and frameworks in cybersecurity.Control Frameworks: Examination of popular cybersecurity frameworks (e.g., NIST, ISO 27001) and their application in organizational contexts.Positioning Controls: Strategies for determining the most effective placement of cybersecurity controls within organizational processes.Substantive Testing: Techniques for assessing the effectiveness of cybersecurity controls through substantive testing. Overview Section 1: Cybersecurity Audit School Lecture 1 Overview Lecture 2 Cybersecurity Key Concepts Lecture 3 Cybersecurity History and Breaches Lecture 4 Types of Cyber Attacks - Human Lecture 5 Types of Cyber Attacks - Technical Lecture 6 Cybersecurity Frameworks, Standards Lecture 7 NIST Frameworks and Standards Lecture 8 Industry Frameworks (PCI, HIPAA, CIS CSC, ISO/IEC) Lecture 9 Cybersecurity Oversight, Governance & Compliance Lecture 10 Security Policies Lecture 11 Security Risk Management Overview Lecture 12 Threat Analysis Lecture 13 Security Risk Management in Practice Lecture 14 Asset Identification and Inventory Lecture 15 Third-party / Service Provider Management Lecture 16 Business Impact Assessment Lecture 17 Configuration Management and Change Control Lecture 18 Defending Business Assets Overview Lecture 19 Identity and access management Lecture 20 Authentication and Authorization Lecture 21 Vulnerability and Patch Management Lecture 22 Security awareness Lecture 23 Physical Security Lecture 24 Personnel Security Lecture 25 Computer Networking Fundamentals Lecture 26 Network Defenses Lecture 27 Network Security Access Controls Lecture 28 EndPoint and System Security Configuration Lecture 29 EndPoint and System Security Protection Lecture 30 Application Security Lecture 31 Cloud & Virtualization Security Lecture 32 Encryption Concepts Lecture 33 Cryptographic Algorithms Lecture 34 Encryption - Public Key Infrastructure Lecture 35 Data Privacy Controls Lecture 36 Securing Data Lecture 37 Logging, monitoring and alerting Lecture 38 Incident Response (IR) Planning Lecture 39 Incident Response (IR) Testing Lecture 40 Digital Forensics Lecture 41 Recovering Systems Lecture 42 Business Continuity and Recovery Lecture 43 The Auditor's Role Lecture 44 CISO's Role Lecture 45 Establishing Audit Scope Lecture 46 Building the Audit Plan Lecture 47 Cybersecurity evaluation methods Lecture 48 Vulnerability Assessments, Scanning and Testing Lecture 49 Penetration Testing Lecture 50 Security Maturity Models Lecture 51 Auditing using NIST frameworks Lecture 52 Auditing other security frameworks, standards ISO Lecture 53 Auditing PCI DSS Lecture 54 Cybersecurity Auditing Examples Lecture 55 Collecting and Organizing Cybersecurity Evidence Lecture 56 NIST Reporting Requirements Lecture 57 Prioritizing Risks and Influencing decisions Lecture 58 Course Summary and Conclusion This course is ideal for anyone looking to strengthen their skills in cybersecurity assessment and contribute effectively to their organization's cyber defense strategy. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |