CyberSecurity Audit School
Organizations needs to establish robust cybersecurity programs
In an era of increasing cyber threats, auditors must go beyond traditional roles and understand the complexities of cybersecurity. This course equips participants with the knowledge and skills to effectively contribute to their organization's cybersecurity efforts. Attendees will explore the risks associated with cyberattacks, learn how to design and implement robust controls, and understand compliance with industry standards and regulations.
Key topics include effective control frameworks, identifying warning signs of potential incidents, and employing investigative techniques to analyze cybersecurity breaches.
By the end of the course, attendees will be empowered to assess the effectiveness of cybersecurity controls and understand their crucial role as members of their organization’s “Cyber Defense Team.” This comprehensive program is essential for auditors aiming to enhance their contributions to safeguarding organizational data and infrastructure. Join us to build your expertise in cybersecurity and ensure your organization is well-prepared to face evolving threats.
Key Topics:
- Cybersecurity Fundamentals: Overview of key concepts, terminology, and frameworks in cybersecurity.
- Control Frameworks: Examination of popular cybersecurity frameworks (e.g., NIST, ISO 27001) and their application in organizational contexts.
- Positioning Controls: Strategies for determining the most effective placement of cybersecurity controls within organizational processes.
- Substantive Testing: Techniques for assessing the effectiveness of cybersecurity controls through substantive testing.
Your Instructor
Stone River eLearning was started in 2012, and since then we've trained over a million students. Our content is timely and up to date with high production value. Above all, our courses are well taught, so you'll learn more easily than the cut rate courses on some other sites.
Course Curriculum
-
StartOverview (1:57)
-
PreviewCybersecurity Key Concepts (18:33)
-
StartCybersecurity History and Breaches (17:42)
-
StartTypes of Cyber Attacks - Human (17:49)
-
PreviewTypes of Cyber Attacks - Technical (22:14)
-
StartIndustry Frameworks (PCI, HIPAA, CIS CSC, ISO_IEC) (23:36)
-
StartNIST Frameworks and Standards (15:29)
-
StartCybersecurity Frameworks, Standards (19:59)
-
StartCybersecurity Oversight, Governance & Compliance (22:12)
-
StartSecurity Policies (22:22)
-
StartSecurity Risk Management Overview (21:24)
-
StartThreat Analysis (17:52)
-
StartSecurity Risk Management in Practice (21:49)
-
StartAsset Identification and Inventory (20:48)
-
StartThird-party _ Service Provider Management (15:09)
-
StartBusiness Impact Assessment (14:55)
-
StartConfiguration Management and Change Control (16:11)
-
StartDefending Business Assets Overview (19:02)
-
StartIdentity and access management (22:15)
-
StartAuthentication and Authorization (20:43)
-
StartVulnerability and Patch Management (23:06)
-
StartSecurity awareness (18:53)
-
StartPhysical Security (19:34)
-
StartPersonnel Security (22:21)
-
StartComputer Networking Fundamentals (19:37)
-
StartNetwork Defenses (22:19)
-
StartNetwork Security Access Controls (20:43)
-
StartEndPoint and System Security Configuration (15:52)
-
StartEndPoint and System Security Protection (22:19)
-
PreviewApplication Security (21:48)
-
StartCloud & Virtualization Security (22:40)
-
StartEncryption Concepts (18:58)
-
StartCryptographic Algorithms (22:55)
-
StartEncryption - Public Key Infrastructure
-
StartData Privacy Controls (20:13)
-
StartSecuring Data (25:25)
-
StartLogging, monitoring and alerting (16:44)
-
StartIncident Response (IR) Planning (20:51)
-
StartIncident Response (IR) Testing (19:53)
-
StartDigital Forensics (14:04)
-
StartRecovering Systems (21:22)
-
StartBusiness Continuity and Recovery (14:54)
-
StartThe Auditor-s Role (23:06)
-
StartCISO-s Role (19:25)
-
StartEstablishing Audit Scope (17:27)
-
StartBuilding the Audit Plan (28:03)
-
StartCybersecurity evaluation methods (16:28)
-
StartVulnerability Assessments, Scanning and Testing (20:58)
-
StartPenetration Testing (22:48)
-
StartSecurity Maturity Models (14:55)
-
StartAuditing using NIST frameworks (16:58)
-
StartAuditing other security frameworks, standards ISO (15:32)
-
StartAuditing PCI DSS (19:37)
-
StartCybersecurity Auditing Examples (15:30)
-
StartCollecting and Organizing Cybersecurity Evidence
-
StartNIST Reporting Requirements (19:43)
-
StartPrioritizing Risks and Influencing decisions (18:53)
-
StartCourse Summary and Conclusion (5:51)
Frequently Asked Questions
Get started now!

