Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CyberSecurity Audit School
CyberSecurity Audit School
Overview (1:57)
Cybersecurity Key Concepts (18:33)
Cybersecurity History and Breaches (17:42)
Types of Cyber Attacks - Human (17:49)
Types of Cyber Attacks - Technical (22:14)
Industry Frameworks (PCI, HIPAA, CIS CSC, ISO_IEC) (23:36)
NIST Frameworks and Standards (15:29)
Cybersecurity Frameworks, Standards (19:59)
Cybersecurity Oversight, Governance & Compliance (22:12)
Security Policies (22:22)
Security Risk Management Overview (21:24)
Threat Analysis (17:52)
Security Risk Management in Practice (21:49)
Asset Identification and Inventory (20:48)
Third-party _ Service Provider Management (15:09)
Business Impact Assessment (14:55)
Configuration Management and Change Control (16:11)
Defending Business Assets Overview (19:02)
Identity and access management (22:15)
Authentication and Authorization (20:43)
Vulnerability and Patch Management (23:06)
Security awareness (18:53)
Physical Security (19:34)
Personnel Security (22:21)
Computer Networking Fundamentals (19:37)
Network Defenses (22:19)
Network Security Access Controls (20:43)
EndPoint and System Security Configuration (15:52)
EndPoint and System Security Protection (22:19)
Application Security (21:48)
Cloud & Virtualization Security (22:40)
Encryption Concepts (18:58)
Cryptographic Algorithms (22:55)
Encryption - Public Key Infrastructure
Data Privacy Controls (20:13)
Securing Data (25:25)
Logging, monitoring and alerting (16:44)
Incident Response (IR) Planning (20:51)
Incident Response (IR) Testing (19:53)
Digital Forensics (14:04)
Recovering Systems (21:22)
Business Continuity and Recovery (14:54)
The Auditor-s Role (23:06)
CISO-s Role (19:25)
Establishing Audit Scope (17:27)
Building the Audit Plan (28:03)
Cybersecurity evaluation methods (16:28)
Vulnerability Assessments, Scanning and Testing (20:58)
Penetration Testing (22:48)
Security Maturity Models (14:55)
Auditing using NIST frameworks (16:58)
Auditing other security frameworks, standards ISO (15:32)
Auditing PCI DSS (19:37)
Cybersecurity Auditing Examples (15:30)
Collecting and Organizing Cybersecurity Evidence
NIST Reporting Requirements (19:43)
Prioritizing Risks and Influencing decisions (18:53)
Course Summary and Conclusion (5:51)
EndPoint and System Security Protection
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock