This is first Part of CISA Domain 5 which is Protection of Information Assets .This Domain has 27 % weighting in the CISA Exam.
Here is the breakdown of the video for your convenience .
00:00 – 02:06 Introduction and Agenda
02:07 – 05:20 Information Security Management – Key Tasks
05:22 – 07:52 Intrinsic and Contextual value of Data
07:53 – 09:14 Information Security Management
09:15 – 10:42 Key Elements of Information Security Program and Roles and Responsibilities
10:43 – 12:55 Classification of Information Assets
12:56 – 14:39 Security and Monitoring Controls
14:41 – 18:43 System Access(Access Rule,Authentication,Time based Control)
18:44 – 21:28 Identity Life Cycle and Privacy rules
21:30 – 22:50 PII ( Personally Identifiable Information )
22:52 – 26:48 Critical Success factor of Information Security
26:50 – 31:43 Risk and Control for External Parties
31:45 – 32:25 Type of Computer Crime
32:26 – 34:34 Types of Incidents and Incident Response Phases
34:36 – 43:58 Logical Access Controls , Identification and Authentication
43:59 – 50:30 Protection of Logs ,Audit log Management , Security Information and Event Management
50:32 – 57:15 Virtualization , Internet Security , Firewalls
Note : You might face low voice quality at different sections . We apologize for that as it was out of our hands .
Saquib Malik has diversified experience of 8 years in the field of information security management, IS auditing, GDPR, CMMi, process re engineering and IT Service Management. He carries multiple certifications such as CEHv9, CHFIv9 ,PMP and CISA. As a trainer, conducted number of trainings on ISMS, CISM, Risk Management, IT Service Management and IS Auditing.
It is an effort by GISPP (Global Information Security Society for Professionals of Pakistan) .GISPP was initiated in 2016 by a group of Pakistani Information Security professionals living and working in Saudi Arabia. You can follow us on our social media links mentioned on our Channel Page .
#CISA #CISAExam #CISADomain5 #GISPP #GisppAcademy #GisppTraining #Cybersecurity #Informationsecurity