IT Auditing: Using Controls to Protect Information Assets
Course
Distance
Description
-
Type
Course
-
Methodology
Distance Learning
Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.
Reviews
Course programme
Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.
Program
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource.
Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assetscovers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates( Here are the contents of this book ).
Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus,you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.
With this book you'll learn how to:
- Implement best practice IT audit processes and controls.
- Analyze UNIX-, Linux-, and Windows-based operating systems.
- Audit network routers, switches, firewalls, WLANs, and mobile devices.
- Evaluate entity-level controls, data centers, and disaster recovery plans.
- Examine Web servers, platforms, and applications for vulnerabilities.
- Review databases for critical controls.
- Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies.
- Implement sound risk analysis and risk management practices.
- Drill down into applications to find potential control weaknesses.
Reviews of the Books:
'A must-have for auditors and IT professionals.'
-Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.
Author: Chris Davis, Mike Schiller, Kevin Wheeler
Publisher: McGraw-Hill Osborne
Format: Soft Cover
ISBN 10: 0072263431
ISBN 13: 9780072263435
Pages: 387
Published Date: Jan 07
Availability: Ex Stock
Order today for immediate despatch!
IT Auditing: Using Controls to Protect Information Assets