IT Auditing: Using Controls to Protect Information Assets

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.               

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IT
  • Auditing
  • IT Auditing
  • Audit
  • IT Security
  • Security
  • Systems

Course programme

Description
Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.

Program

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource.

Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assetscovers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates( Here are the contents of this book ).


Inside, you'll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus,you'll get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.



With this book you'll learn how to:


  • Implement best practice IT audit processes and controls.
  • Analyze UNIX-, Linux-, and Windows-based operating systems.
  • Audit network routers, switches, firewalls, WLANs, and mobile devices.
  • Evaluate entity-level controls, data centers, and disaster recovery plans.
  • Examine Web servers, platforms, and applications for vulnerabilities.
  • Review databases for critical controls.
  • Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies.
  • Implement sound risk analysis and risk management practices.
  • Drill down into applications to find potential control weaknesses.

Reviews of the Books:

'A must-have for auditors and IT professionals.'
-Doug Dexter, CISSP-ISSMP, CISA, Audit Team Lead, Cisco Systems, Inc.

Author: Chris Davis, Mike Schiller, Kevin Wheeler
Publisher: McGraw-Hill Osborne
Format: Soft Cover
ISBN 10: 0072263431
ISBN 13: 9780072263435
Pages: 387
Published Date: Jan 07
Availability: Ex Stock

Order today for immediate despatch!

IT Auditing: Using Controls to Protect Information Assets

Price on request