IT Auditing by Chris Davis
Description
Design and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced it audit and security professionals, BUT it Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Inside, you’ll learn how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, you get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.
BUILD AND MAINTAIN AN IT AUDIT FUNCTION FOR MAXIMUM EFFECTIVENESS AND VALUE
Implement the best practice IS to audit, process and control
Analyze UNIX -, Linux-, and Windows operating system based
Audit router network, switches, firewalls, WLANs, and mobile devices
Evaluate entity-level controls, data centers, and disaster recovery plans
Examine Web servers, platforms, and applications for vulnerabilities
Review for crisis control
Use the COSO, CobiT, ITIL, ISO, and NSA INFOSEC methodologies
Platform of sound risk analysis and risk management practices
Drill down into applications to find potential control weaknesses
Take IT Auditing by Chris Davis at Whatstudy.com
More Info: Click to preview
Course Features
- Lectures 0
- Quizzes 0
- Duration Lifetime access
- Skill level All levels
- Language English
- Students 141
- Assessments Yes
1 Comment
“We create this shop with the mission: Bring the courses to 500 millions of people in the world,
to help them awake their power and change their life”