Certified Information Systems Auditor CISA, Part 5 of 5: Protecting Assets

with expert Kenneth Mayer

The objective of this course is to ensure enterprise security policies, standards procedures and controls will ensure confidentiality, integrity and availability of information assets. This course will cover standards and procedures, evaluate design and monitoring of systems, data classification, physical access, environmental controls and safeguards as well as retrieval and disposal of information assets. This course is part of a series covering the ISACA Certified Information Systems Auditor (CISA).


Intermediate | 2h 26m | March 01, 2018

Security

Course Outline


Kenneth Mayer

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.




Explore Our Blogs, Courses and Webinars