From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors

Welcome

- [Michael] Welcome to CISA five, Protection of IT Assets. Well, in this course, you're gonna learn about an intro to information security and some of the things that are involved in that, cyber attacks, social engineering, different types of domains. We're gonna talk about security controls and access control models. We're gonna talk about identity management a little bit. We're gonna talk about cryptography and hash algorithms and crypto algorithms, symmetric and asymmetric. We're gonna talk about different types of attacks and countermeasures. We'll talk about networking technologies and secure protocols, wireless. All kinds of good stuff. And then we'll wrap it up with different types of attestation audits, SOC audits, what we used to call SAS 70s. So if you're ready to watch one of the best videos you've ever seen in your darn life, then I would push that button and watch CISA five, IT Asset Protection.

Contents