Performing IT security audits at the enterprise level can be an overwhelming task. It is difficult to know where to start and which controls should be audited first. Audits often focus on things that are not as important, wasting precious time and resources.
Performing IT security audits at the enterprise level can be an overwhelming task. It is difficult to know where to start and which controls should be audited first. Audits often focus on things that are not as important, wasting precious time and resources.
Management is left in the dark about the real risk to the organizations mission. Operations staff cant use the audit report to reproduce or remediate findings. AUD507 gives the student the tools, techniques and thought processes required to perform meaningful risk assessments and audits.
Learn to use risk assessments to recommend which controls should be used and where they should be placed. Know which tools will help you focus your efforts and learn how to automate those tools for maximum effectiveness.
Skills Earned:
Apply risk-based decision making to the task of auditing enterprise security
Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit
Conduct a proper risk assessment of an enterprise to identify vulnerabilities and develop audit priorities
Establish a well-secured baseline for computers and networks as a standard to conduct audit against
Perform cloud environment audits using automated tools and a repeatable process
Audit virtualization hosts and container environments to ensure properly deployment and configuration
Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed decisions about risk and resources
Audit a web application's configuration, authentication, and session management to identify vulnerabilities attackers can exploit
Utilize automated tools to audit Windows and Linux systems
Audit Active Directory Domains
Launched in 1989 as a cooperative for information security thought leadership, it is SANS’ ongoing mission to empower cyber security professionals with the practical skills and knowledge they need to make our world a safer place.
We fuel this effort with high quality training, certifications, scholarship academies, degree programs, cyber ranges, and resources to meet the needs of every cyber professional. Our data, research, and the top minds in cybersecurity collectively ensure that individuals and organizations have the actionable education and support they need.
A 3-day instructor-led classroom training, designed to guide you on the latest thinking in Enterprise Governance of Information & Technology. Essential for business leaders to achieve their objectives for effective I&T governance.
This is an intensive course to help participants to learn how to audit based on the ISO/IEC 20000-1:2018 Information Technology – Service Management System.
This course has been designed to train Software professionals in the Principles and Practices of Auditing the organization’s Quality System also called process audits.Â
Managing IT as an organisational resource is essential for good business value and risk management. Control Objectives for Information and Related Technology (COBIT) provides best practices in IT governance for IT professionals and managers.
This 5-day cyber security course (CISSP) backed by (ISC²)will expand upon your knowledge addressing the essential elements of the eight domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy