-
Chapter 1 : Data Management.Lecture 1: Data Storage-The BasicsFree PreviewLecture 2: Types of Data StorageFree PreviewLecture 3: Data Life CyclePrivateLecture 4: M/C Test on Data Storage and Data Life CyclePrivateLecture 5: Databases Part 1PrivateLecture 6: Databases Part 2PrivateLecture 7: Database SchemaPrivateLecture 8: M/C Test on Data Management, Data Life Cycle, and DatabasesPrivateLecture 9: SQL-The BasicsPrivateLecture 10: SQL-Aggregate FunctionsPrivateLecture 11: SQL-String FunctionsPrivateLecture 12: M/C on SQL the Basics and Aggregate and String FunctionsPrivateLecture 13: SQL-Logical Operators-The BasicsPrivateLecture 14: SQL-Logical Operators-ContinuedPrivateLecture 15: SQL-Comparison Operators-The BasicsPrivateLecture 16: SQL-Comparison Operators-ContinuedPrivateLecture 17: M/C Test on Comparison and Logical Operators in SQLPrivateLecture 18: ISC Multiple Choice Test on SQLPrivateLecture 19: Multiple Choice Test on all of Chapter 1 Data ManagementPrivate
-
Chapter 2 : Information Systems-IT InfrastructureLecture 1: Types of NetworksFree PreviewLecture 2: M/C Questions on Types of NetworksPrivateLecture 3: Cloud Computing-The BasicsFree PreviewLecture 4: Cloud Computing-Roles and ResponsibilitiesPrivateLecture 5: ISC-M/C on Cloud Computing Basics, Roles and ResponsibilitiesPrivateLecture 6: Cloud Deployment ModelsPrivateLecture 7: M/C Questions on Cloud Deployment ModelsPrivateLecture 8: Risks and Controls related to Cloud ComputingPrivateLecture 9: Multiple Choice Test on IT Infrastructure and Cloud ComputingPrivate
-
Chapter 3 : Enterprise and Accounting Information SystemsLecture 1: Types of Information systems and data miningFree PreviewLecture 2: Types of Information systems continuedFree PreviewLecture 3: Business Processes-Long Term Financing CyclePrivateLecture 4: M/C Questions on Types of Information Systems and Data MiningPrivateLecture 5: Enterprise Resource Planning SystemsPrivateLecture 6: M/C Test on Enterprise Resource Planning (ERP) SystemsPrivateLecture 7: Risks of Blockchain in Financial ReportingPrivateLecture 8: Risks of Blockchain in Financial Reporting Part 2PrivateLecture 9: M/C Questions on Risk of Blockchain in Financial ReportingPrivateLecture 10: Controls to Mitigate Risks Associated with Blockchain in Financial ReportingPrivateLecture 11: M/C Test on Types of Systems, ERP, Risk of Blockchain in Financial ReportingPrivateLecture 12: Changes to business processes to improve Accounting Info SystemsPrivateLecture 13: M/C Questions on Changes in Business Processes to Improve AISPrivateLecture 14: AIS Business Processes-Revenue CyclePrivateLecture 15: M/C Questions on AIS Business Processes-Revenue CyclePrivateLecture 16: Business Processes AIS-Expenditures CyclePrivateLecture 17: M/C Questions on AIS Business Processes-Expenditures CyclePrivateLecture 18: Business Processes-Production CyclePrivateLecture 19: M/C Questions on AIS Business Processes-Production CyclePrivateLecture 20: Business Processes-HR and Payroll Cycle Part 1PrivateLecture 21: HR and Payroll Cycle Part 2PrivateLecture 22: M/C Questions on Payroll Cycle and Human ResourcesPrivateLecture 23: Long Term Financing CyclePrivateLecture 24: M/C Questions on Long Term Financing CyclePrivateLecture 25: Business Processes-General Ledger and Reporting CyclePrivateLecture 26: M/C Questions on General Ledger and Reporting CyclePrivateLecture 27: Multiple Choice Test on Enterprise and Accounting Information systemsPrivate
-
Chapter 4 : IT System AvailabilityLecture 1: Disaster Recovery Part 1Free PreviewLecture 2: Disaster Recovery Part 2Free PreviewLecture 3: M/C ISC Test on Disaster RecoveryPrivateLecture 4: Business Impact AnalysisPrivateLecture 5: M/C Test on Business Impact AnalysisPrivateLecture 6: Measures of System Availability and Service Level Agreements Part 1PrivateLecture 7: ISC M/C Test on Service Level Agreements Part OnePrivateLecture 8: Availability and Service Level Agreements Part 2PrivateLecture 9: Multiple Choice Test on Information Systems-AvailabilityPrivate
-
Chapter 5 : Change ManagementLecture 1: Change Management-The BasicsFree PreviewLecture 2: M/C Questions on Change Management-The BasicsPrivateLecture 3: Release Management-Part 1Free PreviewLecture 4: M/C Questions on Release Management Part 1PrivateLecture 5: Release Management-Deployment MethodsPrivateLecture 6: M/C Questions on Deployment Methods-Release ManagementPrivateLecture 7: Patch ManagementPrivateLecture 8: M/C Questions on Patch ManagementPrivateLecture 9: Change Control PoliciesPrivateLecture 10: Multiple Choice Test on Change ManagementPrivate
-
Chapter 6 : Regulations Standards and FrameworksLecture 1: HIPAA-The BasicsFree PreviewLecture 2: M/C Questions on HIPAA The BasicsPrivateLecture 3: HIPAA-Privacy RuleFree PreviewLecture 4: M/C Questions on the HIPAA Privacy RulePrivateLecture 5: HIPAA-Security RulePrivateLecture 6: M/C Test on HIPAA Security RulePrivateLecture 7: General Data Protection Regulation GDPRPrivateLecture 8: M/C Questions on GDPR for ISCPrivateLecture 9: PCI DSS-The BasicsPrivateLecture 10: PCI DSS ContinuedPrivateLecture 11: M/C Questions on PCI DSS for the ISC ExamPrivateLecture 12: M/C Test on HIPAA, PCI DSS and GDPRPrivateLecture 13: NIST Cybersecurity Framework-CorePrivateLecture 14: M/C Questions on NIST Cybersecurity Framework-CorePrivateLecture 15: NIST Cybersecurity Framework-profilesPrivateLecture 16: M/C Q on NIST ProfilesPrivateLecture 17: NIST Cybersecurity Framework TiersPrivateLecture 18: M/C NIST Cybersecurity Framework-TiersPrivateLecture 19: NIST Privacy FrameworkPrivateLecture 20: M/C NIST Privacy FrameworkPrivateLecture 21: COBIT 2019PrivateLecture 22: M/C Questions on COBIT Governance PrinciplesPrivateLecture 23: Multiple Choice Test on NIST Cybersecurity Framework and COBIT 2019PrivateLecture 24: CIS Controls Part 1PrivateLecture 25: CIS Controls Part 2PrivateLecture 26: CIS Controls Part 3PrivateLecture 27: CIS Controls Part 4PrivateLecture 28: M/C Questions on CIS ControlsPrivateLecture 29: CIA Security TriadPrivateLecture 30: Chapter Multiple Choice Test-Regulations, Standards and FrameworksPrivate
-
Chapter 7 : Security-Threats and AttacksLecture 1: Stages in a Cyber AttackFree PreviewLecture 2: Threat AgentsFree PreviewLecture 3: M/C Questions on Stages in a Cyber Attack and Threat AgentsPrivateLecture 4: Types of AttacksPrivateLecture 5: Types of Attacks Part 2PrivateLecture 6: M/C Questions on Types of AttacksPrivateLecture 7: M/C Test on Stages of a Cyberattack, Threat Agents, Types of AttacksPrivateLecture 8: Techniques used in Cyber Attacks-Buffer OverflowPrivateLecture 9: Techniques used in cyber attack-mobile codePrivateLecture 10: M/C Questions on Buffer Overflow and Mobile CodePrivateLecture 11: Techniques used in cyber attack-cross site scriptingPrivateLecture 12: Techniques used in a cyber attack-SQL injectionPrivateLecture 13: M/C Questions on Cross Site Scripting and SQL InjectionPrivateLecture 14: Techniques used in cyber attack-race conditionsPrivateLecture 15: Techniques used in cyber attack-covert channelPrivateLecture 16: M/C Questions on Race Conditions and Covert ChannelsPrivateLecture 17: Techniques used in cyber attack-replay attackPrivateLecture 18: M/C Questions on Replay AttacksPrivateLecture 19: M/C Test on Techniques used in Cyber attacksPrivateLecture 20: Cybersecurity risks related to PaaSPrivateLecture 21: M/C Q Cybersecurity Risks related to PaaSPrivateLecture 22: Cybersecurity risks related to IaaSPrivateLecture 23: M/C Questions-Cybersecurity Risks related to IaaSPrivateLecture 24: Cybersecurity risks related to SaaSPrivateLecture 25: M/C Questions-Cybersecurity Risks related to SaaSPrivateLecture 26: Cybersecurity risks-Internet of ThingsPrivateLecture 27: M/C Questions on Cybersecurity Risks IoTPrivateLecture 28: Security-Threat ModelingPrivateLecture 29: Threat Modeling Part 2PrivateLecture 30: M/C Questions on Threat ModelingPrivateLecture 31: Cybersecurity Risks in communicating with customersPrivateLecture 32: Multiple Choice Test-Threats and AttacksPrivate
-
Chapter 8 : Security-Controls and MitigationLecture 1: Protecting the Network-Part 1-Segmentation, Isolation, VPNFree PreviewLecture 2: M/C Questions on Segmentation, Isolation, and VPNPrivateLecture 3: Protecting the Network-Part 2-System Hardening, Intrusion Detection, MAC FilterFree PreviewLecture 4: M/C on System Hardening, intrusion detection, and MAC filterPrivateLecture 5: Vulnerability ManagementPrivateLecture 6: M/C Questions on Vulnerability ManagementPrivateLecture 7: Defense in Depth Strategy-layeringPrivateLecture 8: M/C Questions on Defense in Depth StrategyPrivateLecture 9: M/C Test on Protecting the Network, Vulnerability and Defense in DepthPrivateLecture 10: Least-Privilege, Need-to-Know, Zero-Trust, WhitelistingPrivateLecture 11: M/C on Least Privilege, Need to Know, Zero Trust, WhitelistingPrivateLecture 12: Security Policy and Access ControlsPrivateLecture 13: M/C Questions on Security Policy-Access ControlsPrivateLecture 14: Technology Acceptable Use Policy-Bring Your Own DevicePrivateLecture 15: M/C Test- Least Privilege, Need to Know, Zero-Trust, Access Controls, BYODPrivateLecture 16: Preventive Controls Part 1PrivateLecture 17: Preventive Controls Part 2PrivateLecture 18: M/C Questions on Preventive ControlsPrivateLecture 19: Detective ControlsPrivateLecture 20: M/C Questions on Detective and Corrective ControlsPrivateLecture 21: Scenario- Authentication techniques for a specific purpose-Part 1PrivateLecture 22: Authentication Scenario-Part 2PrivateLecture 23: Multiple Choice Chapter Test on Controls and MitigationPrivate
-
Chapter 9 : Security-Awareness, Training, Education and TestingLecture 1: Security Awareness, Training and EducationFree PreviewLecture 2: M/C Questions on Security Awareness, Training, Education and TestingPrivateLecture 3: Role of the IT Professional in Security Awareness and TrainingFree PreviewLecture 4: M/C Test on Role of the IT Professional in Security Awareness etcPrivateLecture 5: Security Testing-Vulnerabilities and PenetrationPrivateLecture 6: M/C on Security Testing-Vulnerabilities and PenetrationPrivateLecture 7: IT Security Professional Role in Security Assessment ReportPrivateLecture 8: M/C Questions on IT Professional's role in a Security Assessment ReportPrivateLecture 9: Security Testing-WalkthroughPrivateLecture 10: Multiple Choice Questions on Security-WalkthroughsPrivateLecture 11: Security-Testing-SOC2 The BasicsPrivateLecture 12: Security-Trust Services Criteria PrinciplesPrivateLecture 13: M/C on Security Testing-SOC 2-The Basics and Trust Services CriteriaPrivateLecture 14: SOC 2-TSC-Control Design DeficienciesPrivateLecture 15: M/C Questions on SOC 2-TSC Control Design DeficienciesPrivateLecture 16: SOC 2-Testing for Control Operating DeficienciesPrivateLecture 17: M/C Questions on SOC 2 Operating DeficienciesPrivateLecture 18: Multiple Choice Chapter Test on Security Awareness, Training and TestingPrivate
-
Chapter 10 : Confidentiality, Privacy and Incident ResponseLecture 1: Encryption-Part 1-Symmetric vs AssymetricFree PreviewLecture 2: Encryption-Part 2-Data at Rest, Data in Transit, Data in MemoryFree PreviewLecture 3: M/C Questions on Encryption for ISCPrivateLecture 4: Data Loss Prevention (DLP) SystemsPrivateLecture 5: Multiple Choice Questions on Data Loss PreventionPrivateLecture 6: Data Protection Techniques, Tokenization, Obfuscation and MaskingPrivateLecture 7: Multiple Choice Questions on Data Protection TechniquesPrivateLecture 8: M/C Questions on Encryption, Data Loss Prevention, Tokenization, MaskingPrivateLecture 9: Operational and Financial Implications of a data breachPrivateLecture 10: M/C on Operational and Financial Implications of a Data BreachPrivateLecture 11: Security Event vs Security IncidentPrivateLecture 12: M/C Questions on Security Event vs Security IncidentPrivateLecture 13: Security Incident Response PlanPrivateLecture 14: M/C Questions on Incident Response PlanPrivateLecture 15: Testing of Security Incident ResponsePrivateLecture 16: Multiple Choice Chapter Test on Confidentiality, Privacy and Incident ResponsePrivate
-
Chapter 11 : SOC EngagementsLecture 1: SOC 1 EngagementsFree PreviewLecture 3: SOC 2-The BasicsFree PreviewLecture 4: M/C Questions on SOC 2 The BasicsPrivateLecture 5: SOC 2 Type 1 vs SOC 2 Type 2PrivateLecture 6: M/C Questions on SOC 2 Type 1 vs SOC 2 Type 2PrivateLecture 7: Management Assertions in a SOC 1 EngagementPrivateLecture 8: M/C Questions on Management Assertions in a SOC 1 EngagementPrivateLecture 9: Management Assertions-SOC 2 EngagementsPrivateLecture 10: M/C Questions on Management Assertions in a SOC 2 EngagementPrivateLecture 11: Materiality-SOC EngagementsPrivateLecture 12: M/C Questions on Materiality in a SOC EngagemenPrivateLecture 13: SOC-Risk Assessment by the service organizationPrivateLecture 14: M/C Questions on Risk Assessment at the Service OrganizationPrivateLecture 15: Service Auditor's risk assessment in a SOC engagementPrivateLecture 16: M/C Questions-Service Auditor Risk Assessment in a SOC EngagementPrivateLecture 17: Criteria for a vendor to be considered a Sub-Service OrganizationPrivateLecture 18: M/C Questions- Criteria for a Vendor to be a Sub-Service OrganizationPrivateLecture 19: SOC 2-Service Commitments vs System RequirementsPrivateLecture 20: M/C Questions on Service Commitments and System RequirementsPrivateLecture 21: SOC Engagements-System DescriptionPrivateLecture 22: M/C Questions on System Description in a SOC EngagementPrivateLecture 23: Description Criteria for Cybersecurity Risk Management ProgramPrivateLecture 24: M/C Questions on Cybersecurity Risk Management Program CriteriaPrivateLecture 25: Complementary User Entity ControlsPrivateLecture 26: M/C Test on Complementary User Entity Controls-SOC EngagementsPrivateLecture 27: SOC-Management Written RepresentationsPrivateLecture 28: M/C Test on Management Written Representations in a SOC EngagementPrivateLecture 29: Defining the System Boundaries in a SOC 2 EngagementPrivateLecture 30: M/C Q on Understanding the System Boundaries in a SOC EngagementPrivateLecture 31: Comparison of management’s system description to suitable criteria in a SOC 1®PrivateLecture 32: comparison of managements system description to the description criteria SOC 2PrivateLecture 33: M/C on Comparison of system description to suitable criteria in SOCPrivateLecture 34: Subsequent Events in a SOC 1 EngagementPrivateLecture 35: M/C Questions on Subsequent Events in a SOC 1 EngagementPrivateLecture 36: Subsequent Events-SOC 2 EngagementPrivateLecture 37: M/C Questions on Subsequent Events in a SOC 2 EngagementPrivateLecture 38: Inclusive vs Carve-Out MethodPrivateLecture 39: Inclusive vs Carve out Part 2- Complementary Subservice Org. ControlsPrivateLecture 40: M/C Questions on Inclusive vs Carve-Out MethodPrivateLecture 41: SOC-Types of Opinions and Report ModificationsPrivateLecture 42: Tests of Controls in a SOC 2 EngagementPrivateLecture 43: M/C Questions on Tests of Controls in a SOC 2 EngagementPrivateLecture 44: Form and Content-SOC 1 Type 1PrivateLecture 45: M/C Questions on Form and Content of a SOC 1 Type 1 ReportPrivateLecture 46: Form and Content-SOC 1 Type 2PrivateLecture 47: M/C Questions on Form and Content of a SOC 1 Type 2 ReportPrivateLecture 48: Form and Content SOC 2 Type 1PrivateLecture 49: M/C Questions on Form and Content of a SOC 2 Type 1 ReportPrivateLecture 50: Form and Content-SOC 2 Type 2PrivateLecture 51: M/C Questions on Form and Content of a SOC 2 Type 2 ReportPrivateLecture 52: M/C Test on Form and Content of SOC 1 and SOC 2 ReportsPrivateLecture 53: M/C Chapter Test #1 on SOC ReportingPrivateLecture 54: M/C Chapter Test #2 on SOC ReportingPrivateLecture 55: M/C Chapter Test on SOC Reporting #3PrivateLecture 56: M/C Questions on Types of Opinions and Report Modifications in a SOC EngagementPrivate
-
Chapter 12 : COSO-Internal Control
-
Chapter 13 : Final Review Chapter-Testlets and Amazon E-BookLecture 1: ISC-Final Exam Testlet #1PrivateLecture 2: ISC Final Exam Testlet # 2PrivateLecture 3: ISC Final Exam Testlet # 3PrivateLecture 4: ISC Final Exam Testlet # 4PrivateLecture 5: ISC Final Exam Testlet # 5PrivateLecture 6: ISC-Final Exam Testlet #6PrivateLecture 7: ISC Final Exam Testlet #7PrivateLecture 8: ISC Amazon E-Book Part 1PrivateLecture 9: ISC Amazon E-Book Part 2PrivateLecture 10: Final Review of Relational DatabasesPrivate
Course Description
2024 ISC Exam is one of the three Discipline Exams. The ISC exam involves IT concepts and controls.