- Chapter 1 : Data Management.Lecture 1:Data Storage-The BasicsFree PreviewLecture 2:Types of Data StorageFree PreviewLecture 3:Data Life CyclePrivateLecture 4:M/C Test on Data Storage and Data Life CyclePrivateLecture 5:Databases Part 1PrivateLecture 6:Databases Part 2PrivateLecture 7:Database SchemaPrivateLecture 8:M/C Test on Data Management, Data Life Cycle, and DatabasesPrivateLecture 9:SQL-The BasicsPrivateLecture 10:SQL-Aggregate FunctionsPrivateLecture 11:SQL-String FunctionsPrivateLecture 12:M/C on SQL the Basics and Aggregate and String FunctionsPrivateLecture 13:SQL-Logical Operators-The BasicsPrivateLecture 14:SQL-Logical Operators-ContinuedPrivateLecture 15:SQL-Comparison Operators-The BasicsPrivateLecture 16:SQL-Comparison Operators-ContinuedPrivateLecture 17:M/C Test on Comparison and Logical Operators in SQLPrivateLecture 18:ISC Multiple Choice Test on SQLPrivateLecture 19:Multiple Choice Test on all of Chapter 1 Data ManagementPrivate
- Chapter 2 : Information Systems-IT InfrastructureLecture 1:Types of NetworksFree PreviewLecture 2:M/C Questions on Types of NetworksPrivateLecture 3:Cloud Computing-The BasicsFree PreviewLecture 4:Cloud Computing-Roles and ResponsibilitiesPrivateLecture 5:ISC-M/C on Cloud Computing Basics, Roles and ResponsibilitiesPrivateLecture 6:Cloud Deployment ModelsPrivateLecture 7:M/C Questions on Cloud Deployment ModelsPrivateLecture 8:Risks and Controls related to Cloud ComputingPrivateLecture 9:Multiple Choice Test on IT Infrastructure and Cloud ComputingPrivate
- Chapter 3 : Enterprise and Accounting Information SystemsLecture 1:Types of Information systems and data miningFree PreviewLecture 2:Types of Information systems continuedFree PreviewLecture 3:Business Processes-Long Term Financing CyclePrivateLecture 4:M/C Questions on Types of Information Systems and Data MiningPrivateLecture 5:Enterprise Resource Planning SystemsPrivateLecture 6:M/C Test on Enterprise Resource Planning (ERP) SystemsPrivateLecture 7:Risks of Blockchain in Financial ReportingPrivateLecture 8:Risks of Blockchain in Financial Reporting Part 2PrivateLecture 9:M/C Questions on Risk of Blockchain in Financial ReportingPrivateLecture 10:Controls to Mitigate Risks Associated with Blockchain in Financial ReportingPrivateLecture 11:M/C Test on Types of Systems, ERP, Risk of Blockchain in Financial ReportingPrivateLecture 12:Changes to business processes to improve Accounting Info SystemsPrivateLecture 13:M/C Questions on Changes in Business Processes to Improve AISPrivateLecture 14:AIS Business Processes-Revenue CyclePrivateLecture 15:M/C Questions on AIS Business Processes-Revenue CyclePrivateLecture 16:Business Processes AIS-Expenditures CyclePrivateLecture 17:M/C Questions on AIS Business Processes-Expenditures CyclePrivateLecture 18:Business Processes-Production CyclePrivateLecture 19:M/C Questions on AIS Business Processes-Production CyclePrivateLecture 20:Business Processes-HR and Payroll Cycle Part 1PrivateLecture 21:HR and Payroll Cycle Part 2PrivateLecture 22:M/C Questions on Payroll Cycle and Human ResourcesPrivateLecture 23:Long Term Financing CyclePrivateLecture 24:M/C Questions on Long Term Financing CyclePrivateLecture 25:Business Processes-General Ledger and Reporting CyclePrivateLecture 26:M/C Questions on General Ledger and Reporting CyclePrivateLecture 27:Multiple Choice Test on Enterprise and Accounting Information systemsPrivate
- Chapter 4 : IT System AvailabilityLecture 1:Disaster Recovery Part 1Free PreviewLecture 2:Disaster Recovery Part 2Free PreviewLecture 3:M/C ISC Test on Disaster RecoveryPrivateLecture 4:Business Impact AnalysisPrivateLecture 5:M/C Test on Business Impact AnalysisPrivateLecture 6:Measures of System Availability and Service Level Agreements Part 1PrivateLecture 7:ISC M/C Test on Service Level Agreements Part OnePrivateLecture 8:Availability and Service Level Agreements Part 2PrivateLecture 9:Multiple Choice Test on Information Systems-AvailabilityPrivate
- Chapter 5 : Change ManagementLecture 1:Change Management-The BasicsFree PreviewLecture 2:M/C Questions on Change Management-The BasicsPrivateLecture 3:Release Management-Part 1Free PreviewLecture 4:M/C Questions on Release Management Part 1PrivateLecture 5:Release Management-Deployment MethodsPrivateLecture 6:M/C Questions on Deployment Methods-Release ManagementPrivateLecture 7:Patch ManagementPrivateLecture 8:M/C Questions on Patch ManagementPrivateLecture 9:Change Control PoliciesPrivateLecture 10:Multiple Choice Test on Change ManagementPrivate
- Chapter 6 : Regulations Standards and FrameworksLecture 1:HIPAA-The BasicsFree PreviewLecture 2:M/C Questions on HIPAA The BasicsPrivateLecture 3:HIPAA-Privacy RuleFree PreviewLecture 4:M/C Questions on the HIPAA Privacy RulePrivateLecture 5:HIPAA-Security RulePrivateLecture 6:M/C Test on HIPAA Security RulePrivateLecture 7:General Data Protection Regulation GDPRPrivateLecture 8:M/C Questions on GDPR for ISCPrivateLecture 9:PCI DSS-The BasicsPrivateLecture 10:PCI DSS ContinuedPrivateLecture 11:M/C Questions on PCI DSS for the ISC ExamPrivateLecture 12:M/C Test on HIPAA, PCI DSS and GDPRPrivateLecture 13:NIST Cybersecurity Framework-CorePrivateLecture 14:M/C Questions on NIST Cybersecurity Framework-CorePrivateLecture 15:NIST Cybersecurity Framework-profilesPrivateLecture 16:M/C Q on NIST ProfilesPrivateLecture 17:NIST Cybersecurity Framework TiersPrivateLecture 18:M/C NIST Cybersecurity Framework-TiersPrivateLecture 19:NIST Privacy FrameworkPrivateLecture 20:M/C NIST Privacy FrameworkPrivateLecture 21:COBIT 2019PrivateLecture 22:M/C Questions on COBIT Governance PrinciplesPrivateLecture 23:Multiple Choice Test on NIST Cybersecurity Framework and COBIT 2019PrivateLecture 24:CIS Controls Part 1PrivateLecture 25:CIS Controls Part 2PrivateLecture 26:CIS Controls Part 3PrivateLecture 27:CIS Controls Part 4PrivateLecture 28:M/C Questions on CIS ControlsPrivateLecture 29:CIA Security TriadPrivateLecture 30:Chapter Multiple Choice Test-Regulations, Standards and FrameworksPrivate
- Chapter 7 : Security-Threats and AttacksLecture 1:Stages in a Cyber AttackFree PreviewLecture 2:Threat AgentsFree PreviewLecture 3:M/C Questions on Stages in a Cyber Attack and Threat AgentsPrivateLecture 4:Types of AttacksPrivateLecture 5:Types of Attacks Part 2PrivateLecture 6:M/C Questions on Types of AttacksPrivateLecture 7:M/C Test on Stages of a Cyberattack, Threat Agents, Types of AttacksPrivateLecture 8:Techniques used in Cyber Attacks-Buffer OverflowPrivateLecture 9:Techniques used in cyber attack-mobile codePrivateLecture 10:M/C Questions on Buffer Overflow and Mobile CodePrivateLecture 11:Techniques used in cyber attack-cross site scriptingPrivateLecture 12:Techniques used in a cyber attack-SQL injectionPrivateLecture 13:M/C Questions on Cross Site Scripting and SQL InjectionPrivateLecture 14:Techniques used in cyber attack-race conditionsPrivateLecture 15:Techniques used in cyber attack-covert channelPrivateLecture 16:M/C Questions on Race Conditions and Covert ChannelsPrivateLecture 17:Techniques used in cyber attack-replay attackPrivateLecture 18:M/C Questions on Replay AttacksPrivateLecture 19:M/C Test on Techniques used in Cyber attacksPrivateLecture 20:Cybersecurity risks related to PaaSPrivateLecture 21:M/C Q Cybersecurity Risks related to PaaSPrivateLecture 22:Cybersecurity risks related to IaaSPrivateLecture 23:M/C Questions-Cybersecurity Risks related to IaaSPrivateLecture 24:Cybersecurity risks related to SaaSPrivateLecture 25:M/C Questions-Cybersecurity Risks related to SaaSPrivateLecture 26:Cybersecurity risks-Internet of ThingsPrivateLecture 27:M/C Questions on Cybersecurity Risks IoTPrivateLecture 28:Security-Threat ModelingPrivateLecture 29:Threat Modeling Part 2PrivateLecture 30:M/C Questions on Threat ModelingPrivateLecture 31:Cybersecurity Risks in communicating with customersPrivateLecture 32:Multiple Choice Test-Threats and AttacksPrivate
- Chapter 8 : Security-Controls and MitigationLecture 1:Protecting the Network-Part 1-Segmentation, Isolation, VPNFree PreviewLecture 2:M/C Questions on Segmentation, Isolation, and VPNPrivateLecture 3:Protecting the Network-Part 2-System Hardening, Intrusion Detection, MAC FilterFree PreviewLecture 4:M/C on System Hardening, intrusion detection, and MAC filterPrivateLecture 5:Vulnerability ManagementPrivateLecture 6:M/C Questions on Vulnerability ManagementPrivateLecture 7:Defense in Depth Strategy-layeringPrivateLecture 8:M/C Questions on Defense in Depth StrategyPrivateLecture 9:M/C Test on Protecting the Network, Vulnerability and Defense in DepthPrivateLecture 10:Least-Privilege, Need-to-Know, Zero-Trust, WhitelistingPrivateLecture 11:M/C on Least Privilege, Need to Know, Zero Trust, WhitelistingPrivateLecture 12:Security Policy and Access ControlsPrivateLecture 13:M/C Questions on Security Policy-Access ControlsPrivateLecture 14:Technology Acceptable Use Policy-Bring Your Own DevicePrivateLecture 15:M/C Test- Least Privilege, Need to Know, Zero-Trust, Access Controls, BYODPrivateLecture 16:Preventive Controls Part 1PrivateLecture 17:Preventive Controls Part 2PrivateLecture 18:M/C Questions on Preventive ControlsPrivateLecture 19:Detective ControlsPrivateLecture 20:M/C Questions on Detective and Corrective ControlsPrivateLecture 21:Scenario- Authentication techniques for a specific purpose-Part 1PrivateLecture 22:Authentication Scenario-Part 2PrivateLecture 23:Multiple Choice Chapter Test on Controls and MitigationPrivate
- Chapter 9 : Security-Awareness, Training, Education and TestingLecture 1:Security Awareness, Training and EducationFree PreviewLecture 2:M/C Questions on Security Awareness, Training, Education and TestingPrivateLecture 3:Role of the IT Professional in Security Awareness and TrainingFree PreviewLecture 4:M/C Test on Role of the IT Professional in Security Awareness etcPrivateLecture 5:Security Testing-Vulnerabilities and PenetrationPrivateLecture 6:M/C on Security Testing-Vulnerabilities and PenetrationPrivateLecture 7:IT Security Professional Role in Security Assessment ReportPrivateLecture 8:M/C Questions on IT Professional's role in a Security Assessment ReportPrivateLecture 9:Security Testing-WalkthroughPrivateLecture 10:Multiple Choice Questions on Security-WalkthroughsPrivateLecture 11:Security-Testing-SOC2 The BasicsPrivateLecture 12:Security-Trust Services Criteria PrinciplesPrivateLecture 13:M/C on Security Testing-SOC 2-The Basics and Trust Services CriteriaPrivateLecture 14:SOC 2-TSC-Control Design DeficienciesPrivateLecture 15:M/C Questions on SOC 2-TSC Control Design DeficienciesPrivateLecture 16:SOC 2-Testing for Control Operating DeficienciesPrivateLecture 17:M/C Questions on SOC 2 Operating DeficienciesPrivateLecture 18:Multiple Choice Chapter Test on Security Awareness, Training and TestingPrivate
- Chapter 10 : Confidentiality, Privacy and Incident ResponseLecture 1:Encryption-Part 1-Symmetric vs AssymetricFree PreviewLecture 2:Encryption-Part 2-Data at Rest, Data in Transit, Data in MemoryFree PreviewLecture 3:M/C Questions on Encryption for ISCPrivateLecture 4:Data Loss Prevention (DLP) SystemsPrivateLecture 5:Multiple Choice Questions on Data Loss PreventionPrivateLecture 6:Data Protection Techniques, Tokenization, Obfuscation and MaskingPrivateLecture 7:Multiple Choice Questions on Data Protection TechniquesPrivateLecture 8:M/C Questions on Encryption, Data Loss Prevention, Tokenization, MaskingPrivateLecture 9:Operational and Financial Implications of a data breachPrivateLecture 10:M/C on Operational and Financial Implications of a Data BreachPrivateLecture 11:Security Event vs Security IncidentPrivateLecture 12:M/C Questions on Security Event vs Security IncidentPrivateLecture 13:Security Incident Response PlanPrivateLecture 14:M/C Questions on Incident Response PlanPrivateLecture 15:Testing of Security Incident ResponsePrivateLecture 16:Multiple Choice Chapter Test on Confidentiality, Privacy and Incident ResponsePrivate
- Chapter 11 : SOC EngagementsLecture 1:SOC 1 EngagementsFree PreviewLecture 3:SOC 2-The BasicsFree PreviewLecture 4:M/C Questions on SOC 2 The BasicsPrivateLecture 5:SOC 2 Type 1 vs SOC 2 Type 2PrivateLecture 6:M/C Questions on SOC 2 Type 1 vs SOC 2 Type 2PrivateLecture 7:Management Assertions in a SOC 1 EngagementPrivateLecture 8:M/C Questions on Management Assertions in a SOC 1 EngagementPrivateLecture 9:Management Assertions-SOC 2 EngagementsPrivateLecture 10:M/C Questions on Management Assertions in a SOC 2 EngagementPrivateLecture 11:Materiality-SOC EngagementsPrivateLecture 12:M/C Questions on Materiality in a SOC EngagemenPrivateLecture 13:SOC-Risk Assessment by the service organizationPrivateLecture 14:M/C Questions on Risk Assessment at the Service OrganizationPrivateLecture 15:Service Auditor's risk assessment in a SOC engagementPrivateLecture 16:M/C Questions-Service Auditor Risk Assessment in a SOC EngagementPrivateLecture 17:Criteria for a vendor to be considered a Sub-Service OrganizationPrivateLecture 18:M/C Questions- Criteria for a Vendor to be a Sub-Service OrganizationPrivateLecture 19:SOC 2-Service Commitments vs System RequirementsPrivateLecture 20:M/C Questions on Service Commitments and System RequirementsPrivateLecture 21:SOC Engagements-System DescriptionPrivateLecture 22:M/C Questions on System Description in a SOC EngagementPrivateLecture 23:Description Criteria for Cybersecurity Risk Management ProgramPrivateLecture 24:M/C Questions on Cybersecurity Risk Management Program CriteriaPrivateLecture 25:Complementary User Entity ControlsPrivateLecture 26:M/C Test on Complementary User Entity Controls-SOC EngagementsPrivateLecture 27:SOC-Management Written RepresentationsPrivateLecture 28:M/C Test on Management Written Representations in a SOC EngagementPrivateLecture 29:Defining the System Boundaries in a SOC 2 EngagementPrivateLecture 30:M/C Q on Understanding the System Boundaries in a SOC EngagementPrivateLecture 31:Comparison of management’s system description to suitable criteria in a SOC 1®PrivateLecture 32:comparison of managements system description to the description criteria SOC 2PrivateLecture 33:M/C on Comparison of system description to suitable criteria in SOCPrivateLecture 34:Subsequent Events in a SOC 1 EngagementPrivateLecture 35:M/C Questions on Subsequent Events in a SOC 1 EngagementPrivateLecture 36:Subsequent Events-SOC 2 EngagementPrivateLecture 37:M/C Questions on Subsequent Events in a SOC 2 EngagementPrivateLecture 38:Inclusive vs Carve-Out MethodPrivateLecture 39:Inclusive vs Carve out Part 2- Complementary Subservice Org. ControlsPrivateLecture 40:M/C Questions on Inclusive vs Carve-Out MethodPrivateLecture 41:SOC-Types of Opinions and Report ModificationsPrivateLecture 42:M/C Questions on Types of Opinions and Report Modifications in a SOC EngagementPrivateLecture 43:Tests of Controls in a SOC 2 EngagementPrivateLecture 44:M/C Questions on Tests of Controls in a SOC 2 EngagementPrivateLecture 45:Form and Content-SOC 1 Type 1PrivateLecture 46:M/C Questions on Form and Content of a SOC 1 Type 1 ReportPrivateLecture 47:Form and Content-SOC 1 Type 2PrivateLecture 48:M/C Questions on Form and Content of a SOC 1 Type 2 ReportPrivateLecture 49:Form and Content SOC 2 Type 1PrivateLecture 50:M/C Questions on Form and Content of a SOC 2 Type 1 ReportPrivateLecture 51:Form and Content-SOC 2 Type 2PrivateLecture 52:M/C Questions on Form and Content of a SOC 2 Type 2 ReportPrivateLecture 53:M/C Test on Form and Content of SOC 1 and SOC 2 ReportsPrivateLecture 54:Purpose of a SOC 3 EngagementPrivateLecture 55:Intended Users of a SOC 3 ReportPrivateLecture 56:M/C Questions on SOC 3 ReportsPrivateLecture 57:SOC for Cybersecurity EngagementsPrivateLecture 58:M/C Questions on SOC for Cybersecurity EngagementsPrivateLecture 59:M/C Chapter Test #1 on SOC ReportingPrivateLecture 60:M/C Chapter Test #2 on SOC ReportingPrivateLecture 61:M/C Chapter Test # 3 on SOC ReportingPrivate
- Chapter 12 : COSO-Internal Control
- Chapter 13 : Final Review Chapter-Testlets and Amazon E-BookLecture 1:ISC-Final Exam Testlet #1PrivateLecture 2:ISC Final Exam Testlet # 2PrivateLecture 3:ISC Final Exam Testlet # 3PrivateLecture 4:ISC Final Exam Testlet # 4PrivateLecture 5:ISC Final Exam Testlet # 5PrivateLecture 6:ISC-Final Exam Testlet #6PrivateLecture 7:ISC Final Exam Testlet #7PrivateLecture 8:ISC Amazon E-Book Part 1PrivateLecture 9:ISC Amazon E-Book Part 2PrivateLecture 10:Final Review of Relational DatabasesPrivateLecture 11:ISC Simulation Video on Data Storage and DatabasesPrivateLecture 12:ISC Simulation Video on Backup and Recovery and Business Impact AnalysisPrivateLecture 13:ISC Simulation Video on Types of Systems and Data AnalyticsPrivateLecture 14:ISC Simulation Video on Types of NetworksPrivateLecture 15:ISC Simulation Video on Change ManagementPrivateLecture 16:ISC Simulation Video on Regulations, Standards and FrameworksPrivateLecture 17:ISC Simulation Video on Threats and AttacksPrivateLecture 18:ISC Simulation Video on Security-Controls and MitigationPrivateLecture 19:ISC Simulation Video on Confidentiality, Privacy and Incident ResponsePrivateLecture 20:ISC Simulation Video on SOC ReportsPrivate
Course Description
2024 ISC Exam is one of the three Discipline Exams. The ISC exam involves IT concepts and controls.