-
Chapter 1 : Data Management.Lecture 1: Data Storage-The BasicsFree PreviewLecture 2: Types of Data StorageFree PreviewLecture 3: Data Life CyclePrivateLecture 4: M/C Test on Data Storage and Data Life CyclePrivateLecture 5: Databases Part 1PrivateLecture 6: Databases Part 2PrivateLecture 7: Database SchemaPrivateLecture 8: M/C Test on Data Management, Data Life Cycle, and DatabasesPrivateLecture 9: SQL-The BasicsPrivateLecture 10: SQL-Aggregate FunctionsPrivateLecture 11: SQL-String FunctionsPrivateLecture 12: M/C on SQL the Basics and Aggregate and String FunctionsPrivateLecture 13: SQL-Logical Operators-The BasicsPrivateLecture 14: SQL-Logical Operators-ContinuedPrivateLecture 15: SQL-Comparison Operators-The BasicsPrivateLecture 16: SQL-Comparison Operators-ContinuedPrivateLecture 17: M/C Test on Comparison and Logical Operators in SQLPrivateLecture 18: ISC Multiple Choice Test on SQLPrivateLecture 19: Multiple Choice Test on all of Chapter 1 Data ManagementPrivate
-
Chapter 2 : Information Systems-IT InfrastructureLecture 1: Types of NetworksFree PreviewLecture 2: Cloud Computing-The BasicsFree PreviewLecture 3: Cloud Computing-Roles and ResponsibilitiesPrivateLecture 4: Cloud Deployment ModelsPrivateLecture 5: Risks and Controls related to Cloud ComputingPrivateLecture 6: Multiple Choice Test on IT Infrastructure and Cloud ComputingPrivate
-
Chapter 3 : Enterprise and Accounting Information SystemsLecture 1: Types of Information systems and data miningFree PreviewLecture 2: Types of Information systems continuedFree PreviewLecture 3: Enterprise Resource Planning SystemsPrivateLecture 4: Risks of Blockchain in Financial ReportingPrivateLecture 5: Risks of Blockchain in Financial Reporting Part 2PrivateLecture 6: Controls to Mitigate Risks Associated with Blockchain in Financial ReportingPrivateLecture 7: M/C Test on Types of Systems, ERP, Risk of Blockchain in Financial ReportingPrivateLecture 8: Changes to business processes to improve Accounting Info SystemsPrivateLecture 9: AIS Business Processes-Revenue CyclePrivateLecture 10: Business Processes AIS-Expenditures CyclePrivateLecture 11: Business Processes-Production CyclePrivateLecture 12: Business Processes-HR and Payroll Cycle Part 1PrivateLecture 13: HR and Payroll Cycle Part 2PrivateLecture 14: Business Processes-Financing CyclePrivateLecture 15: Business Processes-General Ledger and Reporting CyclePrivateLecture 16: M/C Test on Changes to Business Processes to improve performance of AISPrivateLecture 17: Multiple Choice Test on Enterprise and Accounting Information systemsPrivate
-
Chapter 4 : IT System AvailabilityLecture 1: Disaster Recovery Part 1Free PreviewLecture 2: Disaster Recovery Part 2Free PreviewLecture 3: Business Impact AnalysisPrivateLecture 4: Measures of System Availability and Service Level Agreements Part 1PrivateLecture 5: Availability and Service Level Agreements Part 2PrivateLecture 6: Multiple Choice Test on Information Systems-AvailabilityPrivate
-
Chapter 5 : Change Management
-
Chapter 6 : Regulations Standards and FrameworksLecture 1: HIPAA-The BasicsFree PreviewLecture 2: HIPAA-Privacy RuleFree PreviewLecture 3: HIPAA-Security RulePrivateLecture 4: General Data Protection Regulation GDPRPrivateLecture 5: PCI DSS-The BasicsPrivateLecture 6: PCI DSS ContinuedPrivateLecture 7: M/C Test on HIPAA, PCI DSS and GDPRPrivateLecture 8: NIST Cybersecurity Framework-CorePrivateLecture 9: NIST Cybersecurity Framework-profilesPrivateLecture 10: NIST Cybersecurity Framework TiersPrivateLecture 11: NIST Privacy FrameworkPrivateLecture 12: COBIT 2019PrivateLecture 13: Multiple Choice Test on NIST Cybersecurity Framework and COBIT 2019PrivateLecture 14: CIS Controls Part 1PrivateLecture 15: CIS Controls Part 2PrivateLecture 16: CIS Controls Part 3PrivateLecture 17: CIS Controls Part 4PrivateLecture 18: M/C Questions on CIS ControlsPrivateLecture 19: CIA Security TriadPrivateLecture 20: Chapter Multiple Choice Test-Regulations, Standards and FrameworksPrivate
-
Chapter 7 : Security-Threats and AttacksLecture 1: Stages in a Cyber AttackFree PreviewLecture 2: Threat AgentsFree PreviewLecture 3: Types of AttacksPrivateLecture 4: Types of Attacks Part 2PrivateLecture 5: M/C Test on Stages of a Cyberattack, Threat Agents, Types of AttacksPrivateLecture 6: Techniques used in Cyber Attacks-Buffer OverflowPrivateLecture 7: Techniques used in cyber attack-mobile codePrivateLecture 8: Techniques used in cyber attack-cross site scriptingPrivateLecture 9: Techniques used in a cyber attack-SQL injectionPrivateLecture 10: Techniques used in cyber attack-race conditionsPrivateLecture 11: Techniques used in cyber attack-covert channelPrivateLecture 12: Techniques used in cyber attack-replay attackPrivateLecture 13: M/C Test on Techniques used in Cyber attacksPrivateLecture 14: Cybersecurity risks related to PaaSPrivateLecture 15: Cybersecurity risks related to IaaSPrivateLecture 16: Cybersecurity risks related to SaaSPrivateLecture 17: Cybersecurity risks-Internet of ThingsPrivateLecture 18: Security-Threat ModelingPrivateLecture 19: Threat Modeling Part 2PrivateLecture 20: Cybersecurity Risks in communicating with customersPrivateLecture 21: Multiple Choice Test-Threats and AttacksPrivate
-
Chapter 8 : Security-Controls and MitigationLecture 1: Protecting the Network-Part 1-Segmentation, Isolation, VPNFree PreviewLecture 2: Protecting the Network-Part 2-System Hardening, Intrusion Detection, MAC FilterFree PreviewLecture 3: Vulnerability ManagementPrivateLecture 4: Defense in Depth Strategy-layeringPrivateLecture 5: M/C Test on Protecting the Network, Vulnerability and Defense in DepthPrivateLecture 6: Least-Privilege, Need-to-Know, Zero-Trust, WhitelistingPrivateLecture 7: Security Policy and Access ControlsPrivateLecture 8: Technology Acceptable Use Policy-Bring Your Own DevicePrivateLecture 9: M/C Test- Least Privilege, Need to Know, Zero-Trust, Access Controls, BYODPrivateLecture 10: Preventive Controls Part 1PrivateLecture 11: Preventive Controls Part 2PrivateLecture 12: Detective ControlsPrivateLecture 13: Scenario- Authentication techniques for a specific purpose-Part 1PrivateLecture 14: Authentication Scenario-Part 2PrivateLecture 15: Multiple Choice Chapter Test on Controls and MitigationPrivate
-
Chapter 9 : Security-Awareness, Training, Education and TestingLecture 1: Security Awareness, Training and EducationFree PreviewLecture 2: Role of the IT Professional in Security Awareness and TrainingFree PreviewLecture 3: Security TestingPrivateLecture 4: Security Assessment ReportPrivateLecture 5: M/C Questions on Security Awareness, Training, Education and TestingPrivateLecture 6: Security Testing-WalkthroughPrivateLecture 7: Security-Testing-SOC2 The BasicsPrivateLecture 8: Security-Trust Services Criteria PrinciplesPrivateLecture 9: SOC 2-TSC-Control Design DeficienciesPrivateLecture 10: SOC 2-Testing for Control Operating DeficienciesPrivateLecture 11: Multiple Choice Chapter Test on Security Awareness, Training and TestingPrivate
-
Chapter 10 : Confidentiality, Privacy and Incident ResponseLecture 1: Encryption-Part 1-Symmetric vs AssymetricFree PreviewLecture 2: Encryption-Part 2-Data at Rest, Data in Transit, Data in MemoryFree PreviewLecture 3: Data Loss Prevention (DLP) SystemsPrivateLecture 4: Data Protection Techniques, Tokenization, Obfuscation and MaskingPrivateLecture 5: M/C Questions on Encryption, Data Loss Prevention, Tokenization, MaskingPrivateLecture 6: Operational and Financial Implications of a data breachPrivateLecture 7: Security Event vs Security IncidentPrivateLecture 8: Security Incident Response PlanPrivateLecture 9: Testing of Security Incident ResponsePrivateLecture 10: Multiple Choice Chapter Test on Confidentiality, Privacy and Incident ResponsePrivate
-
Chapter 11 : SOC EngagementsLecture 1: SOC 1 EngagementsFree PreviewLecture 2: SOC 2-The BasicsFree PreviewLecture 3: SOC 2 Type 1 vs SOC 2 Type 2PrivateLecture 4: Management Assertions in a SOC 1 EngagementPrivateLecture 5: Management Assertions-SOC 2 EngagementsPrivateLecture 6: Multiple Choice Tests on SOC Videos 1-5PrivateLecture 7: Materiality-SOC EngagementsPrivateLecture 8: SOC-Risk Assessment by the service organizationPrivateLecture 9: Service Auditor's risk assessment in a SOC engagementPrivateLecture 10: Criteria for a vendor to be considered a Sub-Service OrganizationPrivateLecture 11: SOC 2-Service Commitments vs System RequirementsPrivateLecture 12: M/C Test on Risk Assessment, Materiality, Vendors, Service CommitmentsPrivateLecture 13: Subsequent Discovery of Facts in a SOC 1 EngagementPrivateLecture 14: Subsequent Discovery of Facts in a SOC 2 EngagementPrivateLecture 15: SOC Engagements-System DescriptionPrivateLecture 16: Description Criteria for Cybersecurity Risk Management ProgramPrivateLecture 17: Complementary User Entity ControlsPrivateLecture 18: M/C Test Discovery of Facts, System Description, Cyber Risk, CUE'sPrivateLecture 19: SOC-Management Written RepresentationsPrivateLecture 20: Defining the System Boundaries in a SOC 2 EngagementPrivateLecture 21: Comparison of management’s system description to suitable criteria in a SOC 1®PrivateLecture 22: comparison of managements system description to the description criteria SOC 2PrivateLecture 23: Subsequent Events in a SOC 1 EngagementPrivateLecture 24: Subsequent Events-SOC 2 EngagementPrivateLecture 25: M/C Test Mgt Rep, system boundaries, suitable criteria, subsequent eventsPrivateLecture 26: Inclusive vs Carve-Out MethodPrivateLecture 27: Inclusive vs Carve out Part 2- Complementary Subservice Org. ControlsPrivateLecture 28: SOC-Types of Opinions and Report ModificationsPrivateLecture 29: Tests of Controls in a SOC 2 EngagementPrivateLecture 30: M/C Test of Controls, Carve-out inclusive, opinions and report modificationsPrivateLecture 31: Form and Content-SOC 1 Type 1PrivateLecture 32: Form and Content-SOC 1 Type 2PrivateLecture 33: Form and Content SOC 2 Type 1PrivateLecture 34: Form and Content-SOC 2 Type 2PrivateLecture 35: M/C Test on Form and Content of SOC 1 and SOC 2 ReportsPrivate
-
Chapter 12 : COSO-Internal Control
-
Chapter 13 : Final Review Chapter-Testlets and Amazon E-BookLecture 1: ISC-Final Exam Testlet #1PrivateLecture 2: ISC Final Exam Testlet # 2PrivateLecture 3: ISC Final Exam Testlet # 3PrivateLecture 4: ISC Final Exam Testlet # 4PrivateLecture 5: ISC Final Exam Testlet # 5PrivateLecture 6: ISC-Final Exam Testlet #6PrivateLecture 7: ISC Amazon E-Book Part 1PrivateLecture 8: ISC Amazon E-Book Part 2PrivateLecture 9: Final Review of Relational DatabasesPrivate
Course Description
2024 ISC Exam is one of the three Discipline Exams. The ISC exam involves IT concepts and controls.