-
Chapter 1 : Data ManagementLecture 1: Data Storage-The BasicsPrivateLecture 2: Types of Data StoragePrivateLecture 3: Data Life CyclePrivateLecture 4: Databases Part 1PrivateLecture 5: Databases Part 2PrivateLecture 6: Database SchemaPrivateLecture 7: SQL The BasicsPrivateLecture 8: SQL-Aggregate FunctionsPrivateLecture 9: SQL-String FunctionsPrivateLecture 10: SQL-Logical Operators-The BasicsPrivateLecture 11: SQL-Logical Operators-ContinuedPrivateLecture 12: Comparison Operators-The BasicsPrivateLecture 13: Comparison Operators-ContinuedPrivate
-
Chapter 2 : Information Systems and IT Infrastructure
-
Chapter 3 : Enterprise and Accounting Information SystemsLecture 1: Types of Information Systems-TPS MIS DSS and Data Mining P1PrivateLecture 2: Types of Information Systems ContinuedPrivateLecture 3: Enterprise Resource Planning SystemsPrivateLecture 4: Risks of Blockchain in Financial Reporting P1PrivateLecture 5: Risk of Blockchain in Financial Reporting Part 2PrivateLecture 6: Controls to Mitigate Risks Associated with Blockchain in Financial ReportingPrivateLecture 7: Changes to Business Processes to Improve AISPrivateLecture 8: AIS-Business Processes-Revenue CyclePrivateLecture 9: AIS-Business Cycles-ExpendituresPrivateLecture 10: AIS-Business Processes-Production CyclePrivateLecture 11: Business Processes-HR and Payroll CyclePrivateLecture 12: Payroll Cycle Part 2PrivateLecture 13: Financing CyclePrivateLecture 14: Business Cycles-General LedgerPrivate
-
Chapter 4 : IT System Availability
-
Chapter 5 : Change Management
-
Chapter 6 : Regulation Standards and FrameworksLecture 1: HIPAA-The BasicsPrivateLecture 2: HIPAA Privacy RulePrivateLecture 3: HIPAA-Security RulePrivateLecture 4: GDPR-General Data ProtectionPrivateLecture 5: PCI-DSS The BasicsPrivateLecture 6: PCI-DSS-ContinuedPrivateLecture 7: NIST Cybersecurity Framework-COREPrivateLecture 8: NIST Cybersecurity Framework-ProfilesPrivateLecture 9: NIST Cybersecurity Framework-TiersPrivateLecture 10: NIST Privacy Framework-PrivateLecture 11: COBITPrivateLecture 12: CIS Controls Part 1PrivateLecture 13: CIS Controls Part 2PrivateLecture 14: CIS Controls Part 3PrivateLecture 15: CIS Controls Part 4PrivateLecture 16: CIA Security TriadPrivate
-
Chapter 7 : Chapter 7-Security-Threats and AttacksLecture 1: Stages in a Cyber AttackPrivateLecture 2: Threat AgentsPrivateLecture 3: Types of AttacksPrivateLecture 4: Types of Attacks Part 2PrivateLecture 5: Buffer OverflowPrivateLecture 6: Mobile CodePrivateLecture 7: Cross-Site ScriptingPrivateLecture 8: SQL InjectionPrivateLecture 9: Race ConditionPrivateLecture 10: Covert ChannelPrivateLecture 11: Replay AttacksPrivateLecture 12: Cybersecurity Risks in Communications with CustomersPrivateLecture 13: Threat Modeling-Part 1PrivateLecture 14: Threat Modeling Part 2PrivateLecture 15: Cybersecurity Risks Related to the Internet of ThingsPrivateLecture 16: Cybersecurity Risks Related to PAASPrivateLecture 17: Cybersecurity Risks Related to IAASPrivateLecture 18: Cybersecurity Risks Related to SAASPrivate
-
Chapter 8 : Security-Controls and MitigationLecture 1: Protecting the Network Part 1PrivateLecture 2: Protecting the Network Part 2PrivateLecture 3: Vulnerability ManagementPrivateLecture 4: Defense in Depth StrategyPrivateLecture 5: Least Privilege, Need to Know, Zero TrustPrivateLecture 6: Security Policy and Access ControlsPrivateLecture 7: Technology Acceptable Use PolicyPrivateLecture 8: Preventive Controls Part 1PrivateLecture 9: Preventive Controls Part 2PrivateLecture 10: Detective ControlsPrivateLecture 11: Scenario Authentication-Part 1PrivateLecture 12: Authentication-Part 2Private
-
Chapter 9 : Security Awareness Training Education and TestingLecture 1: Security Awareness Training and EducationPrivateLecture 2: Role of the IT ProfessionalPrivateLecture 3: Security TestingPrivateLecture 4: Security Assessment ReportPrivateLecture 5: Security Testing-WalkthroughPrivateLecture 6: Security Testing-SOC 2-The BasicsPrivateLecture 7: Security-Trust Services CriteriaPrivateLecture 8: TSC-Control Design DeficienciesPrivateLecture 9: Testing for Control Operating DeficienciesPrivate
-
Chapter 10 : Confidentiality, Privacy and Incident ResponseLecture 1: Encryption Part 1-Symmetric vs AssymetricPrivateLecture 2: Encryption Part 2-Data at Rest vs Data in Transit vs Data in MemoryPrivateLecture 3: Data Loss Prevention DLPPrivateLecture 4: Data Protection TechniquesPrivateLecture 5: Operational and Financial Implications of a Data BreachPrivateLecture 6: Security Event vs Security IncidentPrivateLecture 7: Security Incident Response PlanPrivateLecture 8: Testing of Security Incident Response PlanPrivate
-
Chapter 11 : SOC EngagementsLecture 1: SOC 1 EngagementPrivateLecture 2: SOC 2-The BasicsPrivateLecture 3: SOC 2 Type 1 vs SOC 2 Type 2PrivateLecture 4: Inclusive vs Carve Out MethodPrivateLecture 5: Inclusive vs Carve Out-Part 2PrivateLecture 6: Subsequent Events-SOC 1 EngagementPrivateLecture 7: Subsequent Events-SOC 2PrivateLecture 8: Management Assertions in a SOC 1 EngagementPrivateLecture 9: Management Assertions-SOC 2 EngagementPrivateLecture 10: Materiality-SOC EngagementsPrivateLecture 11: SOC-Risk Assessment by the Service OrganizationPrivateLecture 12: Service Auditors Risk AssessmentPrivateLecture 13: Criteria For a Vendor to be a Sub-Service OrganizationPrivateLecture 14: Service Commitment vs System RequirementsPrivateLecture 15: Subsequent Discovery of Facts-SOC 1 EngagementPrivateLecture 16: Subsequent Discovery of Facts in a SOC 2 EngagementPrivateLecture 17: System DescriptionPrivateLecture 18: Description Criteria for CyberSecurity ProgramPrivateLecture 19: Complementary User Entity ControlsPrivateLecture 20: Management Representations-SOC EngagementPrivateLecture 21: Defining and Understanding the System BoundariesPrivateLecture 22: Comparison of System Description to Suitable Criteria-SOC 1PrivateLecture 23: Comparison of System Description to Suitable Criteria-SOC 2Private
-
Chapter 12 : SOC ReportingLecture 1: SOC-Types of Opinions and Report ModificationsPrivateLecture 2: Tests of Controls in a SOC 2 EngagementPrivateLecture 3: Form and Content of SOC 1 Type 1PrivateLecture 4: Form and Content of SOC 1 Type 2PrivateLecture 5: Form and Content SOC 2 Type 1PrivateLecture 6: Form and Content SOC 2 Type 2Private
-
Chapter 13 : ISC Final Review ChapterLecture 1: ISC Final Exam Testlet #1PrivateLecture 2: ISC Final Exam Testlet #2PrivateLecture 3: ISC Final Exam Testlet #3PrivateLecture 4: ISC Final Exam Testlet #4PrivateLecture 5: ISC Final Exam Testlet #5PrivateLecture 6: ISC Final Exam Testlet #6PrivateLecture 7: ISC Final Exam Testlet #7PrivateLecture 8: ISC Amazon E-Book Part 1 75 "Must Know" QuestionsPrivateLecture 9: ISC Amazon E-Book Volume 2-75 More "Must Know" QuestionsPrivate
Course Description
The i75 ISC CRAM includes 15 Days of Access to all the i75 ISC Videos and the Final Review Chapter. Perfect for those who Do NOT already have i75 ISC Complete. If you want the multiple choice chapter tests, get the i75 ISC Complete monthly subscription option instead of the 15 Day ISC CRAM.
$129.00 /One-time
Highlights
- Information Systems and Controls
- Data Management, IT Infrastructure, Enterprise and Accounting Information Systems, System Availability
- Change Management, Regulation Standards and Frameworks, Threats and Attacks, Controls and Mitigation
- Security Awareness Training Education and Testing, Confidentiality Privacy and Incident Response
- SOC Engagements