Back to Course
Information Systems and Controls ISC Gleim Supplemental Course
0% Complete
0/0 Steps
-
🚀 Start Here: Welcome, Course Resources & Success Tips
-
🚀Introduce Yourself1 Topic
-
✅ ISC CPA Exam Simulation Tutorial + 2024 and 2025 AICPA Video Questions. Gleim5 Topics|2 Quizzes
-
💡1. Introduction to Information Systems and Controls
-
💡2. IT Infrastructure10 Topics|4 Quizzes
-
🎥IT Architectures: operating systems, servers etc. + PPT Slides
-
🎙️IT Architectures: operating systems, servers etc.
-
🎥Introduction to Cloud Computing
-
🎙️Introduction to Cloud Computing
-
🎥Cloud Computing Deployment, Risks and Benefits
-
🎙️Cloud Computing Deployment, Risks and Benefits
-
🎥Role and responsibilities of cloud service providers + PPT Slides
-
🎙️Role and responsibilities of cloud service providers
-
🎥How COSO Frameworks Address Cloud Computing Governance + PPT Slides
-
🎙️How COSO Frameworks Address Cloud Computing Governance
-
🎥IT Architectures: operating systems, servers etc. + PPT Slides
-
💡3. Accounting Systems and Blockchain4 Topics|1 Quiz
-
💡4. Information Systems Management14 Topics|6 Quizzes
-
🎥Business Resiliency Introduction
-
🎙️Business Resiliency Introduction
-
🎥Business Resiliency Crisis Management
-
🎙️Business Resiliency Crisis Management
-
🎥Business Resiliency System Controls
-
🎙️Business Resiliency System Controls
-
🎥Business Resiliency: Disaster Recovery Plan DRP
-
🎙️Business Resiliency: Disaster Recovery Plan DRP
-
🎥Change Management and Process of Change Management
-
🎙️Change Management and Process of Change Management
-
🎥Risks and Mitigations to Change Management
-
🎙️Risks and Mitigations to Change Management
-
🎥Purpose of testing change management
-
🎙️Purpose of testing change management
-
🎥Business Resiliency Introduction
-
🎯AICPA Questions: Business Continuity Plan1 Quiz
-
💡5. Data Management: 5.1 - Data Collection Methods and Storage6 Topics|2 Quizzes
-
💡5. Data Management: 5.2 - Data Life Cycle5 Topics|2 Quizzes
-
💡5. Data Management: 5.3 - Structured Query Language14 Topics|1 Quiz
-
🎥1 to 1 Relationship in SQL Database + PPT Slides
-
🎙️1 to 1 Relationship in SQL Database
-
🎥1 to Many Relationship in SQL Database + PPT Slides
-
🎙️1 to Many Relationship in SQL Database
-
🎥Many to Many Relationship in SQL Database + PPT Slides
-
🎙️Many to Many Relationship in SQL Database
-
🎥Data Normalizaton
-
🎙️Data Normalizaton
-
🎥Data Normalization (1NF)
-
🎙️Data Normalization (1NF)
-
🎥Data Normalization (2NF)
-
🎙️Data Normalization (2NF)
-
🎥Data Normalization (3F)
-
🎙️Data Normalization (3F)
-
🎥1 to 1 Relationship in SQL Database + PPT Slides
-
💡5. Data Management: 5.6- Business Process Modeling and Flowcharting2 Topics
-
💡6. Regulations, Standards, and Frameworks4 Topics|1 Quiz
-
💡6. Regulations, Standards, and Frameworks: 6.2: COBIT4 Topics|2 Quizzes
-
💡6. Regulations, Standards, and Frameworks: 6.3: NIST Framework20 Topics|10 Quizzes
-
🎥NIST Cybersecurity Framework: Govern Function 1
-
🎙️NIST Cybersecurity Framework: Govern Function 1
-
🎥NIST Cybersecurity Framework Identify Function 2
-
🎙️NIST Cybersecurity Framework Identify Function 2
-
🎥NIST Cybersecurity Framework Protect Function 3
-
🎙️NIST Cybersecurity Framework Protect Function 3
-
🎥NIST Cybersecurity Framework Detect Function 4
-
🎙️NIST Cybersecurity Framework Detect Function 4
-
🎥NIST Cybersecurity Framework Respond Function 5
-
🎙️NIST Cybersecurity Framework Respond Function 5
-
🎥NIST Cybersecurity Framework Recover Function 6
-
🎙️NIST Cybersecurity Framework Recover Function 6
-
🎥NIST Cybersecurity Framework Profile
-
🎙️NIST Cybersecurity Framework Profile
-
🎥NIST: 4 Tiers
-
🎙️NIST: 4 Tiers
-
🎥NIST Privacy Framework
-
🎙️NIST Privacy Framework
-
🎥NIST SP 800-53
-
🎙️NIST SP 800-53
-
🎥NIST Cybersecurity Framework: Govern Function 1
-
💡6. Regulations, Standards, and Frameworks: 6.6: CIS Controls12 Topics|1 Quiz
-
💡6. Regulations, Standards, and Frameworks: 6.7 till 6.10: GDPR, PCI DSS & HIPAA8 Topics|4 Quizzes
-
💡7. Security: Threats and Attacks27 Topics|14 Quizzes
-
🎥Cyber Security
-
🎙️Cyber Security
-
🎥Threat Actors
-
🎙️Threat Actors
-
🎥Network Based Attacks
-
🎙️Network Based Attacks
-
🎥Host Based Attacked
-
🎙️Host Based Attacked
-
🎥Social Engineering Attacks
-
🎙️Social Engineering Attacks
-
🎥Application Based Attacks
-
🎙️Application Based Attacks
-
🎥Phishing Attacks + PPT Slides
-
🎥Physical Attacks
-
🎙️Physical Attacks
-
🎥Supply Chain Attacks
-
🎙️Supply Chain Attacks
-
🎥Stages of Cyber Attacks
-
🎙️Stages of Cyber Attacks
-
🎥Risks Related to Cloud Computing
-
🎙️Risks Related to Cloud Computing
-
🎥Risks Related to Mobile Technology
-
🎙️Risks Related to Mobile Technology
-
🎥Risks Related to Internet of Things
-
🎙️Risks Related to Internet of Things
-
🎥Threat Modeling
-
🎙️Threat Modeling
-
🎥Cyber Security
-
💡8. Mitigation and Testing: 8.1: Mitigation Concepts14 Topics|7 Quizzes
-
🎥Security Policies (Cybersecurity)
-
🎙️Security Policies (Cybersecurity)
-
🎥Security Policies: Acceptable Use Policies
-
🎙️Security Policies: Acceptable Use Policies
-
🎥Bring your own Device Policies
-
🎙️Bring your own Device Policies
-
🎥Network Components
-
🎙️Network Components
-
🎥Network Security
-
🎙️Network Security
-
🎥Authorization and Authentication
-
🎙️Authorization and Authentication
-
🎥Identification and Authentication
-
🎙️Identification and Authentication
-
🎥Security Policies (Cybersecurity)
-
💡8. Mitigation and Testing: 8.2: Mitigation Techniques8 Topics|2 Quizzes
-
💡8. Mitigation and Testing: 8.3: COSO and Cyber risks4 Topics|1 Quiz
-
💡8. Mitigation and Testing: 8.4: Mitigation Cyber Risks8 Topics|3 Quizzes
-
💡8. Mitigation and Testing: 8.5: Testing of Security10 Topics|4 Quizzes
-
🎥Risk Management Framework
-
🎙️Risk Management Framework
-
🎥Security Assessment Reports
-
🎙️Security Assessment Reports
-
🎥Security Assessment Evaluators, Process and evidence
-
🎙️Security Assessment Evaluators, Process and evidence
-
🎥Security Awareness
-
🎙️Security Awareness
-
🎥Evaluating Security Awareness
-
🎙️Evaluating Security Awareness
-
🎥Risk Management Framework
-
💡9. Confidentiality and Privacy18 Topics|6 Quizzes
-
🎥Confidentiality and Privacy
-
🎙️Confidentiality and Privacy
-
🎥Protecting Confidential Data
-
🎙️Protecting Confidential Data
-
🎥Data Obfuscation SDLC
-
🎙️Data Obfuscation SDLC
-
🎥Data Encryption
-
🎙️Data Encryption
-
🎥Hashing and Cipher Techniques
-
🎙️Hashing and Cipher Techniques
-
🎥Data Loss Prevention
-
🎙️Data Loss Prevention
-
🎥Data at rest and Data Deletion
-
🎙️Data at rest and Data Deletion
-
🎥WalkThrough of Org. Security, Confidentiality and Privacy
-
🎙️WalkThrough of Org. Security, Confidentiality and Privacy
-
🎥SOC 2 Engagement
-
🎙️SOC 2 Engagement
-
🎥Confidentiality and Privacy
-
💡Study Unit 10: Incident Response: 10.1: Overview6 Topics|2 Quizzes
-
💡Study Unit 10: Incident Response: 10.2: Incident Response Planning2 Topics|1 Quiz
-
💡Study Unit 10: Incident Response: 10.3: Cybersecurity Insurance2 Topics|1 Quiz
-
💡Study Unit 10: Incident Response: 10.4: Testing incident response2 Topics|1 Quiz
-
💡10. Accounting Information Systems6 Topics|5 Quizzes
-
💡11. Nature of SOC 1, SOC 2, and SOC 3 Engagements28 Topics|9 Quizzes
-
🎥SOC 1, 2 and 3
-
🎙️SOC 1, 2 and 3
-
🎥Type 1 and Type 2 Opinion
-
🎙️Type 1 and Type 2 Opinion
-
🎥Trust Services Criteria
-
🎙️Trust Services Criteria
-
🎥Attestation Engagements ISC
-
🎙️Attestation Engagements ISC
-
🎥COSO and TSC
-
🎙️COSO and TSC
-
🎥TSC Additional Criteria
-
🎙️TSC Additional Criteria
-
🎥SOC 1 Management Responsibilities
-
🎙️SOC 1 Management Responsibilities
-
🎥SOC 2 Management Responsibilities
-
🎙️SOC 2 Management Responsibilities
-
🎥Service Auditor's Responsibilities
-
🎙️Service Auditor’s Responsibilities
-
🎥Independence and SOC Engagement
-
🎙️Independence and SOC Engagement
-
🎥Materiality in SOC Engagement
-
🎙️Materiality in SOC Engagement
-
🎥System Requirements
-
🎙️System Requirements
-
🎥Service Commitments
-
🎙️Service Commitments
-
🎥SOC Risk Assessment
-
🎙️SOC Risk Assessment
-
🎥SOC 1, 2 and 3
-
💡13 & 14: SOC 1 and SOC 2 engagements46 Topics|12 Quizzes
-
🎥Service Organization Control (SOC) Engagement
-
🎙️Service Organization Control (SOC) Engagement
-
🎥Unqualified Opinion
-
🎙️Unqualified Opinion
-
🎥Types of Opinion in a SOC Engagement
-
🎙️Types of Opinion in a SOC Engagement
-
🎥Description of SOC 1
-
🎙️Description of SOC 1
-
🎥Description of SOC 2
-
🎙️Description of SOC 2
-
🎥Descrtion of Cybersecurity
-
🎙️Descrtion of Cybersecurity
-
🎥Management Assertions in a SOC Engagement
-
🎙️Management Assertions in a SOC Engagement
-
🎥SOC 1 Type 1 Report
-
🎙️SOC 1 Type 1 Report
-
🎥SOC 1 Type 2 Report
-
🎙️SOC 1 Type 2 Report
-
🎥SOC 2 Type 2 Report
-
🎙️SOC 2 Type 2 Report
-
🎥Carve-out and Include Method
-
🎙️Carve-out and Include Method
-
🎥CUECs
-
🎙️CUECs
-
🎥SOC Reports: Complementary Subservice and User Controls
-
🎙️SOC Reports: Complementary Subservice and User Controls
-
🎥SOC Reports: Qualified or Adverse
-
🎙️SOC Reports: Qualified or Adverse
-
🎥SOC Reports: Qualified or Disclaimer
-
🎙️SOC Reports: Qualified or Disclaimer
-
🎥SOC Engagement: Response to the Assessed Level of Risk
-
🎙️SOC Engagement: Response to the Assessed Level of Risk
-
🎥SOC Description 1
-
🎙️SOC Description 1
-
🎥SOC Description 2
-
🎙️SOC Description 2
-
🎥Control Design
-
🎙️Control Design
-
🎥Test of Effectiveness
-
🎙️Test of Effectiveness
-
🎥Evaluate the Procedures
-
🎙️Evaluate the Procedures
-
🎥Subsequent Events in a SOC Engagement
-
🎙️Subsequent Events in a SOC Engagement
-
🎥Representation Letter (SOC Engagement)
-
🎙️Representation Letter (SOC Engagement)
-
🎥Service Organization Control (SOC) Engagement
Participants 2077
Lesson 1 of 31
In Progress
