Back to Course
Information Systems and Controls ISC Miles Supplemental Course
0% Complete
0/0 Steps
-
🚀 Start Here: Welcome, Course Resources & Success Tips
-
🚀Introduce Yourself1 Topic
-
✅ ISC CPA Exam Simulation Tutorial + 2024 and 2025 AICPA Video Questions5 Topics|2 Quizzes
-
💡ISC1 : M1 : National Institute of Standards and Technology Frameworks20 Topics|9 Quizzes
-
🎥NIST Cybersecurity Framework: Govern Function 1
-
🎙️NIST Cybersecurity Framework: Govern Function 1
-
🎥NIST Cybersecurity Framework Identify Function 2
-
🎙️NIST Cybersecurity Framework Identify Function 2
-
🎥NIST Cybersecurity Framework Protect Function 3
-
🎙️NIST Cybersecurity Framework Protect Function 3
-
🎥NIST Cybersecurity Framework Detect Function 4
-
🎙️NIST Cybersecurity Framework Detect Function 4
-
🎥NIST Cybersecurity Framework Respond Function 5
-
🎙️NIST Cybersecurity Framework Respond Function 5
-
🎥NIST Cybersecurity Framework Recover Function 6
-
🎙️NIST Cybersecurity Framework Recover Function 6
-
🎥NIST Cybersecurity Framework Profile
-
🎙️NIST Cybersecurity Framework Profile
-
🎥NIST: 4 Tiers
-
🎙️NIST: 4 Tiers
-
🎥NIST Privacy Framework
-
🎙️NIST Privacy Framework
-
🎥NIST SP 800-53
-
🎙️NIST SP 800-53
-
🎥NIST Cybersecurity Framework: Govern Function 1
-
💡ISC1 : M2 : Privacy and Data Security Standards8 Topics|4 Quizzes
-
💡ISC1 : M3 : Center for Internet Security Critical Security Controls: Part 110 Topics|2 Quizzes
-
🎥Introduction to CIS and Its Design Principles
-
🎙️Introduction to CIS and Its Design Principles
-
🎥CIS Implementation Groups: IG 1, 2 and 3
-
🎙️CIS Implementation Groups: IG 1, 2 and 3
-
🎥CIS Controls 1 to 3
-
🎙️CIS Controls 1 to 3
-
🎥CIS Controls 4 to 6
-
🎙️CIS Controls 4 to 6
-
🎥CIS Controls 7 to 9
-
🎙️CIS Controls 7 to 9
-
🎥Introduction to CIS and Its Design Principles
-
💡ISC1 : M4 : Center for Internet Security Critical Security Controls: Part 26 Topics
-
💡ISC1 : M5 : COBIT 2019 Framework4 Topics|2 Quizzes
-
💡ISC2 : M1 : IT Infrastructure10 Topics|4 Quizzes
-
🎥IT Architectures: operating systems, servers etc. + PPT Slides
-
🎙️IT Architectures: operating systems, servers etc.
-
🎥Introduction to Cloud Computing
-
🎙️Introduction to Cloud Computing
-
🎥Cloud Computing Deployment, Risks and Benefits
-
🎙️Cloud Computing Deployment, Risks and Benefits
-
🎥Role and responsibilities of cloud service providers + PPT Slides
-
🎙️Role and responsibilities of cloud service providers
-
🎥How COSO Frameworks Address Cloud Computing Governance + PPT Slides
-
🎙️How COSO Frameworks Address Cloud Computing Governance
-
🎥IT Architectures: operating systems, servers etc. + PPT Slides
-
💡ISC2 : M2 : Enterprise and Accounting Information Systems4 Topics|1 Quiz
-
💡ISC2 : M3 : Availability, Resiliency, and Disaster Recovery8 Topics|4 Quizzes
-
🎥Business Resiliency Introduction
-
🎙️Business Resiliency Introduction
-
🎥Business Resiliency Crisis Management
-
🎙️Business Resiliency Crisis Management
-
🎥Business Resiliency: Disaster Recovery Plan DRP
-
🎙️Business Resiliency: Disaster Recovery Plan DRP
-
🎥Business Resiliency System Controls
-
🎙️Business Resiliency System Controls
-
🎥Business Resiliency Introduction
-
🎯AICPA Questions: Business Continuity Plan1 Quiz
-
💡ISC2 : M4 : Change Management6 Topics|2 Quizzes
-
💡ISC2 : M5 : Introduction to Data Collection and the Data Life Cycle2 Topics|1 Quiz
-
💡ISC2 : M6 : Data Storage and Database Design9 Topics|3 Quizzes
-
🎥Database Systems
-
🎙️Database Systems
-
🎥Flat Files Versus Structured Data
-
🎙️Flat Files Versus Structured Data
-
🎥Business Intelligence Tools for Databases
-
🎙️Business Intelligence Tools for Databases
-
🎥Primary and Foreign Key + PPT Slides
-
🎙️Primary and Foreign Key
-
🎥CPA Exam Simulation Primary and Foreign Key + PPT Slides
-
🎥Database Systems
-
💡ISC2 : M7 : Data Extraction, Integration, and Process Documentation16 Topics|1 Quiz
-
🎥1 to 1 Relationship in SQL Database + PPT Slides
-
🎙️1 to 1 Relationship in SQL Database
-
🎥1 to Many Relationship in SQL Database + PPT Slides
-
🎙️1 to Many Relationship in SQL Database
-
🎥Many to Many Relationship in SQL Database + PPT Slides
-
🎙️Many to Many Relationship in SQL Database
-
🎥Business Process Modeling Notation
-
🎙️Business Process Modeling Notation
-
🎥Data Normalizaton
-
🎙️Data Normalizaton
-
🎥Data Normalization (1NF)
-
🎙️Data Normalization (1NF)
-
🎥Data Normalization (2NF)
-
🎙️Data Normalization (2NF)
-
🎥Data Normalization (3F)
-
🎙️Data Normalization (3F)
-
🎥1 to 1 Relationship in SQL Database + PPT Slides
-
💡ISC3 : M1 : Threats and Attacks26 Topics|13 Quizzes
-
🎥Cyber Security
-
🎙️Cyber Security
-
🎥Threat Actors
-
🎙️Threat Actors
-
🎥Network Based Attacks
-
🎙️Network Based Attacks
-
🎥Host Based Attacked
-
🎙️Host Based Attacked
-
🎥Social Engineering Attacks
-
🎙️Social Engineering Attacks
-
🎥Application Based Attacks
-
🎙️Application Based Attacks
-
🎥Physical Attacks
-
🎙️Physical Attacks
-
🎥Supply Chain Attacks
-
🎙️Supply Chain Attacks
-
🎥Stages of Cyber Attacks
-
🎙️Stages of Cyber Attacks
-
🎥Risks Related to Cloud Computing
-
🎙️Risks Related to Cloud Computing
-
🎥Risks Related to Mobile Technology
-
🎙️Risks Related to Mobile Technology
-
🎥Risks Related to Internet of Things
-
🎙️Risks Related to Internet of Things
-
🎥Threat Modeling
-
🎙️Threat Modeling
-
🎥Cyber Security
-
💡ISC3 : M2 : Mitigation of Threats and Attacks34 Topics|13 Quizzes
-
🎥COSO and Cybersecurity
-
🎙️COSO and Cybersecurity
-
🎥ERM: Cybersecurity
-
🎙️ERM: Cybersecurity
-
🎥Security Policies (Cybersecurity)
-
🎙️Security Policies (Cybersecurity)
-
🎥Security Policies: Acceptable Use Policies
-
🎙️Security Policies: Acceptable Use Policies
-
🎥Bring your own Device Policies
-
🎙️Bring your own Device Policies
-
🎥Network Components
-
🎙️Network Components
-
🎥Network Security
-
🎙️Network Security
-
🎥Authorization and Authentication
-
🎙️Authorization and Authentication
-
🎥Identification and Authentication
-
🎙️Identification and Authentication
-
🎥Vulnerability Management
-
🎙️Vulnerability Management
-
🎥Vulnerability Scanning
-
🎙️Vulnerability Scanning
-
🎥Defense in Depth
-
🎙️Defense in Depth
-
🎥Redundancy and Diversification
-
🎙️Redundancy and Diversification
-
🎥Preventive Controls
-
🎙️Preventive Controls
-
🎥Access Controls
-
🎙️Access Controls
-
🎥Detective Controls
-
🎙️Detective Controls
-
🎥Corrective Controls
-
🎙️Corrective Controls
-
🎥COSO and Cybersecurity
-
💡ISC3 : M3 : Security Testing10 Topics|4 Quizzes
-
🎥Risk Management Framework
-
🎙️Risk Management Framework
-
🎥Security Assessment Reports
-
🎙️Security Assessment Reports
-
🎥Security Assessment Evaluators, Process and evidence
-
🎙️Security Assessment Evaluators, Process and evidence
-
🎥Security Awareness
-
🎙️Security Awareness
-
🎥Evaluating Security Awareness
-
🎙️Evaluating Security Awareness
-
🎥Risk Management Framework
-
💡ISC3 : M4 : Confidentiality and Privacy18 Topics|5 Quizzes
-
🎥Confidentiality and Privacy
-
🎙️Confidentiality and Privacy
-
🎥Protecting Confidential Data
-
🎙️Protecting Confidential Data
-
🎥Data Obfuscation SDLC
-
🎙️Data Obfuscation SDLC
-
🎥Data Encryption
-
🎙️Data Encryption
-
🎥Hashing and Cipher Techniques
-
🎙️Hashing and Cipher Techniques
-
🎥Data Loss Prevention
-
🎙️Data Loss Prevention
-
🎥Data at rest and Data Deletion
-
🎙️Data at rest and Data Deletion
-
🎥WalkThrough of Org. Security, Confidentiality and Privacy
-
🎙️WalkThrough of Org. Security, Confidentiality and Privacy
-
🎥SOC 2 Engagement
-
🎙️SOC 2 Engagement
-
🎥Confidentiality and Privacy
-
💡ISC3 : M4 : Incident Response12 Topics|5 Quizzes
-
💡ISC4 : M1 : SOC Engagement Categories and Types12 Topics|3 Quizzes
-
💡ISC4 : M2 : Reporting on SOC Engagements: Part 120 Topics|5 Quizzes
-
🎥Service Organization Control (SOC) Engagement
-
🎙️Service Organization Control (SOC) Engagement
-
🎥Unqualified Opinion
-
🎙️Unqualified Opinion
-
🎥Types of Opinion in a SOC Engagement
-
🎙️Types of Opinion in a SOC Engagement
-
🎥Description of SOC 1
-
🎙️Description of SOC 1
-
🎥Description of SOC 2
-
🎙️Description of SOC 2
-
🎥Descrtion of Cybersecurity
-
🎙️Descrtion of Cybersecurity
-
🎥Management Assertions in a SOC Engagement
-
🎙️Management Assertions in a SOC Engagement
-
🎥SOC 1 Type 1 Report
-
🎙️SOC 1 Type 1 Report
-
🎥SOC 1 Type 2 Report
-
🎙️SOC 1 Type 2 Report
-
🎥SOC 2 Type 2 Report
-
🎙️SOC 2 Type 2 Report
-
🎥Service Organization Control (SOC) Engagement
-
💡ISC4 : M3 :Reporting on SOC Engagements: Part 210 Topics
-
🎥Carve-out and Include Method
-
🎙️Carve-out and Include Method
-
🎥CUECs
-
🎙️CUECs
-
🎥SOC Reports: Complementary Subservice and User Controls
-
🎙️SOC Reports: Complementary Subservice and User Controls
-
🎥SOC Reports: Qualified or Adverse
-
🎙️SOC Reports: Qualified or Adverse
-
🎥SOC Reports: Qualified or Disclaimer
-
🎙️SOC Reports: Qualified or Disclaimer
-
🎥Carve-out and Include Method
-
💡ISC4 : M4 : Planning and Risk Assessment in a SOC Engagement16 Topics|6 Quizzes
-
🎥SOC 1 Management Responsibilities
-
🎙️SOC 1 Management Responsibilities
-
🎥SOC 2 Management Responsibilities
-
🎙️SOC 2 Management Responsibilities
-
🎥Service Auditor's Responsibilities
-
🎙️Service Auditor’s Responsibilities
-
🎥Independence and SOC Engagement
-
🎙️Independence and SOC Engagement
-
🎥Materiality in SOC Engagement
-
🎙️Materiality in SOC Engagement
-
🎥System Requirements
-
🎙️System Requirements
-
🎥Service Commitments
-
🎙️Service Commitments
-
🎥SOC Risk Assessment
-
🎙️SOC Risk Assessment
-
🎥SOC 1 Management Responsibilities
-
💡ISC4 : M5 : Performing SOC Engagements16 Topics|6 Quizzes
-
🎥SOC Engagement: Response to the Assessed Level of Risk
-
🎙️SOC Engagement: Response to the Assessed Level of Risk
-
🎥SOC Description 1
-
🎙️SOC Description 1
-
🎥SOC Description 2
-
🎙️SOC Description 2
-
🎥Control Design
-
🎙️Control Design
-
🎥Test of Effectiveness
-
🎙️Test of Effectiveness
-
🎥Evaluate the Procedures
-
🎙️Evaluate the Procedures
-
🎥Subsequent Events in a SOC Engagement
-
🎙️Subsequent Events in a SOC Engagement
-
🎥Representation Letter (SOC Engagement)
-
🎙️Representation Letter (SOC Engagement)
-
🎥SOC Engagement: Response to the Assessed Level of Risk
Participants 132
Lesson 1 of 26
In Progress
