Back to Course
Information Systems and Controls ISC Surgent Supplemental Course
0% Complete
0/0 Steps
-
🚀 Start Here: Welcome, Course Resources & Success Tips
-
🚀Introduce Yourself1 Topic
-
✅ ISC CPA Exam Simulation Tutorial + 2024 and 2025 AICPA Video Questions. Surgent5 Topics|2 Quizzes
-
💡1A - Information Systems30 Topics|11 Quizzes
-
🎥Introduction to Cloud Computing
-
🎙️Introduction to Cloud Computing
-
🎥Cloud Computing Deployment, Risks and Benefits
-
🎙️Cloud Computing Deployment, Risks and Benefits
-
🎥Role and responsibilities of cloud service providers + PPT Slides
-
🎙️Role and responsibilities of cloud service providers
-
🎥How COSO Frameworks Address Cloud Computing Governance + PPT Slides
-
🎙️How COSO Frameworks Address Cloud Computing Governance
-
🎥Enterprise Resource Planning (ERP)
-
🎙️Enterprise Resource Planning (ERP)
-
🎥Enterprise Resource Planning (ERP) Architecture
-
🎙️Enterprise Resource Planning (ERP) Architecture
-
🎥IT Architectures: operating systems, servers etc. + PPT Slides
-
🎙️IT Architectures: operating systems, servers etc.
-
🎥Introduction to Accounting & Users of Accounting Information
-
🎥Introduction to accounting Information system (business cycles) + PPT Slides
-
🎥Business Resiliency Introduction
-
🎙️Business Resiliency Introduction
-
🎥Business Resiliency Crisis Management
-
🎙️Business Resiliency Crisis Management
-
🎥Business Resiliency: Disaster Recovery Plan DRP
-
🎙️Business Resiliency: Disaster Recovery Plan DRP
-
🎥Business Resiliency System Controls
-
🎙️Business Resiliency System Controls
-
🎥Change Management and Process of Change Management
-
🎙️Change Management and Process of Change Management
-
🎥Risks and Mitigations to Change Management
-
🎙️Risks and Mitigations to Change Management
-
🎥Purpose of testing change management
-
🎙️Purpose of testing change management
-
🎥Introduction to Cloud Computing
-
🎯AICPA Questions: Business Continuity Plan1 Quiz
-
💡▾ 1B - Data Management28 Topics|7 Quizzes
-
🎥Data Life Cycle
-
🎙️Data Life Cycle
-
🎥Database Systems
-
🎙️Database Systems
-
🎥Flat Files Versus Structured Data
-
🎙️Flat Files Versus Structured Data
-
🎥Business Intelligence Tools for Databases
-
🎙️Business Intelligence Tools for Databases
-
🎥Primary and Foreign Key + PPT Slides
-
🎙️Primary and Foreign Key
-
🎥CPA Exam Simulation Primary and Foreign Key + PPT Slides
-
🎥Data Governance Challenges and Mitigation
-
🎥Data Normalizaton
-
🎙️Data Normalizaton
-
🎥Data Normalization (1NF)
-
🎙️Data Normalization (1NF)
-
🎥Data Normalization (2NF)
-
🎙️Data Normalization (2NF)
-
🎥Data Normalization (3F)
-
🎙️Data Normalization (3F)
-
🎥1 to 1 Relationship in SQL Database + PPT Slides
-
🎙️1 to 1 Relationship in SQL Database
-
🎥1 to Many Relationship in SQL Database + PPT Slides
-
🎙️1 to Many Relationship in SQL Database
-
🎥Many to Many Relationship in SQL Database + PPT Slides
-
🎙️Many to Many Relationship in SQL Database
-
🎥Business Process Modeling Notation
-
🎙️Business Process Modeling Notation
-
🎥Data Life Cycle
-
💡▾ 2A - Regulations, Standards, and Frameworks51 Topics|20 Quizzes
-
🎥AICPA Framework: 7 Threats to Principles +PPT Slides
-
🎥Malware Attacks + PPT Slides
-
🎥Generally Accepted Privacy principles
-
🎥NIST Cybersecurity Framework: Govern Function 1
-
🎙️NIST Cybersecurity Framework: Govern Function 1
-
🎥NIST Cybersecurity Framework Identify Function 2
-
🎙️NIST Cybersecurity Framework Identify Function 2
-
🎥NIST Cybersecurity Framework Protect Function 3
-
🎙️NIST Cybersecurity Framework Protect Function 3
-
🎥NIST Cybersecurity Framework Detect Function 4
-
🎙️NIST Cybersecurity Framework Detect Function 4
-
🎥NIST Cybersecurity Framework Respond Function 5
-
🎙️NIST Cybersecurity Framework Respond Function 5
-
🎥NIST Cybersecurity Framework Recover Function 6
-
🎙️NIST Cybersecurity Framework Recover Function 6
-
🎥NIST Cybersecurity Framework Profile
-
🎙️NIST Cybersecurity Framework Profile
-
🎥NIST: 4 Tiers
-
🎙️NIST: 4 Tiers
-
🎥NIST Privacy Framework
-
🎙️NIST Privacy Framework
-
🎥NIST SP 800-53
-
🎙️NIST SP 800-53
-
🎥Introduction to Data Privacy Laws + PPT
-
🎙️Introduction to Data Privacy Laws
-
🎥Health Insurance Portability and Accountability Act (HIPAA) + PPT
-
🎙️Health Insurance Portability and Accountability Act (HIPAA)
-
🎥GDPR + PPT
-
🎙️GDPR
-
🎥PCIDSS+ PPT Slides
-
🎙️PCIDSS
-
🎥Introduction to CIS and Its Design Principles
-
🎙️Introduction to CIS and Its Design Principles
-
🎥CIS Implementation Groups: IG 1, 2 and 3
-
🎙️CIS Implementation Groups: IG 1, 2 and 3
-
🎥CIS Controls 1 to 3
-
🎙️CIS Controls 1 to 3
-
🎥CIS Controls 4 to 6
-
🎙️CIS Controls 4 to 6
-
🎥CIS Controls 7 to 9
-
🎙️CIS Controls 7 to 9
-
🎥CIS Controls 10 to 12
-
🎙️CIS Controls 10 to 12
-
🎥CIS Controls 13 to 15
-
🎙️CIS Controls 13 to 15
-
🎥CIS Controls 16 to 18
-
🎙️CIS Controls 16 to 18
-
🎥The 6 principles of COBIT
-
🎙️The 6 principles of COBIT
-
🎥COBIT 7 information criteria
-
🎙️COBIT 7 information criteria
-
🎥AICPA Framework: 7 Threats to Principles +PPT Slides
-
💡2B: Security, Confidentiality, and Privacy: 2B1: Threats & Attacks27 Topics|13 Quizzes
-
🎥Encryption & Digital Certificate
-
🎥Cyber Security
-
🎙️Cyber Security
-
🎥Threat Actors
-
🎙️Threat Actors
-
🎥Network Based Attacks
-
🎙️Network Based Attacks
-
🎥Host Based Attacked
-
🎙️Host Based Attacked
-
🎥Social Engineering Attacks
-
🎙️Social Engineering Attacks
-
🎥Application Based Attacks
-
🎙️Application Based Attacks
-
🎥Physical Attacks
-
🎙️Physical Attacks
-
🎥Supply Chain Attacks
-
🎙️Supply Chain Attacks
-
🎥Stages of Cyber Attacks
-
🎙️Stages of Cyber Attacks
-
🎥Risks Related to Cloud Computing
-
🎙️Risks Related to Cloud Computing
-
🎥Risks Related to Mobile Technology
-
🎙️Risks Related to Mobile Technology
-
🎥Risks Related to Internet of Things
-
🎙️Risks Related to Internet of Things
-
🎥Threat Modeling
-
🎙️Threat Modeling
-
🎥Encryption & Digital Certificate
-
💡2B: Security, Confidentiality, and Privacy: 2B2 : Mitigation34 Topics|13 Quizzes
-
🎥COSO and Cybersecurity
-
🎙️COSO and Cybersecurity
-
🎥ERM: Cybersecurity
-
🎙️ERM: Cybersecurity
-
🎥Security Policies (Cybersecurity)
-
🎙️Security Policies (Cybersecurity)
-
🎥Security Policies: Acceptable Use Policies
-
🎙️Security Policies: Acceptable Use Policies
-
🎥Bring your own Device Policies
-
🎙️Bring your own Device Policies
-
🎥Network Components
-
🎙️Network Components
-
🎥Network Security
-
🎙️Network Security
-
🎥Authorization and Authentication
-
🎙️Authorization and Authentication
-
🎥Identification and Authentication
-
🎙️Identification and Authentication
-
🎥Vulnerability Management
-
🎙️Vulnerability Management
-
🎥Vulnerability Scanning
-
🎙️Vulnerability Scanning
-
🎥Defense in Depth
-
🎙️Defense in Depth
-
🎥Redundancy and Diversification
-
🎙️Redundancy and Diversification
-
🎥Preventive Controls
-
🎙️Preventive Controls
-
🎥Access Controls
-
🎙️Access Controls
-
🎥Detective Controls
-
🎙️Detective Controls
-
🎥Corrective Controls
-
🎙️Corrective Controls
-
🎥COSO and Cybersecurity
-
💡2B: Security, Confidentiality, and Privacy: 2B3 : Testing10 Topics|4 Quizzes
-
🎥Risk Management Framework
-
🎙️Risk Management Framework
-
🎥Security Assessment Reports
-
🎙️Security Assessment Reports
-
🎥Security Assessment Evaluators, Process and evidence
-
🎙️Security Assessment Evaluators, Process and evidence
-
🎥Security Awareness
-
🎙️Security Awareness
-
🎥Evaluating Security Awareness
-
🎙️Evaluating Security Awareness
-
🎥Risk Management Framework
-
💡▾ 2C - Confidentiality and Privacy18 Topics|6 Quizzes
-
🎥Confidentiality and Privacy
-
🎙️Confidentiality and Privacy
-
🎥Protecting Confidential Data
-
🎙️Protecting Confidential Data
-
🎥Data Obfuscation SDLC
-
🎙️Data Obfuscation SDLC
-
🎥Data Encryption
-
🎙️Data Encryption
-
🎥Hashing and Cipher Techniques
-
🎙️Hashing and Cipher Techniques
-
🎥Data Loss Prevention
-
🎙️Data Loss Prevention
-
🎥Data at rest and Data Deletion
-
🎙️Data at rest and Data Deletion
-
🎥WalkThrough of Org. Security, Confidentiality and Privacy
-
🎙️WalkThrough of Org. Security, Confidentiality and Privacy
-
🎥SOC 2 Engagement
-
🎙️SOC 2 Engagement
-
🎥Confidentiality and Privacy
-
💡▾ 2D - Incident Response12 Topics|5 Quizzes
-
💡▾ 3A - Considerations Specific to Planning and Performing a SOC Engagement44 Topics|15 Quizzes
-
🎥SOC 1, 2 and 3
-
🎙️SOC 1, 2 and 3
-
🎥Type 1 and Type 2 Opinion
-
🎙️Type 1 and Type 2 Opinion
-
🎥Trust Services Criteria
-
🎙️Trust Services Criteria
-
🎥Attestation Engagements ISC
-
🎙️Attestation Engagements ISC
-
🎥COSO and TSC
-
🎙️COSO and TSC
-
🎥TSC Additional Criteria
-
🎙️TSC Additional Criteria
-
🎥SOC Engagement: Response to the Assessed Level of Risk
-
🎙️SOC Engagement: Response to the Assessed Level of Risk
-
🎥SOC Description 1
-
🎙️SOC Description 1
-
🎥SOC Description 2
-
🎙️SOC Description 2
-
🎥Control Design
-
🎙️Control Design
-
🎥Test of Effectiveness
-
🎙️Test of Effectiveness
-
🎥Evaluate the Procedures
-
🎙️Evaluate the Procedures
-
🎥Subsequent Events in a SOC Engagement
-
🎙️Subsequent Events in a SOC Engagement
-
🎥Representation Letter (SOC Engagement)
-
🎙️Representation Letter (SOC Engagement)
-
🎥SOC 1 Management Responsibilities
-
🎙️SOC 1 Management Responsibilities
-
🎥SOC 2 Management Responsibilities
-
🎙️SOC 2 Management Responsibilities
-
🎥Service Auditor's Responsibilities
-
🎙️Service Auditor’s Responsibilities
-
🎥Independence and SOC Engagement
-
🎙️Independence and SOC Engagement
-
🎥Materiality in SOC Engagement
-
🎙️Materiality in SOC Engagement
-
🎥System Requirements
-
🎙️System Requirements
-
🎥Service Commitments
-
🎙️Service Commitments
-
🎥SOC Risk Assessment
-
🎙️SOC Risk Assessment
-
🎥SOC 1, 2 and 3
-
💡3B - Considerations Specific to Reporting on a SOC Engagement30 Topics|7 Quizzes
-
🎥Service Organization Control (SOC) Engagement
-
🎙️Service Organization Control (SOC) Engagement
-
🎥Unqualified Opinion
-
🎙️Unqualified Opinion
-
🎥Types of Opinion in a SOC Engagement
-
🎙️Types of Opinion in a SOC Engagement
-
🎥Description of SOC 1
-
🎙️Description of SOC 1
-
🎥Description of SOC 2
-
🎙️Description of SOC 2
-
🎥Descrtion of Cybersecurity
-
🎙️Descrtion of Cybersecurity
-
🎥Management Assertions in a SOC Engagement
-
🎙️Management Assertions in a SOC Engagement
-
🎥SOC 1 Type 1 Report
-
🎙️SOC 1 Type 1 Report
-
🎥SOC 1 Type 2 Report
-
🎙️SOC 1 Type 2 Report
-
🎥SOC 2 Type 2 Report
-
🎙️SOC 2 Type 2 Report
-
🎥Carve-out and Include Method
-
🎙️Carve-out and Include Method
-
🎥CUECs
-
🎙️CUECs
-
🎥SOC Reports: Complementary Subservice and User Controls
-
🎙️SOC Reports: Complementary Subservice and User Controls
-
🎥SOC Reports: Qualified or Adverse
-
🎙️SOC Reports: Qualified or Adverse
-
🎥SOC Reports: Qualified or Disclaimer
-
🎙️SOC Reports: Qualified or Disclaimer
-
🎥Service Organization Control (SOC) Engagement
Participants 2068
Lesson 1 of 14
In Progress
