Back to Course
Information Systems and Control ISC UWorld Supplemental Course
0% Complete
0/0 Steps
-
🚀 Start Here: Welcome, Course Resources & Success Tips
-
🚀Introduce Yourself1 Topic
-
✅ ISC CPA Exam Simulation Tutorial + 2024 and 2025 AICPA Video Questions. Uworld5 Topics|2 Quizzes
-
💡ISC 01: SOC Planning and Performing ISC 1.01: Introduction to SOC Engagements42 Topics|15 Quizzes
-
🎥SOC 1, 2 and 3
-
🎙️SOC 1, 2 and 3
-
🎥Type 1 and Type 2 Opinion
-
🎥Trust Services Criteria
-
🎙️Trust Services Criteria
-
🎥Attestation Engagements ISC
-
🎙️Attestation Engagements ISC
-
🎥COSO and TSC
-
🎙️COSO and TSC
-
🎥TSC Additional Criteria
-
🎙️TSC Additional Criteria
-
🎥SOC 1 Management Responsibilities
-
🎙️SOC 1 Management Responsibilities
-
🎥SOC 2 Management Responsibilities
-
🎙️SOC 2 Management Responsibilities
-
🎥Service Auditor's Responsibilities
-
🎙️Service Auditor’s Responsibilities
-
🎥Independence and SOC Engagement
-
🎙️Independence and SOC Engagement
-
🎥Materiality in SOC Engagement
-
🎙️Materiality in SOC Engagement
-
🎥System Requirements
-
🎙️System Requirements
-
🎥Service Commitments
-
🎙️Service Commitments
-
🎥SOC Risk Assessment
-
🎙️SOC Risk Assessment
-
🎥SOC Engagement: Response to the Assessed Level of Risk
-
🎙️SOC Engagement: Response to the Assessed Level of Risk
-
🎥SOC Description 1
-
🎙️SOC Description 1
-
🎥SOC Description 2
-
🎥Control Design
-
🎙️Control Design
-
🎥Test of Effectiveness
-
🎙️Test of Effectiveness
-
🎥Evaluate the Procedures
-
🎙️Evaluate the Procedures
-
🎥Subsequent Events in a SOC Engagement
-
🎙️Subsequent Events in a SOC Engagement
-
🎥Representation Letter (SOC Engagement)
-
🎙️Representation Letter (SOC Engagement)
-
🎥SOC 1, 2 and 3
-
💡ISC 02: SOC Reporting30 Topics|7 Quizzes
-
🎥Service Organization Control (SOC) Engagement
-
🎙️Service Organization Control (SOC) Engagement
-
🎥Unqualified Opinion
-
🎙️Unqualified Opinion
-
🎥Types of Opinion in a SOC Engagement
-
🎙️Types of Opinion in a SOC Engagement
-
🎥Description of SOC 1
-
🎙️Description of SOC 1
-
🎥Description of SOC 2
-
🎙️Description of SOC 2
-
🎥Descrtion of Cybersecurity
-
🎙️Descrtion of Cybersecurity
-
🎥Management Assertions in a SOC Engagement
-
🎙️Management Assertions in a SOC Engagement
-
🎥SOC 1 Type 1 Report
-
🎙️SOC 1 Type 1 Report
-
🎥SOC 1 Type 2 Report
-
🎙️SOC 1 Type 2 Report
-
🎥SOC 2 Type 2 Report
-
🎙️SOC 2 Type 2 Report
-
🎥Carve-out and Include Method
-
🎙️Carve-out and Include Method
-
🎥CUECs
-
🎙️CUECs
-
🎥SOC Reports: Complementary Subservice and User Controls
-
🎙️SOC Reports: Complementary Subservice and User Controls
-
🎥SOC Reports: Qualified or Adverse
-
🎙️SOC Reports: Qualified or Adverse
-
🎥SOC Reports: Qualified or Disclaimer
-
🎙️SOC Reports: Qualified or Disclaimer
-
🎥Service Organization Control (SOC) Engagement
-
💡ISC 03: Information systems33 Topics|14 Quizzes
-
🎥IT Architectures: operating systems, servers etc. + PPT Slides
-
🎙️IT Architectures: operating systems, servers etc.
-
🎥Introduction to Cloud Computing
-
🎙️Introduction to Cloud Computing
-
🎥Cloud Computing Deployment, Risks and Benefits
-
🎙️Cloud Computing Deployment, Risks and Benefits
-
🎥Role and responsibilities of cloud service providers + PPT Slides
-
🎙️Role and responsibilities of cloud service providers
-
🎥How COSO Frameworks Address Cloud Computing Governance + PPT Slides
-
🎙️How COSO Frameworks Address Cloud Computing Governance
-
🎥Enterprise Resource Planning (ERP)
-
🎙️Enterprise Resource Planning (ERP)
-
🎥Enterprise Resource Planning (ERP) Architecture
-
🎙️Enterprise Resource Planning (ERP) Architecture
-
🎥Business Process Modeling Notation
-
🎙️Business Process Modeling Notation
-
🎥Business Resiliency Introduction
-
🎙️Business Resiliency Introduction
-
🎥Business Resiliency Crisis Management
-
🎙️Business Resiliency Crisis Management
-
🎥Business Resiliency: Disaster Recovery Plan DRP
-
🎙️Business Resiliency: Disaster Recovery Plan DRP
-
🎥Business Resiliency System Controls
-
🎙️Business Resiliency System Controls
-
🎥Change Management and Process of Change Management
-
🎙️Change Management and Process of Change Management
-
🎥Risks and Mitigations to Change Management
-
🎙️Risks and Mitigations to Change Management
-
🎥System Development Life Cycle (SDLC)
-
🎥Waterfall and Agile Methodology
-
🎥Purpose of testing change management
-
🎙️Purpose of testing change management
-
🎥Software System Testing
-
🎥IT Architectures: operating systems, servers etc. + PPT Slides
-
🎯AICPA Questions: Business Continuity Plan1 Quiz
-
💡ISC 04: Data management30 Topics|7 Quizzes
-
🎥Data Definition language: Create and Alter
-
🎥Data Definition language: Drop, Truncate and Rename
-
🎥Data Manipulation language: Insert, Update and Delete
-
🎥Data Control language: Grant and Revoke
-
🎥Transaction Control language: Commit Rollback and Save point
-
🎥Data Life Cycle
-
🎙️Data Life Cycle
-
🎥Database Systems
-
🎙️Database Systems
-
🎥Flat Files Versus Structured Data
-
🎙️Flat Files Versus Structured Data
-
🎥Business Intelligence Tools for Databases
-
🎙️Business Intelligence Tools for Databases
-
🎥Primary and Foreign Key + PPT Slides
-
🎙️Primary and Foreign Key
-
🎥CPA Exam Simulation Primary and Foreign Key + PPT Slides
-
🎥1 to 1 Relationship in SQL Database + PPT Slides
-
🎙️1 to 1 Relationship in SQL Database
-
🎥1 to Many Relationship in SQL Database + PPT Slides
-
🎙️1 to Many Relationship in SQL Database
-
🎥Many to Many Relationship in SQL Database + PPT Slides
-
🎙️Many to Many Relationship in SQL Database
-
🎥Data Normalizaton
-
🎙️Data Normalizaton
-
🎥Data Normalization (1NF)
-
🎙️Data Normalization (1NF)
-
🎥Data Normalization (2NF)
-
🎙️Data Normalization (2NF)
-
🎥Data Normalization (3F)
-
🎙️Data Normalization (3F)
-
🎥Data Definition language: Create and Alter
-
💡ISC 05: Regulations, standards and frameworks48 Topics|18 Quizzes
-
🎥Introduction to Data Privacy Laws + PPT
-
🎙️Introduction to Data Privacy Laws
-
🎥Health Insurance Portability and Accountability Act (HIPAA) + PPT
-
🎙️Health Insurance Portability and Accountability Act (HIPAA)
-
🎥GDPR + PPT
-
🎙️GDPR
-
🎥PCIDSS+ PPT Slides
-
🎙️PCIDSS
-
🎥Introduction to CIS and Its Design Principles
-
🎙️Introduction to CIS and Its Design Principles
-
🎥CIS Implementation Groups: IG 1, 2 and 3
-
🎙️CIS Implementation Groups: IG 1, 2 and 3
-
🎥CIS Controls 1 to 3
-
🎙️CIS Controls 1 to 3
-
🎥CIS Controls 4 to 6
-
🎙️CIS Controls 4 to 6
-
🎥CIS Controls 7 to 9
-
🎙️CIS Controls 7 to 9
-
🎥CIS Controls 10 to 12
-
🎙️CIS Controls 10 to 12
-
🎥CIS Controls 13 to 15
-
🎙️CIS Controls 13 to 15
-
🎥CIS Controls 16 to 18
-
🎙️CIS Controls 16 to 18
-
🎥NIST Cybersecurity Framework: Govern Function 1
-
🎙️NIST Cybersecurity Framework: Govern Function 1
-
🎥NIST Cybersecurity Framework Identify Function 2
-
🎙️NIST Cybersecurity Framework Identify Function 2
-
🎥NIST Cybersecurity Framework Protect Function 3
-
🎙️NIST Cybersecurity Framework Protect Function 3
-
🎥NIST Cybersecurity Framework Detect Function 4
-
🎙️NIST Cybersecurity Framework Detect Function 4
-
🎥NIST Cybersecurity Framework Respond Function 5
-
🎙️NIST Cybersecurity Framework Respond Function 5
-
🎥NIST Cybersecurity Framework Recover Function 6
-
🎙️NIST Cybersecurity Framework Recover Function 6
-
🎥NIST Cybersecurity Framework Profile
-
🎙️NIST Cybersecurity Framework Profile
-
🎥NIST: 4 Tiers
-
🎙️NIST: 4 Tiers
-
🎥The 6 principles of COBIT
-
🎙️The 6 principles of COBIT
-
🎥COBIT 7 information criteria
-
🎙️COBIT 7 information criteria
-
🎥NIST Privacy Framework
-
🎙️NIST Privacy Framework
-
🎥NIST SP 800-53
-
🎙️NIST SP 800-53
-
🎥Introduction to Data Privacy Laws + PPT
-
💡ISC 06: Security 6.01: Threats and attacks28 Topics|15 Quizzes
-
🎥Cyber Security
-
🎙️Cyber Security
-
🎥Threat Actors
-
🎙️Threat Actors
-
🎥Network Based Attacks
-
🎙️Network Based Attacks
-
🎥Host Based Attacked
-
🎙️Host Based Attacked
-
🎥Malware Attacks + PPT Slides
-
🎥Social Engineering Attacks
-
🎙️Social Engineering Attacks
-
🎥Application Based Attacks
-
🎙️Application Based Attacks
-
🎥Phishing Attacks + PPT Slides
-
🎥Physical Attacks
-
🎙️Physical Attacks
-
🎥Supply Chain Attacks
-
🎙️Supply Chain Attacks
-
🎥Stages of Cyber Attacks
-
🎙️Stages of Cyber Attacks
-
🎥Risks Related to Cloud Computing
-
🎙️Risks Related to Cloud Computing
-
🎥Risks Related to Mobile Technology
-
🎙️Risks Related to Mobile Technology
-
🎥Risks Related to Internet of Things
-
🎙️Risks Related to Internet of Things
-
🎥Threat Modeling
-
🎙️Threat Modeling
-
🎥Cyber Security
-
💡ISC 06: Security: 6.02: Mitigation44 Topics|17 Quizzes
-
🎥Security Policies (Cybersecurity)
-
🎙️Security Policies (Cybersecurity)
-
🎥Bring your own Device Policies
-
🎙️Bring your own Device Policies
-
🎥Network Components
-
🎙️Network Components
-
🎥Security Policies: Acceptable Use Policies
-
🎙️Security Policies: Acceptable Use Policies
-
🎥Network Security
-
🎙️Network Security
-
🎥Authorization and Authentication
-
🎙️Authorization and Authentication
-
🎥Identification and Authentication
-
🎙️Identification and Authentication
-
🎥Vulnerability Management
-
🎙️Vulnerability Management
-
🎥COSO and Cybersecurity
-
🎙️COSO and Cybersecurity
-
🎥ERM: Cybersecurity
-
🎙️ERM: Cybersecurity
-
🎥Vulnerability Scanning
-
🎙️Vulnerability Scanning
-
🎥Defense in Depth
-
🎙️Defense in Depth
-
🎥Redundancy and Diversification
-
🎙️Redundancy and Diversification
-
🎥Preventive Controls
-
🎙️Preventive Controls
-
🎥Access Controls
-
🎙️Access Controls
-
🎥Detective Controls
-
🎙️Detective Controls
-
🎥Corrective Controls
-
🎙️Corrective Controls
-
🎥Risk Management Framework
-
🎙️Risk Management Framework
-
🎥Security Assessment Reports
-
🎙️Security Assessment Reports
-
🎥Security Assessment Evaluators, Process and evidence
-
🎙️Security Assessment Evaluators, Process and evidence
-
🎥Security Awareness
-
🎙️Security Awareness
-
🎥Evaluating Security Awareness
-
🎙️Evaluating Security Awareness
-
🎥Security Policies (Cybersecurity)
-
💡ISC 07: Confidentiality and privacy19 Topics|6 Quizzes
-
🎥Encryption & Digital Certificate
-
🎥Confidentiality and Privacy
-
🎙️Confidentiality and Privacy
-
🎥Protecting Confidential Data
-
🎙️Protecting Confidential Data
-
🎥Data Obfuscation SDLC
-
🎙️Data Obfuscation SDLC
-
🎥Data Encryption
-
🎙️Data Encryption
-
🎥Hashing and Cipher Techniques
-
🎙️Hashing and Cipher Techniques
-
🎥Data Loss Prevention
-
🎙️Data Loss Prevention
-
🎥Data at rest and Data Deletion
-
🎙️Data at rest and Data Deletion
-
🎥WalkThrough of Org. Security, Confidentiality and Privacy
-
🎙️WalkThrough of Org. Security, Confidentiality and Privacy
-
🎥SOC 2 Engagement
-
🎙️SOC 2 Engagement
-
🎥Encryption & Digital Certificate
-
💡ISC 08: Incident response12 Topics|5 Quizzes
-
💡ISC 09: Appendices
Participants 2068
Lesson 1 of 14
In Progress
