1.1 Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 21 minutes
Difficulty
Intermediate
CEU/CPE
1
Video Transcription
00:27
Greetings, everyone, and welcome to sever security Audit overview.
00:35
My name is Darcy Campo,
00:38
and in this course we're going to be talking about the basics of auditing.
00:43
And since it's Cyber Security audit will review, I'm going to introduce you to some of cybersecurity frameworks.
00:50
They're actually used
00:51
my auditors
00:53
when they perform cyber security audits.
00:58
Now, before we get started, I have one quick question for you.
01:03
What is the difference between an auditor
01:06
and a heartless, mindless zombie?
01:11
Auditors need checklists. Zombies don't
01:18
and I have 15 years of a lot of experience,
01:19
a couple of fiber security certifications
01:23
as well as a master's in computer information network security.
01:30
I'm retired military,
01:32
and during my military career,
01:34
there are three key positions that I had as they relate to auditing.
01:40
One of them was the Requirements Office where I worked at the Pentagon,
01:44
and I oversaw enlisted technical training programs.
01:49
It was also Quality Assurance Officer,
01:53
where I managed the internal auditing
01:57
and I was actually Quality Assurance representative, which meant that I went out and actually performed the audits on the different departments and divisions.
02:07
After I retired, I worked as a senior analyst
02:10
and I did an audit, an assessment of six United States Marine Corps irrigation with just six communities.
02:17
Now my hobbies and interests mulches keep that classified.
02:23
Now the only
02:25
bit of information about myself that I can give you is the fact that, well, I'm phlegmatic
02:34
and, no, it's not a disease.
02:37
It basically means that I am very unemotional. As I'm treating tell by the tone of my voice.
02:44
I think I became this way.
02:46
Do the auditing
02:49
because sometimes you have to keep a straight face. Let you know the other person is sitting there lying to you.
02:54
They just can't stand up and say Liar, liar, pants on fire.
03:02
No news course
03:04
you will learn the purpose of a cyber security *** auto controls out of frameworks
03:09
and proper on a team performance, which is very important,
03:14
as well as the benefits of the cyber security audit.
03:19
Now you need to be successful.
03:22
Well, basic understanding of auditing principles on cybersecurity principles will be good,
03:28
but don't worry, we're going to start off with the basics
03:34
now. The course supplementary materials are all free.
03:38
Unfortunately, you're gonna have to donald them,
03:42
and the reason for that is very simple.
03:46
A lot of these pdf files are very, very large.
03:49
It just wouldn't be possible for me to present them here in their entirety.
03:53
Therefore, you can download them at your leisure. I will provide the links,
03:59
and you can go through him.
04:01
Okay, Time for a first knowledge bomb.
04:05
Now. Knowledge bombs, air. Basically
04:09
piece of information. Like to pass up based on past experiences,
04:15
you should always have
04:16
a cybersecurity
04:19
reference file.
04:23
Now, why is that?
04:25
Well, that we can keep all the important documents like, for example, the supplemental materials in one location
04:31
and you can reference them is needed
04:36
no target audience for this course. Basically, people are new to cyber security, auditing the employees
04:45
as well as those interested in cybersecurity. Oddity.
04:47
You know, students in college where lateral transfers, you know, people that are sick and tired of working at the help desk.
04:55
There's always those people just wanting you knowledge. All right, let's get started and move on to module to
Up Next
Cybersecurity Audit Overview

This cybersecurity audit training is a beginner level course for anyone interested in cybersecurity audits or a career as an auditor. Upon completion of the course, the student will be familiar with the concept and purpose of auditing along with control frameworks focused on cybersecurity.

Instructed By