Greetings, everyone, and welcome to sever security Audit overview.
My name is Darcy Campo,
and in this course we're going to be talking about the basics of auditing.
And since it's Cyber Security audit will review, I'm going to introduce you to some of cybersecurity frameworks.
They're actually used
when they perform cyber security audits.
Now, before we get started, I have one quick question for you.
What is the difference between an auditor
and a heartless, mindless zombie?
Auditors need checklists. Zombies don't
and I have 15 years of a lot of experience,
a couple of fiber security certifications
as well as a master's in computer information network security.
I'm retired military,
and during my military career,
there are three key positions that I had as they relate to auditing.
One of them was the Requirements Office where I worked at the Pentagon,
and I oversaw enlisted technical training programs.
It was also Quality Assurance Officer,
where I managed the internal auditing
and I was actually Quality Assurance representative, which meant that I went out and actually performed the audits on the different departments and divisions.
After I retired, I worked as a senior analyst
and I did an audit, an assessment of six United States Marine Corps irrigation with just six communities.
Now my hobbies and interests mulches keep that classified.
bit of information about myself that I can give you is the fact that, well, I'm phlegmatic
and, no, it's not a disease.
It basically means that I am very unemotional. As I'm treating tell by the tone of my voice.
I think I became this way.
because sometimes you have to keep a straight face. Let you know the other person is sitting there lying to you.
They just can't stand up and say Liar, liar, pants on fire.
you will learn the purpose of a cyber security *** auto controls out of frameworks
and proper on a team performance, which is very important,
as well as the benefits of the cyber security audit.
Now you need to be successful.
Well, basic understanding of auditing principles on cybersecurity principles will be good,
but don't worry, we're going to start off with the basics
now. The course supplementary materials are all free.
Unfortunately, you're gonna have to donald them,
and the reason for that is very simple.
A lot of these pdf files are very, very large.
It just wouldn't be possible for me to present them here in their entirety.
Therefore, you can download them at your leisure. I will provide the links,
and you can go through him.
Okay, Time for a first knowledge bomb.
Now. Knowledge bombs, air. Basically
piece of information. Like to pass up based on past experiences,
you should always have
Well, that we can keep all the important documents like, for example, the supplemental materials in one location
and you can reference them is needed
no target audience for this course. Basically, people are new to cyber security, auditing the employees
as well as those interested in cybersecurity. Oddity.
You know, students in college where lateral transfers, you know, people that are sick and tired of working at the help desk.
There's always those people just wanting you knowledge. All right, let's get started and move on to module to