Instructor for this course
more

Logical Security Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data.  Logical Security Controls are comprised of tactics such as utilizing restricting user access, limiting administrative privileges, enforcing strong passwords and encrypting data.  In this course you will learn how to ensure proper controls have been implemented to protect corporate assets, company trade secrets, customer and employee identity and financial information.      

This course will take you through controls organizations can implement to protect assets, brand and image. We will delve into understanding the principles behind IT Logical Security and Access Controls. Lastly, we will discuss simple audit procedure proper controls are in place and working as intended.

 

Learning Objectives

  • Recognize Risks.
  • Identify appropriate Logical Access & Security Controls to mitigate specific risks.
  • Discover audit procedures to ensure effective controls are in place
  • Explore audit output.
Last updated/reviewed: May 15, 2022

Included In Certifications

This course is included in the following Certification Programs:

10 CoursesInformation Technology Auditor Certification

  1. Understanding Information Technology Governance and the Application of NIST
  2. Performing a Security Risk Assessment
  3. Auditing Data Security IT Computer Controls
  4. Auditing Third Party Service Providers and Cloud Environments
  5. Auditing Automated Business and Financial Transaction Processes
  6. Auditing Logical Security and Logical Access Controls
  7. Auditing Change Management
  8. Auditing the Network
  9. The Importance of Incident Response, Disaster Recovery and Business Continuity Planning
  10. Information Technology Audit Summary

14 Reviews (58 ratings)Reviews

4
Member's Profile
Instructor largely succeeded in presenting a very technical subject in plain English. My only recommendation is that a few of the technical terms could have been defined - course assumes you have a certain level of systems architecture background.
4
Member's Profile
The audio disappeared for a few minutes right before the one-hour mark in the continuous play file. Other than that, I think this course was good.
5
Anonymous Author
Overall the course was well structured and was presented in a clear manner, and provided good explanations within each of the areas discussed.
4
Member's Profile
This course covers technical matters in understandable manner. I am interested in the followup SOC 2 course by this author as well.
5
Anonymous Author
The course provides great insights on auditing logical access and logical security controls in a clear and concise manner.
5
Anonymous Author
Stated prerequisite requirements were appropriate and sufficient. Time allotted to the learning activity was appropriate
3
Member's Profile
Please refrain from using "what not". It is distracting and takes away from the lesson.
4
Anonymous Author
This course provides an understanding of Logical Security and Logical Access Controls.
4
Anonymous Author
Stop forcing us to write reviews for your courses. We've already paid for them.
5
Anonymous Author
This was a great course that was presented well. I would recommend it to others.
3
Anonymous Author
Adequate for what I need to perform the audit needed as well as for the CPE.
4
Member's Profile
Great overview and insight to logical access controls. Thank you!
5
Anonymous Author
Good course that met objectives. Well structured and presented.
5
Anonymous Author
Good course that met objectives. Well structured and presented.

Prerequisites

Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  1:29Introduction to Auditing Logical Access and Logical Security
  7:10The Layers of IT General Controls
  11:54Logical Access - Network Device
  11:41Logical Access - Virtual Private Network
  6:11Logical Access - Active Directory
  6:29Logical Access - File Shares
  16:36Logical Access - Database and Application
  5:26Logical Access - Critical Segregation of Duties
  10:55Logical Access - Report Writers and Tools
  6:54Logical Security
Continuous Play
  1:24:45Auditing Logical Access and Logical Security
Supporting Materials
  PDFSlides: Auditing Logical Security and Logical Access Controls
  PDFAuditing Logical Security and Logical Access Controls Glossary/Index
Review And Test
  quizREVIEW QUESTIONS
 examFINAL EXAM