PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES
The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in both the public and private sector. Written by industry experts, this book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the laws and the need to protect and secure business and consumer privacy data. Using examples and exercises, this book incorporates hands-on activities to prepare readers to skillfully complete IT compliance auditing.
Instructor materials for Auditing IT Infrastructures for Compliance, Second Edition include:
- PowerPoint Lecture Slides
- Instructor's Guide
- Sample Course Syllabus
- Quiz & Exam Questions
- Case Scenarios/Handouts
About the Series
This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking—putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.
Written for IT students and Professionals looking to gain knowledge in compliance laws within IT infrastructures and Information Security.
Chapter 1: The Need for Information Systems Security Compliance
Chapter 2: Overview of U.S. Compliancy Laws
Chapter 3: What Is the Scope of an IT Compliance Audit?
Chapter 4: Auditing Standards and Frameworks
Chapter 5: Planning an IT Infrastructure Audit for Compliance
Chapter 6: Conducting an IT Infrastructure Audit for Compliance
Chapter 7: Writing the IT Infrastructure Audit Report
Chapter 8: Compliance Within the User Domain
Chapter 9: Compliance Within the Workstation Domain
Chapter 10: Compliance Within the LAN Domain
Chapter 11: Compliance Within the LAN-to-WAN Domain
Chapter 12: Compliance Within the WAN Domain
Chapter 13: Compliance Within the Remote Access Domain
Chapter 14: Compliance Within the System/Application Domain
Chapter 15: Ethics, Education, and Certification for IT Auditors
Martin Weiss-Manager of Information Security Gurus, RSA, The Security Division of EMC
Martin Weiss is a manager of information security gurus at RSA, The Security Division of EMC, which helps organizations accelerate their business by solving their most complex and sensitive security challenges. He is also on the board of directors for the Connecticut chapter of ISSA and has written several books. He holds a number of certifications, including Security+, CISSP, MCSE: Security, and RSA CSE. Marty received his MBA from the Isenberg School of Management at the University of Massachusetts and currently lives in New England with his wife and three sons.
Additional Titles by this Author
- ISBN-13: 9781284104110
- ISBN-13: 9781284064445
- ISBN-13: 9781284059182
Michael G. Solomon, PhD, CISSP, PMP, CISM-Solomon Consulting Inc.
Michael G. Solomon, Ph.D., CISSP, PMP, CISM, is a full-time security and OpenEdge speaker, consultant, and author who specializes in leading teams in achieving and maintaining secure IT environments. As an IT professional and consultant since 1987, he has led projects for numerous major organizations and has authored and contributed to multiple books and training courses. From 1998 until 2001, he was an instructor in the Kennesaw State University’s Computer Science and Information Sciences (CSIS) department, currently teaches graduate Information System Security courses at the University of the Cumberlands, and holds a PhD in Computer Science and Informatics from Emory University.
Additional Titles by this Author
- ISBN-13: 9781284116458
- ISBN-13: 9781284108064
- ISBN-13: 9781284060140