-
Book Overview & Buying
-
Table Of Contents
IT Audit Field Manual
By :
IT Audit Field Manual
By:
Overview of this book
As cyber threats evolve and regulations tighten, IT professionals struggle to maintain effective auditing practices and ensure robust cybersecurity across complex systems. Drawing from over a decade of submarine military service and extensive cybersecurity experience, Lewis offers a unique blend of technical expertise and field-tested insights in this comprehensive field manual.
Serving as a roadmap for beginners as well as experienced professionals, this manual guides you from foundational concepts and audit planning to in-depth explorations of auditing various IT systems and networks, including Cisco devices, next-generation firewalls, cloud environments, endpoint security, and Linux systems. You’ll develop practical skills in assessing security configurations, conducting risk assessments, and ensuring compliance with privacy regulations. This book also covers data protection, reporting, remediation, advanced auditing techniques, and emerging trends.
Complete with insightful guidance on building a successful career in IT auditing, by the end of this book, you’ll be equipped with the tools to navigate the complex landscape of cybersecurity and compliance, bridging the gap between technical expertise and practical application.
Table of Contents (18 chapters)
Preface
Chapter 1: Introduction to IT Auditing
Chapter 2: Audit Planning and Preparation
Part 2: Auditing IT Systems and Networks
Chapter 3: Cisco Switches and Routers: Access Methods and Security Assessments
Chapter 4: Next-Generation Firewall Auditing
Chapter 5: Cloud Security Auditing
Chapter 6: Endpoint Security: Windows 10 and Windows 11
Chapter 7: Linux Systems Auditing
Chapter 8: Wireless Access Points and Storage Technology Auditing
Chapter 9: Data Protection and Privacy Considerations
Chapter 10: Reporting and Remediation
Chapter 11: Advanced Topics in IT Auditing
Chapter 12: Building an IT Audit Career
Index
Other Books You May Enjoy
Appendix: Conclusion and Future Outlook