Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying IT Audit Field Manual
  • Table Of Contents Toc
IT Audit Field Manual

IT Audit Field Manual

By : Lewis Heuermann
5 (2)
close
close
IT Audit Field Manual

IT Audit Field Manual

5 (2)
By: Lewis Heuermann

Overview of this book

As cyber threats evolve and regulations tighten, IT professionals struggle to maintain effective auditing practices and ensure robust cybersecurity across complex systems. Drawing from over a decade of submarine military service and extensive cybersecurity experience, Lewis offers a unique blend of technical expertise and field-tested insights in this comprehensive field manual. Serving as a roadmap for beginners as well as experienced professionals, this manual guides you from foundational concepts and audit planning to in-depth explorations of auditing various IT systems and networks, including Cisco devices, next-generation firewalls, cloud environments, endpoint security, and Linux systems. You’ll develop practical skills in assessing security configurations, conducting risk assessments, and ensuring compliance with privacy regulations. This book also covers data protection, reporting, remediation, advanced auditing techniques, and emerging trends. Complete with insightful guidance on building a successful career in IT auditing, by the end of this book, you’ll be equipped with the tools to navigate the complex landscape of cybersecurity and compliance, bridging the gap between technical expertise and practical application.
Table of Contents (18 chapters)
close
close
Lock Free Chapter
1
Part 1: Foundations of IT Auditing
4
Part 2: Auditing IT Systems and Networks

Cisco Switches and Routers: Access Methods and Security Assessments

To do an IT audit well, the auditor needs different skills and knowledge beyond competencies in audit methodology and processes. Having some technical background may be very helpful in IT auditing. Common areas of IT auditing are networks and infrastructure. As an example, in this chapter, we will speak about the popular network devices made by Cisco. Since they are common subjects of audit reviews, we will explain how to assess them. We selected these devices due to their popularity and access to tools such as Cisco Packet Tracer (https://www.netacad.com/courses/packet-tracer) to reinforce real-world configuration experiences. You will explore the architecture and functions of Cisco switches and routers, understand the security risks associated with these devices, learn about the various access methods available, and walk through the process of conducting detailed security assessments, including using the Cisco Command...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
IT Audit Field Manual
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon