Logical Security Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data.  Logical Security Controls are comprised of tactics such as utilizing restricting user access, limiting administrative privileges, enforcing strong passwords and encrypting data.  In this course you will learn how to ensure proper controls have been implemented to protect corporate assets, company trade secrets, customer and employee identity and financial information.      

This course will take you through controls organizations can implement to protect assets, brand and image. We will delve into understanding the principles behind IT Logical Security and Access Controls. Lastly, we will discuss simple audit procedure proper controls are in place and working as intended.

 

Learning Objectives
  • Recognize Risks.
  • Identify appropriate Logical Access & Security Controls to mitigate specific risks.
  • Discover audit procedures to ensure effective controls are in place
  • Explore audit output.
Last updated/reviewed: March 10, 2024

Included In Certifications

This course is included in the following Certification Programs:

10 CoursesInformation Technology Auditor Certification

  1. Understanding Information Technology Governance and the Application of NIST
  2. Performing a Security Risk Assessment
  3. Auditing Data Security IT Computer Controls
  4. Auditing Third Party Service Providers and Cloud Environments
  5. Auditing Automated Business and Financial Transaction Processes
  6. Auditing Logical Security and Logical Access Controls
  7. Auditing Change Management
  8. Auditing the Network
  9. The Importance of Incident Response, Disaster Recovery and Business Continuity Planning
  10. Information Technology Audit Summary
27 Reviews (118 ratings)

Reviews

3
Member's Profile
Some of the content seems out of date and should be refreshed. Administrator rights should be restricted at all layers, not just at network layer

5
Anonymous Author
Very comprehensive and imfo content The instructor explained all topics in the course in easy and friendly manner I highly recommend this course to everyone who seeks cybersecurity course or to fulfill isaca cpe for isca certifications. Many thanks to illumeo All your courses are excellent and comprehensive in all fields.

4
Member's Profile
Instructor largely succeeded in presenting a very technical subject in plain English. My only recommendation is that a few of the technical terms could have been defined - course assumes you have a certain level of systems architecture background.

5
Anonymous Author
I like the fact that the materials were explained in plain easy to understand terms and that we were able to see the repetition in audit steps across the layers (helps to make the information stick)

3
Anonymous Author
this answer to this question is so wrong. some courses say one answer and other courses say different. nonsense. Administrator rights should be restricted at which layer?

5
Member's Profile
I liked the course but the initial plan was in a different order than the slide show. The areas repeatedly discussed were not always the ones tested.

4
Member's Profile
The audio disappeared for a few minutes right before the one-hour mark in the continuous play file. Other than that, I think this course was good.

5
Member's Profile
good topical course with clear linkage among the various security components, Helpful examples to demonstrate were provided- language was clear

5
Anonymous Author
Overall the course was well structured and was presented in a clear manner, and provided good explanations within each of the areas discussed.

5
Anonymous Author
Great course that went in-depth into the nuances of logical access and controls to be taken care of in IT environment. Well done!!!.

4
Member's Profile
This course covers technical matters in understandable manner. I am interested in the followup SOC 2 course by this author as well.

5
Anonymous Author
The course provides great insights on auditing logical access and logical security controls in a clear and concise manner.

5
Anonymous Author
Stated prerequisite requirements were appropriate and sufficient. Time allotted to the learning activity was appropriate

5
Anonymous Author
I enjoyed this course best. It is by far the most practical and informative as far as my personal interests go.

5
Anonymous Author
I enjoyed this course best. It is by far the most practical and informative as far as my personal interests go.

5
Anonymous Author
The course provides great insights on auditing security controls in a clear and concise manner.

3
Member's Profile
Please refrain from using "what not". It is distracting and takes away from the lesson.

4
Anonymous Author
This course provides an understanding of Logical Security and Logical Access Controls.

4
Anonymous Author
Stop forcing us to write reviews for your courses. We've already paid for them.

5
Anonymous Author
This was a great course that was presented well. I would recommend it to others.

3
Anonymous Author
Adequate for what I need to perform the audit needed as well as for the CPE.

4
Member's Profile
Great overview and insight to logical access controls. Thank you!

5
Anonymous Author
Good course that met objectives. Well structured and presented.

5
Anonymous Author
Good course that met objectives. Well structured and presented.

5
Member's Profile
Great real-life applicable content. I enjoyed this course!

1
Member's Profile
the connection was lost throughout the time of the course.

5
Member's Profile
Some something I have to write something. It was good

Prerequisites
Course Complexity: Intermediate

No advanced preparation or prerequisites are required for this course.

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to Auditing Logical Access and Logical Security1:29
  The Layers of IT General Controls7:10
  Logical Access - Network Device11:54
  Logical Access - Virtual Private Network11:41
  Logical Access - Active Directory6:11
  Logical Access - File Shares6:29
  Logical Access - Database and Application16:36
  Logical Access - Critical Segregation of Duties5:26
  Logical Access - Report Writers and Tools10:55
  Logical Security6:54
Continuous Play
  Auditing Logical Access and Logical Security1:24:45
Supporting Materials
  Slides: Auditing Logical Security and Logical Access ControlsPDF
  Auditing Logical Security and Logical Access Controls Glossary/IndexPDF
Review And Test
  REVIEW QUESTIONSquiz
 FINAL EXAMexam