Tags
Language
Tags
April 2025
Su Mo Tu We Th Fr Sa
30 31 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 1 2 3
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

CISA: Certified Information Systems Auditor

Posted By: IrGens
CISA: Certified Information Systems Auditor

CISA: Certified Information Systems Auditor
ISBN: 9780135448281 | .MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 10h 44m | 3.33 GB
Instructor: Aamir Lakhani

The Sneak Peek program provides early access to Pearson video products and is exclusively available to subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.

Introduction

CISA: Introduction

Module 1: Information Systems Auditing

Module Introduction

Lesson 1: Audit Fundamentals

Learning objectives
1.1 Understanding the Audit Function
1.2 ISACA Standards and Guidelines
1.3 Audit and Assessment Approaches
1.4 The Risk-Audit Relationship
1.5 Information System (IS) Controls

Lesson 2: Audit Execution

Learning objectives
2.1 Audit Project Management: The Fundamentals
2.2 Audit Project Management: The Audit Plan
2.3 Audit Project Management: Audit Planning
2.4 Audit Evidence
2.5 Sampling Techniques and Data Analytics
2.6 Reporting and Communicating Audit Results
2.7 Audit Frameworks

Module 2: Governance and Management of IT

Module Introduction

Lesson 3: IT Governance

Learning objectives
3.1 Laws, Regulations, and Industry Standards
3.2 Organizational Structure, Governance, and Strategy
3.3 Strategic Plans, Policies, and Procedures
3.4 Enterprise Architecture and Maturity Models: The Fundamentals
3.5 Enterprise Architecture and Maturity Models: Policies, Documentation, Regulations, and Standards
3.6 Enterprise Risk Management
3.7 Privacy Programs and Principles
3.8 Data Governance and Classification

Lesson 4: IT Management

Learning objectives
4.1 IT Resource Management
4.2 IT Vendor Management 
4.3 IT Performance Monitoring and Reporting
4.4 Quality Assurance and Quality Management of IT
4.5 Maximizing IT Management (Tales from Audit)
4.6 Other Risk Considerations (Tales from Audit)

Module 3: Information Systems Acquisition, Development, and Implementation

Module Introduction

Lesson 5: Project Governance and Management

Learning objectives
5.1 Business Case and Feasability Analysis
5.2 System Development Methodologies
5.3 Control Identification and Design

Lesson 6: Information Systems Implementation

Learning objectives
6.1 System Readiness and Implementation Testing
6.2 Implementation, Configuration, and Release Management
6.3 System Migration, Infrastructure Deployment, and Data Conversion
6.4 "Post-Implementation Review"

Module 4: Information Systems Operations and Business Resilience

Module Introduction

Lesson 7: Information Systems Operations

Learning objectives
7.1 IT Components
7.2 IT Asset Management
7.3 Job Scheduling and Production Process Automation
7.4 System Interfaces
7.5 Shadow IT and End-User Computing
7.6 Systems Availability and Capacity Management
7.7 Problem and Incident Management
7.8 IT Change, Configuration, and Patch Management
7.9 Operational Log Management
7.10 IT Service Level Management
7.11 Database Management

Lesson 8: Business Resilience

Learning objectives
8.1 Business Impact Analysis
8.2 System and Operational Resilience
8.3 Data Backup, Storage, and Restoration
8.4 Business Continuity Plan
8.5 Disaster Recovery Plans

Module 5: Protection of Information Assets

Module Introduction

Lesson 9: Information Asset Security and Control

Learning objectives
9.1 Information Asset Security Frameworks, Standards, and Guidelines
9.2 Physical and Environmental Controls
9.3 Identity and Access Management
9.4 Network and End-Point Security
9.5 Data Loss Prevention
9.6 Data Encryption
9.7 Public Key Infrastructure
9.8 Cloud and Virtualized Environments
9.9 Mobile, Wireless, and Internet-of-Things Devices

Lesson 10: Authentication and Access Control

Learning objectives
10.1 Security Awareness Training and Programs
10.2 Information System Attack Methods and Techniques
10.3 Security Testing Tools and Techniques
10.4 Security Monitoring Tools and Techniques
10.5 Security Incident Response Management
10.6 Evidence Collection and Forensics

Summary

CISA: Summary


CISA: Certified Information Systems Auditor