Tags
Language
Tags
November 2024
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

Certified Information Systems Auditor : Cisa

Posted By: ELK1nG
Certified Information Systems Auditor : Cisa

Certified Information Systems Auditor : Cisa
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 22.13 GB | Duration: 26h 39m

This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.

What you'll learn

Learn the fundamentals of planning, conducting, and reporting on information systems audits.

Explore the principles of governance, risk management, and the overall management of IT resources.

Understand the lifecycle of IT systems and the critical aspects of acquisition and development.

Delve into operational practices that ensure the integrity and availability of information systems.

Learn strategies for safeguarding information assets against risks and breaches.

Requirements

Familiarity with fundamental information technology concepts, including networks, systems, and databases.

While not mandatory, a background in IT, cybersecurity, or auditing is beneficial. Ideally, candidates should have at least two years of experience in a related field.

A foundational understanding of auditing concepts and practices will enhance your learning experience.

Access to ISACA’s CISA Exam Content Outline (ECO) and relevant study guides is recommended for additional reference.

A willingness to dedicate time and effort to studying the course material, as well as actively engaging in discussions and exercises

This course is designed to build on your existing knowledge and provide the necessary tools to prepare for the CISA exam effectively.

Description

Certificate Exam Preparatory courseThis course is designed to help you master the essential knowledge and skills needed to pass the Certified Information Systems Auditor (CISA) exam, administered by ISACA. Built around the five domains outlined in ISACA's Exam Content Outline (ECO), the course provides a structured approach to understanding the key principles of information systems auditing.You will explore the entire audit process, from planning and conducting audits to effectively reporting findings. The course covers the governance and management of IT, emphasizing risk management and resource allocation. You'll also learn about the acquisition, development, and implementation of information systems, focusing on best practices throughout the system lifecycle.In addition, we delve into the operations, maintenance, and support of information systems, ensuring you understand the critical aspects of ongoing management. Finally, we emphasize the importance of protecting information assets through effective risk mitigation strategies.While this course is not ISACA-accredited, it closely follows their guidelines, providing you with valuable tools and resources for your certification journey. By the end of the course, you will feel well-prepared and confident to take on the CISA exam.Whether you are new to the field or looking to refine your expertise, this course provides valuable insights and practical knowledge to support your certification journey and career advancement.

Overview

Section 1: Course Overview

Lecture 1 Course Overview

Section 2: Information System Auditing Process

Lecture 2 Exam Overview

Lecture 3 Standards, Guidelines, and Professional Ethics

Lecture 4 IS Audit Functions

Lecture 5 Business Process Applications and Controls

Lecture 6 Control Types

Lecture 7 Risk and Audit Planning

Lecture 8 Project Management and Auditing

Lecture 9 Sampling Methodologies

Lecture 10 Collecting Evidence

Lecture 11 Data Analytics and CAATs

Lecture 12 Continuous Auditing

Lecture 13 How to Communicate the Audit Results

Lecture 14 Quality Assurance and Improving Audit

Section 3: Governance and Management of IT

Lecture 15 What is Governance?

Lecture 16 Best Practices for Enterprise Governance in IT

Lecture 17 Business Intelligence and Strategic Planning

Lecture 18 IT Standards, Policies and Procedures

Lecture 19 Organizational Structures

Lecture 20 Roles and Segregation of Duties

Lecture 21 Risk Management in the Enterprise

Lecture 22 Risk Analysis

Lecture 23 Maturity Models

Lecture 24 The Role of Industry Standards and Regulations

Lecture 25 Resource Management in IT

Lecture 26 Human Resource Management

Lecture 27 Organizational Change Management and Financial Management

Lecture 28 IT Service Provider Acquisition and Management

Lecture 29 Governance in the Cloud

Lecture 30 Third-party Services

Lecture 31 Quality Assurance and IT Audits

Lecture 32 Performance Monitoring and Reporting

Section 4: Information Systems Acquisition, Development and Implementation

Lecture 33 Project Governance and Management

Lecture 34 Roles in Project Management

Lecture 35 The PMO

Lecture 36 Initiating the Project

Lecture 37 Planning the Project

Lecture 38 Executing and Monitoring the Project

Lecture 39 Closing the Project

Lecture 40 Business Case and Feasibility Analysis

Lecture 41 System Development Lifecycles

Lecture 42 System and Software Development Methods

Lecture 43 Computer Aided Software Engineering and 4GL

Lecture 44 Identifyng and Designing Controls

Lecture 45 Decision Support Systems

Lecture 46 Testing Methodologies

Lecture 47 Application Systems and Data Integrity Testing

Lecture 48 Data Migration

Lecture 49 Changeover Techniques

Lecture 50 System Change and Post Implementation Procedures

Section 5: Information Systems Operations and Business Resiliency

Lecture 51 Necessary Technology Components

Lecture 52 USB and RFID

Lecture 53 IT Asset Management

Lecture 54 System Interfaces and End User Computing

Lecture 55 Data Governance

Lecture 56 Operating Systems

Lecture 57 Software Licensing and Source Code Management

Lecture 58 Incident and Problem Management

Lecture 59 Release and Patch Management

Lecture 60 Service Level Management and Agreements

Lecture 61 Database Management

Lecture 62 Business Impact Analysis

Lecture 63 System Resiliency

Lecture 64 Backups, Storage and Restoration

Lecture 65 Business Continuity Management

Lecture 66 The Business Continuity Plan

Lecture 67 Testing the BCP

Lecture 68 Disaster Recovery Plans

Lecture 69 Testing the DRP

Section 6: Protection of Information Assets

Lecture 70 Frameworks, Standards and Guidelines

Lecture 71 Roles and Responsibilities for Auditing the IS Management Framework

Lecture 72 Recommended IT Security Baseline

Lecture 73 Principles of Data Privacy

Lecture 74 Physical Access and Controls

Lecture 75 Environmental Controls

Lecture 76 Identity and Access Management

Lecture 77 Logical Access and Authorization Issues

Lecture 78 Audit Logging of System Access

Lecture 79 Data Loss Prevention

Lecture 80 Network Infrastructure

Lecture 81 Applications in a Networked Environment

Lecture 82 Network Infrastructure Security Firewalls

Lecture 83 Change Management in Networks

Lecture 84 Encryption Systems

Lecture 85 Applications of Cryptography

Lecture 86 The Public Key Infrastructure

Lecture 87 IS Audits and Social Media

Lecture 88 Virtualization and Cloud Computing

Lecture 89 Security Awareness Training

Lecture 90 IS Attack Methods and Techniques

Lecture 91 Testing Techniques for Security Controls

Lecture 92 Network Penetration Testing

Lecture 93 Monitoring Tools

Lecture 94 Incident Response Management

Lecture 95 Evidence Collection and Forensics

Aspiring Auditors: Those looking to start a career in IT auditing or transition from related fields.,IT Professionals: Individuals already working in information technology who want to expand their understanding of audit processes and principles.,Compliance and Risk Management Officers: Professionals responsible for ensuring organizational compliance with regulations and managing IT risks.,Cybersecurity Practitioners: Those focused on protecting information assets who wish to deepen their auditing knowledge.,Students and Recent Graduates: Individuals pursuing degrees in information systems, cybersecurity, or related fields who aim to bolster their qualifications for future job opportunities.,Current CISA Candidates: Anyone preparing for the CISA exam who seeks structured guidance and resources to enhance their study efforts.