Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    CISA: Certified Information Systems Auditor

    Posted By: IrGens
    CISA: Certified Information Systems Auditor

    CISA: Certified Information Systems Auditor
    ISBN: 9780135448281 | .MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 10h 44m | 3.33 GB
    Instructor: Aamir Lakhani

    The Sneak Peek program provides early access to Pearson video products and is exclusively available to subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.

    Introduction

    CISA: Introduction

    Module 1: Information Systems Auditing

    Module Introduction

    Lesson 1: Audit Fundamentals

    Learning objectives
    1.1 Understanding the Audit Function
    1.2 ISACA Standards and Guidelines
    1.3 Audit and Assessment Approaches
    1.4 The Risk-Audit Relationship
    1.5 Information System (IS) Controls

    Lesson 2: Audit Execution

    Learning objectives
    2.1 Audit Project Management: The Fundamentals
    2.2 Audit Project Management: The Audit Plan
    2.3 Audit Project Management: Audit Planning
    2.4 Audit Evidence
    2.5 Sampling Techniques and Data Analytics
    2.6 Reporting and Communicating Audit Results
    2.7 Audit Frameworks

    Module 2: Governance and Management of IT

    Module Introduction

    Lesson 3: IT Governance

    Learning objectives
    3.1 Laws, Regulations, and Industry Standards
    3.2 Organizational Structure, Governance, and Strategy
    3.3 Strategic Plans, Policies, and Procedures
    3.4 Enterprise Architecture and Maturity Models: The Fundamentals
    3.5 Enterprise Architecture and Maturity Models: Policies, Documentation, Regulations, and Standards
    3.6 Enterprise Risk Management
    3.7 Privacy Programs and Principles
    3.8 Data Governance and Classification

    Lesson 4: IT Management

    Learning objectives
    4.1 IT Resource Management
    4.2 IT Vendor Management 
    4.3 IT Performance Monitoring and Reporting
    4.4 Quality Assurance and Quality Management of IT
    4.5 Maximizing IT Management (Tales from Audit)
    4.6 Other Risk Considerations (Tales from Audit)

    Module 3: Information Systems Acquisition, Development, and Implementation

    Module Introduction

    Lesson 5: Project Governance and Management

    Learning objectives
    5.1 Business Case and Feasability Analysis
    5.2 System Development Methodologies
    5.3 Control Identification and Design

    Lesson 6: Information Systems Implementation

    Learning objectives
    6.1 System Readiness and Implementation Testing
    6.2 Implementation, Configuration, and Release Management
    6.3 System Migration, Infrastructure Deployment, and Data Conversion
    6.4 "Post-Implementation Review"

    Module 4: Information Systems Operations and Business Resilience

    Module Introduction

    Lesson 7: Information Systems Operations

    Learning objectives
    7.1 IT Components
    7.2 IT Asset Management
    7.3 Job Scheduling and Production Process Automation
    7.4 System Interfaces
    7.5 Shadow IT and End-User Computing
    7.6 Systems Availability and Capacity Management
    7.7 Problem and Incident Management
    7.8 IT Change, Configuration, and Patch Management
    7.9 Operational Log Management
    7.10 IT Service Level Management
    7.11 Database Management

    Lesson 8: Business Resilience

    Learning objectives
    8.1 Business Impact Analysis
    8.2 System and Operational Resilience
    8.3 Data Backup, Storage, and Restoration
    8.4 Business Continuity Plan
    8.5 Disaster Recovery Plans

    Module 5: Protection of Information Assets

    Module Introduction

    Lesson 9: Information Asset Security and Control

    Learning objectives
    9.1 Information Asset Security Frameworks, Standards, and Guidelines
    9.2 Physical and Environmental Controls
    9.3 Identity and Access Management
    9.4 Network and End-Point Security
    9.5 Data Loss Prevention
    9.6 Data Encryption
    9.7 Public Key Infrastructure
    9.8 Cloud and Virtualized Environments
    9.9 Mobile, Wireless, and Internet-of-Things Devices

    Lesson 10: Authentication and Access Control

    Learning objectives
    10.1 Security Awareness Training and Programs
    10.2 Information System Attack Methods and Techniques
    10.3 Security Testing Tools and Techniques
    10.4 Security Monitoring Tools and Techniques
    10.5 Security Incident Response Management
    10.6 Evidence Collection and Forensics

    Summary

    CISA: Summary


    CISA: Certified Information Systems Auditor