Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified In Information System Audit (Cisa) By Isaca

    Posted By: ELK1nG
    Certified In Information System Audit (Cisa) By Isaca

    Certified In Information System Audit (Cisa) By Isaca
    Last updated 4/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.32 GB | Duration: 17h 0m

    CISA by Hemang Doshi

    What you'll learn
    Certified Information System Audits (ISACA -CISA) Lectures
    Contains all the 5 Domains of CISA Review Manual
    Candidate will able to understand practical aspects of Information System Audit
    Candidate will able to confidently attempt and pass the CISA exam
    Requirements
    No prior knowledge or experience is required. We will teach you everything from basics to pass the CISA Exam.
    Description
    Please note that objective of this course is to support and supplement the content of the ISACA's official resources. This course is not meant to replace CISA Review Manual and Question, Answer and Explanation Manual. Candidates are strongly advised to use ISACA's official resource as prime resource to study for CISA exam. This course will help you to decipher the technicities used in official resources. This course is designed on the basis of official resources of ISACA. It covers all the 5 domains of CISA Review Manual. Topics are arranged segment wise and aligned with latest CISA Review Manual.Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:(1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CISA Review Manual (CRM) in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.Features of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CISA Review Manual. Exam oriented practice questions and practical example for CISA aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 1000 plus practice questions

    Overview

    Section 1: Information System Auditing Process

    Lecture 1 1.1.1 Audit Planning

    Lecture 2 1.1.2 Audit Charter

    Lecture 3 1.2 Electronic Data Interchange (EDI)

    Lecture 4 1.3 Types of Controls

    Lecture 5 1.4.1 What is Risk?

    Lecture 6 1.4.2 Understanding Vulnerabilities and threats

    Lecture 7 1.4.3 Types of Risks

    Lecture 8 1.4.4 Risk response methodology

    Lecture 9 1.4.5 Key Aspects - Risk based Audit Planning

    Lecture 10 1.4.6 QAE - Risk based Audit Planning

    Lecture 11 1.6.1 Key Aspects - Audit Project Management

    Lecture 12 1.6.2 QAE - Audit Project Management

    Lecture 13 1.7.1 Sampling Methodology

    Lecture 14 1.7.2 Compliance and Substantive Testing

    Lecture 15 1.8 Audit Evidence Collection Techniques

    Lecture 16 1.9.1 Continous Auditing Techniques

    Lecture 17 1.9.2 Data Analytics

    Lecture 18 1.10 Reporting and Communication Techniques

    Lecture 19 1.11 Control Self Assessment

    Section 2: Domain 2 - Governance and Management of IT

    Lecture 20 2.1.1 Key Aspects Enterprise Governance of Information and Technology

    Lecture 21 2.1.2 QAE Enterprise Governance of Information and Technology

    Lecture 22 2.3.1 IT Standards, Policies and Procedures

    Lecture 23 2.3.2 Approaches for Policy Development (Top down & Bottom up)

    Lecture 24 2.4.1 Organizational Structure - Roles and Responsibility of Various Functions

    Lecture 25 2.4.2 IT Strategy & Steering Commitee

    Lecture 26 2.5 Enterprise Architecture

    Lecture 27 2.6.2 Risk Treatment

    Lecture 28 2.6.1 Risk Analysis Methods

    Lecture 29 2.6.3 Enterprise Risk Management.

    Lecture 30 2.7 Maturity Models

    Lecture 31 2.8 Laws, Regulations and Industry Standards Affecting the Organization

    Lecture 32 2.9 IT Resource Management Training Scheduling and Time Reporting Terms and Cond

    Lecture 33 2.10 IT Service Provider Acquisition and Management

    Lecture 34 2.11.1 IT Performance Monitoring and Reporting

    Lecture 35 2.11.2 Balanced Score Card

    Lecture 36 2.12 Quality Assurance and Quality Management of IT

    Section 3: Domain 3 - Information Systems Acquisition, Development and Implementation

    Lecture 37 3.1.1 Project Evaluation Methods

    Lecture 38 3.1.2 Project Management Structure

    Lecture 39 3.2 Business Case and Feasibility Analysis

    Lecture 40 3.3.1 Agile System Development Methodology

    Lecture 41 3.3.2 Object Oriented system development methodology

    Lecture 42 3.3.3 Prototype & Rapid Application Development (RAD)

    Lecture 43 3.3.4.1 Key Aspects - System Development Methodologies

    Lecture 44 3.3.4.2 QAE - System Development Methodologies

    Lecture 45 3.4.1 Check Digit

    Lecture 46 3.4.2 Parity Bit, Checksum and CRC

    Lecture 47 3.4.3.1 Key Aspects - Control Identification and Design and Balancing

    Lecture 48 3.4.3.2 QAE - Control Identification and Design and Balancing

    Lecture 49 3.5 Testing Methodologies

    Lecture 50 3.7 System Migration, Infrastructure Deployment and Data Conversion

    Lecture 51 3.8 Post-implementation Review

    Section 4: Domain 4 - Information Systems Operations, Maintenance and Support

    Lecture 52 4.1.1 RFID

    Lecture 53 4.2 IT Asset Management

    Lecture 54 4.3 Job Scheduling and Production Process Automation

    Lecture 55 4.5 End-user Computing

    Lecture 56 4.7 Systems Performance Management

    Lecture 57 4.8.1 Problem and Incident Management

    Lecture 58 4.8.2 Network Management Tools

    Lecture 59 4.9 Change, Configuration, Release and Patch Management

    Lecture 60 4.10 IT Service Level Management

    Lecture 61 4.11.1 Relational database model

    Lecture 62 4.11.2 Database Normalization

    Lecture 63 4.11.3 Database checks and controls

    Lecture 64 4.11.4 DBA Roles and Responsibilites & SoD

    Lecture 65 4.11.5 Database Management

    Lecture 66 4.12 Business Impact Analysis

    Lecture 67 4.13 System Resiliency

    Lecture 68 4.15.2 Business Continuity Plan

    Lecture 69 4.16.1 Types of Backup

    Lecture 70 4.16.2 RTO & RPO

    Lecture 71 4.16.3 Alternate Recovery Site

    Lecture 72 4.16.4 Disaster Recovery Plans

    Lecture 73 4.16.5 DRP - Test Methods

    Section 5: Domain 5 - Protection of Information Assets

    Lecture 74 5.1 Information Security Management Framework

    Lecture 75 5.2 Privacy Principles

    Lecture 76 5.3.1 Physical Access and Environmental Controls

    Lecture 77 5.3.2 Fire Supression Systems

    Lecture 78 5.4.1 Single Sign On

    Lecture 79 5.4.2 Factor of Authentication

    Lecture 80 5.4.3.1 Key Aspects - Identity and Access Management

    Lecture 81 5.4.3.2 QAE 1 - Identity and Access Management

    Lecture 82 5.4.3.3 QAE 2 - Identity and Access Management

    Lecture 83 5.5.1 Biometrics

    Lecture 84 5.5.2 OSI Layers

    Lecture 85 5.5.3 Firewall Types

    Lecture 86 5.5.4 Firewall Implementation

    Lecture 87 5.5.5 Virtual Private Network

    Lecture 88 5.5.6 Network LAN Components

    Lecture 89 5.5.7 Network Physical Devices

    Lecture 90 5.5.8 Voice over Internet Protocols (VoIP)

    Lecture 91 5.5.9 Wireless Network

    Lecture 92 5.5.10 Email Security

    Lecture 93 5.6 Classification of Information Assets

    Lecture 94 5.7 Data Encryption and Encryption-related Techniques

    Lecture 95 5.8 Public Key Infrastructure

    Lecture 96 Cloud Computing

    Lecture 97 5.12 Security Awareness Training and Programs

    Lecture 98 5.13.1 Information System Attack Methods and Techniques

    Lecture 99 5.13.2 Key Aspects - Information System Attack Methods and Techniques

    Lecture 100 5.13.3 QAE - Information System Attack Methods and Techniques

    Lecture 101 Security Testing Tools and Techniques

    Lecture 102 5.15 IDS & IPS

    Lecture 103 5.16 Incident Response Management

    Lecture 104 5.17 Evidence Collection and Forensics

    Section 6: Practice Questions

    IT Auditor, System Auditor,Risk Manager,Information Security Professional