Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Certified Information Systems Auditor : Cisa

    Posted By: ELK1nG
    Certified Information Systems Auditor : Cisa

    Certified Information Systems Auditor : Cisa
    Published 10/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 22.13 GB | Duration: 26h 39m

    This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.

    What you'll learn

    Learn the fundamentals of planning, conducting, and reporting on information systems audits.

    Explore the principles of governance, risk management, and the overall management of IT resources.

    Understand the lifecycle of IT systems and the critical aspects of acquisition and development.

    Delve into operational practices that ensure the integrity and availability of information systems.

    Learn strategies for safeguarding information assets against risks and breaches.

    Requirements

    Familiarity with fundamental information technology concepts, including networks, systems, and databases.

    While not mandatory, a background in IT, cybersecurity, or auditing is beneficial. Ideally, candidates should have at least two years of experience in a related field.

    A foundational understanding of auditing concepts and practices will enhance your learning experience.

    Access to ISACA’s CISA Exam Content Outline (ECO) and relevant study guides is recommended for additional reference.

    A willingness to dedicate time and effort to studying the course material, as well as actively engaging in discussions and exercises

    This course is designed to build on your existing knowledge and provide the necessary tools to prepare for the CISA exam effectively.

    Description

    Certificate Exam Preparatory courseThis course is designed to help you master the essential knowledge and skills needed to pass the Certified Information Systems Auditor (CISA) exam, administered by ISACA. Built around the five domains outlined in ISACA's Exam Content Outline (ECO), the course provides a structured approach to understanding the key principles of information systems auditing.You will explore the entire audit process, from planning and conducting audits to effectively reporting findings. The course covers the governance and management of IT, emphasizing risk management and resource allocation. You'll also learn about the acquisition, development, and implementation of information systems, focusing on best practices throughout the system lifecycle.In addition, we delve into the operations, maintenance, and support of information systems, ensuring you understand the critical aspects of ongoing management. Finally, we emphasize the importance of protecting information assets through effective risk mitigation strategies.While this course is not ISACA-accredited, it closely follows their guidelines, providing you with valuable tools and resources for your certification journey. By the end of the course, you will feel well-prepared and confident to take on the CISA exam.Whether you are new to the field or looking to refine your expertise, this course provides valuable insights and practical knowledge to support your certification journey and career advancement.

    Overview

    Section 1: Course Overview

    Lecture 1 Course Overview

    Section 2: Information System Auditing Process

    Lecture 2 Exam Overview

    Lecture 3 Standards, Guidelines, and Professional Ethics

    Lecture 4 IS Audit Functions

    Lecture 5 Business Process Applications and Controls

    Lecture 6 Control Types

    Lecture 7 Risk and Audit Planning

    Lecture 8 Project Management and Auditing

    Lecture 9 Sampling Methodologies

    Lecture 10 Collecting Evidence

    Lecture 11 Data Analytics and CAATs

    Lecture 12 Continuous Auditing

    Lecture 13 How to Communicate the Audit Results

    Lecture 14 Quality Assurance and Improving Audit

    Section 3: Governance and Management of IT

    Lecture 15 What is Governance?

    Lecture 16 Best Practices for Enterprise Governance in IT

    Lecture 17 Business Intelligence and Strategic Planning

    Lecture 18 IT Standards, Policies and Procedures

    Lecture 19 Organizational Structures

    Lecture 20 Roles and Segregation of Duties

    Lecture 21 Risk Management in the Enterprise

    Lecture 22 Risk Analysis

    Lecture 23 Maturity Models

    Lecture 24 The Role of Industry Standards and Regulations

    Lecture 25 Resource Management in IT

    Lecture 26 Human Resource Management

    Lecture 27 Organizational Change Management and Financial Management

    Lecture 28 IT Service Provider Acquisition and Management

    Lecture 29 Governance in the Cloud

    Lecture 30 Third-party Services

    Lecture 31 Quality Assurance and IT Audits

    Lecture 32 Performance Monitoring and Reporting

    Section 4: Information Systems Acquisition, Development and Implementation

    Lecture 33 Project Governance and Management

    Lecture 34 Roles in Project Management

    Lecture 35 The PMO

    Lecture 36 Initiating the Project

    Lecture 37 Planning the Project

    Lecture 38 Executing and Monitoring the Project

    Lecture 39 Closing the Project

    Lecture 40 Business Case and Feasibility Analysis

    Lecture 41 System Development Lifecycles

    Lecture 42 System and Software Development Methods

    Lecture 43 Computer Aided Software Engineering and 4GL

    Lecture 44 Identifyng and Designing Controls

    Lecture 45 Decision Support Systems

    Lecture 46 Testing Methodologies

    Lecture 47 Application Systems and Data Integrity Testing

    Lecture 48 Data Migration

    Lecture 49 Changeover Techniques

    Lecture 50 System Change and Post Implementation Procedures

    Section 5: Information Systems Operations and Business Resiliency

    Lecture 51 Necessary Technology Components

    Lecture 52 USB and RFID

    Lecture 53 IT Asset Management

    Lecture 54 System Interfaces and End User Computing

    Lecture 55 Data Governance

    Lecture 56 Operating Systems

    Lecture 57 Software Licensing and Source Code Management

    Lecture 58 Incident and Problem Management

    Lecture 59 Release and Patch Management

    Lecture 60 Service Level Management and Agreements

    Lecture 61 Database Management

    Lecture 62 Business Impact Analysis

    Lecture 63 System Resiliency

    Lecture 64 Backups, Storage and Restoration

    Lecture 65 Business Continuity Management

    Lecture 66 The Business Continuity Plan

    Lecture 67 Testing the BCP

    Lecture 68 Disaster Recovery Plans

    Lecture 69 Testing the DRP

    Section 6: Protection of Information Assets

    Lecture 70 Frameworks, Standards and Guidelines

    Lecture 71 Roles and Responsibilities for Auditing the IS Management Framework

    Lecture 72 Recommended IT Security Baseline

    Lecture 73 Principles of Data Privacy

    Lecture 74 Physical Access and Controls

    Lecture 75 Environmental Controls

    Lecture 76 Identity and Access Management

    Lecture 77 Logical Access and Authorization Issues

    Lecture 78 Audit Logging of System Access

    Lecture 79 Data Loss Prevention

    Lecture 80 Network Infrastructure

    Lecture 81 Applications in a Networked Environment

    Lecture 82 Network Infrastructure Security Firewalls

    Lecture 83 Change Management in Networks

    Lecture 84 Encryption Systems

    Lecture 85 Applications of Cryptography

    Lecture 86 The Public Key Infrastructure

    Lecture 87 IS Audits and Social Media

    Lecture 88 Virtualization and Cloud Computing

    Lecture 89 Security Awareness Training

    Lecture 90 IS Attack Methods and Techniques

    Lecture 91 Testing Techniques for Security Controls

    Lecture 92 Network Penetration Testing

    Lecture 93 Monitoring Tools

    Lecture 94 Incident Response Management

    Lecture 95 Evidence Collection and Forensics

    Aspiring Auditors: Those looking to start a career in IT auditing or transition from related fields.,IT Professionals: Individuals already working in information technology who want to expand their understanding of audit processes and principles.,Compliance and Risk Management Officers: Professionals responsible for ensuring organizational compliance with regulations and managing IT risks.,Cybersecurity Practitioners: Those focused on protecting information assets who wish to deepen their auditing knowledge.,Students and Recent Graduates: Individuals pursuing degrees in information systems, cybersecurity, or related fields who aim to bolster their qualifications for future job opportunities.,Current CISA Candidates: Anyone preparing for the CISA exam who seeks structured guidance and resources to enhance their study efforts.