The Ultimate Cisa Journey
Published 10/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.21 GB | Duration: 5h 21m
Published 10/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.21 GB | Duration: 5h 21m
Comprehensive CISA Exam Prep with Real-World Scenarios
What you'll learn
IT infrastructure and implementing controls
Merging their IT systems with top-line business goals
Security, control, management and IT infrastructure development
Develop and implement the outline of a firm’s systems
Be able to develop strategies for preventing and responding to cyber-attacks.
Able to evaluate the security of information systems and develop strategies for protecting sensitive information
Requirements
With the CISA, you’re riding the wave of IT auditing. You earn a credential that’s globally recognized, respected by employers and offers a golden ticket to a prestigious, lucrative career. The sooner you start studying for and pass the CISA Exam, the sooner you’ll be ready to make the big career moves.
Description
Are you ready to take your career in IT to the next level? Look no further than the Ultimate CISA Mastery Course! Join me, as I guide you through the challenging journey of becoming a Certified Information Systems Auditor.From the basics of information systems audit to the intricacies of IT governance and security, this comprehensive course will equip you with the knowledge and skills you need to succeed. You'll dive into each of the five domains of CISA and take challenging quizzes to assess your understanding. And when you're ready, the grand final assessment will test your mastery of the course and prepare you for the real-life scenario of the CISA exam.But this course is not just about passing the exam. It's about becoming an expert in the field of information systems audit and opening up a world of opportunities in the field of cybersecurity, IT audit, and governance. With my guidance, you'll gain a deep understanding of the best practices for auditing information systems, managing and overseeing IT operations, and protecting sensitive information.So why wait? Unleash your potential and join me on this exciting journey to become a Certified Information Systems Auditor. Enroll now and start your journey towards mastery today!
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: Domain 1 : Information System Auditing Process
Lecture 2 What is IS Audit
Lecture 3 Audit Universe
Lecture 4 Controls
Lecture 5 Controls and it Types
Lecture 6 IT Standards, Polices and Procedures
Lecture 7 IS Auditor's Roles and Responsibilities
Lecture 8 Process of IS Audit
Lecture 9 Planning an IS Audit
Lecture 10 Developing an IS Audit Plan
Lecture 11 Follow up on IS Audit
Lecture 12 Water Marking
Lecture 13 Control Self Assessment - CSA
Lecture 14 Electronic Data Interchange - EDI
Lecture 15 Evidence and Fraud Detection
Lecture 16 CAATs
Lecture 17 CAATs VS Auditor
Lecture 18 Audit Charter
Lecture 19 Types of Risk
Lecture 20 What is Risk
Lecture 21 Managing IS Audit
Lecture 22 IS Audit Life Cycle
Section 3: Domain 2 : Governance and Management of IT
Lecture 23 Introduction
Lecture 24 Governance and Management of IT
Lecture 25 What is Governance
Lecture 26 IT Governance
Lecture 27 Governance vs Management
Lecture 28 IT Frameworks
Lecture 29 Organisational Structure
Lecture 30 IT Resource Management
Lecture 31 Control Identification
Lecture 32 Technical Controls
Lecture 33 Administrative Controls
Lecture 34 IT Performance Management
Lecture 35 IT Service Provider Acquisition and Management
Lecture 36 IT Performance and Reporting
Lecture 37 Quality Assurance And Management
Lecture 38 Business Feasibility Analysis
Lecture 39 System Development Methodologies
Lecture 40 ERM
Lecture 41 Auditor's Role
Lecture 42 SoD
Lecture 43 Closing the Right Supplier
Lecture 44 BPR
Section 4: Domain 3 : IS Acquisition Development and Implementation
Lecture 45 Information System Aquisition Development & Implementation
Lecture 46 Project Governance and Management
Lecture 47 Feasibility Analysis
Lecture 48 Business Case Analysis
Lecture 49 System Development Methodologies
Lecture 50 Information System Aquisition
Lecture 51 Planning Phase - ISADI
Lecture 52 Acquisition Phase - ISADI
Lecture 53 Control Identification
Lecture 54 Control Design
Lecture 55 Access Control
Lecture 56 Application Controls
Lecture 57 Configuration Management
Lecture 58 System Migration
Lecture 59 Release Management
Lecture 60 Development Phase - ISADI
Lecture 61 Maturity Model
Lecture 62 Implementation Phase - ISADI
Lecture 63 Post Implementation Review / PIR
Lecture 64 Conclusion
Section 5: Domain 4 : IS Operations & Business Resilience
Lecture 65 What to expect
Lecture 66 Common Technologies and Architecture
Lecture 67 End User Computing
Lecture 68 Data Governance
Lecture 69 Data Conversion
Lecture 70 Problem Incident Management
Lecture 71 Change Configuration, Release and Patch Management
Lecture 72 IT Service Level Management - SLM
Lecture 73 Database Management
Lecture 74 Business Resilience
Lecture 75 System Resilience
Lecture 76 Business Impact analysis - BIA
Lecture 77 Disaster Recovery Plan - DRP
Lecture 78 BCP
Lecture 79 IS Operations
Lecture 80 Data Backup, Storage and Restore
Lecture 81 Automation
Lecture 82 System Performance Management
Lecture 83 IT Management
Lecture 84 Clusters
Lecture 85 Client-Server Architecture
Lecture 86 Protocols
Lecture 87 RAID
Lecture 88 RPO vs RTO
Lecture 89 EMI and Attenuation
Lecture 90 Capacity Management
Section 6: Domain 5 : Protection of Information Assets
Lecture 91 Introduction
Lecture 92 INFORMATION ASSET SECURITY FRAMEWORKS, STANDARDS AND GUIDLINES
Lecture 93 Identity Access Management - IAM
Lecture 94 Network End Point Security
Lecture 95 Data Classification
Lecture 96 Encryption And Related Techniques
Lecture 97 Public Key Infrastructure - PKI
Lecture 98 Web Based Communication Technologies
Lecture 99 Virtualization Environment
Lecture 100 Security Event Management - SEM
Lecture 101 Security Awareness Training
Lecture 102 IS Attack Methodologies and Techniques
Lecture 103 Security Tools and Techniques
Lecture 104 Evidence Collection and Forensics
Lecture 105 Dead man doors
Lecture 106 Biometrics
Lecture 107 SSO and Kerberos
Lecture 108 Asymmetric Key Encryption
Lecture 109 Symmetric Key Encryption
Lecture 110 OSI Model
Lecture 111 Data Classification
Lecture 112 VoIP
Lecture 113 BOMBS
Lecture 114 XSS, Parameter Tampering and Spear Phishing
Lecture 115 Sateful Firewall
Lecture 116 Pen Testing
Lecture 117 Forensics
Lecture 118 INFORMATION ASSET SECURITY AND CONTORLS
Lecture 119 PRIVACY PRINCIPLE
Section 7: Final Assessment
If you enjoy working with IT and you’re always itching to learn what’s next, becoming a CISA could be an excellent career fit. Consider the benefits to earning your CISA, and you’ll be on the pathway to career success.,CISA Exam and continuing education requirements equip you with the tools and skills to keep pace. The CISA is for you if you crave variety in your work and want to dance on that ever-moving ledge where IT is revolutionizing business functions. In particular, more accounting functions are operating through information systems. The CISA-certified IT auditor remains agile in a forward-thinking field.,Incorporating IT into business functions offers rewards in efficiencies, but it also elevates the risks involved. Employers see CISA holders as the IT auditors best qualified to mitigate those risks, and they’re willing to pay a premium for those safeguards. CISA certificate holders make between $83,677 and $107,342 a year, according to PayScale. Security consultants earn between $67,860 and $106,407, while IS auditors earn between $59,647 and $82,159 a year. If you leverage your CISA certificate to become an internal audit director, your salary can climb to $136,082 a year.,IT professionals looking to advance their careers in the field of cybersecurity, IT audit, and governance will benefit from this course.,IT security professionals looking to broaden their knowledge and understanding of information systems audit will benefit from this course.,IT managers looking to understand the best practices for managing and overseeing IT operations will find this course valuable.,This course is designed to prepare individuals for the CISA exam and help them clear it in their first attempt.