Certified Information Systems Auditor Cisa - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Certified Information Systems Auditor Cisa (/Thread-Certified-Information-Systems-Auditor-Cisa) |
Certified Information Systems Auditor Cisa - OneDDL - 11-14-2024 Free Download Certified Information Systems Auditor Cisa Published 10/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 22.13 GB | Duration: 26h 39m This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam. What you'll learn Learn the fundamentals of planning, conducting, and reporting on information systems audits. Explore the principles of governance, risk management, and the overall management of IT resources. Understand the lifecycle of IT systems and the critical aspects of acquisition and development. Delve into operational practices that ensure the integrity and availability of information systems. Learn strategies for safeguarding information assets against risks and breaches. Requirements Familiarity with fundamental information technology concepts, including networks, systems, and databases. While not mandatory, a background in IT, cybersecurity, or auditing is beneficial. Ideally, candidates should have at least two years of experience in a related field. A foundational understanding of auditing concepts and practices will enhance your learning experience. Access to ISACA's CISA Exam Content Outline (ECO) and relevant study guides is recommended for additional reference. A willingness to dedicate time and effort to studying the course material, as well as actively engaging in discussions and exercises This course is designed to build on your existing knowledge and provide the necessary tools to prepare for the CISA exam effectively. Description Certificate Exam Preparatory courseThis course is designed to help you master the essential knowledge and skills needed to pass the Certified Information Systems Auditor (CISA) exam, administered by ISACA. Built around the five domains outlined in ISACA's Exam Content Outline (ECO), the course provides a structured approach to understanding the key principles of information systems auditing.You will explore the entire audit process, from planning and conducting audits to effectively reporting findings. The course covers the governance and management of IT, emphasizing risk management and resource allocation. You'll also learn about the acquisition, development, and implementation of information systems, focusing on best practices throughout the system lifecycle.In addition, we delve into the operations, maintenance, and support of information systems, ensuring you understand the critical aspects of ongoing management. Finally, we emphasize the importance of protecting information assets through effective risk mitigation strategies.While this course is not ISACA-accredited, it closely follows their guidelines, providing you with valuable tools and resources for your certification journey. By the end of the course, you will feel well-prepared and confident to take on the CISA exam.Whether you are new to the field or looking to refine your expertise, this course provides valuable insights and practical knowledge to support your certification journey and career advancement. Overview Section 1: Course Overview Lecture 1 Course Overview Section 2: Information System Auditing Process Lecture 2 Exam Overview Lecture 3 Standards, Guidelines, and Professional Ethics Lecture 4 IS Audit Functions Lecture 5 Business Process Applications and Controls Lecture 6 Control Types Lecture 7 Risk and Audit Planning Lecture 8 Project Management and Auditing Lecture 9 Sampling Methodologies Lecture 10 Collecting Evidence Lecture 11 Data Analytics and CAATs Lecture 12 Continuous Auditing Lecture 13 How to Communicate the Audit Results Lecture 14 Quality Assurance and Improving Audit Section 3: Governance and Management of IT Lecture 15 What is Governance? Lecture 16 Best Practices for Enterprise Governance in IT Lecture 17 Business Intelligence and Strategic Planning Lecture 18 IT Standards, Policies and Procedures Lecture 19 Organizational Structures Lecture 20 Roles and Segregation of Duties Lecture 21 Risk Management in the Enterprise Lecture 22 Risk Analysis Lecture 23 Maturity Models Lecture 24 The Role of Industry Standards and Regulations Lecture 25 Resource Management in IT Lecture 26 Human Resource Management Lecture 27 Organizational Change Management and Financial Management Lecture 28 IT Service Provider Acquisition and Management Lecture 29 Governance in the Cloud Lecture 30 Third-party Services Lecture 31 Quality Assurance and IT Audits Lecture 32 Performance Monitoring and Reporting Section 4: Information Systems Acquisition, Development and Implementation Lecture 33 Project Governance and Management Lecture 34 Roles in Project Management Lecture 35 The PMO Lecture 36 Initiating the Project Lecture 37 Planning the Project Lecture 38 Executing and Monitoring the Project Lecture 39 Closing the Project Lecture 40 Business Case and Feasibility Analysis Lecture 41 System Development Lifecycles Lecture 42 System and Software Development Methods Lecture 43 Computer Aided Software Engineering and 4GL Lecture 44 Identifyng and Designing Controls Lecture 45 Decision Support Systems Lecture 46 Testing Methodologies Lecture 47 Application Systems and Data Integrity Testing Lecture 48 Data Migration Lecture 49 Changeover Techniques Lecture 50 System Change and Post Implementation Procedures Section 5: Information Systems Operations and Business Resiliency Lecture 51 Necessary Technology Components Lecture 52 USB and RFID Lecture 53 IT Asset Management Lecture 54 System Interfaces and End User Computing Lecture 55 Data Governance Lecture 56 Operating Systems Lecture 57 Software Licensing and Source Code Management Lecture 58 Incident and Problem Management Lecture 59 Release and Patch Management Lecture 60 Service Level Management and Agreements Lecture 61 Database Management Lecture 62 Business Impact Analysis Lecture 63 System Resiliency Lecture 64 Backups, Storage and Restoration Lecture 65 Business Continuity Management Lecture 66 The Business Continuity Plan Lecture 67 Testing the BCP Lecture 68 Disaster Recovery Plans Lecture 69 Testing the DRP Section 6: Protection of Information Assets Lecture 70 Frameworks, Standards and Guidelines Lecture 71 Roles and Responsibilities for Auditing the IS Management Framework Lecture 72 Recommended IT Security Baseline Lecture 73 Principles of Data Privacy Lecture 74 Physical Access and Controls Lecture 75 Environmental Controls Lecture 76 Identity and Access Management Lecture 77 Logical Access and Authorization Issues Lecture 78 Audit Logging of System Access Lecture 79 Data Loss Prevention Lecture 80 Network Infrastructure Lecture 81 Applications in a Networked Environment Lecture 82 Network Infrastructure Security Firewalls Lecture 83 Change Management in Networks Lecture 84 Encryption Systems Lecture 85 Applications of Cryptography Lecture 86 The Public Key Infrastructure Lecture 87 IS Audits and Social Media Lecture 88 Virtualization and Cloud Computing Lecture 89 Security Awareness Training Lecture 90 IS Attack Methods and Techniques Lecture 91 Testing Techniques for Security Controls Lecture 92 Network Penetration Testing Lecture 93 Monitoring Tools Lecture 94 Incident Response Management Lecture 95 Evidence Collection and Forensics Aspiring Auditors: Those looking to start a career in IT auditing or transition from related fields.,IT Professionals: Individuals already working in information technology who want to expand their understanding of audit processes and principles.,Compliance and Risk Management Officers: Professionals responsible for ensuring organizational compliance with regulations and managing IT risks.,Cybersecurity Practitioners: Those focused on protecting information assets who wish to deepen their auditing knowledge.,Students and Recent Graduates: Individuals pursuing degrees in information systems, cybersecurity, or related fields who aim to bolster their qualifications for future job opportunities.,Current CISA Candidates: Anyone preparing for the CISA exam who seeks structured guidance and resources to enhance their study efforts. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |