![]() |
|
CISA Certified Information Systems Auditor by Aamir Lakhani - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: CISA Certified Information Systems Auditor by Aamir Lakhani (/Thread-CISA-Certified-Information-Systems-Auditor-by-Aamir-Lakhani) |
CISA Certified Information Systems Auditor by Aamir Lakhani - OneDDL - 04-13-2025 ![]() Free Download CISA Certified Information Systems Auditor by Aamir Lakhani Released 4/2025 By Aamir Lakhani MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 10h 45m | Size: 3.33 GB Table of contents Introduction CISA: Introduction Module 1: Information Systems Auditing Module Introduction Lesson 1: Audit Fundamentals Learning objectives 1.1 Understanding the Audit Function 1.2 ISACA Standards and Guidelines 1.3 Audit and Assessment Approaches 1.4 The Risk-Audit Relationship 1.5 Information System (IS) Controls Lesson 2: Audit Execution Learning objectives 2.1 Audit Project Management: The Fundamentals 2.2 Audit Project Management: The Audit Plan 2.3 Audit Project Management: Audit Planning 2.4 Audit Evidence 2.5 Sampling Techniques and Data Analytics 2.6 Reporting and Communicating Audit Results 2.7 Audit Frameworks Module 2: Governance and Management of IT Module Introduction Lesson 3: IT Governance Learning objectives 3.1 Laws, Regulations, and Industry Standards 3.2 Organizational Structure, Governance, and Strategy 3.3 Strategic Plans, Policies, and Procedures 3.4 Enterprise Architecture and Maturity Models: The Fundamentals 3.5 Enterprise Architecture and Maturity Models: Policies, Documentation, Regulations, and Standards 3.6 Enterprise Risk Management 3.7 Privacy Programs and Principles 3.8 Data Governance and Classification Lesson 4: IT Management Learning objectives 4.1 IT Resource Management 4.2 IT Vendor Management 4.3 IT Performance Monitoring and Reporting 4.4 Quality Assurance and Quality Management of IT 4.5 Maximizing IT Management (Tales from Audit) 4.6 Other Risk Considerations (Tales from Audit) Module 3: Information Systems Acquisition, Development, and Implementation Module Introduction Lesson 5: Project Governance and Management Learning objectives 5.1 Business Case and Feasability Analysis 5.2 System Development Methodologies 5.3 Control Identification and Design Lesson 6: Information Systems Implementation Learning objectives 6.1 System Readiness and Implementation Testing 6.2 Implementation, Configuration, and Release Management 6.3 System Migration, Infrastructure Deployment, and Data Conversion 6.4 "Post-Implementation Review" Module 4: Information Systems Operations and Business Resilience Module Introduction Lesson 7: Information Systems Operations Learning objectives 7.1 IT Components 7.2 IT Asset Management 7.3 Job Scheduling and Production Process Automation 7.4 System Interfaces 7.5 Shadow IT and End-User Computing 7.6 Systems Availability and Capacity Management 7.7 Problem and Incident Management 7.8 IT Change, Configuration, and Patch Management 7.9 Operational Log Management 7.10 IT Service Level Management 7.11 Database Management Lesson 8: Business Resilience Learning objectives 8.1 Business Impact Analysis 8.2 System and Operational Resilience 8.3 Data Backup, Storage, and Restoration 8.4 Business Continuity Plan 8.5 Disaster Recovery Plans Module 5: Protection of Information Assets Module Introduction Lesson 9: Information Asset Security and Control Learning objectives 9.1 Information Asset Security Frameworks, Standards, and Guidelines 9.2 Physical and Environmental Controls 9.3 Identity and Access Management 9.4 Network and End-Point Security 9.5 Data Loss Prevention 9.6 Data Encryption 9.7 Public Key Infrastructure 9.8 Cloud and Virtualized Environments 9.9 Mobile, Wireless, and Internet-of-Things Devices Lesson 10: Authentication and Access Control Learning objectives 10.1 Security Awareness Training and Programs 10.2 Information System Attack Methods and Techniques 10.3 Security Testing Tools and Techniques 10.4 Security Monitoring Tools and Techniques 10.5 Security Incident Response Management 10.6 Evidence Collection and Forensics Summary CISA: Summary Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |