Autoplay
Autocomplete
Previous Lesson
Complete and Continue
ISACA - Certified Information Systems Auditor - CISA
Training Overview
Description of Training
Introduction
Introduction (2:40)
Student Feedback (1:00)
How to Access the Student Poeral
Very Important Audit Templates
Student Materials
CISA Course and Certification
CISA Course Introduction (2:09)
CISA Certification (2:44)
CISA Exam (3:36)
CISA Course Outline (2:41)
Audit Overview (11:31)
Basic Knowledge
GRC (5:46)
GRC Tools (3:01)
ITAF (8:29)
Audit Scenario (1:42)
Standards (2:42)
Important Definations (2:36)
CISA Materials
Senior Management and GRC (7:27)
Senior Management and Risks (6:43)
Organization Structure (5:27)
Domain 1 — Information System Auditing Process
Conduct an IS Audit (9:17)
IS Audit Report and Presentation samples (4:58)
Information Asesst Register (6:12)
Audit Risk Assessment (12:30)
Audit Planning and managment (7:24)
Document Control (3:23)
Audit Scenario (44:08)
Business process (7:16)
Law and regulation (2:20)
Evidence (5:56)
Sampling (3:58)
Domain 2 – Governance & Management of IT
IT Governance (3:06)
Governance and Management of IT (14:35)
NIST 800-100 (7:31)
Governance – Requirements
Information System Strategy (4:53)
IT Organization (2:55)
Maintenace of Polcies and Procedures (5:04)
Policy and Procedures Resources (24:53)
Legal Compliance (8:38)
Quality Managment System (2:00)
Mutarity Models (3:23)
Process Optmization (3:56)
IT Investment Practices (5:34)
IT Supplier Selection (5:15)
Make or Buy decision (18:12)
Risk Managment (10:54)
Business Impact Analysis (10:41)
Domain 3 – Information Systems Acquisition, Development, & Implementation
Information Systems Acquisition, Development and Implementation (9:29)
Project Governance (2:32)
Types of Organization (6:38)
Project Managment (6:38)
Architecture (5:36)
Procurment Managment (1:09)
Plan Procurment Managment (18:13)
Domain 4 – Information Systems Operations and Business Resilience
Information System Operations (6:51)
Service Level Management (5:09)
Hardware, Software and Network (7:32)
Software Licensing (3:15)
Capacity Managment (2:50)
Incident Managment (5:35)
Incident Report Form (5:33)
Backup (5:59)
Disaster Recovery Plans (3:34)
Alternative Sites (8:09)
Domain 5 – Protection of Information Assets
Protection of Information Assets (7:13)
Access Control (19:23)
Network Security (17:08)
Cryptography (16:30)
Physical security (9:48)
Data classification practices. (12:40)
Policies and Practices. (24:50)
Audio Version of Training
Audio Download
Standards
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock