Certified in Information System Audit CISA

CISA by Hemang Doshi
Certified in Information System Audit CISA
File Size :
3.05 GB
Total length :
17h 0m

Category

Instructor

Hemang Doshi

Language

Last update

4/2022

Ratings

4.4/5

Certified in Information System Audit CISA

What you’ll learn

Certified Information System Audits (ISACA -CISA) Lectures
Contains all the 5 Domains of CISA Review Manual
Candidate will able to understand practical aspects of Information System Audit
Candidate will able to confidently attempt and pass the CISA exam

Certified in Information System Audit CISA

Requirements

No prior knowledge or experience is required. We will teach you everything from basics to pass the CISA Exam.

Description

Please note that objective of this course is to support and supplement the content of the ISACA’s official resources. This course is not meant to replace CISA Review Manual and Question, Answer and Explanation Manual. Candidates are strongly advised to use ISACA’s official resource as prime resource to study for CISA exam. This course will help you to decipher the technicities used in official resources. This course is designed on the basis of official resources of ISACA. It covers all the 5 domains of CISA Review Manual. Topics are arranged segment wise and aligned with latest CISA Review Manual.Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:(1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CISA Review Manual (CRM) in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.Features of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CISA Review Manual. Exam oriented practice questions and practical example for CISA aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 1000 plus practice questions

Overview

Section 1: Information System Auditing Process

Lecture 1 1.1.1 Audit Planning

Lecture 2 1.1.2 Audit Charter

Lecture 3 1.2 Electronic Data Interchange (EDI)

Lecture 4 1.3 Types of Controls

Lecture 5 1.4.1 What is Risk?

Lecture 6 1.4.2 Understanding Vulnerabilities and threats

Lecture 7 1.4.3 Types of Risks

Lecture 8 1.4.4 Risk response methodology

Lecture 9 1.4.5 Key Aspects – Risk based Audit Planning

Lecture 10 1.4.6 QAE – Risk based Audit Planning

Lecture 11 1.6.1 Key Aspects – Audit Project Management

Lecture 12 1.6.2 QAE – Audit Project Management

Lecture 13 1.7.1 Sampling Methodology

Lecture 14 1.7.2 Compliance and Substantive Testing

Lecture 15 1.8 Audit Evidence Collection Techniques

Lecture 16 1.9.1 Continous Auditing Techniques

Lecture 17 1.9.2 Data Analytics

Lecture 18 1.10 Reporting and Communication Techniques

Lecture 19 1.11 Control Self Assessment

Section 2: Domain 2 – Governance and Management of IT

Lecture 20 2.1.1 Key Aspects Enterprise Governance of Information and Technology

Lecture 21 2.1.2 QAE Enterprise Governance of Information and Technology

Lecture 22 2.3.1 IT Standards, Policies and Procedures

Lecture 23 2.3.2 Approaches for Policy Development (Top down & Bottom up)

Lecture 24 2.4.1 Organizational Structure – Roles and Responsibility of Various Functions

Lecture 25 2.4.2 IT Strategy & Steering Commitee

Lecture 26 2.5 Enterprise Architecture

Lecture 27 2.6.2 Risk Treatment

Lecture 28 2.6.1 Risk Analysis Methods

Lecture 29 2.6.3 Enterprise Risk Management.

Lecture 30 2.7 Maturity Models

Lecture 31 2.8 Laws, Regulations and Industry Standards Affecting the Organization

Lecture 32 2.9 IT Resource Management Training Scheduling and Time Reporting Terms and Cond

Lecture 33 2.10 IT Service Provider Acquisition and Management

Lecture 34 2.11.1 IT Performance Monitoring and Reporting

Lecture 35 2.11.2 Balanced Score Card

Lecture 36 2.12 Quality Assurance and Quality Management of IT

Section 3: Domain 3 – Information Systems Acquisition, Development and Implementation

Lecture 37 3.1.1 Project Evaluation Methods

Lecture 38 3.1.2 Project Management Structure

Lecture 39 3.2 Business Case and Feasibility Analysis

Lecture 40 3.3.1 Agile System Development Methodology

Lecture 41 3.3.2 Object Oriented system development methodology

Lecture 42 3.3.3 Prototype & Rapid Application Development (RAD)

Lecture 43 3.3.4.1 Key Aspects – System Development Methodologies

Lecture 44 3.3.4.2 QAE – System Development Methodologies

Lecture 45 3.4.1 Check Digit

Lecture 46 3.4.2 Parity Bit, Checksum and CRC

Lecture 47 3.4.3.1 Key Aspects – Control Identification and Design and Balancing

Lecture 48 3.4.3.2 QAE – Control Identification and Design and Balancing

Lecture 49 3.5 Testing Methodologies

Lecture 50 3.7 System Migration, Infrastructure Deployment and Data Conversion

Lecture 51 3.8 Post-implementation Review

Section 4: Domain 4 – Information Systems Operations, Maintenance and Support

Lecture 52 4.1.1 RFID

Lecture 53 4.2 IT Asset Management

Lecture 54 4.3 Job Scheduling and Production Process Automation

Lecture 55 4.5 End-user Computing

Lecture 56 4.7 Systems Performance Management

Lecture 57 4.8.1 Problem and Incident Management

Lecture 58 4.8.2 Network Management Tools

Lecture 59 4.9 Change, Configuration, Release and Patch Management

Lecture 60 4.10 IT Service Level Management

Lecture 61 4.11.1 Relational database model

Lecture 62 4.11.2 Database Normalization

Lecture 63 4.11.3 Database checks and controls

Lecture 64 4.11.4 DBA Roles and Responsibilites & SoD

Lecture 65 4.11.5 Database Management

Lecture 66 4.12 Business Impact Analysis

Lecture 67 4.13 System Resiliency

Lecture 68 4.15.2 Business Continuity Plan

Lecture 69 4.16.1 Types of Backup

Lecture 70 4.16.2 RTO & RPO

Lecture 71 4.16.3 Alternate Recovery Site

Lecture 72 4.16.4 Disaster Recovery Plans

Lecture 73 4.16.5 DRP – Test Methods

Section 5: Domain 5 – Protection of Information Assets

Lecture 74 5.1 Information Security Management Framework

Lecture 75 5.2 Privacy Principles

Lecture 76 5.3.1 Physical Access and Environmental Controls

Lecture 77 5.3.2 Fire Supression Systems

Lecture 78 5.4.1 Single Sign On

Lecture 79 5.4.2 Factor of Authentication

Lecture 80 5.4.3.1 Key Aspects – Identity and Access Management

Lecture 81 5.4.3.2 QAE 1 – Identity and Access Management

Lecture 82 5.4.3.3 QAE 2 – Identity and Access Management

Lecture 83 5.5.1 Biometrics

Lecture 84 5.5.2 OSI Layers

Lecture 85 5.5.3 Firewall Types

Lecture 86 5.5.4 Firewall Implementation

Lecture 87 5.5.5 Virtual Private Network

Lecture 88 5.5.6 Network LAN Components

Lecture 89 5.5.7 Network Physical Devices

Lecture 90 5.5.8 Voice over Internet Protocols (VoIP)

Lecture 91 5.5.9 Wireless Network

Lecture 92 5.5.10 Email Security

Lecture 93 5.6 Classification of Information Assets

Lecture 94 5.7 Data Encryption and Encryption-related Techniques

Lecture 95 5.8 Public Key Infrastructure

Lecture 96 Cloud Computing

Lecture 97 5.12 Security Awareness Training and Programs

Lecture 98 5.13.1 Information System Attack Methods and Techniques

Lecture 99 5.13.2 Key Aspects – Information System Attack Methods and Techniques

Lecture 100 5.13.3 QAE – Information System Attack Methods and Techniques

Lecture 101 Security Testing Tools and Techniques

Lecture 102 5.15 IDS & IPS

Lecture 103 5.16 Incident Response Management

Lecture 104 5.17 Evidence Collection and Forensics

Section 6: Practice Questions

IT Auditor, System Auditor,Risk Manager,Information Security Professional

Course Information:

Udemy | English | 17h 0m | 3.05 GB
Created by: Hemang Doshi

You Can See More Courses in the IT & Software >> Greetings from CourseDown.com

New Courses

Scroll to Top