Certified Information Systems Auditor : Cisa
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 22.13 GB | Duration: 26h 39m
This course will help you understand the requirements for passing ISACA's Certified Information Systems Auditor exam.
What you'll learn
Learn the fundamentals of planning, conducting, and reporting on information systems audits.
Explore the principles of governance, risk management, and the overall management of IT resources.
Understand the lifecycle of IT systems and the critical aspects of acquisition and development.
Delve into operational practices that ensure the integrity and availability of information systems.
Learn strategies for safeguarding information assets against risks and breaches.
Requirements
Familiarity with fundamental information technology concepts, including networks, systems, and databases.
While not mandatory, a background in IT, cybersecurity, or auditing is beneficial. Ideally, candidates should have at least two years of experience in a related field.
A foundational understanding of auditing concepts and practices will enhance your learning experience.
Access to ISACA's CISA Exam Content Outline (ECO) and relevant study guides is recommended for additional reference.
A willingness to dedicate time and effort to studying the course material, as well as actively engaging in discussions and exercises
This course is designed to build on your existing knowledge and provide the necessary tools to prepare for the CISA exam effectively.
Description
Certificate Exam Preparatory courseThis course is designed to help you master the essential knowledge and skills needed to pass the Certified Information Systems Auditor (CISA) exam, administered by ISACA. Built around the five domains outlined in ISACA's Exam Content Outline (ECO), the course provides a structured approach to understanding the key principles of information systems auditing.You will explore the entire audit process, from planning and conducting audits to effectively reporting findings. The course covers the governance and management of IT, emphasizing risk management and resource allocation. You'll also learn about the acquisition, development, and implementation of information systems, focusing on best practices throughout the system lifecycle.In addition, we delve into the operations, maintenance, and support of information systems, ensuring you understand the critical aspects of ongoing management. Finally, we emphasize the importance of protecting information assets through effective risk mitigation strategies.While this course is not ISACA-accredited, it closely follows their guidelines, providing you with valuable tools and resources for your certification journey. By the end of the course, you will feel well-prepared and confident to take on the CISA exam.Whether you are new to the field or looking to refine your expertise, this course provides valuable insights and practical knowledge to support your certification journey and career advancement.
Overview
Section 1: Course Overview
Lecture 1 Course Overview
Section 2: Information System Auditing Process
Lecture 2 Exam Overview
Lecture 3 Standards, Guidelines, and Professional Ethics
Lecture 4 IS Audit Functions
Lecture 5 Business Process Applications and Controls
Lecture 6 Control Types
Lecture 7 Risk and Audit Planning
Lecture 8 Project Management and Auditing
Lecture 9 Sampling Methodologies
Lecture 10 Collecting Evidence
Lecture 11 Data Analytics and CAATs
Lecture 12 Continuous Auditing
Lecture 13 How to Communicate the Audit Results
Lecture 14 Quality Assurance and Improving Audit
Section 3: Governance and Management of IT
Lecture 15 What is Governance?
Lecture 16 Best Practices for Enterprise Governance in IT
Lecture 17 Business Intelligence and Strategic Planning
Lecture 18 IT Standards, Policies and Procedures
Lecture 19 Organizational Structures
Lecture 20 Roles and Segregation of Duties
Lecture 21 Risk Management in the Enterprise
Lecture 22 Risk Analysis
Lecture 23 Maturity Models
Lecture 24 The Role of Industry Standards and Regulations
Lecture 25 Resource Management in IT
Lecture 26 Human Resource Management
Lecture 27 Organizational Change Management and Financial Management
Lecture 28 IT Service Provider Acquisition and Management
Lecture 29 Governance in the Cloud
Lecture 30 Third-party Services
Lecture 31 Quality Assurance and IT Audits
Lecture 32 Performance Monitoring and Reporting
Section 4: Information Systems Acquisition, Development and Implementation
Lecture 33 Project Governance and Management
Lecture 34 Roles in Project Management
Lecture 35 The PMO
Lecture 36 Initiating the Project
Lecture 37 Planning the Project
Lecture 38 Executing and Monitoring the Project
Lecture 39 Closing the Project
Lecture 40 Business Case and Feasibility Analysis
Lecture 41 System Development Lifecycles
Lecture 42 System and Software Development Methods
Lecture 43 Computer Aided Software Engineering and 4GL
Lecture 44 Identifyng and Designing Controls
Lecture 45 Decision Support Systems
Lecture 46 Testing Methodologies
Lecture 47 Application Systems and Data Integrity Testing
Lecture 48 Data Migration
Lecture 49 Changeover Techniques
Lecture 50 System Change and Post Implementation Procedures
Section 5: Information Systems Operations and Business Resiliency
Lecture 51 Necessary Technology Components
Lecture 52 USB and RFID
Lecture 53 IT Asset Management
Lecture 54 System Interfaces and End User Computing
Lecture 55 Data Governance
Lecture 56 Operating Systems
Lecture 57 Software Licensing and Source Code Management
Lecture 58 Incident and Problem Management
Lecture 59 Release and Patch Management
Lecture 60 Service Level Management and Agreements
Lecture 61 Database Management
Lecture 62 Business Impact Analysis
Lecture 63 System Resiliency
Lecture 64 Backups, Storage and Restoration
Lecture 65 Business Continuity Management
Lecture 66 The Business Continuity Plan
Lecture 67 Testing the BCP
Lecture 68 Disaster Recovery Plans
Lecture 69 Testing the DRP
Section 6: Protection of Information Assets
Lecture 70 Frameworks, Standards and Guidelines
Lecture 71 Roles and Responsibilities for Auditing the IS Management Framework
Lecture 72 Recommended IT Security Baseline
Lecture 73 Principles of Data Privacy
Lecture 74 Physical Access and Controls
Lecture 75 Environmental Controls
Lecture 76 Identity and Access Management
Lecture 77 Logical Access and Authorization Issues
Lecture 78 Audit Logging of System Access
Lecture 79 Data Loss Prevention
Lecture 80 Network Infrastructure
Lecture 81 Applications in a Networked Environment
Lecture 82 Network Infrastructure Security Firewalls
Lecture 83 Change Management in Networks
Lecture 84 Encryption Systems
Lecture 85 Applications of Cryptography
Lecture 86 The Public Key Infrastructure
Lecture 87 IS Audits and Social Media
Lecture 88 Virtualization and Cloud Computing
Lecture 89 Security Awareness Training
Lecture 90 IS Attack Methods and Techniques
Lecture 91 Testing Techniques for Security Controls
Lecture 92 Network Penetration Testing
Lecture 93 Monitoring Tools
Lecture 94 Incident Response Management
Lecture 95 Evidence Collection and Forensics
Aspiring Auditors: Those looking to start a career in IT auditing or transition from related fields.,IT Professionals: Individuals already working in information technology who want to expand their understanding of audit processes and principles.,Compliance and Risk Management Officers: Professionals responsible for ensuring organizational compliance with regulations and managing IT risks.,Cybersecurity Practitioners: Those focused on protecting information assets who wish to deepen their auditing knowledge.,Students and Recent Graduates: Individuals pursuing degrees in information systems, cybersecurity, or related fields who aim to bolster their qualifications for future job opportunities.,Current CISA Candidates: Anyone preparing for the CISA exam who seeks structured guidance and resources to enhance their study efforts.
https://anonymz.com/?https://www.udemy.com/course/certified-information-systems-auditor-cisa-l/
download скачать from RapidGator
https://rapidgator.net/file/9758577328df341097db907212fb5933/ https://rapidgator.net/file/880bd80b334f809e0ecbf01de87dcbeb/ https://rapidgator.net/file/07ecf82d9260c349145af0403ec276df/ https://rapidgator.net/file/d8c1b2b53cc5fa0546a702e6c5ab46f1/ https://rapidgator.net/file/0a45752fbb1dd371d83b60df04a129f0/
Premium Links
https://nitroflare.com/view/1963FAD58D05A19/ https://nitroflare.com/view/3EB00D86B62E18E/ https://nitroflare.com/view/9ECC5CE488F6684/ https://nitroflare.com/view/1DDD4C0057C9A5F/ https://nitroflare.com/view/A2E71334FA39484/
download скачать from Keep2Share
https://k2s.cc/file/6cdd8baf5e5f5 https://k2s.cc/file/74dfe04c7ab98 https://k2s.cc/file/a108fcde1a327 https://k2s.cc/file/eb230ae51e608 https://k2s.cc/file/0e1be8eb7b547