Companies Home Search Profile

Certified Information System Auditor Course - (CISA) 2024

Focused View

14:57:02

0 View
  • 1. CISA Training Introduction.mp4
    10:34
  • 1. Information System Auditing Overview.mp4
    14:16
  • 2. Types of Auditing.mp4
    13:47
  • 3. ISACAs code of professional ethics.mp4
    06:31
  • 4. ISACAs IT Assurance Framework.mp4
    05:32
  • 5. Policy, Standard, Procedure, Guideline.mp4
    09:07
  • 6. Audit Planning.mp4
    18:56
  • 7. CIA Triad and Understand Security Basic terminologies.mp4
    09:40
  • 8. Conducting IS Audit.mp4
    22:08
  • 9. Audit Reporting.mp4
    09:09
  • 10. Audit Risk.mp4
    02:06
  • 11. Sampling Methodology.mp4
    13:32
  • 12. Control Self Assessment.mp4
    07:07
  • 13. CAATs and Continues Auditing technique.mp4
    13:46
  • 14. Technology challenges and emerging technologies.mp4
    27:16
  • 15. CISA Practice Questions - Domain 1 - 1.mp4
    13:16
  • 16. CISA Practice Questions - Domain 1 - 2.mp4
    09:12
  • 17. CISA Practice Questions - Domain 1 - 3.mp4
    14:34
  • 1. Domain 2 Introduction.mp4
    01:56
  • 2. Governance of IT.mp4
    15:52
  • 3. Goals and Objective of Governance.mp4
    20:13
  • 4. Governance Frameworks.mp4
    12:31
  • 5. Critical Success Factors for effective Governance.mp4
    02:52
  • 6. Policies.mp4
    13:00
  • 7. Standards, Procedures and Guidelines.mp4
    11:12
  • 8. IT Integration with Business.mp4
    02:52
  • 9. What is Risk Management.mp4
    22:15
  • 10. Security Controls.mp4
    14:37
  • 11. Business Case.mp4
    13:39
  • 12. IT Organization.mp4
    20:14
  • 13. Portfolio Management and Return on Investment.mp4
    02:52
  • 14. Outsourcing and Third Party Risk Management - TPRM.mp4
    02:52
  • 15. IT Performance Management and KPI and Balanced Score Card.mp4
    02:52
  • 16. IT Balanced Score Card and Business Model for Information Systems.mp4
    06:17
  • 17. Maturity Assessment Model.mp4
    07:55
  • 18. Change Management of IT.mp4
    02:52
  • 19. Quality Control and Assurance.mp4
    01:56
  • 20. Impact of Lack of Governance of IT.mp4
    02:52
  • 21. Legal and Regulatory Standards.mp4
    16:43
  • 1. Domain 3 Introduction.mp4
    01:00
  • 2. Business Case and feasibility analysis and RFP Process.mp4
    06:00
  • 3. Auditors role in reviewing Business case and feasibility analysis.mp4
    01:56
  • 4. Project Steps and Project Management Organization.mp4
    08:17
  • 5. Project vs Program.mp4
    04:17
  • 6. Software Project Cost Estimation Tools.mp4
    06:51
  • 7. Project Scheduling and Management Tools.mp4
    08:11
  • 8. Post Project Activities and IS Auditor role in Project Review.mp4
    04:55
  • 9. Software Development Methodologies.mp4
    12:22
  • 10. Software Engineering Terminologies.mp4
    05:25
  • 11. IS Auditor roles in Software Projects.mp4
    06:45
  • 12. Software Testing.mp4
    16:17
  • 13. Software Implementation and Rollover.mp4
    11:03
  • 14. Software Accreditation and Post-Implementation Activities.mp4
    08:34
  • 15. Application Controls.mp4
    10:38
  • 16. Virtualization.mp4
    09:30
  • 17. Containers.mp4
    09:31
  • 1. Domain 4 Introduction.mp4
    01:25
  • 2. IT Asset Management.html
  • 3. Managing Source Code.html
  • 4. Auditing Enterprise Architecture and End user computing.html
  • 5. Release Management Process.html
  • 6. Incident Management.mp4
    08:20
  • 7. Database Overview.mp4
    01:56
  • 8. IT Network Overview.mp4
    01:56
  • 9. IT Network Overview - Part 2.mp4
    01:56
  • 10. Cloud computing and virtualization overview.mp4
    01:56
  • 11. Auditing Systems.mp4
    01:56
  • 12. Application and Network Resiliency.mp4
    01:56
  • 13. Backup types and media and concerns.mp4
    08:49
  • 14. Business Continuity Planning and Disaster Recovery Planning.mp4
    14:04
  • 15. Recovery time and Point Objectives.mp4
    06:57
  • 16. Recovery Strategies.mp4
    14:04
  • 17. Data Backup.mp4
    08:49
  • 1. Information Security vs Cybersecurity.mp4
    13:18
  • 2. Security and Privacy.mp4
    04:50
  • 3. What we are trying to secure.mp4
    12:37
  • 4. What is the security vulnerability and how it can be used.mp4
    16:54
  • 5. Threat Actors.mp4
    12:29
  • 6. Malware Overview.mp4
    30:10
  • 7. Cyber Attacks Overview.mp4
    26:17
  • 8. Web Application Attacks.mp4
    19:12
  • 9. Ethical Hacking quick overview.mp4
    14:26
  • 10. Cyber Security frameworks.mp4
    07:16
  • 11. Social Engineering.mp4
    15:20
  • 12. Physical Security Part 1.mp4
    29:18
  • 13. Physical Security Part 2.mp4
    29:18
  • 14. AAA Overview.mp4
    01:56
  • 15. Authentication - a deeper look.mp4
    01:56
  • 16. MFA and Securing biometric authentication from attacks.html
  • 17. Authorization and Accounting - SIEM and SSO.html
  • 18. Network Security controls and services - Part 1.html
  • 19. Network Security controls and services - Part 2.html
  • 20. Cryptography overview.html
  • 21. Symmetric Encryption overview.html
  • 22. Asymmetric Encryption overview.html
  • 23. Public Key Infrastructure overview.html
  • 24. Hashing and Digital Signature.html
  • 25. Application of Encryption.mp4
    08:40
  • 26. Software Implementation and Rollover.mp4
    07:16
  • 27. Software Accreditation and Post-Implementation Activities.mp4
    07:16
  • 28. Application Controls.mp4
    14:04
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 88
    • duration 14:57:02
    • Release Date 2024/03/10

    Courses related to Network Security