Certified Information System Auditor Course - (CISA) 2024
Focused View
14:57:02
0 View
1. CISA Training Introduction.mp4
10:34
1. Information System Auditing Overview.mp4
14:16
2. Types of Auditing.mp4
13:47
3. ISACAs code of professional ethics.mp4
06:31
4. ISACAs IT Assurance Framework.mp4
05:32
5. Policy, Standard, Procedure, Guideline.mp4
09:07
6. Audit Planning.mp4
18:56
7. CIA Triad and Understand Security Basic terminologies.mp4
09:40
8. Conducting IS Audit.mp4
22:08
9. Audit Reporting.mp4
09:09
10. Audit Risk.mp4
02:06
11. Sampling Methodology.mp4
13:32
12. Control Self Assessment.mp4
07:07
13. CAATs and Continues Auditing technique.mp4
13:46
14. Technology challenges and emerging technologies.mp4
27:16
15. CISA Practice Questions - Domain 1 - 1.mp4
13:16
16. CISA Practice Questions - Domain 1 - 2.mp4
09:12
17. CISA Practice Questions - Domain 1 - 3.mp4
14:34
1. Domain 2 Introduction.mp4
01:56
2. Governance of IT.mp4
15:52
3. Goals and Objective of Governance.mp4
20:13
4. Governance Frameworks.mp4
12:31
5. Critical Success Factors for effective Governance.mp4
02:52
6. Policies.mp4
13:00
7. Standards, Procedures and Guidelines.mp4
11:12
8. IT Integration with Business.mp4
02:52
9. What is Risk Management.mp4
22:15
10. Security Controls.mp4
14:37
11. Business Case.mp4
13:39
12. IT Organization.mp4
20:14
13. Portfolio Management and Return on Investment.mp4
02:52
14. Outsourcing and Third Party Risk Management - TPRM.mp4
02:52
15. IT Performance Management and KPI and Balanced Score Card.mp4
02:52
16. IT Balanced Score Card and Business Model for Information Systems.mp4
06:17
17. Maturity Assessment Model.mp4
07:55
18. Change Management of IT.mp4
02:52
19. Quality Control and Assurance.mp4
01:56
20. Impact of Lack of Governance of IT.mp4
02:52
21. Legal and Regulatory Standards.mp4
16:43
1. Domain 3 Introduction.mp4
01:00
2. Business Case and feasibility analysis and RFP Process.mp4
06:00
3. Auditors role in reviewing Business case and feasibility analysis.mp4
01:56
4. Project Steps and Project Management Organization.mp4
08:17
5. Project vs Program.mp4
04:17
6. Software Project Cost Estimation Tools.mp4
06:51
7. Project Scheduling and Management Tools.mp4
08:11
8. Post Project Activities and IS Auditor role in Project Review.mp4
04:55
9. Software Development Methodologies.mp4
12:22
10. Software Engineering Terminologies.mp4
05:25
11. IS Auditor roles in Software Projects.mp4
06:45
12. Software Testing.mp4
16:17
13. Software Implementation and Rollover.mp4
11:03
14. Software Accreditation and Post-Implementation Activities.mp4
08:34
15. Application Controls.mp4
10:38
16. Virtualization.mp4
09:30
17. Containers.mp4
09:31
1. Domain 4 Introduction.mp4
01:25
2. IT Asset Management.html
3. Managing Source Code.html
4. Auditing Enterprise Architecture and End user computing.html
5. Release Management Process.html
6. Incident Management.mp4
08:20
7. Database Overview.mp4
01:56
8. IT Network Overview.mp4
01:56
9. IT Network Overview - Part 2.mp4
01:56
10. Cloud computing and virtualization overview.mp4
01:56
11. Auditing Systems.mp4
01:56
12. Application and Network Resiliency.mp4
01:56
13. Backup types and media and concerns.mp4
08:49
14. Business Continuity Planning and Disaster Recovery Planning.mp4
14:04
15. Recovery time and Point Objectives.mp4
06:57
16. Recovery Strategies.mp4
14:04
17. Data Backup.mp4
08:49
1. Information Security vs Cybersecurity.mp4
13:18
2. Security and Privacy.mp4
04:50
3. What we are trying to secure.mp4
12:37
4. What is the security vulnerability and how it can be used.mp4
16:54
5. Threat Actors.mp4
12:29
6. Malware Overview.mp4
30:10
7. Cyber Attacks Overview.mp4
26:17
8. Web Application Attacks.mp4
19:12
9. Ethical Hacking quick overview.mp4
14:26
10. Cyber Security frameworks.mp4
07:16
11. Social Engineering.mp4
15:20
12. Physical Security Part 1.mp4
29:18
13. Physical Security Part 2.mp4
29:18
14. AAA Overview.mp4
01:56
15. Authentication - a deeper look.mp4
01:56
16. MFA and Securing biometric authentication from attacks.html
17. Authorization and Accounting - SIEM and SSO.html
18. Network Security controls and services - Part 1.html
19. Network Security controls and services - Part 2.html
20. Cryptography overview.html
21. Symmetric Encryption overview.html
22. Asymmetric Encryption overview.html
23. Public Key Infrastructure overview.html
24. Hashing and Digital Signature.html
25. Application of Encryption.mp4
08:40
26. Software Implementation and Rollover.mp4
07:16
27. Software Accreditation and Post-Implementation Activities.mp4
07:16
28. Application Controls.mp4
14:04
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 88
- duration 14:57:02
- Release Date 2024/03/10