Companies Home Search Profile

Certified Information Systems Auditor (CISA) Cert Prep

Focused View

Cybrary

9:30:26

19 View
  • 01 - CISA welcome and intro.mp4
    09:10
  • 02 - Introduction to IS audit.mp4
    12:20
  • 03 - Information Technology Assurance Framework (ITAF).mp4
    07:31
  • 04 - Audit strategy.mp4
    04:15
  • 05 - Laws and regulations.mp4
    02:52
  • 06 - Business processes.mp4
    03:26
  • 07 - Types of controls.mp4
    11:47
  • 08 - Risk-based audit, part 1.mp4
    06:51
  • 09 - Risk-based audit, part 2.mp4
    06:33
  • 10 - Audit execution.mp4
    04:56
  • 11 - Audit evidence collection.mp4
    05:48
  • 12 - Sampling.mp4
    11:23
  • 13 - Communication of results.mp4
    05:48
  • 14 - Additional types of audit.mp4
    04:24
  • 01 - Enterprise risk management.mp4
    08:30
  • 02 - Introduction to IT governance.mp4
    08:46
  • 03 - IT frameworks.mp4
    09:20
  • 04 - Frameworks continued.mp4
    11:38
  • 05 - Enterprise architecture.mp4
    04:55
  • 06 - Evaluation of controls.mp4
    03:36
  • 07 - Evaluation criteria.mp4
    08:11
  • 08 - Information security strategy.mp4
    08:09
  • 09 - Information security program.mp4
    06:44
  • 10 - Quality control and security management.mp4
    03:40
  • 11 - Roles and responsibilities.mp4
    07:07
  • 01 - Introduction To project management.mp4
    14:41
  • 02 - Project management lifecycle.mp4
    06:41
  • 03 - Project management documents throughout the lifecycle.mp4
    04:38
  • 04 - Software development methodologies.mp4
    07:11
  • 05 - Hardware and software acquisitions.mp4
    04:54
  • 06 - Control identification and design.mp4
    08:24
  • 07 - Testing.mp4
    12:18
  • 08 - System migration and changeover.mp4
    05:35
  • 01 - Introduction.mp4
    07:31
  • 02 - Data governance.mp4
    07:37
  • 03 - The data lifecycle.mp4
    08:13
  • 04 - Software and systems and APIs.mp4
    07:53
  • 05 - Cloud deployment.mp4
    11:10
  • 06 - Problem and incident management.mp4
    03:29
  • 07 - IS operations.mp4
    02:32
  • 08 - Database management.mp4
    06:55
  • 09 - Redundancy.mp4
    11:25
  • 10 - Business continuity, part 1.mp4
    12:39
  • 11 - Components of the plan.mp4
    02:26
  • 12 - Business continuity, part 2.mp4
    06:32
  • 01 - Introduction and privacy principles.mp4
    05:40
  • 02 - Physical and environmental controls.mp4
    03:01
  • 03 - Identity and access management.mp4
    05:21
  • 04 - SOCs and SLAs.mp4
    02:48
  • 05 - Networking basics.mp4
    11:34
  • 06 - The OSI and TCP reference models.mp4
    07:09
  • 07 - OSI Layers 1 and 2.mp4
    15:11
  • 08 - OSI Layers 37 and TCP model.mp4
    15:54
  • 09 - Network devices.mp4
    10:36
  • 10 - NAT and PAT.mp4
    05:38
  • 11 - Firewalls.mp4
    10:38
  • 12 - Additional security devices, part 1.mp4
    10:23
  • 13 - Additional security devices, part 2.mp4
    06:04
  • 14 - Cryptography basics.mp4
    02:23
  • 15 - Symmetric cryptography.mp4
    09:01
  • 16 - Asymmetric cryptography.mp4
    18:13
  • 17 - Hybrid cryptography.mp4
    05:21
  • 18 - Integrity.mp4
    04:45
  • 19 - PKI and wrap-up.mp4
    06:04
  • 20 - Wireless security.mp4
    05:06
  • 21 - Indicators of attacks, part 1.mp4
    14:09
  • 22 - Indicators of attacks, part 2.mp4
    13:13
  • 23 - Indicators for application attacks.mp4
    07:15
  • 24 - Cross-site attacks.mp4
    09:03
  • 25 - Timing attacks.mp4
    06:06
  • 26 - Memory issues.mp4
    02:20
  • 27 - Network-based attacks.mp4
    18:49
  • 28 - Threat actors and vectors.mp4
    08:17
  • Description


    The Certified Information Systems Auditor (CISA) certification enables you to prove your ability to audit an organization's information systems compliance, and this course from Cybrary—a leading cybersecurity professional development platform—puts you on the path to gaining the knowledge you need to pass the exam. Deep dive into the process for auditing information systems. Learn about the government and management of IT. Explore the acquisition, development, and implementations of various information systems. Find out how you can make the best use of information systems operations and business resilience. Plus, review in depth what you’ll need to know about information asset security and control.

    This course was created by Cybrary. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 73
    • duration 9:30:26
    • English subtitles has
    • Release Date 2024/08/12