Companies Home Search Profile

CISA (Certified Information Systems Auditor)

Focused View

12:17:41

149 View
  • 001. CISA (Certified Information Systems Auditor) Introduction.mp4
    04:06
  • 001. Learning objectives.mp4
    01:04
  • 002. 1.1 Understanding the Audit Function.mp4
    08:20
  • 003. 1.2 Adhering to ISACA IS Audit and Assurance Standards and Guidelines.mp4
    06:11
  • 004. 1.3 Identifying the Risk Audit Relationship.mp4
    07:14
  • 005. 1.4 Surveying IS Controls.mp4
    08:06
  • 006. Lesson 1 Review.mp4
    07:06
  • 001. Learning objectives.mp4
    00:56
  • 002. 2.1 Performing an IS Audit.mp4
    06:18
  • 003. 2.2 Gathering Audit Evidence.mp4
    08:40
  • 004. 2.3 Understanding Sampling Techniques.mp4
    08:45
  • 005. 2.4 Reporting and Communicating Audit Results.mp4
    10:43
  • 006. 2.5 Audit Evolutions.mp4
    07:08
  • 007. Lesson 2 Review.mp4
    06:48
  • 001. Learning objectives.mp4
    01:11
  • 002. 3.1 Understanding Corporate and Information Security Governance (Defining Governance).mp4
    07:21
  • 003. 3.2 Designing Strategic Plans, Policies, and Procedures.mp4
    09:53
  • 004. 3.3 Surveying IT Organizational Structures and SOD.mp4
    07:40
  • 005. 3.4 Surveying Maturity and Process Implementation Models.mp4
    07:31
  • 006. 3.5 Understanding Performance Optimization.mp4
    07:41
  • 007. 3.6 Real-world Auditing IT Governance.mp4
    03:11
  • 008. Lesson 3 Review.mp4
    07:17
  • 001. Learning objectives.mp4
    00:58
  • 002. 4.1 Evaluating a Risk Management Program.mp4
    07:58
  • 003. 4.2 Conducting a Risk Assessment.mp4
    09:41
  • 004. 4.3 Real-world Auditing Risk Management.mp4
    02:55
  • 005. Lesson 4 Review.mp4
    05:38
  • 001. Learning objectives.mp4
    01:08
  • 002. 5.1 Examining Outsourcing and Third-Party Management.mp4
    10:55
  • 003. 5.2 Deconstructing Cloud Computing.mp4
    09:30
  • 004. 5.3 Real-world Auditing Third-Party Relationships.mp4
    03:24
  • 005. Lesson 5 Review.mp4
    06:17
  • 001. Learning objectives.mp4
    01:01
  • 002. 6.1 Defining Business Continuity Planning.mp4
    08:11
  • 003. 6.2 Examining a Business Impact Analysis (BIA).mp4
    08:47
  • 004. 6.3 Designing Business Continuity Plans.mp4
    07:49
  • 005. 6.4 Evaluating Business Continuity Testing and Readiness.mp4
    09:06
  • 006. 6.5 Real-world Auditing Business Continuity.mp4
    03:19
  • 007. Lesson 6 Review.mp4
    06:55
  • 001. Learning objectives.mp4
    01:03
  • 002. 7.1 Developing a Business Case.mp4
    06:11
  • 003. 7.2 Understanding Portfolio Management.mp4
    05:31
  • 004. 7.3 Defining Project Management.mp4
    11:55
  • 005. 7.4 Real-world Auditing Portfolio and Project Management.mp4
    03:37
  • 006. Lesson 7 Review.mp4
    06:31
  • 001. Learning objectives.mp4
    01:08
  • 002. 8.1 Exploring Business Application Development.mp4
    07:28
  • 003. 8.2 Identifying Software Development Testing Techniques.mp4
    09:45
  • 004. 8.3 Recognizing Source Code Vulnerabilities.mp4
    06:28
  • 005. 8.4 Real-world Auditing the Development Process.mp4
    03:30
  • 006. Lesson 8 Review.mp4
    05:47
  • 001. Learning objectives.mp4
    01:13
  • 002. 9.1 Exploring Acquisition Processes.mp4
    06:31
  • 003. 9.2 Deconstructing System Implementation.mp4
    08:30
  • 004. 9.3 Recognizing Application Controls.mp4
    08:02
  • 005. 9.4 Understanding Configuration and Change Management.mp4
    07:58
  • 006. 9.5 Real-world Auditing Acquisition and Implementation.mp4
    04:08
  • 007. Lesson 9 Review.mp4
    06:11
  • 001. Learning objectives.mp4
    01:10
  • 002. 10.1 Surveying Information Systems Management and Frameworks.mp4
    07:24
  • 003. 10.2 Managing Operational Processes.mp4
    08:05
  • 004. 10.3 Understanding Asset Management.mp4
    03:46
  • 005. 10.4 Real-world Auditing IS Operational Management.mp4
    03:25
  • 006. Lesson 10 Review.mp4
    04:12
  • 001. Learning objectives.mp4
    01:01
  • 002. 11.1 Defining Data Management.mp4
    07:27
  • 003. 11.2 Exploring Database Management Systems (DBMS).mp4
    09:28
  • 004. 11.3 Real-world Auditing Data Management.mp4
    03:44
  • 005. Lesson 11 Review.mp4
    05:30
  • 001. Learning objectives.mp4
    01:21
  • 002. 12.1 Examining OSI and TCPIP Models.mp4
    06:12
  • 003. 12.2 Exploring Transmission Media and Telecommunications.mp4
    09:01
  • 004. 12.3 Understanding Wireless Networks.mp4
    10:32
  • 005. 12.4 Exploring VoIP.mp4
    06:50
  • 006. 12.5 Real-world Auditing Network Architecture.mp4
    03:45
  • 007. Lesson 12 Review.mp4
    05:35
  • 001. Learning objectives.mp4
    01:38
  • 002. 13.1 Understanding Disaster Reponse and Recovery Objectives.mp4
    05:43
  • 003. 13.2 Identifying Recovery Strategies.mp4
    07:25
  • 004. 13.3 Assessing Backup and Replication Strategies.mp4
    10:23
  • 005. 13.4 Evaluating Disaster Recovery Plan Maintenance.mp4
    07:34
  • 006. 13.5 Real-world Auditing Disaster Response and Recovery.mp4
    04:14
  • 007. Lesson 13 Review.mp4
    06:17
  • 001. Learning objectives.mp4
    01:13
  • 002. 14.1 Surveying Information Security Management Systems (ISMS).mp4
    07:17
  • 003. 14.2 Identifying Information Security Classifications and Controls.mp4
    04:54
  • 004. 14.3 Exploring Cyberthreats and Adversaries.mp4
    09:58
  • 005. 14.4 Understanding Incident Management.mp4
    06:37
  • 006. 14.5 Evaluating Investigative and Evidence Handling Capabilities.mp4
    09:50
  • 007. 14.6 Real-world Auditing Information Security Program Management.mp4
    03:13
  • 008. Lesson 14 Review.mp4
    05:50
  • 001. Learning objectives.mp4
    01:00
  • 002. 15.1 Examining Identification and Authentication.mp4
    07:46
  • 003. 15.2 Exploring Access Control.mp4
    11:30
  • 004. 15.3 Monitoring Access.mp4
    08:24
  • 005. 15.4 Real-world Auditing User Access Controls.mp4
    03:41
  • 006. Lesson 15 Review.mp4
    06:10
  • 001. Learning objectives.mp4
    01:15
  • 002. 16.1 Surveying Perimeter Security.mp4
    13:03
  • 003. 16.2 Managing Malware.mp4
    08:25
  • 004. 16.3 Security Endpoint.mp4
    07:23
  • 005. 16.4 Mobile Device Challenges.mp4
    06:06
  • 006. 16.5 Testing Network Infrastructure Security.mp4
    10:15
  • 007. 16.6 Real-world Auditing Infrastructure Security Controls.mp4
    03:47
  • 008. Lesson 16 Review.mp4
    06:39
  • 001. Learning objectives.mp4
    01:14
  • 002. 17.1 Demystifying Encryption.mp4
    09:00
  • 003. 17.2 Applying Asymmetric Encryption.mp4
    06:50
  • 004. 17.3 Examining Hashing and Digital Signatures.mp4
    07:51
  • 005. 17.4 Understanding Digital Certificates.mp4
    07:56
  • 006. 17.5 Identifying Cryptographic Protocols and Attacks.mp4
    06:48
  • 007. 17.6 Real-world Auditing Cryptographic Protocols.mp4
    03:47
  • 008. Lesson 17 Review.mp4
    07:20
  • 001. Learning objectives.mp4
    01:10
  • 002. 18.1 Examining Environmental Threats.mp4
    06:25
  • 003. 18.2 Securing People and Places.mp4
    06:18
  • 004. 18.3 Real-world Auditing Environmental and Physical Access.mp4
    03:57
  • 005. Lesson 18 Review.mp4
    04:33
  • 001. Module Intro.mp4
    01:13
  • 001. Module Intro.mp4
    01:29
  • 001. Module Intro.mp4
    01:29
  • 001. Module Intro.mp4
    01:38
  • 001. Module Intro.mp4
    01:56
  • 001. Module Intro.mp4
    00:23
  • 002. Lesson 19 Understanding the Exam Structure.mp4
    03:01
  • 003. Lesson 20 Test Taking Strategies.mp4
    03:49
  • 004. Lesson 21 What to Expect at the Testing Center.mp4
    03:05
  • 005. Lesson 22 Attaining and Maintaining Your CISA Certification.mp4
    01:33
  • 001. CISA (Certified Information Systems Auditor) Summary.mp4
    00:49
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 129
    • duration 12:17:41
    • English subtitles has
    • Release Date 2023/06/14

    Courses related to CISSP - Certified Information Systems Security Professional

    Courses related to Cyber Security

    Subtitle
    Personnel Security
    Pluralsight Kevin Henry
    Kevin Henry
    Personnel Security
    1:19:41
    English subtitles
    02/25/2023
    Subtitle
    Getting Started with OAuth 2.0
    Pluralsight Scott Brady
    Scott Brady
    Getting Started with OAuth 2.0
    2:00:01
    English subtitles
    12/02/2023
    Subtitle
    Cyber Resilience: An Overview

    Courses related to Network Security

    Subtitle
    Threat Hunting: Network Hunting
    Subtitle
    IT Professional Fundamentals: Security
    Subtitle
    Identity Management
    INEIdentity Management
    7:24:28
    English subtitles
    08/07/2023

    Courses related to Information Security

    Courses related to Cyber Security Awareness