Companies Home Search Profile

CISA - Certified Information Systems Auditor

Focused View

Cybersecurity Certificates

7:54:16

60 View
  • 1. Introduction.mp4
    02:05
  • 2. CISA Certification.mp4
    02:44
  • 3. CISA Exam.mp4
    03:36
  • 4. CISA Course Outline.mp4
    02:41
  • 5. Audit Overview.mp4
    11:31
  • 1. GRC.mp4
    05:46
  • 2. GRC Tools.mp4
    03:01
  • 3. ITAF.mp4
    08:29
  • 4. Audit Scenario.mp4
    01:42
  • 5. Standards.mp4
    02:41
  • 6. Important Definitions.mp4
    02:27
  • 7. Senior Management and GRC.mp4
    07:25
  • 8. Senior Management and Risks.mp4
    06:42
  • 9. Organization Structure.mp4
    05:27
  • 1. Conduct an IS Audit.mp4
    09:11
  • 2. IS Audit Report and Presentation Samples.mp4
    04:54
  • 3. Information Asset Register.mp4
    06:09
  • 4. Audit Risk Assessment.mp4
    12:30
  • 5. Audit Planning and Management.mp4
    07:16
  • 6. Document Control.mp4
    03:23
  • 7. Business Process.mp4
    07:16
  • 8. Law and Regulation.mp4
    02:13
  • 9. Evidence.mp4
    05:49
  • 10. Sampling.mp4
    03:58
  • 11. Domain 1 Practice Questions.html
  • 1. IT Governance.mp4
    03:06
  • 2. Governance and Management of IT.mp4
    14:28
  • 3. NIST 800-100.mp4
    06:04
  • 4. Governance Requirements.mp4
    06:14
  • 5. Information System Strategy.mp4
    04:48
  • 6. IT Organization.mp4
    02:48
  • 7. Maintenance of Policies and Procedures.mp4
    04:59
  • 8. Policy and Procedures Resources.mp4
    24:42
  • 9. Legal Compliance.mp4
    08:38
  • 10. Quality Management System.mp4
    01:59
  • 11. Maturity Models.mp4
    03:22
  • 12. Process Optimization.mp4
    03:56
  • 13. IT Investment Practices.mp4
    05:34
  • 14. IT Supplier Selection.mp4
    05:15
  • 15. Make or Buy Decision.mp4
    18:12
  • 16. Risk Management.mp4
    10:53
  • 17. Business Impact Analysis.mp4
    10:38
  • 18. Domain 2 Practice Questions.html
  • 1. Information Systems Acquisition, Development and Implementation.mp4
    09:22
  • 2. Project Governance.mp4
    02:32
  • 3. Types of Organization.mp4
    06:38
  • 4. Project Management.mp4
    04:55
  • 5. Architecture.mp4
    05:36
  • 6. Procurement Management.mp4
    01:02
  • 7. Plan Procurement Management.mp4
    18:12
  • 1. Information System Operations.mp4
    06:51
  • 2. Service Level Management.mp4
    05:09
  • 3. Hardware, Software and Network.mp4
    07:32
  • 4. Software Licensing.mp4
    03:10
  • 5. Capacity Management.mp4
    02:49
  • 6. Incident Management.mp4
    05:35
  • 7. Incident Report Form.mp4
    05:33
  • 8. Backup.mp4
    05:59
  • 9. Disaster Recovery Plans.mp4
    03:34
  • 10. Alternative Sites.mp4
    08:09
  • 1. Protection of Information Assets.mp4
    07:09
  • 2. Access Control.mp4
    19:23
  • 3. Network Security.mp4
    17:05
  • 4. Cryptography.mp4
    16:30
  • 5. Physical Security.mp4
    09:48
  • 6. Data classification practices.mp4
    12:32
  • 7. Policies and Practices.mp4
    24:39
  • Description


    This course will help you learn how to audit, control, and secure information system & clear CISA certification

    What You'll Learn?


    • Info System Auditing: Learn techniques for effective control and governance of information systems.
    • IT Governance & Management: Ensure alignment of IT strategy with organizational goals and structures.
    • System Acquisition & Development: Master practices for acquiring and developing information systems.
    • Protection of Information Assets: Implement controls for information security and privacy.
    • Risk Management & Compliance: Grasp frameworks for managing IT risks and ensuring legal compliance

    Who is this for?


  • Information Systems Auditors
  • IT Professionals
  • Security Professionals
  • Compliance Officers and Risk Managers
  • What You Need to Know?


  • No prior knowledge or experience is required. We will teach you everything from basics to pass the CISA Exam.
  • More details


    Description

    The Certified Information Systems Auditor (CISA) Training Course is a comprehensive program designed to equip individuals with the knowledge and skills necessary to excel in the field of information systems auditing, control, and security. This course is tailored for professionals who aim to pursue a career as IT auditors or enhance their expertise in assessing and ensuring the security and compliance of IT systems within organizations.

    Throughout the course, participants will delve into various topics essential to the practice of IT auditing, including IT governance, risk management, control frameworks, and the auditing process. They will gain a deep understanding of industry best practices and internationally recognized standards, enabling them to identify and mitigate risks, evaluate control effectiveness, and provide valuable insights and recommendations to improve IT systems and processes.

    Key Course Highlights:

    1. IT Governance and Management: Participants will explore the principles of IT governance, strategic alignment, and the roles and responsibilities of IT within an organization. They will learn how to align IT goals with business objectives, establish effective IT policies and procedures, and manage IT resources efficiently.

    2. Risk Assessment and Management: The course will cover various aspects of risk assessment and management, including risk identification, analysis, and response strategies. Participants will understand how to evaluate and prioritize risks, develop risk management frameworks, and implement appropriate controls to mitigate identified risks.

    3. Control Frameworks and Standards: Participants will be introduced to widely recognized control frameworks and standards, such as COBIT (Control Objectives for Information and Related Technologies), ISO/IEC 27001, and COSO (Committee of Sponsoring Organizations of the Treadway Commission). They will learn how to assess control frameworks, apply control objectives, and ensure compliance with relevant regulations and standards.

    4. Auditing Processes and Techniques: The course will provide comprehensive insights into the auditing process, including planning, execution, and reporting. Participants will learn auditing techniques, data collection methods, and how to evaluate control effectiveness. They will gain hands-on experience in conducting risk-based audits and performing IT control testing.

    5. Information Systems Operations and Business Resilience: Participants will understand the key aspects of information systems operations, including system development, acquisition, and maintenance. They will also explore business resilience, disaster recovery planning, and incident response strategies to ensure business continuity in the face of disruptions.

    6. Ethics and Professional Conduct: The course emphasizes the importance of professional ethics and conduct in the field of IT auditing. Participants will learn about the ISACA Code of Professional Ethics and other relevant guidelines, focusing on integrity, confidentiality, and professional competence.

    By the end of this training course, participants will be well-prepared to undertake the CISA certification exam, as administered by ISACA. They will possess the knowledge and skills necessary to excel in the field of information systems auditing, control, and security, and will be equipped to contribute effectively to the security and compliance of IT systems within organizations.

    Who this course is for:

    • Information Systems Auditors
    • IT Professionals
    • Security Professionals
    • Compliance Officers and Risk Managers

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Cybersecurity Certificates
    Cybersecurity Certificates
    Instructor's Courses
    There will be 3.5 million unfilled cyber security jobs globally, and of the candidates who are applying for these positions, fewer than one in four are even qualified, according to the MIT Technology Review. Cybersecurity Certificates gives you an opportunity to become an industry-ready cyber security professional with advanced cyber security training programs to help you earn certification in this domain. Our self-placed certification courses provide a high-engagement learning experience with real-world applications. Each course has been designed for individuals who want to start a new and satisfying career in cyber security.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 65
    • duration 7:54:16
    • Release Date 2023/08/01