Companies Home Search Profile

CISA Domain 3 Training-Information System Acquisition ' 2023

Focused View

Experts Learn | Cyvitrix

5:46:08

68 View
  • 1. 1-CISA0-Welcome to the Course.mp4
    02:03
  • 2. 2-CISA0-What is CISA Certification.mp4
    05:45
  • 3. 1-CISA3-Introduction to domain 3.mp4
    03:53
  • 1. 2-CISA3-Computing device components.mp4
    20:31
  • 2. 3-CISA3-Computing device forms and types of OS and Platforms.mp4
    19:05
  • 3. 4-CISA3-Application architecture and Network architecture.mp4
    23:43
  • 4. 5-CISA3-Software types and license types.mp4
    12:09
  • 5. 6-CISA3-Intellectual Property.mp4
    07:32
  • 1. 7-CISA3-The Process of Acquiring New technology.mp4
    17:55
  • 2. 8-CISA3-Feasibility Analysis and Business Case.mp4
    04:30
  • 3. 9-CISA3-Request for proposal and Budget and Bidding.mp4
    04:50
  • 4. 10-Project vs Program, PMO vs PM.mp4
    12:32
  • 5. 11-CISA3-Project Planning and Objective Breakdown techniques.mp4
    07:37
  • 6. 12-CISA3-Project Cost & Size Estimation.mp4
    07:43
  • 7. 13-CISA3-Project Scheduling and Monitoring Tools.mp4
    12:45
  • 8. 14-CISA3-Project Closure Activities.mp4
    02:37
  • 9. 15-CISA3-Auditors roles in Project Review.mp4
    04:17
  • 1. 16-CISA3-Software development Process.mp4
    08:57
  • 2. 17-CISA3- Coding example and OOSD and CBD.mp4
    09:02
  • 3. 18-CISA3-Software development methodologies overview.mp4
    16:31
  • 4. 19-CISA3-Use case vs Abuse case in development.mp4
    04:07
  • 5. 20-CISA3-Software Re-Engineering and Reverse Engineering.mp4
    03:54
  • 6. 21-CISA3-Application Controls.mp4
    16:21
  • 7. 22-CISA4-DevOps and CICD.mp4
    07:06
  • 8. 23-CISA4-DevSecOps.mp4
    08:04
  • 1. 24-CISA3-Software Testing 1.mp4
    14:59
  • 2. 25-CISA3-Software Testing 2.mp4
    03:25
  • 3. 26-CISA3-Certification vs Accreditation.mp4
    03:37
  • 4. 27-CISA3-Release Management.mp4
    10:07
  • 5. 28-CISA3-Software Implementation.mp4
    07:09
  • 6. 29-CISA3-Post Implementation Review.mp4
    02:57
  • 7. 30-CISA3-Software Maintenance Activities.mp4
    05:17
  • 1. 31-CISA3-Change Management Process.mp4
    06:52
  • 2. 32-CISA3-Types of Changes.mp4
    06:14
  • 3. 33-CISA3-Configuration Management.mp4
    05:39
  • 4. 34-CISA3-Version Control System - VCS.mp4
    03:27
  • 5. 35-CISA3-Securing the Applications source code.mp4
    04:20
  • 6. 36-CISA3-Patch Management and Vulnerability Management.mp4
    03:10
  • 7. 37-CISA3-Auditors roles in software projects auditing.mp4
    08:13
  • 1. 38-CISA3-Domain 3 Questions Part 1.mp4
    10:11
  • 2. 39-CISA3-Domain 3 Questions Part 2.mp4
    07:02
  • 1. Exam 1 - Domain 3.html
  • 2. Exam 2 - Domain 3.html
  • Description


    Information System Acquisition and Development - ISACA CISA Training ' 2023

    What You'll Learn?


    • Become an Information System Auditor or information Security Professional, Achieve your career goals by getting all that you need to know to support your way!
    • Learn the fundamentals of IT Audit and Key aspects of Internal and External Auditing
    • Understand the Process of Information System Acquisition and IT Project Management metrics!
    • Understand Software development, Software testing, changeover and management, and configuration management process.

    Who is this for?


  • Security analysts, GRC Analysts and Managers
  • Students who need to gain understanding in Infosec and cybersecurity
  • People who are interested in pursuing this certification
  • Accountants and financial analysts
  • IT Manager, and Analysts who want to understand and advance their career
  • Auditors and Risk practitioners and compliance specialists
  • Anyone interested in the subject of the training
  • What You Need to Know?


  • No requirements, everything will be explained from scratch, however basic understanding for IT and Security will be beneficial to keep the pace!
  • More details


    Description

    Welcome to our ALL New CISA Course - Domain 3 + Practice Exams

    CISA stands for Certified Information Systems Auditor. It is a globally recognized certification in the field of information security auditing, assurance, and control. This certification is awarded by the Information Systems Audit and Control Association (ISACA) to professionals who demonstrate proficiency in auditing, monitoring, controlling, and assessing information systems and technology. CISA certification validates the knowledge and skills required to evaluate and manage information systems and provides a competitive edge to professionals seeking career growth in the field of information security.


    If you pursue the Information System Auditing role or Information Security assurance role, this course will be your best guide to gain all the required information and practices that will help you elevate and build your career.


    Our CISA Course is up to date, and relevant to CISA CRM version 27 as of July 2023, ISACA announced the new revised version of CISA will be released by 2024, and the updates that the new version may include will be considered in this training as well.


    CISA domains are as follows:

    1. The Process of Auditing Information Systems

    - This domain covers the internal and external audit processes, including audit planning, execution, reporting, and follow-up.

    2. Governance and Management of IT

    - This domain focuses on the management of IT resources, including policies, procedures, standards, and organizational structure.

    3. Information Systems Acquisition, Development, and Implementation

    - This domain covers the process of acquiring, developing, and implementing information systems, including project management, system development life cycle, and change management.

    4. Information Systems Operations, Maintenance, and Support

    - This domain covers the ongoing operations and maintenance of information systems, including incident management, service management, and asset management.

    5. Protection of Information Assets

    - This domain covers the protection of information assets, including information security, access controls, encryption, and physical security.


    Secure Your Future with Cyvitrix

    In today's digital age, cybersecurity and information security are no longer optional. With an increasing amount of sensitive information being stored and shared online, the need for top-notch security has never been greater. Welcome to Cyvitrix, your ultimate resource for comprehensive and cutting-edge cybersecurity courses.

    At Cyvitrix, we understand that knowledge is power — power to protect, power to prevent, and power to prosper. Our wide range of courses caters to everyone, from beginners who want to understand the basics to professionals seeking advanced skills to stay ahead of the curve.


    Why train with Cyvitrix?

    Industry-Relevant Curriculum: We constantly update our courses to reflect the latest threats and trends in cybersecurity. You'll learn how to deal with real-world scenarios, preparing you for the challenges you'll face in the field.


    Expert Instructors: Our courses are taught by industry veterans with years of experience in cybersecurity and information security. They're not just teachers, they're practitioners who have been in the trenches.


    Flexible Learning: We believe in making learning accessible. Whether you prefer to study at your own pace online or enjoy the intensity of live online classes, we've got you covered.


    Certification: Upon completion of our courses, you'll receive a Cyvitrix certification, a testament to your newfound skills and a valuable addition to your professional profile.


    Community: Join a network of like-minded learners and experts. Share insights, ask questions, and build connections in our vibrant community.


    Whether you're looking to advance your career, start a new one, or simply enhance your understanding of cybersecurity, Cyvitrix is your trusted partner on this journey. With our courses, you're not just investing in education; you're investing in your future.


    Take the first step towards empowering your digital life. Enroll in a Cyvitrix course today.


    At Cyvitrix, we provide Training courses that help you as students to conquer and pass your certification exams from the first attempt.


    Our courses are designed to provide you with all that you need in order not only to pass the exam but also to apply this knowledge to elevate and support your career objectives.


    Why training with us is ideal for you?

    - Excellent quality video content

    - High courses quality

    - Organized materials

    - Real-life scenarios and examples

    - Practice questions and question ideas

    - Up-to-date content

    - Reasonable pricing


    Disclaimer

    THIS COURSE CONTAINS NOT ONLY ISACA'S BLUEPRINT FOR THE CISA EXAMINATION BUT ALSO SUPPLEMENTARY VIDEOS AND ARTICLES TO MAKE YOU MASTER THE SUBJECT, THIS COURSE IS VERY LOW-LEVEL.


    The objective of this course is to support and supplement the content of ISACA’s official resources. This course is not meant to replace the CISA Review Manual and Question, Answer, and Explanation Manual.


    Who this course is for:

    • Security analysts, GRC Analysts and Managers
    • Students who need to gain understanding in Infosec and cybersecurity
    • People who are interested in pursuing this certification
    • Accountants and financial analysts
    • IT Manager, and Analysts who want to understand and advance their career
    • Auditors and Risk practitioners and compliance specialists
    • Anyone interested in the subject of the training

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Experts Learn | Cyvitrix
    Experts Learn | Cyvitrix
    Instructor's Courses
    At Cyvitrix, we provide Training courses that help you as students to conquer and pass your certification exams from first attempt.Our courses are designed to provide you all what you need in order not only to pass the exam, but also to apply this knowledge to elevate and support your career objectivesWhy training with us is ideal for you?- Excellent quality video content- High courses quality- Organized materials- Real life scenarios and examples- Practice questions and questions ideas- Up to date content- Instructor is available to answer all questions you might get- Reasonable pricingHere are 10 reasons why you should train with me as your cyber-security trainer:Expertise: With years of experience working in the cyber-security field, I bring a wealth of knowledge and expertise to my courses. I stay up-to-date with the latest trends and best practices in the industry, and I am dedicated to sharing this knowledge with my students.Comprehensive Training: My courses cover a wide range of cyber-security topics, including network security, cloud security, data protection, threat detection, and incident response. This ensures that learners have a well-rounded understanding of the cyber-security landscape.Practical Insights: My courses are designed to be practical and actionable, with a focus on real-world scenarios and challenges. I provide hands-on exercises and case studies that help learners apply their knowledge and skills in a practical setting.Accessibility: My courses are accessible to learners of all skill levels and backgrounds. I use clear and concise language, and I provide explanations and examples that are easy to understand.Engaging Instruction: I use a variety of teaching methods, including lectures, interactive exercises, and quizzes, to keep learners engaged and motivated. My courses are designed to be dynamic and interesting, with a focus on active learning.Flexibility: My courses are self-paced, which means learners can complete them at their own pace and on their own schedule. This makes it easy for busy professionals to fit training into their busy schedules.Support: I am always available to answer questions and provide support to my students. I am dedicated to helping learners succeed, and I offer personalized support to ensure that students get the most out of their training.Collaboration: I encourage collaboration and communication among learners, which helps to foster a sense of community and support. I provide opportunities for learners to connect with each other and share their experiences and insights.Soft Skills Training: In addition to technical skills, I emphasize the importance of soft skills such as critical thinking, problem-solving, and communication. These skills are essential for success in the security field, and I provide training and guidance on how to develop them.Affordability: My courses are affordable and offer exceptional value for the price. I believe that everyone should have access to quality cyber-security training, and I strive to make my courses accessible to as many learners as possible.As a cyber-security trainer on Udemy, I am committed to helping learners develop the knowledge and skills they need to succeed in the cyber-security field. I am dedicated to providing high-quality training that is relevant, engaging, and practical, and I am always available to answer questions and provide support to my students.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 41
    • duration 5:46:08
    • Release Date 2023/10/12