Companies Home Search Profile

The Ultimate CISA Journey

Focused View

Sheikh M Faizan Saleem

5:20:21

38 View
  • 1 - Introduction.mp4
    01:13
  • 2 - What is IS Audit.mp4
    01:02
  • 3 - Audit Universe.mp4
    01:15
  • 4 - Controls.mp4
    00:57
  • 5 - Controls and it Types.mp4
    02:26
  • 6 - IT Standards Polices and Procedures.mp4
    01:44
  • 7 - IS Auditors Roles and Responsibilities.mp4
    01:50
  • 8 - Process of IS Audit.mp4
    02:10
  • 9 - Planning an IS Audit.mp4
    02:11
  • 10 - Developing an IS Audit Plan.mp4
    02:43
  • 11 - Follow up on IS Audit.mp4
    02:22
  • 12 - Water Marking.mp4
    01:52
  • 13 - Control Self Assessment CSA.mp4
    02:43
  • 14 - Electronic Data Interchange EDI.mp4
    02:46
  • 15 - Evidence and Fraud Detection.mp4
    02:32
  • 16 - CAATs.mp4
    02:36
  • 17 - CAATs VS Auditor.mp4
    02:31
  • 18 - Audit Charter.mp4
    01:16
  • 19 - Types of Risk.mp4
    03:10
  • 20 - What is Risk.mp4
    02:15
  • 21 - Managing IS Audit.mp4
    01:00
  • 22 - IS Audit Life Cycle.mp4
    01:35
  • 23 - Introduction.mp4
    03:33
  • 24 - Governance and Management of IT.mp4
    03:13
  • 25 - What is Governance.mp4
    04:00
  • 26 - IT Governance.mp4
    03:26
  • 27 - Governance vs Management.mp4
    03:36
  • 28 - IT Frameworks.mp4
    04:25
  • 29 - Organisational Structure.mp4
    01:17
  • 30 - IT Resource Management.mp4
    01:27
  • 31 - Control Identification.mp4
    09:21
  • 32 - Technical Controls.mp4
    02:35
  • 33 - Administrative Controls.mp4
    02:42
  • 34 - IT Performance Management.mp4
    00:17
  • 35 - IT Service Provider Acquisition and Management.mp4
    03:02
  • 36 - IT Performance and Reporting.mp4
    02:02
  • 37 - Quality Assurance And Management.mp4
    03:25
  • 38 - Business Feasibility Analysis.mp4
    02:09
  • 39 - System Development Methodologies.mp4
    02:40
  • 40 - ERM.mp4
    03:11
  • 41 - Auditors Role.mp4
    03:09
  • 42 - SoD.mp4
    03:07
  • 43 - Closing the Right Supplier.mp4
    03:24
  • 44 - BPR.mp4
    03:01
  • 3 - Domain 3 Final Assessment.html
  • 45 - Information System Aquisition Development Implementation.mp4
    02:29
  • 46 - Project Governance and Management.mp4
    04:13
  • 47 - Feasibility Analysis.mp4
    02:10
  • 48 - Business Case Analysis.mp4
    02:28
  • 49 - System Development Methodologies.mp4
    05:00
  • 50 - Information System Aquisition.mp4
    03:20
  • 51 - Planning Phase ISADI.mp4
    02:43
  • 52 - Acquisition Phase ISADI.mp4
    02:28
  • 53 - Control Identification.mp4
    01:56
  • 54 - Control Design.mp4
    03:48
  • 55 - Access Control.mp4
    06:08
  • 56 - Application Controls.mp4
    05:17
  • 57 - Configuration Management.mp4
    02:50
  • 58 - System Migration.mp4
    02:42
  • 59 - Release Management.mp4
    03:39
  • 60 - Development Phase ISADI.mp4
    02:29
  • 61 - Maturity Model.mp4
    05:26
  • 62 - Implementation Phase ISADI.mp4
    02:36
  • 63 - Post Implementation Review PIR.mp4
    07:30
  • 64 - Conclusion.mp4
    02:00
  • 65 - What to expect.mp4
    03:57
  • 66 - Common Technologies and Architecture.mp4
    01:48
  • 67 - End User Computing.mp4
    04:13
  • 68 - Data Governance.mp4
    02:19
  • 69 - Data Conversion.mp4
    02:14
  • 70 - Problem Incident Management.mp4
    01:17
  • 71 - Change Configuration Release and Patch Management.mp4
    02:13
  • 72 - IT Service Level Management SLM.mp4
    01:25
  • 73 - Database Management.mp4
    01:54
  • 74 - Business Resilience.mp4
    02:14
  • 75 - System Resilience.mp4
    01:46
  • 76 - Business Impact analysis BIA.mp4
    01:33
  • 77 - Disaster Recovery Plan DRP.mp4
    05:01
  • 78 - BCP.mp4
    02:52
  • 79 - IS Operations.mp4
    03:07
  • 80 - Data Backup Storage and Restore.mp4
    01:38
  • 81 - Automation.mp4
    04:22
  • 82 - System Performance Management.mp4
    02:14
  • 83 - IT Management.mp4
    06:32
  • 84 - Clusters.mp4
    03:25
  • 85 - ClientServer Architecture.mp4
    03:24
  • 86 - Protocols.mp4
    03:55
  • 87 - RAID.mp4
    05:48
  • 88 - RPO vs RTO.mp4
    05:08
  • 89 - EMI and Attenuation.mp4
    03:57
  • 90 - Capacity Management.mp4
    02:24
  • 91 - Introduction.mp4
    01:58
  • 92 - INFORMATION ASSET SECURITY FRAMEWORKS STANDARDS AND GUIDLINES.mp4
    01:27
  • 93 - Identity Access Management IAM.mp4
    01:34
  • 94 - Network End Point Security.mp4
    01:31
  • 95 - Data Classification.mp4
    01:18
  • 96 - Encryption And Related Techniques.mp4
    01:39
  • 97 - Public Key Infrastructure PKI.mp4
    02:07
  • 98 - Web Based Communication Technologies.mp4
    00:50
  • 99 - Virtualization Environment.mp4
    01:14
  • 100 - Security Event Management SEM.mp4
    01:21
  • 101 - Security Awareness Training.mp4
    01:23
  • 102 - IS Attack Methodologies and Techniques.mp4
    01:29
  • 103 - Security Tools and Techniques.mp4
    01:39
  • 104 - Evidence Collection and Forensics.mp4
    01:49
  • 105 - Dead man doors.mp4
    02:11
  • 106 - Biometrics.mp4
    02:20
  • 107 - SSO and Kerberos.mp4
    03:07
  • 108 - Asymmetric Key Encryption.mp4
    01:23
  • 109 - Symmetric Key Encryption.mp4
    00:40
  • 110 - OSI Model.mp4
    03:23
  • 111 - Data Classification.mp4
    01:40
  • 112 - VoIP.mp4
    01:42
  • 113 - BOMBS.mp4
    02:02
  • 114 - XSS Parameter Tampering and Spear Phishing.mp4
    02:33
  • 115 - Sateful Firewall.mp4
    01:29
  • 116 - Pen Testing.mp4
    02:18
  • 117 - Forensics.mp4
    03:47
  • 118 - INFORMATION ASSET SECURITY AND CONTORLS.mp4
    01:35
  • 119 - PRIVACY PRINCIPLE.mp4
    03:49
  • Description


    Comprehensive CISA Exam Prep with Real-World Scenarios

    What You'll Learn?


    • IT infrastructure and implementing controls
    • Merging their IT systems with top-line business goals
    • Security, control, management and IT infrastructure development
    • Develop and implement the outline of a firm’s systems
    • Be able to develop strategies for preventing and responding to cyber-attacks.
    • Able to evaluate the security of information systems and develop strategies for protecting sensitive information

    Who is this for?


  • If you enjoy working with IT and you’re always itching to learn what’s next, becoming a CISA could be an excellent career fit. Consider the benefits to earning your CISA, and you’ll be on the pathway to career success.
  • CISA Exam and continuing education requirements equip you with the tools and skills to keep pace. The CISA is for you if you crave variety in your work and want to dance on that ever-moving ledge where IT is revolutionizing business functions. In particular, more accounting functions are operating through information systems. The CISA-certified IT auditor remains agile in a forward-thinking field.
  • Incorporating IT into business functions offers rewards in efficiencies, but it also elevates the risks involved. Employers see CISA holders as the IT auditors best qualified to mitigate those risks, and they’re willing to pay a premium for those safeguards. CISA certificate holders make between $83,677 and $107,342 a year, according to PayScale. Security consultants earn between $67,860 and $106,407, while IS auditors earn between $59,647 and $82,159 a year. If you leverage your CISA certificate to become an internal audit director, your salary can climb to $136,082 a year.
  • IT professionals looking to advance their careers in the field of cybersecurity, IT audit, and governance will benefit from this course.
  • IT security professionals looking to broaden their knowledge and understanding of information systems audit will benefit from this course.
  • IT managers looking to understand the best practices for managing and overseeing IT operations will find this course valuable.
  • This course is designed to prepare individuals for the CISA exam and help them clear it in their first attempt.
  • What You Need to Know?


  • With the CISA, you’re riding the wave of IT auditing. You earn a credential that’s globally recognized, respected by employers and offers a golden ticket to a prestigious, lucrative career. The sooner you start studying for and pass the CISA Exam, the sooner you’ll be ready to make the big career moves.
  • More details


    Description

    Are you ready to take your career in IT to the next level? Look no further than the Ultimate CISA Mastery Course! Join me, as I guide you through the challenging journey of becoming a Certified Information Systems Auditor.

    From the basics of information systems audit to the intricacies of IT governance and security, this comprehensive course will equip you with the knowledge and skills you need to succeed. You'll dive into each of the five domains of CISA and take challenging quizzes to assess your understanding. And when you're ready, the grand final assessment will test your mastery of the course and prepare you for the real-life scenario of the CISA exam.

    But this course is not just about passing the exam. It's about becoming an expert in the field of information systems audit and opening up a world of opportunities in the field of cybersecurity, IT audit, and governance. With my guidance, you'll gain a deep understanding of the best practices for auditing information systems, managing and overseeing IT operations, and protecting sensitive information.

    So why wait? Unleash your potential and join me on this exciting journey to become a Certified Information Systems Auditor. Enroll now and start your journey towards mastery today!

    Who this course is for:

    • If you enjoy working with IT and you’re always itching to learn what’s next, becoming a CISA could be an excellent career fit. Consider the benefits to earning your CISA, and you’ll be on the pathway to career success.
    • CISA Exam and continuing education requirements equip you with the tools and skills to keep pace. The CISA is for you if you crave variety in your work and want to dance on that ever-moving ledge where IT is revolutionizing business functions. In particular, more accounting functions are operating through information systems. The CISA-certified IT auditor remains agile in a forward-thinking field.
    • Incorporating IT into business functions offers rewards in efficiencies, but it also elevates the risks involved. Employers see CISA holders as the IT auditors best qualified to mitigate those risks, and they’re willing to pay a premium for those safeguards. CISA certificate holders make between $83,677 and $107,342 a year, according to PayScale. Security consultants earn between $67,860 and $106,407, while IS auditors earn between $59,647 and $82,159 a year. If you leverage your CISA certificate to become an internal audit director, your salary can climb to $136,082 a year.
    • IT professionals looking to advance their careers in the field of cybersecurity, IT audit, and governance will benefit from this course.
    • IT security professionals looking to broaden their knowledge and understanding of information systems audit will benefit from this course.
    • IT managers looking to understand the best practices for managing and overseeing IT operations will find this course valuable.
    • This course is designed to prepare individuals for the CISA exam and help them clear it in their first attempt.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Sheikh M Faizan Saleem
    Sheikh M Faizan Saleem
    Instructor's Courses
    As a seasoned professional with over a decade of experience in the field of Information Technology, I have honed my skills in Full Stack Development, Mobile App Development, Cloud Computing, ERP Systems, Data Science, and Machine Learning Engineering, I am also an Information Systems auditor and a proud member of ISACA.Currently, I am working in the Fintech industry and have honed my skills through self-taught learning. My passion for technology and drive for continuous learning has led me to new heights in my career. I believe in sharing my experiences and knowledge to help others accelerate their careers. That's why I am eager to assist students in their own journey to become successful technology professionals.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 119
    • duration 5:20:21
    • Release Date 2023/12/16

    Courses related to Cyber Security

    Subtitle
    Biometrics Security Professional (CBSP) Part - 6
    Subtitle
    Specialized Testing: SQL Injection
    Subtitle
    Dridex Banking Trojan
    Pluralsight Josh Stroschein
    Josh Stroschein
    Dridex Banking Trojan
    1:57:44
    English subtitles
    12/08/2022

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Cyber Security Awareness