Certified In Information System Audit (Cisa) By ISACA



Last updated 4/2022
MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.32 GB | Duration: 17h 0m


CISA by Hemang Doshi
What you’ll learn
Certified Information System Audits (ISACA -CISA) Lectures
Contains all the 5 Domains of CISA Review Manual
Candidate will able to understand practical aspects of Information System Audit
Candidate will able to confidently attempt and pass the CISA exam
Requirements
No prior knowledge or experience is required. We will teach you everything from basics to pass the CISA Exam.
Description
Please note that objective of this course is to support and supplement the content of the ISACA’s official resources. This course is not meant to replace CISA Review Manual and Question, Answer and Explanation Manual. Candidates are strongly advised to use ISACA’s official resource as prime resource to study for CISA exam. This course will help you to decipher the technicities used in official resources. This course is designed on the basis of official resources of ISACA. It covers all the 5 domains of CISA Review Manual. Topics are arranged segment wise and aligned with latest CISA Review Manual.Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:(1) Whether content has capability to engage the audience throughout?(2) Whether content is able to convey the meaning of CISA Review Manual (CRM) in a effective manner.(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.Features of this course are as follow:This course is designed on the basis of official resources of ISACA.Course is designed specifically for candidates from non-technical background.Topics are arranged segment wise and aligned with latest CISA Review Manual. Exam oriented practice questions and practical example for CISA aspirants.Flashcards based learning mode.Use of smartarts for easy learningMore than 1000 plus practice questions
Overview
Section 1: Information System Auditing Process
Lecture 1 1.1.1 Audit Planning
Lecture 2 1.1.2 Audit Charter
Lecture 3 1.2 Electronic Data Interchange (EDI)
Lecture 4 1.3 Types of Controls
Lecture 5 1.4.1 What is Risk?
Lecture 6 1.4.2 Understanding Vulnerabilities and threats
Lecture 7 1.4.3 Types of Risks
Lecture 8 1.4.4 Risk response methodology
Lecture 9 1.4.5 Key Aspects – Risk based Audit Planning
Lecture 10 1.4.6 QAE – Risk based Audit Planning
Lecture 11 1.6.1 Key Aspects – Audit Project Management
Lecture 12 1.6.2 QAE – Audit Project Management
Lecture 13 1.7.1 Sampling Methodology
Lecture 14 1.7.2 Compliance and Substantive Testing
Lecture 15 1.8 Audit Evidence Collection Techniques
Lecture 16 1.9.1 Continous Auditing Techniques
Lecture 17 1.9.2 Data Analytics
Lecture 18 1.10 Reporting and Communication Techniques
Lecture 19 1.11 Control Self Assessment
Section 2: Domain 2 – Governance and Management of IT
Lecture 20 2.1.1 Key Aspects Enterprise Governance of Information and Technology
Lecture 21 2.1.2 QAE Enterprise Governance of Information and Technology
Lecture 22 2.3.1 IT Standards, Policies and Procedures
Lecture 23 2.3.2 Approaches for Policy Development (Top down & Bottom up)
Lecture 24 2.4.1 Organizational Structure – Roles and Responsibility of Various Functions
Lecture 25 2.4.2 IT Strategy & Steering Commitee
Lecture 26 2.5 Enterprise Architecture
Lecture 27 2.6.2 Risk Treatment
Lecture 28 2.6.1 Risk Analysis Methods
Lecture 29 2.6.3 Enterprise Risk Management.
Lecture 30 2.7 Maturity Models
Lecture 31 2.8 Laws, Regulations and Industry Standards Affecting the Organization
Lecture 32 2.9 IT Resource Management Training Scheduling and Time Reporting Terms and Cond
Lecture 33 2.10 IT Service Provider Acquisition and Management
Lecture 34 2.11.1 IT Performance Monitoring and Reporting
Lecture 35 2.11.2 Balanced Score Card
Lecture 36 2.12 Quality Assurance and Quality Management of IT
Section 3: Domain 3 – Information Systems Acquisition, Development and Implementation
Lecture 37 3.1.1 Project Evaluation Methods
Lecture 38 3.1.2 Project Management Structure
Lecture 39 3.2 Business Case and Feasibility Analysis
Lecture 40 3.3.1 Agile System Development Methodology
Lecture 41 3.3.2 Object Oriented system development methodology
Lecture 42 3.3.3 Prototype & Rapid Application Development (RAD)
Lecture 43 3.3.4.1 Key Aspects – System Development Methodologies
Lecture 44 3.3.4.2 QAE – System Development Methodologies
Lecture 45 3.4.1 Check Digit
Lecture 46 3.4.2 Parity Bit, Checksum and CRC
Lecture 47 3.4.3.1 Key Aspects – Control Identification and Design and Balancing
Lecture 48 3.4.3.2 QAE – Control Identification and Design and Balancing
Lecture 49 3.5 Testing Methodologies
Lecture 50 3.7 System Migration, Infrastructure Deployment and Data Conversion
Lecture 51 3.8 Post-implementation Review
Section 4: Domain 4 – Information Systems Operations, Maintenance and Support
Lecture 52 4.1.1 RFID
Lecture 53 4.2 IT Asset Management
Lecture 54 4.3 Job Scheduling and Production Process Automation
Lecture 55 4.5 End-user Computing
Lecture 56 4.7 Systems Performance Management
Lecture 57 4.8.1 Problem and Incident Management
Lecture 58 4.8.2 Network Management Tools
Lecture 59 4.9 Change, Configuration, Release and Patch Management
Lecture 60 4.10 IT Service Level Management
Lecture 61 4.11.1 Relational database model
Lecture 62 4.11.2 Database Normalization
Lecture 63 4.11.3 Database checks and controls
Lecture 64 4.11.4 DBA Roles and Responsibilites & SoD
Lecture 65 4.11.5 Database Management
Lecture 66 4.12 Business Impact Analysis
Lecture 67 4.13 System Resiliency
Lecture 68 4.15.2 Business Continuity Plan
Lecture 69 4.16.1 Types of Backup
Lecture 70 4.16.2 RTO & RPO
Lecture 71 4.16.3 Alternate Recovery Site
Lecture 72 4.16.4 Disaster Recovery Plans
Lecture 73 4.16.5 DRP – Test Methods
Section 5: Domain 5 – Protection of Information Assets
Lecture 74 5.1 Information Security Management Framework
Lecture 75 5.2 Privacy Principles
Lecture 76 5.3.1 Physical Access and Environmental Controls
Lecture 77 5.3.2 Fire Supression Systems
Lecture 78 5.4.1 Single Sign On
Lecture 79 5.4.2 Factor of Authentication
Lecture 80 5.4.3.1 Key Aspects – Identity and Access Management
Lecture 81 5.4.3.2 QAE 1 – Identity and Access Management
Lecture 82 5.4.3.3 QAE 2 – Identity and Access Management
Lecture 83 5.5.1 Biometrics
Lecture 84 5.5.2 OSI Layers
Lecture 85 5.5.3 Firewall Types
Lecture 86 5.5.4 Firewall Implementation
Lecture 87 5.5.5 Virtual Private Network
Lecture 88 5.5.6 Network LAN Components
Lecture 89 5.5.7 Network Physical Devices
Lecture 90 5.5.8 Voice over Internet Protocols (VoIP)
Lecture 91 5.5.9 Wireless Network
Lecture 92 5.5.10 Email Security
Lecture 93 5.6 Classification of Information Assets
Lecture 94 5.7 Data Encryption and Encryption-related Techniques
Lecture 95 5.8 Public Key Infrastructure
Lecture 96 Cloud Computing
Lecture 97 5.12 Security Awareness Training and Programs
Lecture 98 5.13.1 Information System Attack Methods and Techniques
Lecture 99 5.13.2 Key Aspects – Information System Attack Methods and Techniques
Lecture 100 5.13.3 QAE – Information System Attack Methods and Techniques
Lecture 101 Security Testing Tools and Techniques
Lecture 102 5.15 IDS & IPS
Lecture 103 5.16 Incident Response Management
Lecture 104 5.17 Evidence Collection and Forensics
Section 6: Practice Questions
IT Auditor, System Auditor,Risk Manager,Information Security Professional

Homepage

https://www.udemy.com/course/certified-in-information-system-audit/

Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


DOWNLOAD FROM RAPIDGATOR.NET
DOWNLOAD FROM RAPIDGATOR.NET

DOWNLOAD FROM UPLOADGIG.COM
DOWNLOAD FROM UPLOADGIG.COM

DOWNLOAD FROM NITROFLARE.COM
DOWNLOAD FROM NITROFLARE.COM

Links are Interchangeable – No Password – Single Extraction