Certified Information Systems Auditor (CISA)
4.2 (45 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
437 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Certified Information Systems Auditor (CISA) to your Wishlist.

Add to Wishlist

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA)
4.2 (45 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
437 students enrolled
Last updated 2/2017
English
Current price: $10 Original price: $200 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 12.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Ability to leverage standards, manage vulnerabilities.
  • Student will understand ensure compliance, offer solutions, institute controls and deliver value to an enterprise.
  • Understanding the Acquisition process and testing process
View Curriculum
Requirements
  • No prerequisites
  • It is helpful and recommended to understand CISSP, CISM
Description

CISA is to Audit what CPA and CA are to Accounting CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the June 2011 CISA exam administration. For purposes of these statements, the key terms "enterprise" and "organization" or "organizational" are considered synonymous.

Who is the target audience?
  • Science & Technology Professionals
  • Information System Auditors
  • Any person or business who needs help with Disaster Recovery Regulations
Students Who Viewed This Course Also Viewed
Curriculum For This Course
74 Lectures
12:36:20
+
Lesson 1
12 Lectures 02:04:25

Audit Process
10:58

Auditing Standards
14:26

Auditing Guidelines
13:35

Cobit Model
02:36


Internal Control Classifications
14:27

Planning
12:40

Program
07:14

Evidence
14:31


C S A Control Self- Assessment
07:53
+
Lesson 2
7 Lectures 53:29
IT Governance
07:27

Outsourcing and Governance
05:09

Evaluating IT Governance
12:36

Governance and Security Policies
12:10

Organizational Compliance
05:38

Outsourcing and Globalization
08:07

Outsourcing
02:22
+
Lesson 3
11 Lectures 02:15:53
System And Infrastructure
14:15


Project Management Tools- Part1
11:54

Project Management Tools- Part2
13:38

Applications
10:15

Agile Development
15:06

Monitoring And Controlling
10:38

Acquisition Process
10:59

Testing Process
14:18

Information Systems Maintenance Practices
12:54

Data Conversion Tools
08:32
+
Lesson 4
4 Lectures 32:20

Post Implementation Review
06:43

Periodic Review
09:31

System Maintenance
07:26
+
Lesson 5
11 Lectures 01:55:39
IT Service Delivery And Support
11:56

How To Evaluate Service Level Management Practices
03:33

Operations Management
13:03

Databases
09:49

Structured Query Language
10:20

Monitoring Performance
13:48


Patch Management
07:46

Incident Management
12:16

Hardware Component Types
12:59

Network Component Types
12:48
+
Lesson 6
26 Lectures 04:25:59
I S Auditor Technical Overview
11:17

Security Design
13:21

Monitoring Systems
13:40


Cryptography
08:02

Encryption
05:34

Asymmetric Encryption
11:08

Digital Certificate
14:05

Different Kinds of Attacks
12:08

Access Controls
11:44

Identification and Authentication
13:41

Physical Access Exposure
09:07

Environmental Security
13:49

Network Security Devices and Network Components
13:46


Virtual Private Networks
08:34

Voice System Risks
12:09

Intrusion Detection
04:12

Firewalls
11:10

Firewall Implementation
06:32

Network Access Protection
05:45

Honey Pot
03:46

Risks to Portable And Wireless Devices
11:28

Bluetooth
07:20

OSI Networking
13:03

Managing Data
08:22
+
Lesson 7
3 Lectures 28:35
Business Continuity and Disaster Recovery
10:52


Business Continuity and Disaster Recovery Regulations
10:07
About the Instructor
iCollege Certifications
4.1 Average rating
1,664 Reviews
11,239 Students
100 Courses
Certification Leader

iCollege is a leading international provider of E-Learning courses, learning technologies and development services.

Utilizing state of the art technologies, highly experienced consultants and innovative methodologies, we provide, cutting-edge education products, services and solutions for individuals, corporate organizations, governmental institutions and education providers.

Our collective knowledge and experience in education and training sets the standard for service delivery in learning solutions.