Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
Office Productivity Microsoft Windows Server

Certified Information Systems Auditor (CISA) (Part 2 of 2)

Certified Information Systems Auditor (CISA) Certification Prep Course
Bestseller
Rating: 4.4 out of 54.4 (268 ratings)
4,167 students
Created by Stone River eLearning
Last updated 9/2018
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • After successfully completing this course, the students will be able to understand the six domains covered in the CISA exam:
  • IT audit process
  • IT governance
  • Systems and infrastructure lifecycle management
  • IT service delivery and support
  • Protection of information assets
  • Business continuity and disaster recovery

Requirements

  • The course requires the candidates to have systems administration experience, familiarity with networking fundamentals such as TCP/IP, and an understanding of UNIX, Linux, and Windows operating systems.
  • This is an advanced level course and requires the students to have basic concepts and knowledge of the IT security and a minimum of 3-5 years practical experience.

Description


The Certified Information Systems Auditor (CISA) course covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.

** This course is in 2 parts. Please purchase Part 1 as well for complete course.**

CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA certification is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.

Who this course is for:

  • IT audit, control, assurance, and security professionals
  • IT consultants, auditors, and managers
  • Security policy writers
  • Privacy officers
  • Information security officers
  • Network security engineers

Course content

2 sections • 186 lectures • 4h 44m total length

  • Preview01:46
  • IS Architecture and Software Part2
    01:13
  • Preview00:53
  • Software Integrity Issues Part1
    01:48
  • Software Integrity Issues Part2
    00:30
  • Activity Logging and Reporting Options
    01:15
  • Data Communication Software
    00:53
  • Data Management
    00:43
  • File Organization
    01:14
  • Database Management Systems Part1
    00:44
  • Database Management Systems Part2
    00:40
  • Example of Data in DBMS
    06:02
  • DBMS Architecture
    00:56
  • Preview00:51
  • Database Structure
    01:10
  • Relational Database
    00:46
  • Database Models
    03:35
  • Relational Database Model
    05:09
  • Database Controls
    02:20
  • Tape and Disk Management Systems
    00:21
  • Utility Programs
    00:54
  • Software Licensing Issues Part1
    01:50
  • Software Licensing Issues Part2
    01:07
  • Software Licensing Issues Part3
    01:06
  • Digital Rights Management
    01:07
  • Lesson 4: Network Infrastructure
    01:37
  • Enterprise Network Architecture
    00:37
  • Preview04:02
  • Network Services
    01:59
  • Network Standards and Protocols
    01:08
  • OSI Architecture
    01:16
  • OSI Layers
    10:46
  • Application of the OSI Model in Network Architectures
    00:49
  • Local Area Network
    00:21
  • Network Physical Media Specifications
    02:57
  • Implementation of WANs
    00:58
  • LAN Media Access Technologies
    02:28
  • LAN Components
    03:10
  • OSI Layer Diagram
    07:43
  • LAN Technology Selection Criteria
    00:47
  • Wide Area Networks Part1
    02:26
  • Wide Area Networks Part2
    03:10
  • Preview02:05
  • WAN Technologies
    02:40
  • Wireless Networks
    00:51
  • Wireless Wide Area Networks
    00:33
  • Wireless Local Area Networks Part1
    00:37
  • Wireless Local Area Networks Part2
    02:24
  • Wireless Security
    01:44
  • Wireless Application Protocol
    00:34
  • Risks of Wireless Communications Part1
    00:16
  • Risks of Wireless Communications Part2
    01:38
  • World Wide Web Services
    01:15
  • General Internet Terminology
    03:34
  • Preview00:54
  • Network Performance Metrics
    01:46
  • Network Management Issues
    01:25
  • Network Management Tools
    01:45
  • Client/Server Technology Part1
    00:41
  • Client/Server Technology Part2
    01:37
  • Client/Server Technology Part3
    00:51
  • Client/Server Technology Part4
    01:34
  • Client/Server Technology Part5
    00:44
  • Lesson 5: Disaster Recovery Planning
    00:24
  • Recovery Point Objective and Recovery Time Objective Part1
    01:05
  • Recovery Point Objective and Recovery Time Objective Part2
    00:44
  • Recovery Strategies Part1
    01:07
  • Preview00:11
  • Recovery Strategies Part3
    02:32
  • Application Disaster Recovery Methods Part1
    01:04
  • Application Disaster Recovery Methods Part2
    00:51
  • Data Storage Disaster Recovery Methods
    00:36
  • Telecommunication Networks Disaster Recovery Methods
    00:24
  • Methods for Network Protection
    01:40
  • Development of Disaster Recovery Plans
    00:39
  • Organization and Assignment Of Responsibilities Part1
    00:53
  • Organization and Assignment Of Responsibilities Part2
    00:42
  • Organization and Assignment Of Responsibilities Part3
    00:08
  • Backup and Restoration
    00:21
  • Preview01:25
  • Types of Backup Devices and Media Part1
    00:14
  • Types of Backup Devices and Media Part2
    00:29
  • Periodic Backup Procedures
    00:25
  • Frequency of Rotation
    01:03
  • Backup Schemes
    01:45
  • Module 04 Review
    01:01
  • Module 04 - Quiz
    9 questions

  • Introduction
    01:30
  • Lesson 1: Importance Of Information Security
    01:18
  • Key Elements of Information Security Management
    01:07
  • Information Security Management Roles and Responsibilities
    00:15
  • Inventory and Classification of Information Assets Part1
    00:53
  • Inventory and Classification of Information Assets Part2
    01:46
  • System Access Permission Part1
    03:03
  • System Access Permission Part2
    02:37
  • Mandatory and Discretionary Access Controls
    02:42
  • Privacy Management Issue and the Role of IS Auditors Part1
    00:42
  • Privacy Management Issue and the Role of IS Auditors Part2
    00:36
  • Critical Success Factors to Information Security Management
    00:54
  • Information Security and External Parties
    01:16
  • Identification of Risks Related to External Parties
    01:08
  • Addressing Security When Dealing with Customers
    02:55
  • Addressing Security and Third-Party Agreements Part1
    00:41
  • Addressing Security and Third-Party Agreements Part2
    00:42
  • Human Resources Security and Third Parties Part1
    01:37
  • Human Resources Security and Third Parties Part2
    01:25
  • Computer Crime Issues and Exposures Part1
    02:45
  • Computer Crime Issues and Exposures Part2
    02:26
  • Types of Computer Crimes Part1
    01:36
  • Types of Computer Crimes Part2
    03:44
  • Peer to Peer, Instant Messaging, Data Leakage and Web-Based Technologies
    02:20
  • Security Incident Handling and Response Part1
    02:05
  • Security Incident Handling and Response Part2
    01:32
  • Lesson 2: Logical Access
    00:25
  • Logical Access Exposures
    00:43
  • Familiarization with the Enterprise IT Environment
    00:19
  • Paths of Logical Access
    01:03
  • General Points of Entry
    00:17
  • Logical Access Control Software
    00:40
  • Identification and Authentication
    01:51
  • Features of Passwords Part1
    01:08
  • Features of Passwords Part2
    02:20
  • Identification and Authentication Best Practices
    03:09
  • Token Devices, One-Time Passwords
    01:35
  • Management of Biometrics
    02:47
  • Single Sign-On Part1
    01:35
  • Single Sign-On Part2
    01:06
  • Authorization Issues
    00:38
  • Access Control Lists
    00:44
  • Logical Access Security Administration
    01:00
  • Remote Access Security Part1
    01:41
  • Remote Access Security Part2
    01:07
  • Common Connectivity Methods Part1
    02:33
  • Common Connectivity Methods Part2
    00:21
  • Remote Access Using PDAs
    01:53
  • Access Issues with Mobile Technology
    02:13
  • Access Rights to System Logs
    01:04
  • Tools for Audit Trail Analysis
    00:55
  • Use of Intrusion Detection
    01:31
  • Storing, Retrieving, Transporting and Disposing of Confidential Information
    02:42
  • Lesson 3: Network Infrastructure Security
    00:43
  • LAN Security
    00:37
  • Virtualization
    00:43
  • Client/Server Security Part1
    01:24
  • Client/Server Security Part2
    02:21
  • Client/Server Security Part3
    00:52
  • Wireless Security Threats and Risks Mitigation Part1
    00:32
  • Wireless Security Threats and Risks Mitigation Part2
    00:56
  • Internet Threats and Security
    02:06
  • Network Security Threats
    03:13
  • Internet Security Control Audits
    03:00
  • Firewall Security Systems
    03:51
  • Common Attacks Against a Firewall
    01:46
  • Examples of Firewall Implementation
    01:56
  • Intrusion Detection
    02:09
  • Describing IDS and IPS Deployment
    02:38
  • Encryption Part1
    00:48
  • Encryption Part2
    02:29
  • Uses of Encryption
    01:39
  • Viruses
    01:48
  • Technical Controls Against Viruses
    00:20
  • AV Software
    01:24
  • Voice Over IP
    01:17
  • Private Branch Exchange
    01:05
  • Lesson 4: Auditing Information Security Management Framework Part1
    00:19
  • Auditing Information Security Management Framework Part2
    00:43
  • Auditing Logical Access
    00:45
  • Techniques for Testing Security
    01:38
  • Lesson 5: Auditing Network Infrastructure Security
    01:11
  • Auditing Remote Access
    01:29
  • Network Penetration Test
    02:56
  • Types of Penetration Tests
    01:52
  • Full Network Assessment Reviews
    00:41
  • Development and Authorization of Network Changes
    00:39
  • Unauthorized Changes
    01:00
  • Computer Forensics
    01:33
  • Chain of Evidence
    02:19
  • Lesson 6: Environmental Exposures and Controls Part1
    00:04
  • Environmental Exposures and Controls Part2
    02:25
  • Lesson 7: Physical Access Exposures and Controls
    00:15
  • Physical Access Exposures
    01:01
  • Physical Access Controls
    02:04
  • Auditing Physical Access
    01:28
  • Lesson 8: Mobile Computing Part1
    00:12
  • Mobile Computing Part2
    01:30
  • Module 05 Review
    01:07
  • Course Closure
    02:44
  • Module 05 - Quiz
    10 questions

Instructor

Stone River eLearning
500,000+ Happy Udemy Students
Stone River eLearning
  • 4.2 Instructor Rating
  • 52,723 Reviews
  • 668,212 Students
  • 307 Courses

At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered. 

Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 800+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.