Certified Information Systems Auditor (CISA) (Part 2 of 2)
4.1 (148 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,827 students enrolled

Certified Information Systems Auditor (CISA) (Part 2 of 2)

Certified Information Systems Auditor (CISA) Certification Prep Course
4.1 (148 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
2,827 students enrolled
Last updated 9/2018
English
English [Auto-generated]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 5 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • After successfully completing this course, the students will be able to understand the six domains covered in the CISA exam:
  • IT audit process
  • IT governance
  • Systems and infrastructure lifecycle management
  • IT service delivery and support
  • Protection of information assets
  • Business continuity and disaster recovery
Requirements
  • The course requires the candidates to have systems administration experience, familiarity with networking fundamentals such as TCP/IP, and an understanding of UNIX, Linux, and Windows operating systems.
  • This is an advanced level course and requires the students to have basic concepts and knowledge of the IT security and a minimum of 3-5 years practical experience.
Description


The Certified Information Systems Auditor (CISA) course covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.

** This course is in 2 parts. Please purchase Part 1 as well for complete course.**

CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA certification is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.

Who this course is for:
  • IT audit, control, assurance, and security professionals
  • IT consultants, auditors, and managers
  • Security policy writers
  • Privacy officers
  • Information security officers
  • Network security engineers
Course content
Expand all 186 lectures 04:44:45
+ Module 04 - Information Systems Operations, Maintenance and Support (continue...
86 lectures 02:14:18
IS Architecture and Software Part2
01:13
Software Integrity Issues Part1
01:48
Software Integrity Issues Part2
00:30
Activity Logging and Reporting Options
01:15
Data Communication Software
00:53
Data Management
00:43
File Organization
01:14
Database Management Systems Part1
00:44
Database Management Systems Part2
00:40
Example of Data in DBMS
06:02
DBMS Architecture
00:56
Database Structure
01:10
Relational Database
00:46
Database Models
03:35
Relational Database Model
05:09
Database Controls
02:20
Tape and Disk Management Systems
00:21
Utility Programs
00:54
Software Licensing Issues Part1
01:50
Software Licensing Issues Part2
01:07
Software Licensing Issues Part3
01:06
Digital Rights Management
01:07
Lesson 4: Network Infrastructure
01:37
Enterprise Network Architecture
00:37
Network Services
01:59
Network Standards and Protocols
01:08
OSI Architecture
01:16
OSI Layers
10:46
Application of the OSI Model in Network Architectures
00:49
Local Area Network
00:21
Network Physical Media Specifications
02:57
Implementation of WANs
00:58
LAN Media Access Technologies
02:28
LAN Components
03:10
OSI Layer Diagram
07:43
LAN Technology Selection Criteria
00:47
Wide Area Networks Part1
02:26
Wide Area Networks Part2
03:10
WAN Technologies
02:40
Wireless Networks
00:51
Wireless Wide Area Networks
00:33
Wireless Local Area Networks Part1
00:37
Wireless Local Area Networks Part2
02:24
Wireless Security
01:44
Wireless Application Protocol
00:34
Risks of Wireless Communications Part1
00:16
Risks of Wireless Communications Part2
01:38
World Wide Web Services
01:15
General Internet Terminology
03:34
Network Performance Metrics
01:46
Network Management Issues
01:25
Network Management Tools
01:45
Client/Server Technology Part1
00:41
Client/Server Technology Part2
01:37
Client/Server Technology Part3
00:51
Client/Server Technology Part4
01:34
Client/Server Technology Part5
00:44
Lesson 5: Disaster Recovery Planning
00:24
Recovery Point Objective and Recovery Time Objective Part1
01:05
Recovery Point Objective and Recovery Time Objective Part2
00:44
Recovery Strategies Part1
01:07
Recovery Strategies Part3
02:32
Application Disaster Recovery Methods Part1
01:04
Application Disaster Recovery Methods Part2
00:51
Data Storage Disaster Recovery Methods
00:36
Telecommunication Networks Disaster Recovery Methods
00:24
Methods for Network Protection
01:40
Development of Disaster Recovery Plans
00:39
Organization and Assignment Of Responsibilities Part1
00:53
Organization and Assignment Of Responsibilities Part2
00:42
Organization and Assignment Of Responsibilities Part3
00:08
Backup and Restoration
00:21
Types of Backup Devices and Media Part1
00:14
Types of Backup Devices and Media Part2
00:29
Periodic Backup Procedures
00:25
Frequency of Rotation
01:03
Backup Schemes
01:45
Module 04 Review
01:01
Module 04 - Quiz
9 questions
+ Module 05 - Protection of Information Assets
100 lectures 02:30:27

Download Supporting files here

Introduction
01:30
Lesson 1: Importance Of Information Security
01:18
Key Elements of Information Security Management
01:07
Information Security Management Roles and Responsibilities
00:15
Inventory and Classification of Information Assets Part1
00:53
Inventory and Classification of Information Assets Part2
01:46
System Access Permission Part1
03:03
System Access Permission Part2
02:37
Mandatory and Discretionary Access Controls
02:42
Privacy Management Issue and the Role of IS Auditors Part1
00:42
Privacy Management Issue and the Role of IS Auditors Part2
00:36
Critical Success Factors to Information Security Management
00:54
Information Security and External Parties
01:16
Identification of Risks Related to External Parties
01:08
Addressing Security When Dealing with Customers
02:55
Addressing Security and Third-Party Agreements Part1
00:41
Addressing Security and Third-Party Agreements Part2
00:42
Human Resources Security and Third Parties Part1
01:37
Human Resources Security and Third Parties Part2
01:25
Computer Crime Issues and Exposures Part1
02:45
Computer Crime Issues and Exposures Part2
02:26
Types of Computer Crimes Part1
01:36
Types of Computer Crimes Part2
03:44
Peer to Peer, Instant Messaging, Data Leakage and Web-Based Technologies
02:20
Security Incident Handling and Response Part1
02:05
Security Incident Handling and Response Part2
01:32
Lesson 2: Logical Access
00:25
Logical Access Exposures
00:43
Familiarization with the Enterprise IT Environment
00:19
Paths of Logical Access
01:03
General Points of Entry
00:17
Logical Access Control Software
00:40
Identification and Authentication
01:51
Features of Passwords Part1
01:08
Features of Passwords Part2
02:20
Identification and Authentication Best Practices
03:09
Token Devices, One-Time Passwords
01:35
Management of Biometrics
02:47
Single Sign-On Part1
01:35
Single Sign-On Part2
01:06
Authorization Issues
00:38
Access Control Lists
00:44
Logical Access Security Administration
01:00
Remote Access Security Part1
01:41
Remote Access Security Part2
01:07
Common Connectivity Methods Part1
02:33
Common Connectivity Methods Part2
00:21
Remote Access Using PDAs
01:53
Access Issues with Mobile Technology
02:13
Access Rights to System Logs
01:04
Tools for Audit Trail Analysis
00:55
Use of Intrusion Detection
01:31
Storing, Retrieving, Transporting and Disposing of Confidential Information
02:42
Lesson 3: Network Infrastructure Security
00:43
LAN Security
00:37
Virtualization
00:43
Client/Server Security Part1
01:24
Client/Server Security Part2
02:21
Client/Server Security Part3
00:52
Wireless Security Threats and Risks Mitigation Part1
00:32
Wireless Security Threats and Risks Mitigation Part2
00:56
Internet Threats and Security
02:06
Network Security Threats
03:13
Internet Security Control Audits
03:00
Firewall Security Systems
03:51
Common Attacks Against a Firewall
01:46
Examples of Firewall Implementation
01:56
Intrusion Detection
02:09
Describing IDS and IPS Deployment
02:38
Encryption Part1
00:48
Encryption Part2
02:29
Uses of Encryption
01:39
Viruses
01:48
Technical Controls Against Viruses
00:20
AV Software
01:24
Voice Over IP
01:17
Private Branch Exchange
01:05
Lesson 4: Auditing Information Security Management Framework Part1
00:19
Auditing Information Security Management Framework Part2
00:43
Auditing Logical Access
00:45
Techniques for Testing Security
01:38
Lesson 5: Auditing Network Infrastructure Security
01:11
Auditing Remote Access
01:29
Network Penetration Test
02:56
Types of Penetration Tests
01:52
Full Network Assessment Reviews
00:41
Development and Authorization of Network Changes
00:39
Unauthorized Changes
01:00
Computer Forensics
01:33
Chain of Evidence
02:19
Lesson 6: Environmental Exposures and Controls Part1
00:04
Environmental Exposures and Controls Part2
02:25
Lesson 7: Physical Access Exposures and Controls
00:15
Physical Access Exposures
01:01
Physical Access Controls
02:04
Auditing Physical Access
01:28
Lesson 8: Mobile Computing Part1
00:12
Mobile Computing Part2
01:30
Module 05 Review
01:07
Course Closure
02:44
Module 05 - Quiz
10 questions