Certified Information Systems Auditor (CISA) (Part 2 of 2)
What you'll learn
- After successfully completing this course, the students will be able to understand the six domains covered in the CISA exam:
- IT audit process
- IT governance
- Systems and infrastructure lifecycle management
- IT service delivery and support
- Protection of information assets
- Business continuity and disaster recovery
Requirements
- The course requires the candidates to have systems administration experience, familiarity with networking fundamentals such as TCP/IP, and an understanding of UNIX, Linux, and Windows operating systems.
- This is an advanced level course and requires the students to have basic concepts and knowledge of the IT security and a minimum of 3-5 years practical experience.
Description
The Certified Information Systems Auditor (CISA) course covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.
** This course is in 2 parts. Please purchase Part 1 as well for complete course.**
CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA certification is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.
Who this course is for:
- IT audit, control, assurance, and security professionals
- IT consultants, auditors, and managers
- Security policy writers
- Privacy officers
- Information security officers
- Network security engineers
Course content
- Preview01:46
- 01:13IS Architecture and Software Part2
- Preview00:53
- 01:48Software Integrity Issues Part1
- 00:30Software Integrity Issues Part2
- 01:15Activity Logging and Reporting Options
- 00:53Data Communication Software
- 00:43Data Management
- 01:14File Organization
- 00:44Database Management Systems Part1
- 00:40Database Management Systems Part2
- 06:02Example of Data in DBMS
- 00:56DBMS Architecture
- Preview00:51
- 01:10Database Structure
- 00:46Relational Database
- 03:35Database Models
- 05:09Relational Database Model
- 02:20Database Controls
- 00:21Tape and Disk Management Systems
- 00:54Utility Programs
- 01:50Software Licensing Issues Part1
- 01:07Software Licensing Issues Part2
- 01:06Software Licensing Issues Part3
- 01:07Digital Rights Management
- 01:37Lesson 4: Network Infrastructure
- 00:37Enterprise Network Architecture
- Preview04:02
- 01:59Network Services
- 01:08Network Standards and Protocols
- 01:16OSI Architecture
- 10:46OSI Layers
- 00:49Application of the OSI Model in Network Architectures
- 00:21Local Area Network
- 02:57Network Physical Media Specifications
- 00:58Implementation of WANs
- 02:28LAN Media Access Technologies
- 03:10LAN Components
- 07:43OSI Layer Diagram
- 00:47LAN Technology Selection Criteria
- 02:26Wide Area Networks Part1
- 03:10Wide Area Networks Part2
- Preview02:05
- 02:40WAN Technologies
- 00:51Wireless Networks
- 00:33Wireless Wide Area Networks
- 00:37Wireless Local Area Networks Part1
- 02:24Wireless Local Area Networks Part2
- 01:44Wireless Security
- 00:34Wireless Application Protocol
- 00:16Risks of Wireless Communications Part1
- 01:38Risks of Wireless Communications Part2
- 01:15World Wide Web Services
- 03:34General Internet Terminology
- Preview00:54
- 01:46Network Performance Metrics
- 01:25Network Management Issues
- 01:45Network Management Tools
- 00:41Client/Server Technology Part1
- 01:37Client/Server Technology Part2
- 00:51Client/Server Technology Part3
- 01:34Client/Server Technology Part4
- 00:44Client/Server Technology Part5
- 00:24Lesson 5: Disaster Recovery Planning
- 01:05Recovery Point Objective and Recovery Time Objective Part1
- 00:44Recovery Point Objective and Recovery Time Objective Part2
- 01:07Recovery Strategies Part1
- Preview00:11
- 02:32Recovery Strategies Part3
- 01:04Application Disaster Recovery Methods Part1
- 00:51Application Disaster Recovery Methods Part2
- 00:36Data Storage Disaster Recovery Methods
- 00:24Telecommunication Networks Disaster Recovery Methods
- 01:40Methods for Network Protection
- 00:39Development of Disaster Recovery Plans
- 00:53Organization and Assignment Of Responsibilities Part1
- 00:42Organization and Assignment Of Responsibilities Part2
- 00:08Organization and Assignment Of Responsibilities Part3
- 00:21Backup and Restoration
- Preview01:25
- 00:14Types of Backup Devices and Media Part1
- 00:29Types of Backup Devices and Media Part2
- 00:25Periodic Backup Procedures
- 01:03Frequency of Rotation
- 01:45Backup Schemes
- 01:01Module 04 Review
- 9 questionsModule 04 - Quiz
Instructor
At Stone River eLearning, technology is all we teach. If you're interested in IT, programming, development or design - we have it covered.
Check out our huge catalog of courses and join the over 1,200,000+ students currently taking Stone River eLearning courses. We currently offer 800+ different technology training courses on our Stone River eLearning website and are adding new courses on hot and trending topics every month. A subscription option is available for those with a real passion for learning.