Certified Information Systems Auditor (CISA)
Description
The Certified Information Systems Auditor (CISA) course covers all six areas of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). The CISA exam has become the industry standard for IT auditing, control and security. The course helps students gain relevant, relevant and concise knowledge along with practical hands-on exams to prepare for the CISA certification exam.
CISA is one of the most popular and sought after IT certifications available on the market, with approximately 60,000 professionals holding CISA certification. The CISA certification has also been consistently named one of the best professional certifications held by leading analysts around the world. The course offers students the in-depth knowledge and concepts needed to pass the CISA certification exam.
Course Curriculum
Introduction to the Course
PreviewIntroduction (0:52)
Introducing the Course Preview (02:46)
Module 01 – Information Systems Audit Process
PreviewIntroduction (1:51)
StartLesson 1: Managing the Audit Function (1:40)
Start-up of the IP Audit Function (3:12)
StartIS Audit Resource Management (1:04)
StartAudit Planning Part1 (1:08)
StartAudit Planning Part2 (1:48)
StartAudit Planning Part3 (1:32)
StartAudit Planning Part4 (1:07)
StartAudit Planning Part5 (2:01)
IP Audit Planning Laws and Regulations Commencement Part 1 (2:17)
StartEffect Laws and Regulations for Audit Planning Part2 (0:56)
StartEffect laws and regulations on audit, planning Part3 (0:41)
StartEffect Audit Planning Laws and Regulations Part4 (0:45)
StartLesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1 (2:01)
StartISACA IT Audit and Assurance Standards and Guidelines Part2 (3:25)
StartISACA IT Audit and Assurance Standards and Guidelines Part3 (0:41)
StartISACA IT Audit and Assurance Standards and Guidelines Part4 (0:36)
StartISACA IT Audit And Assurance Standards Framework (1:18)
StartAuditing Standards Part1 (1:53)
StartAuditing Standards Part2 (1:05)
StartAuditing Standards Part3 (2:45)
StartAuditing Standards Part4 (0:28)
StartAuditing Standards Part5 (1:58)
StartAuditing Standards Part6 (1:25)
StartAuditing Standards Part7 (2:00)
StartAuditing Standards Part8 (0:41)
StartAuditing Standards Part9 (1:05)
StartAudit Guide Part 1 (0:33)
StartAudit Guide Part 2 (1:07)
StartAudit Guide Part 3 (1:38)
StartAudit Part4 Manual (3:07)
StartAudit Part5 Manual (1:57)
StartAudit Part6 Manual (1:28)
StartAudit Guide Part 7 (1:41)
StartAudit Part8 Manual (1:58)
StartAudit Guide Part 9 (1:57)
StartAudit Part10 Manual (1:31)
StartAudit Guide Part 11 (1:56)
StartAudit Part12 Manual (02:02)
StartAudit and Assurance Tools and Techniques (0:45)
Starrelation between standards, guidelines, tools and methods (1:29)
StartInformation Technology Assurance Framework (0:26)
StartInformation Technology Component Assurance (2:23)
StartITAF General Standards (Section 2200) Part 1 (1:27)
StartITAF General Standards (Section 2200) Part 2 (1:21)
StartITAF Performance Standards (Section 2400) Part 1 (3:02)
StartITAF Performance Standards (Section 2400) Part 2 (2:01)
StartITAF Performance Standards (Section 2400) Part 3 (0:33)
StartITAF Performance Standards (Section 2400) Part4 (1:10)
StartReporting Standards (Section 2600) Part 1 (0:21)
StartReporting Standards (Section 2600) Part 2 (0:51)
StartReporting Standards (Section 2600) Part 3 (0:54)
StartIT Security Guide (Section 3000) Part 1 (1:15)
StartIT Security Guide (Section 3000) Part 2 (0:51)
StartIT Security Guide (Section 3000) Part 3 (1:32)
StartIT Security Guide (Section 3000) Part 4 (1:31)
StartIT Security Guide (Section 3000) Part 5 (2:06)
StartIT Security Manual (Section 3000) Part6 (0:20)
StartIT Security Guide (Section 3000) Part 7 (1:22)
StartIT Security Guide (Section 3000) Part 8 (2:11)
StartIT Security Guide (Section 3000) Part 9 (0:45)
StartIT Security Guide (Section 3000) Part 10 (1:58)
StartIT Security Guide (Section 3000) Part 11 (1:40)
StartLesson 3: Risk Analysis (0:40)
StartRisk Analysis Part 1 (4:21)
StartRisk Analysis Part2 (3:06)
StartRisk Analysis Part3 (2:32)
StartRisk Analysis Part4 (1:26)
StartRisk Analysis Part5 (1:31)
StartRisk Analysis Part6 (4:10)
StartRisk Analysis Part7 (3:31)
StartLesson 4: Internal Control (1:31)
Internal Control Starting Tasks (1:05)
Goals of StartIS Management Part 1 (2:34)
Goals of StartIS Management Part 2 (1:19)
Goals of StartIS Management Part 3 (2:06)
StartCOBIT (0:35)
StartGeneral Controls Part1 (0:48)
StartGeneral Controls Part2 (3:23)
StartIS Control (03:40)
StartLesson 5: Performing an IS Audit (02:39)
Start of IP audit (1:08)
Start Classifying Audits (2:32)
StartAudit Programs Part 1 (1:07)
StartAudit Programs Part2 (3:02)
StartAudit Methodology Part 1 (1:54)
StartAudit Methodology Part 2 (1:26)
StartAudit Methodology Part 3 (3:25)
Discovering StartFraud Part 1 (2:56)
Discovering StartFraud Part2 (02:13)
StartRisk Based Audit Part 1 (1:12)
StartRisk-Based Auditing Part2 (0:53)
StartRisk-Based Auditing Part3 (0:57)
StartAudit Risk and Materiality Part 1 (1:11)
StartAudit Risk and Materiality Part 2 (1:18)
StartAudit Risk and Materiality Part 3 (1:36)
StartAudit Risk and Materiality Part 4 (1:05)
StartAudit Risk and Materiality Part 5 (0:23)
Assessment and Treatment of StartRisk Part 1 (0:39)
Assessment and Treatment of StartRisk Part 2 (1:57)
Assessment and Treatment of StartRisk Part 3 (0:45)
Assessment and Treatment of StartRisk Part4 (1:46)
Assessment and Treatment of StartRisk Part5 (02:04)
Methods for Estimating StartRisk Part 1 (0:18)
StartRisk Estimation Methods Part 2 (0:38)
StartRisk Estimation Methods Part 3 (1:06)
StartRisk Estimation Methods Part 4 (1:09)
StartAudit Goals Part 1 (0:56)
StartAudit Objectives Part2 (0:46)
StartCompliance Against Major Trials Part 1 (0:31)
StartCompliance Vs Subject Testing Part 2 (0:40)
StartCompliance Versus Substantial Testing Part3 (0:35)
StartEvidence Part1 (1:09)
StartEvidence Part2 (1:13)
StartEvidence Part3 (1:21)
Start viewing and observing personnel in the line of duty (1:57)
Starting Sample Part 1 (02:19)
StartSampling Part2 (2:04)
StartSampling Part3 (1:56)
Start Using Services Of Other Auditors And Experts Part 1 (0:30)
Start Using The Services Of Other Auditors And Experts Part 2 (0:43)
StartComputer-Assisted Audit Techniques (CAAT) Part1 (0:58)
StartComputer-Assisted Audit Techniques (CAAT) Part2 (0:24)
Initial Assessment of Audit Strengths and Weaknesses Part 1 (0:48)
Initial Assessment of Audit Strengths and Weaknesses Part 2 (0:57)
Initial Assessment of Audit Strengths and Weaknesses Part 3 (2:02)
StartCommunicating Audit Results Part1 (0:40)
StartCommunicating Audit Results Part2 (1:26)
StartCommunicating Audit Results Part3 (0:25)
StartManagement Implement Recommendations (0:21)
StartAudit Documentation (1:15)
StartLesson 6: Self Assessment Checklist Part 1 (1:12)
StartControl Self-Assessment Part 3 (1:38)
StartObjectives of CSA (1:19)
StartBenefits of CSA (0:56)
StartDisadvantages of CSA (0:36)
Role of StartAuditor in CSA (1:21)
Drivers for StartTechnology for CSA (1:07)
StartTraditional Versus CSA Approach (1:19)
StartLesson 7: Evolution is an Audit Process (0:09)
StartAutomated Work Papers Part1 (0:36)
StartAutomated Work Papers Part2 (1:22)
StartIntegrated Auditing Part1 (0:37)
StartIntegrated Auditing Part2 (1:31)
StartIntegrated Auditing Part3 (0:41)
StartContinuous Auditing Part1 (0:24)
StartContinuous Auditing Part2 (1:02)
StartContinuous Auditing Part3 (0:48)
StartContinuous Auditing Part4 (2:12)
StartContinuous Auditing Part5 (0:45)
StartSection Review (1:37)
StartReview questions
Module 02 – IT governance and management
Start of production (03:12)
StartLesson 1: Corporate Governance (0:17)
StartCorporate Governance Part1 (0:25)
StartCorporate Governance Part2 (0:33)
StartCorporate Governance Part3 (1:33)
StartLesson 2: IT Governance (0:22)
StartIT Governance Part1 (1:02)
StartIT Governance Part2 (0:31)
StartLesson 3: IT Monitoring and Security Practices for the Board of Directors and Senior Management (0:23)
StartIT Monitoring and Provisioning Practice for the Board of Directors and Senior Management Part 1 (2:03)
StartIT Monitoring and Provisioning Practice for the Board of Directors and Senior Management Part 2 (1:01)
StartIT Monitoring and Provisioning Practice for the Board of Directors and Senior Management Part 3 (0:45)
StartBest Practices for IT Governance Part1 (0:53)
StartBest Practices for IT Governance Part2 (3:15)
StartBest Practices for IT Governance Part3 (1:30)
StartBest Practices for IT Governance Part4 (1:17)
StartIT Governance Framework (0:37)
The Role of StartAudit in IT Governance Part 1 (0:43)
The Role of StartAudit in IT Governance Part2 (2:28)
The Role of StartAudit in IT Governance Part3 (1:16)
The Role of StartAudit in IT Governance Part4 (1:14)
StartIT Strategy Committee (0:32)
StartIT Balanced Scorecard Part1 (0:34)
StartIT Balanced Scorecard Part2 (3:09)
StartInformation Security Governance Part1 (1:45)
StartInformation Security Governance Part2 (1:22)
StartInformation Security Governance Part3 (1:09)
StartInformation Security Governance Part4 (1:35)
StartImportance of Information Security Governance Part1 (0:48)
StartImportance of Information Security Governance Part2 (1:04)
StartOutcomes of Security Governance Part1 (4:03)
StartOutcomes of Security Governance Part2 (2:09)
StartEffective Information Security Governance (0:52)
Starting Roles and Responsibilities of Senior Management and the Board of Directors Part 1 (0:45)
Starting Roles and Responsibilities of Senior Management and the Board of Directors Part 2 (02:08)
StartEnterprise Architecture (1:34)
StartLesson 4: Information Systems Strategy (0:42)
StartStrategic Planning Part1 (0:42)
StartStrategic Planning Part2 (2:10)
Start Committee (0:58)
StartLesson 5: Maturity and Process Improvement Models (1:34)
StartMaturity Models and Process Improvements (0:57)
StartLesson 6: IT Investment and Allocation Practices (0:37)
StartIT Investment and Distribution Part 1 (0:49)
StartIT Investment and Distribution Part2 (0:14)
StartIT Investment and Distribution Part 3 (0:24)
StartIT Investment and Distribution Part4 (0:29)
StartImplement IT Portfolio Management (0:47)
StartIT Portfolio Management Compared To A Balanced Scorecard (1:23)
StartLesson 7: Policies and Procedures (0:11)
StartPolicies Part1 (0:43)
StartPolicies Part2 (1:20)
StartPolicies Part3 (2:32)
StartInformation Security Policy Part 1 (1:32)
StartInformation Security Policy Part2 (0:58)
StartInformation Security Policy Part3 (0:31)
StartInformation Security Policy Part4 (1:35)
StartInformation Security Policy Part5 (2:52)
StartInformation Security Policy Part6 (2:30)
StartInformation Security Policy Part7 (1:03)
StartProcedures Part1 (1:31)
StartProcedures Part2 (2:01)
StartLesson 8: Risk Management (0:29)
StartRisk Management (03:27)
Start developing a risk management program (2:37)
StartRisk Management Process Part 1 (0:58)
StartRisk Management Process Part 2 (02:28)
StartRisk Management Process Part 3 (02:19)
Management Process StartRisk Part4 (1:58)
StartRisk Management Process Part5 (1:56)
Management Process StartRisk Part6 (0:59)
StartRisk Analysis Techniques Part 1 (2:14)
StartRisk Analysis Techniques Part 2 (0:13)
StartRisk Analysis Techniques Part 3 (0:47)
StartRisk Part4 Analysis Techniques (3:49)
Analysis Methods StartRisk Part5 (5:30)
StartLesson 9: IS Management Practices (0:23)
StartHuman Resource Management Part1 (0:16)
StartHuman Resource Management Part2 (2:23)
StartHuman Resource Management Part3 (4:09)
StartHuman Resource Management Part4 (4:14)
StartHuman Resource Management Part5 (1:26)
StartHuman Resource Management Part6 (02:52)
StartHuman Resource Management Part7 (3:47)
StartHuman Resource Management Part8 (1:46)
StartHuman Resource Management Part9 (4:14)
StartHuman Resource Management Part10 (2:02)
StartHuman Resource Management Part11 (1:49)
StartHuman Resource Management Part12 (1:16)
StartHuman Resource Management Part13 (1:55)
StartHuman Resource Management Part14 (02:31)
Start Organizational Change Management (02:48)
StartFinancial Management Practices (0:57)
Quality Start Management Part 1 (2:23)
StartQuality Management Part2 (0:49)
StartQuality Management Part3 (0:53)
Security Management StartInformation (1:56)
Optimizing StartPerformance Part 1 (1:26)
Optimizing Starting Performance Part 2 (3:26)
Optimizing Starting Performance Part 3 (0:54)
StartLesson 10: IS Organizational Chart and Responsibilities (2:29)
Startis Roles and Responsibilities Part 1 (1:16)
Startis Roles and Responsibilities Part 2 (0:36)
Startis Roles and Responsibilities Part 3 (3:11)
The separation of duties begins (1:33)
StartSegregation of Duties Controls Part1 (2:33)
StartSegregation of Duties Controls Part2 (4:34)
Start control for lack of segregation (0:20)
StartLesson 11: audit of the structure and implementation of IT management (0:49)
Documentation StartReviewing Part 1 (0:53)
StartReviewing Documentation Part 2 (1:05)
Start Reviewing Contractual Commitments (3:55)
StartLesson 12: Planning Business Continuity Part 1 (6:12)
Continuity Planning StartBusiness Part2 (1:10)
StartBusiness Continuity Planning Part3 (0:53)
Business Continuity Planning StartIS (1:51)
StartDisasters and Other Destructive Events Part 1 (2:26)
StartDisasters and Other Destructive Events Part 2 (2:01)
StartBusiness Continuity Planning Process (1:13)
StartBusiness Continuity Policy (03:19)
StartBusiness Impact Analysis Part1 (1:38)
StartBusiness Impact Analysis Part2 (0:57)
Starting Operation Classification and Severity Analysis (0:46)
Start developing business continuity plans (1:14)
StartOther Issues and Plan Development (02:08)
BCP Part1 Starter Components (0:48)
BCP Part2 Starter Components (1:42)
StartBCP Testing Part 1 (1:29)
StartBCP Testing Part2 (02:31)
StartBCP Testing Part 3 (0:53)
StartBCP Maintenance (0:33)
StartSummary of BCP (0:42)
StartSection Review (2:26)
StartReview questions
Module 03 – Acquisition, Development and Implementation of Information Systems
StartLesson 1: Business Implementation Part 1 (1:09)
Implementation of StartBusiness Part2 (1:27)
StartPortfolio / Program Management Part 1 (0:35)
StartPortfolio / Program Management Part 2 (1:06)
StartPortfolio / Program Management Part 3 (0:43)
StartPortfolio / Program Management Part4 (0:37)
StartPortfolio / Program Management Part5 (0:58)
Development and approval of a case study StartBusiness Part 1 (1:12)
Development and approval of a case study StartBusiness Part 2 (0:52)
Implementation Methods StartBenefits (1:37)
StartLesson 2: Project Management Framework (0:38)
StartProject Context and Environment (0:34)
StartProject Organizational Forms Part 1 (0:14)
Organizational Forms StartProject Part2 (0:49)
StartProject Communication and Culture (1:28)
StartProject Tasks Part 1 (0:40)
StartProject Part2 Tasks (0:35)
StartProject Tasks Part 3 (0:47)
Startrolls and Responsibilities of Groups and Individuals Part 1 (0:49)
Startrolls and Responsibilities of Groups and Individuals Part 2 (1:19)
Startrolls and Responsibilities of Groups and Individuals Part 3 (0:27)
StartLesson 3: Project Management Practice (0:46)
Start of project implementation (0:20)
Launch Project Planning (2:01)
StartExample project management for new software (1:44)
StartSoftware Size Estimation (1:08)
Starting source lines (0:40)
StartFunction Point Analysis (FPA) (0:37)
Starting Points (0:51)
Starting Budgets (0:58)
StartSoftware Cost Estimate (0:44)
StartScheduling and setting the timeframe (0:39)
Starting Critical Path Methodology (1:21)
StartGantt Charts (0:51)
StartProgram Evaluation Review Technique (PERT) (0:44)
Box Control StartTime (0:50)
StartGeneral Project Management (0:18)
StartProject Control Part1 (0:21)
StartProject Control Part2 (0:41)
StartManagement of Resource Usage (0:38)
StartManagement of Risk Part1 (0:35)
StartManagement of Risk Part2 (0:37)
StartClosing a Project (0:39)
StartLesson 4: Business Application Development Part 1 (0:41)
Application Development StartBusiness Part 2 (1:06)
Application Development StartBusiness Part 3 (0:19)
Application Development StartBusiness Part4 (2:14)
Application Development StartBusiness Part5 (0:50)
StartTraditional SDLC Approach (0:55)
Startsdlk Phases (0:23)
Startsdlk (1:11)
StartIntegrated Resource Management Systems Part1 (1:08)
StartIntegrated Resource Management Systems Part2 (0:50)
StartIntegrated Resource Management Systems Part3 (0:29)
Initial SDLC Phase Description Part 1 (1:04)
StartDescription of phases SDLC Part2 (1:45)
Initial SDLC Phase Description Part 3 (1:52)
StartDescription of phases SDLC Part4 (1:16)
StartDescription of SDLC Phases Part5 (0:45)
StartDescription of SDLC Phases Part6 (1:08)
StartDescription of SDLC Phases Part7 (0:45)
StartDescription of SDLC Phases Part8 (1:09)
StartDescription of SDLC Phases Part9 (0:51)
StartDescription of phases SDLC Part10 (1:11)
StartDescription of SDLC Phases Part11 (2:56)
StartDescription of phases SDLC Part12 (1:07)
StartDescription of phases SDLC Part13 (1:41)
StartDescription of phases SDLC Part14 (1:17)
StartDescription of phases SDLC Part15 (1:02)
StartDescription of phases SDLC Part16 (0:50)
StartDescription of phases SDLC Part17 (0:10)
StartDescription of phases SDLC Part18 (1:41)
StartDescription of phases SDLC Part19 (1:22)
StartDescription of phases SDLC Part20 (1:41)
StartDescription of phases SDLC Part21 (1:08)
StartDescription of phases SDLC Part22 (1:43)
StartDescription of phases SDLC Part23 (1:38)
Start Risks Related to Software Development Part 1 (1:26)
StartRisks related software development Part2 (0:37)
StartLesson 5: Business Application Systems (0:13)
StartElectronic Commerce (0:27)
StartE-Commerce Models (1:12)
StartE-Commerce Architectures (0:55)
Starting Risks (0:51)
StartE-Commerce Requirements (0:47)
StartE-Commerce audit and control issues or best practices (0:32)
PKI Starter Components (2:20)
StartElectronic Data Interchange (0:51)
Starting General EDI Requirements (0:50)
StartTraditional EDI (1:13)
Founded after EDI (0:43)
StartEDI Risks and Control (1:03)
StartControls in EDI Part 1 (0:38)
StartControls in EDI Part 2 (0:40)
StartControls in EDI Part 3 (0:43)
StartControls in EDI Part4 (0:43)
Starting Mail (0:54)
StartE-Mail Security Issues (1:37)
StartStandards for E-Mail Security Part1 (0:39)
StartStandards for E-Mail Security Part2 (0:55)
StartStandards for E-Mail Security Part3 (1:28)
StartPoint-Of-Sale (POS) Systems (0:53)
StartElectronic Banking Part1 (1:57)
StartElectronic Banking Part2 (0:39)
StartRisk Management Problems in Electronic Banking (0:51)
StartRisk Management Controls for E-Banking Part1 (0:55)
StartRisk Management Controls for E-Banking Part2 (0:19)
StartElectronic Finance (0:41)
StartPayment Systems (0:20)
StartElectronic Money Model (0:16)
StartElectronic Checks Model (0:28)
StartElectronic Transfer Model (0:11)
StartElectronic Funds Transfer (0:28)
StartControls in EFT Part 1 (0:42)
StartControls in EFT Part 2 (0:47)
StartAutomated Teller Machines Part1 (0:47)
StartAutomated Teller Machines Part2 (0:55)
Processing StartImage Part 1 (1:10)
Processing StartImage Part 2 (1:14)
StartBusiness Intelligence (1:12)
StartDecision Support System (DSS) (0:31)
StartDSS Framework (0:29)
StartCustomer Relation Management (CRM) (0:26)
StartSupply Chain Management (SCM) (1:11)
StartLesson 6: Alternative Forms of Organizing Software Projects Part 1 (0:26)
StartAlternative Forms of Software Project Organization Part2 (0:24)
StartAlternative Forms of Software Project Organization Part3 (0:48)
StartAgile Development (0:27)
StartPrototyping (0:37)
StartRapid Application Development (RAD) (1:00)
StartLesson 7: Alternative Development Techniques (0:47)
Developing Systems Based on StartData (0:36)
Developing a StartObject-Oriented System Part 1 (1:34)
Developing a StartObject-Oriented System Part 2 (2:12)
Development Based on StartComponent (2:29)
Application Development Based on StartWeb (1:36)
Reengineering StartSoftware (0:11)
StartReverse Engineering (1:19)
StartLesson 8: Infrastructure Development / Acquisition Practice Part 1 (0:30)
StartInfrastructure Development / Acquisition Practices Part2 (0:34)
StartInfrastructure Development / Acquisition Practices Part3 (1:03)
Stages of StartProject Analysis of Physical Architecture Part 1 (1:20)
Phases of StartProject Physical Architecture Analysis Part 2 (0:26)
Start Planning Infrastructure Implementation Part 1 (0:28)
Start Planning Infrastructure Implementation Part 2 (0:27)
Acquisition of StartHardware (0:52)
StartAcquisition Steps Part1 (1:01)
StartAcquisition Steps Part2 (0:50)
Purchase StartSystem Software (0:26)
Software Implementation StartSystem (0:15)
StartSystem Software Change Control Procedures (0:28)
StartLesson 9: Practice of Information Systems Maintenance (0:55)
StartChange Control Process Overview (0:37)
StartDeploying Changes (1:04)
StartDocumentation (0:50)
StartTesting Changed Programs (0:31)
Changes To StartAuditing Program (0:45)
StartEmergency Changes (2:28)
StartChange Exposures (1:09)
StartConfiguration Management Part1 (0:55)
StartConfiguration Management Part2 (0:36)
StartLesson 10: System Development Tools And Productivity Tools (0:31)
Start Code Generators (0:16)
StartComputer Aided Software Engineering Part1 (1:06)
StartComputer Aided Software Engineering Part2 (0:36)
StartComputer Aided Software Engineering Part3 (0:31)
StartFourth-Generation Programming Languages (4gl by) Part 1 (1:04)
Fourth generation languages startfourth (4GL) Part 2 (1:21)
StartLesson 11: Business Process Reengineering Projects & Process Change (1:04)
StartBusiness Process Reengineering And Process Change Projects Continue (0:49)
StartBenchmarking Process Part 1 (0:35)
StartBenchmarking Process Part2 (0:31)
Start the Benchmarking Process (0:54)
StartISO 9126 (0:46)
StartSoftware Opportunity Maturity Model (02:31)
StartISO 15504 (0:42)
StartLesson 12: Application Management (0:39)
StartInputs Control Part1 (1:03)
StartInputs Controls Part2 (0:39)
StartInputs Controls Part3 (0:29)
StartInputs Controls Part4 (0:40)
Procedures And Controls StartProcessing (1:10)
StartProcessing Controls (0:35)
File Management Procedures StartData (0:38)
Controlling StartOutput Part 1 (0:10)
StartOutput Controls Part2 (0:34)
StartBusiness Process Control Assurance (0:48)
StartLesson 13: Auditing Application Management Part 1 (0:31)
StartAuditing Application Controls Part2 (0:46)
StartRisk Scoring Model For Analyzing Application Control Elements (1:00)
StartObserving And Test Conducting Procedures, Users (0:49)
Testing StartData Integrity (0:49)
A Starter Example of Referential And Relational Integrity (4:26)
StartData Integrity In Online Transaction Processing Systems (02:07)
StartTest Application Systems (0:15)
StartContinuous Online Auditing (0:33)
StartOnline Audit Methods (1:19)
StartLesson 14: Development, Acquisition And Maintenance Of Audit Systems (1:07)
StartProject Control (0:40)
Starting Feasibility Study (0:33)
Define Starting Requirements (0:41)
StartSoftware Acquisition Process (0:38)
StartDetailed Design And Development (0:51)
StartTesting (0:41)
Initial Implementation Phase (0:43)
StartPost Implementation Review (0:46)
StartSystem Change Procedures And Program Migration Process (0:37)
StartSection Review (1:22)
StartReview questions
Module 04 – Operation, Maintenance and Support of Information Systems
StartIntroduction (0:47)
StartLesson 1: Information System Operations (0:27)
StartManagement of IS Operations (0:45)
Control StartService Part1 (0:34)
Control StartService Part2 (1:08)
Control StartService Part3 (0:42)
Control StartService Part4 (0:30)
Control StartService Part5 (0:23)
StartService Level Part1 (0:52)
StartService Level Part2 (0:24)
Infrastructure Start Operations (0:38)
StartScheduling Part1 (0:22)
StartScheduling Part2 (1:04)
Start monitoring resource usage (0:31)
StartProcess incident handling (0:24)
Management StartProblem (0:58)
Detection, documentation, control, resolution and reporting of abnormal conditions (1:05)
StartSupport / Helpdesk Part 1 (1:15)
StartSupport / Helpdesk Part2 (0:53)
StartChange Control Process Part 1 (0:42)
Control Process StartChange Part2 (0:40)
StartRelease Management Part1 (0:52)
StartRelease Management Part2 (1:15)
Security Management StartInformation (0:39)
Disinfection StartMedia (1:36)
StartLesson 2: Information Systems Equipment (0:33)
Hardware Components and StartComputer Architecture (1:10)
StartCommon Enterprise Backend Devices (1:36)
StartSpecialized Devices (1:09)
Startrisks (0:43)
StartSecurity Control (1:00)
Start radio frequency identification (0:33)
StartRFID Apps (0:45)
StartRFID Risks (0:48)
StartRFID Security Control (0:37)
StartHardware Maintenance Program (1:08)
StartHardware Monitoring Procedures (0:54)
StartCapacity Management Part1 (0:57)
StartCapacity Management Part2 (1:00)
StartLesson 3: IS Architecture and Software Part1 (1:46)
Architecture and software StartIS Part2 (1:13)
StartSoftware Integrity Issues Part 1 (1:47)
Integrity Issues StartSoftware Part 2 (0:30)
StartActivity Logging and Reporting Options (1:15)
Communication Software StartData (0:53)
Control StartData (0:43)
Organization StartFile (1:14)
StartDatabase Management Systems Part1 (0:44)
StartDatabase Management Systems Part2 (0:40)
StartExample data in DBMS (6:02)
StartDBMS Architecture (0:55)
StartDBMS Metadata Architecture (0:51)
StartDatabase structure (1:10)
Shooting Database (0:46)
StartDatabase Models (3:34)
Star Relation Database Model (5:09)
StartDatabase Controls (02:20)
StartTape and Disk Management Systems (0:21)
Startup Programs (0:54)
StartSoftware Licensing Issues Part 1 (1:50)
StartSoftware Licensing Issues Part 2 (1:07)
StartSoftware Licensing Issues Part 3 (1:06)
Rights Management StartDigital (1:06)
StartLesson 4: Network Infrastructure (1:37)
Network Architecture StartEnterprise (0:36)
Starting types of networks (4:02)
StartNetwork Services (1:59)
StartNetwork Standards and Protocols (1:08)
StartOSI Architecture (1:16)
Starting Layers (10:46)
Introduction of the OSI Model to Network Architectures (0:49)
StartLocal Area Network (0:21)
StartNetwork Physical Media Specifications (02:57)
WANs implementation start (0:58)
StartLAN Media Access Technologies (2:28)
StartLAN Components (03:10)
StartOSI Layer Diagram (7:43)
StartLAN Technology Selection Criteria (0:47)
StartWide Area Networks Part1 (2:26)
StartWide Area Networks Part2 (3:10)
StartWAN Devices (02:05)
StartWAN Technologies (2:40)
StartWireless Networks (0:51)
StartWireless Wide Area Networks (0:33)
StartWireless Local Area Networks Part1 (0:36)
StartWireless Local Area Networks Part2 (2:24)
StartWireless Security (1:44)
StartWireless Application Protocol (0:34)
StartRisks of Wireless Communications Part1 (0:16)
StartRisks of Wireless Communications Part2 (1:38)
StartWorld Wide Web Services (1:14)
StartGeneral Internet Terminology (3:34)
StartNetwork Administration and Control (0:54)
StartNetwork Performance Metrics (1:46)
StartNetwork Management Challenges (1:25)
StartNetwork Management Tools (1:45)
StartClient / Server Technology Part 1 (0:40)
StartClient / Server Technology Part 2 (1:37)
StartClient / Server Technology Part 3 (0:51)
StartClient / Server Technology Part4 (1:34)
StartClient / Server Technology Part5 (0:44)
StartLesson 5: Disaster Recovery Planning (0:24)
Start point target and cooldown target part 1 (1:04)
StartRecovery Point Objective and Recovery Time Objective Part2 (0:44)
StartRecovery Strategies Part 1 (1:07)
StartRecovery Strategies Part2 (0:11)
StartRecovery Strategies Part3 (2:32)
Launch Recovery Techniques App Part 1 (1:04)
Disaster Recovery Techniques StartApplication Part2 (0:51)
StartData Disaster Recovery Techniques (0:36)
Start Telecommunication Networks Disaster Recovery Techniques (0:24)
StartMethods for Network Security (1:40)
Start developing disaster recovery plans (0:39)
Start-up organization and division of responsibilities Part 1 (0:52)
Start-up organization and division of responsibilities Part 2 (0:41)
Start-up organization and division of responsibilities Part 3 (0:08)
StartBackup and Recovery (0:20)
StartOff-Site Library Controls (1:25)
Backup Devices and Media Startup Types Part 1 (0:14)
StartTypes of Backup Devices and Media Part2 (0:29)
Backup Procedures StartPeriodic (0:25)
Starting speed (1:03)
StartBackup Schemes (1:45)
StartModule 04 Review (1:01)
StartReview questions
Module 05 – protecting information assets
Start of production (1:30)
StartLesson 1: The Importance of Information Security (1:18)
StartKey Information Security Controls (1:07)
Security Management Roles and Responsibilities StartInformation (0:15)
Take Certified Information Systems Auditor (CISA) at Whatstudy.com
More Info: Click to preview
Course Features
- Lectures 0
- Quizzes 0
- Duration Lifetime access
- Skill level All levels
- Language English
- Students 128
- Assessments Yes
1 Comment
“Welcome to Whatstudy.com Shop. We collect all online courses and put here for you to find the way
to improve verything in your life. Hopefully to serve you here. Thank you!”