Autoplay
Autocomplete
Previous Lesson
Complete and Continue
CISA: Certified Information Systems Auditor
New section
Course Overview (5:10)
Information System Auditing Process
Exam Overview (13:37)
Standards, Guidelines, and Professional Ethics (15:24)
IS Audit Functions (27:04)
Business Process Applications and Controls (31:33)
Control Types (21:49)
Risk and Audit Planning (17:50)
Project Management and Auditing (22:45)
Sampling Methodologies (14:12)
Collecting Evidence (12:30)
Data Analytics and CAATs (12:45)
Continuous Auditing (10:46)
How to Communicate the Audit Results (22:43)
Quality Assurance and Improving Audit (12:38)
Governance and Management of IT
What is Governance (12:37)
Best Practices for Enterprise Governance in IT (17:45)
Business Intelligence and Strategic Planning (19:13)
IT Standards, Policies and Procedures (11:33)
Organizational Structures (12:21)
Roles and Segregation of Duties (27:28)
Risk Management in the Enterprise (13:22)
Risk Analysis (8:51)
Maturity Models (11:38)
The Role of Industry Standards and Regulations (15:21)
Resource Management in IT (11:57)
Human Resource Management (17:05)
Organizational Change Management and Financial Management (12:41)
IT Service Provider Acquisition and Management (24:01)
Governance in the Cloud (10:29)
Third-party Services (14:17)
Quality Assurance and IT Audits (14:09)
Performance Monitoring and Reporting (12:45)
Information Systems Acquisition, Development and Implementation
Project Governance and Management (11:15)
Roles in Project Management (12:33)
The PMO (12:32)
Initiating the Project (10:26)
Planning the Project (17:50)
Executing and Monitoring the Project (10:22)
Closing the Project (15:16)
Business Case and Feasibility Analysis (13:17)
System Development Lifecycles (20:40)
System and Software Development Methods (18:45)
Computer Aided Software Engineering and 4GL (14:35)
Identifyng and Designing Controls (28:47)
Decision Support Systems (13:21)
Testing Methodologies (18:11)
Application Systems and Data Integrity Testing (19:25)
Data Migration (18:04)
Changeover Techniques (16:44)
System Change and Post Implementation Procedures (15:20)
Information Systems Operations and Business Resiliency
Necessary Technology Components (12:14)
USB and RFID (21:44)
IT Asset Management (13:13)
System Interfaces and End User Computing (17:04)
Data Governance (16:30)
Operating Systems (13:34)
Software Licensing and Source Code Management (19:14)
Incident and Problem Management (21:38)
Release and Patch Management (12:00)
Service Level Management and Agreements (11:04)
Database Management (18:18)
Business Impact Analysis (18:03)
System Resiliency (17:13)
Backups, Storage and Restoration (22:39)
Business Continuity Management (20:43)
The Business Continuity Plan (18:24)
Testing the BCP (17:07)
Disaster Recovery Plans (23:08)
Testing the DRP (11:51)
Protection of Information Assets
Frameworks, Standards and Guidelines
Roles and Responsibilities for Auditing the IS Management Framework
Recommended IT Security Baseline (21:05)
Principles of Data Privacy (20:12)
Physical Access and Controls (27:29)
Environmental Controls (17:35)
Identity and Access Management (13:04)
Logical Access and Authorization Issues (27:19)
Audit Logging of System Access (21:32)
Data Loss Prevention (12:09)
Network Infrastructure (18:40)
Applications in a Networked Environment
Network Infrastructure Security Firewalls (25:16)
Change Management in Networks (18:21)
Encryption Systems (17:41)
Applications of Cryptography (12:55)
The Public Key Infrastructure
IS Audits and Social Media (11:27)
Virtualization and Cloud Computing (12:44)
Security Awareness Training (14:31)
IS Attack Methods and Techniques (29:16)
Testing Techniques for Security Controls (11:34)
Network Penetration Testing (22:48)
Monitoring Tools (18:10)
Incident Response Management (23:39)
Evidence Collection and Forensics (22:49)
Course Overview
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock