image
The Ultimate Drawing Course Beginner to Advanced...
$179
$79
image
User Experience Design Essentials - Adobe XD UI UX...
$179
$79
Total:
$659

Description

This course is aligned with CISA - 2024 edition of ISACA.
Please note that objective of this course is to support and supplement the content of the ISACA's official resources. This course is not meant to replace CISA Review Manual and Question, Answer and Explanation Manual. Candidates are strongly advised to use ISACA's official resource as prime resource to study for CISA exam. This course will help you to decipher the technicities used in official resources.
This course is designed on the basis of official resources of ISACA. It covers all the 5 domains of CISA Review Manual. Topics are arranged segment wise and aligned with latest CISA Review Manual.
Course is designed specifically for candidates from non-technical background. Video contents are designed after considering three major aspects:
(1) Whether content has capability to engage the audience throughout?
(2) Whether content is able to convey the meaning of CISA Review Manual (CRM) in a effective manner.
(3) Whether video has capability to make audience understand and retain the key aspects for a longer duration.
Features of this course are as follow:
This course is designed on the basis of official resources of ISACA.
Course is designed specifically for candidates from non-technical background.
Topics are arranged segment wise and aligned with latest CISA Review Manual.
Exam oriented practice questions and practical example for CISA aspirants.
Flashcards based learning mode.
Use of smartarts for easy learning
More than 1000 plus practice questions
Who this course is for:
IT Auditor, System Auditor
Risk Manager
Information Security Professional

What you'll learn

Certified Information System Audits (ISACA -CISA) Lectures

Contains all the 5 Domains of CISA Review Manual

Candidate will able to understand practical aspects of Information System Audit

Candidate will able to confidently attempt and pass the CISA exam

Requirements

  • You will need a copy of Adobe XD 2019 or above. A free trial can be downloaded from Adobe.
  • No previous design experience is needed.
  • No previous Adobe XD skills are needed.

Course Content

27 sections • 95 lectures
Expand All Sections
1-Information System Auditing Process
49
1.1-1.1.1A Audit Planning
1.2-1.1.1B - Key Aspects - Audit Planning
1.3-1.1.1C - QAE - Audit Planning
1.4-Practice Questions - Audit Planning
1.5-1.1.2 Audit Charter
1.6-Practice Questions - Audit Charter
1.7-1.2 Electronic Data Interchange (EDI)
1.8-Practice Questions - EDI
1.9-1.3.1 Internal Controls
1.10-1.3.2 Internal Controls - Key Aspects
1.11-1.3.3 Internal Controls - QAE
1.12-Practice Questions - Internal Controls
1.13-1.4.1 What is Risk?
1.14-1.4.2 Understanding Vulnerabilities and threats
1.15-1.4.3 Types of Risks
1.16-1.4.4 Risk response methodology
1.17-1.4.5 Key Aspects - Risk based Audit Planning
1.18-1.4.6 QAE - Risk based Audit Planning
1.19-Practice Questions - Risk based Audit Planning
1.20-1.5 Steps of Risk Assessment
1.21-1.6.1 Key Aspects - Audit Project Management
1.22-1.6.2 QAE - Audit Project Management
1.23-Practice Questions - Audit Project Management
1.24-1.7.1 Sampling Methodology
1.25-1.7.2 Compliance and Substantive Testing
1.26-Practice Questions - Sampling Methodology
1.27-1.8 Audit Evidence Collection Techniques
1.28-Practice Questions - Audit Evidence Collection Techniques
1.29-1.9.1 Continous Auditing Techniques
1.30-1.9.2 Data Analytics
1.31-Practice Questions - Data Analytics
1.32-1.10 Reporting and Communication Techniques
1.33-Practice Questions - Reporting and Communication Techniques
1.34-1.11 Control Self Assessment
1.35-Practice Questions - Control Self Assessment
1.36-1.12 - IS Internal Audit Function
1.37-Flashcards - IS Internal Audit Function
1.38-Practice Questions - IS Internal Audit Function
1.39-1.13 - Managing third party IS Auditors and other experts
1.40-Flashcards - Managing Third Party IS Auditors and Other Experts
1.41-Practice Questions - Managing third party IS Auditors and other experts
1.42-1.14 - Agile Auditing
1.43-Flashcards - Agile Auditing
1.44-Practice Questions - Agile Auditing
1.45-1.15 - Quality Assurance of Audit Process
1.46-Flashcards - Quality Assurance of Audit Process
1.47-Practice Questions - Quality Assurance of Audit Process
1.48-1.16 - Use of Artificial Intelligence in Audit Process
1.49-Practice Questions - Use of Artificial Intelligence in Audit Process
2-Domain 2 - Governance and Management of IT
33
2.1-2.1.1 Key Aspects Enterprise Governance of Information and Technology
2.2-2.1.2 QAE Enterprise Governance of Information and Technology
2.3-Practice Questions - EGIT
2.4-2.3.1 IT Standards, Policies and Procedures
2.5-Practice Questions - IT Standards, Policies and Procedures
2.6-2.3.2 Approaches for Policy Development (Top down & Bottom up)
2.7-2.4.1 Organizational Structure - Roles and Responsibility of Various Functions
2.8-2.4.2 IT Strategy & Steering Commitee
2.9-Practice Questions - Roles and Responsibilities
2.10-2.5 Enterprise Architecture
2.11-Practice Questions - Enterprise Architecture
2.12-2.6.2 Risk Treatment
2.13-2.6.1 Risk Analysis Methods
2.14-2.6.3 Enterprise Risk Management.
2.15-Practice Questions - Enterprise Risk Management
2.16-2.7 Maturity Models
2.17-2.8 Laws, Regulations and Industry Standards Affecting the Organization
2.18-Practice Questions - Laws & Regulations
2.19-2.9 IT Resource Management Training Scheduling and Time Reporting Terms and Cond
2.20-Practice Questions - IT Resource Management
2.21-2.10 IT Service Provider Acquisition and Management
2.22-Practice Questions - IT Service Providers
2.23-2.11.1 IT Performance Monitoring and Reporting
2.24-2.11.2 Balanced Score Card
2.25-Practice Questions - IT Performance Monitoring and Reporting
2.26-2.12 Quality Assurance and Quality Management of IT
2.27-Practice Questions - Quality Assurance and Quality Management
2.28-2.13 - Data Privacy Program and Principles
2.29-Flashcards - Data Privacy Program and Principles
2.30-Practice Questions - Data Privacy Program and Principles
2.31-2.14 - Data Classification
2.32-Flashcards - Data Classification
2.33-Practice Questions - Data Classification
3-Domain 3 - Information Systems Acquisition, Development and Implementation
25
3.1-3.1.1 Project Evaluation Methods
3.2-3.1.2 Project Management Structure
3.3-Practice Questions - Project Management Structure
3.4-3.2 Business Case and Feasibility Analysis
3.5-Practice Questions - Business Case and Feasibility Analysis
3.6-3.3.1 Agile System Development Methodology
3.7-3.3.2 Object Oriented system development methodology
3.8-3.3.3 Prototype & Rapid Application Development (RAD)
3.9-3.3.4.1 Key Aspects - System Development Methodologies
3.10-3.3.4.2 QAE - System Development Methodologies
3.11-Practice Questions - System Development Methodologies
3.12-3.4.1 Check Digit
3.13-3.4.2 Parity Bit, Checksum and CRC
3.14-3.4.3.1 Key Aspects - Control Identification and Design and Balancing
3.15-3.4.3.2 QAE - Control Identification and Design and Balancing
3.16-Practice Questions - Control Identification and Design
3.17-3.5 Testing Methodologies
3.18-Practice Questions - Testing Methodology
3.19-3.7 System Migration, Infrastructure Deployment and Data Conversion
3.20-Practice Questions - System Migration
3.21-3.8 Post-implementation Review
3.22-Practice Questions - Post Implementation Review
3.23-Configuration & Release Management
3.24-Flashcards - Configuration and Release Management
3.25-Practice Questions - Configuration & Release Management
4-Domain 4 - Information Systems Operations, Maintenance and Support
42
4.1-4.1.1 RFID
4.2-Practice Questions - RFID
4.3-4.2 IT Asset Management
4.4-Practice Questions - IT Asset Management
4.5-4.3 Job Scheduling and Production Process Automation
4.6-Practice Questions - Job Scheduling and Production Process
4.7-4.5 End-user Computing
4.8-Practice Questions - End User Computing
4.9-4.7 Systems Performance Management
4.10-Practice Questions - Systems Performance Management
4.11-4.8.1 Problem and Incident Management
4.12-Practice Questions - Problem and Incident Management
4.13-4.8.2 Network Management Tools
4.14-4.9 Change, Configuration, Release and Patch Management
4.15-Practice Questions - Change, configuration, release and patch management
4.16-4.10 IT Service Level Management
4.17-Practice Questions - IT Service Level Management
4.18-4.11.1 Relational database model
4.19-4.11.2 Database Normalization
4.20-4.11.3 Database checks and controls
4.21-4.11.4 DBA Roles and Responsibilites & SoD
4.22-4.11.5 Database Management
4.23-Practice Questions - Database Management
4.24-4.12 Business Impact Analysis
4.25-Practice Questions - Business Impact Analysis
4.26-4.13 System Resiliency
4.27-Practice Questions - System Resiliency
4.28-4.15.2 Business Continuity Plan
4.29-Practice Questions - Business Continuity Plan
4.30-4.16.1 Types of Backup
4.31-Practice Questions - Types of Backup
4.32-4.16.2 RTO & RPO
4.33-Practice Questions - RTO & RPO
4.34-4.16.3 Alternate Recovery Site
4.35-Practice Questions - Alternate Recovery Site
4.36-4.16.4 Disaster Recovery Plans
4.37-Practice Questions - Disaster Recovery Plans
4.38-4.16.5 DRP - Test Methods
4.39-Practice Questions - DRP Test Methods
4.40-4.17 - Operational Log Management
4.41-Flashcards - Operational Log Management
4.42-Practice Questions - Operational Log Management
5-Domain 5 - Protection of Information Assets
70
5.1-5.1 Information Security Management Framework
5.2-Practice Questions - Information Security Management Framework
5.3-5.2 Privacy Principles
5.4-Practice Questions - Privacy Principles
5.5-5.3.1 Physical Access and Environmental Controls
5.6-5.3.2 Fire Supression Systems
5.7-Practice Questions - Physical Access and Environmental Control
5.8-5.4.1 Single Sign On
5.9-5.4.2 Factor of Authentication
5.10-5.4.3.1 Key Aspects - Identity and Access Management
5.11-5.4.3.2 QAE 1 - Identity and Access Management
5.12-5.4.3.3 QAE 2 - Identity and Access Management
5.13-Practice Questions - Identity and Access Management
5.14-5.5.1 Biometrics
5.15-Practice Questions - Biometric
5.16-5.5.2 OSI Layers
5.17-5.5.3 Firewall Types
5.18-5.5.4 Firewall Implementation
5.19-5.5.4A - Next Generation Firewalls (NGFW)
5.20-5.5.4B - Unified Threat Management (UTM)
5.21-Practice Questions - Firewall Types and Implementation
5.22-5.5.5 Virtual Private Network
5.23-Practice Questions - Virtual Private Network (VPN)
5.24-5.5.6 Network LAN Components
5.25-5.5.7 Network Physical Devices
5.26-5.5.7A - Other Network Devices
5.27-Practice Questions - Network Devices
5.28-5.5.8 Voice over Internet Protocols (VoIP)
5.29-Practice Questions - Voice over Internet Protocols (VoIP)
5.30-5.5.9 Wireless Network
5.31-Practice Questions - Wireless Network
5.32-5.5.10 Email Security
5.33-Practice Questions - Email Security
5.34-5.6 Classification of Information Assets
5.35-5.7 Data Encryption and Encryption-related Techniques
5.36-5.7.1 - Other Encryption Techniques
5.37-Practice Questions - Public Key Cryptography
5.38-5.8 Public Key Infrastructure
5.39-Practice Questions - Elements of Public Key Infrastructure
5.40-Cloud Computing
5.41-Practices Questions - Cloud Computing
5.42-5.12 Security Awareness Training and Programs
5.43-Practice Questions - Security Awareness Training and Program
5.44-5.13.1 Information System Attack Methods and Techniques
5.45-5.13.2 Key Aspects - Information System Attack Methods and Techniques
5.46-5.13.3 QAE - Information System Attack Methods and Techniques
5.47-Practice Questions - Information system attack methods and techniques
5.48-Security Testing Tools and Techniques
5.49-Practice Questions - Security Testing Tools and Techniques
5.50-5.15 IDS & IPS
5.51-Practice Questions - Security monitoring tools and techniques
5.52-5.16 Incident Response Management
5.53-Practice Questions - Incident Response Management
5.54-5.17 Evidence Collection and Forensics
5.55-Practice Questions - Evidence Collection and Forensics
5.56-5.18 - Zero Trust
5.57-Practice Questions - Zero Trust
5.58-5.19 - Privilege Access Management
5.59-Practice Questions - Privilege Access Management
5.60-5.20 - Directory Services
5.61-5.21 - Identity as a Service (IaaS)
5.62-5.22 - Digital Right Management (DRM)
5.63-5.23 - Federated Identity Management (FIM)
5.64-Flashcards - Iaas, DRM and FIM
5.65-5.24 - Data Loss Prevention (DLP)
5.66-Flashcards - Data Loss Prevention (DLP)
5.67-Practice Questions - Data Loss Prevention (DLP)
5.68-5.25 - Virtualization
5.69-Practice Questions - Virtualization
5.70-5.26 - Containerization
6-Practice Questions
30
6.1-Practice Questions - Set 1
6.2-Practice Questions - Set 2
6.3-Practice Questions - Set 3
6.4-Practice Questions - Set 4
6.5-Practice Questions - Set 5
6.6-Practice Questions - Set 6
6.7-Practice Questions - Set 7
6.8-Practice Questions - Set 8
6.9-Practice Questions - Set 9
6.10-Practice Questions - Set 10
6.11-Practice Questions - Set 11
6.12-Practice Questions - Set 12
6.13-Practice Questions - Set 13
6.14-Practice Questions - Set 14
6.15-Practice Questions - Set 15
6.16-Practice Questions - Set 16
6.17-Practice Questions - Set 17
6.18-Practice Questions - Set 18
6.19-Practice Questions - Set 19
6.20-Practice Questions - Set 20
6.21-Practice Questions - Set 21
6.22-Practice Questions - Set 22
6.23-Practice Questions - Set 23
6.24-Practice Questions - Set 24
6.25-Practice Questions - Set 25
6.26-Practice Questions - Set 26
6.27-Practice Questions - Set 27
6.28-Practice Questions - Set 28
6.29-Practice Questions - Set 29
6.30-Practice Questions - Set 30