CISA: Certified Information Systems Auditor

CISA: Certified Information Systems Auditor

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

$14.99 / $24.99

Lesson 1

  • 1. Introduction
    54s
  • 2. Audit Process
    10m 58s
  • 3. Auditing Standards
    14m 26s
  • 4. Auditing Guidelines
    13m 36s
  • 5. Cobit Model
    2m 36s
  • 6. Audit Management
    12m 38s
  • 7. Internal Control Classifications
    14m 27s
  • 8. Planning
    12m 40s
  • 9. Program
    7m 14s
  • 10. Evidence
    14m 31s
  • 11. Audit Control Evaluation
    12m 33s
  • 12. C S A Control Self- Assessment
    7m 54s

Lesson 2

  • 1. IT Governance
    12m 37s
  • 2. Outsourcing and Governance
    12m 10s
  • 3. Security Policies
    8m 7s
  • 4. IT Strategy
    5m 39s
  • 5. Organizational Compliance
    2m 23s
  • 6. Outsourcing and Globalization
    7m 27s
  • 7. IT Performance
    5m 9s

Lesson 3

  • 1. System And Infrastructure
    8m 32s
  • 2. Requirements
    13m 24s
  • 3. Project Management Tools- Part1
    11m 54s
  • 4. Project Management Tools- Part2
    13m 38s
  • 5. Applications
    10m 16s
  • 6. Agile Development
    15m 6s
  • 7. Monitoring And Controlling
    10m 38s
  • 8. Acquisition Process
    10m 59s
  • 9. Testing Process
    14m 19s
  • 10. Information Systems Maintenance Practices
    12m 55s
  • 11. Data Conversion Tools
    14m 15s

Lesson 4

  • 1. Media Disposal Process
    8m 41s
  • 2. Post Implementation Review
    6m 43s
  • 3. Periodic Review
    9m 32s
  • 4. System Maintenance
    7m 26s

Lesson 5

  • 1. IT Service Delivery And Support
    11m 56s
  • 2. How To Evaluate Service Level Management Practices
    3m 33s
  • 3. Operations Management
    13m 4s
  • 4. Databases
    9m 49s
  • 5. Structured Query Language
    10m 21s
  • 6. Monitoring Performance
    13m 48s
  • 7. Source Code And Performance Monitoring
    7m 21s
  • 8. Patch Management
    7m 46s
  • 9. Incident Management
    12m 16s
  • 10. Hardware Component Types
    13m
  • 11. Network Component Types
    12m 48s

Lesson 6

  • 1. I S Auditor Technical Overview
    11m 17s
  • 2. Security Design
    13m 21s
  • 3. Monitoring Systems
    13m 40s
  • 4. Types of Attacks
    15m 8s
  • 5. Cryptography
    8m 2s
  • 6. Encryption
    5m 34s
  • 7. Asymmetric Encryption
    11m 8s
  • 8. Digital Certificate
    14m 5s
  • 9. Different Kinds of Attacks
    12m 8s
  • 10. Access Controls
    11m 45s
  • 11. Identification and Authentication
    13m 42s
  • 12. Physical Access Exposure
    9m 8s
  • 13. Environmental Security
    13m 50s
  • 14. Network Security Devices and Network Components
    13m 46s
  • 15. Network Address Translation
    7m 8s
  • 16. Virtual Private Networks
    8m 34s
  • 17. Voice System Risks
    12m 9s
  • 18. Intrusion Detection
    4m 12s
  • 19. Firewalls
    11m 10s
  • 20. Firewall Implementation
    6m 32s
  • 21. Network Access Protection
    5m 46s
  • 22. Honey Pot
    3m 46s
  • 23. Risks to Portable And Wireless Devices
    11m 28s
  • 24. Bluetooth
    7m 20s
  • 25. OSI Networking
    13m 3s
  • 26. Managing Data
    8m 23s

Lesson 7

  • 1. Business Continuity and Disaster Recovery
    10m 53s
  • 2. Fault Tolerance
    7m 36s
  • 3. Business Continuity and Disaster Recovery Regulations
    10m 7s