CISA: Certified Information Systems Auditor

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
$14.99 / $24.99
Lesson 1
-
1. Introduction54s
-
2. Audit Process10m 58s
-
3. Auditing Standards14m 26s
-
4. Auditing Guidelines13m 36s
-
5. Cobit Model2m 36s
-
6. Audit Management12m 38s
-
7. Internal Control Classifications14m 27s
-
8. Planning12m 40s
-
9. Program7m 14s
-
10. Evidence14m 31s
-
11. Audit Control Evaluation12m 33s
-
12. C S A Control Self- Assessment7m 54s
Lesson 2
-
1. IT Governance12m 37s
-
2. Outsourcing and Governance12m 10s
-
3. Security Policies8m 7s
-
4. IT Strategy5m 39s
-
5. Organizational Compliance2m 23s
-
6. Outsourcing and Globalization7m 27s
-
7. IT Performance5m 9s
Lesson 3
-
1. System And Infrastructure8m 32s
-
2. Requirements13m 24s
-
3. Project Management Tools- Part111m 54s
-
4. Project Management Tools- Part213m 38s
-
5. Applications10m 16s
-
6. Agile Development15m 6s
-
7. Monitoring And Controlling10m 38s
-
8. Acquisition Process10m 59s
-
9. Testing Process14m 19s
-
10. Information Systems Maintenance Practices12m 55s
-
11. Data Conversion Tools14m 15s
Lesson 4
-
1. Media Disposal Process8m 41s
-
2. Post Implementation Review6m 43s
-
3. Periodic Review9m 32s
-
4. System Maintenance7m 26s
Lesson 5
-
1. IT Service Delivery And Support11m 56s
-
2. How To Evaluate Service Level Management Practices3m 33s
-
3. Operations Management13m 4s
-
4. Databases9m 49s
-
5. Structured Query Language10m 21s
-
6. Monitoring Performance13m 48s
-
7. Source Code And Performance Monitoring7m 21s
-
8. Patch Management7m 46s
-
9. Incident Management12m 16s
-
10. Hardware Component Types13m
-
11. Network Component Types12m 48s
Lesson 6
-
1. I S Auditor Technical Overview11m 17s
-
2. Security Design13m 21s
-
3. Monitoring Systems13m 40s
-
4. Types of Attacks15m 8s
-
5. Cryptography8m 2s
-
6. Encryption5m 34s
-
7. Asymmetric Encryption11m 8s
-
8. Digital Certificate14m 5s
-
9. Different Kinds of Attacks12m 8s
-
10. Access Controls11m 45s
-
11. Identification and Authentication13m 42s
-
12. Physical Access Exposure9m 8s
-
13. Environmental Security13m 50s
-
14. Network Security Devices and Network Components13m 46s
-
15. Network Address Translation7m 8s
-
16. Virtual Private Networks8m 34s
-
17. Voice System Risks12m 9s
-
18. Intrusion Detection4m 12s
-
19. Firewalls11m 10s
-
20. Firewall Implementation6m 32s
-
21. Network Access Protection5m 46s
-
22. Honey Pot3m 46s
-
23. Risks to Portable And Wireless Devices11m 28s
-
24. Bluetooth7m 20s
-
25. OSI Networking13m 3s
-
26. Managing Data8m 23s
Lesson 7
-
1. Business Continuity and Disaster Recovery10m 53s
-
2. Fault Tolerance7m 36s
-
3. Business Continuity and Disaster Recovery Regulations10m 7s