Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Information Security Auditor - CISA
Introduction
Introduction (2:40)
Student Feedback (1:00)
Student Portal (1:47)
How to Access the Student Poeral
Very Important Audit Templates
CISA Course and Certification
1. CISA Course Introduction (2:09)
2. CISA Certification (2:44)
3. CISA Exam (3:36)
4. CISA Course Outline (2:41)
5. Audit Overview (11:31)
Basic Knowledge
6. GRC (5:46)
7. GRC Tools (3:01)
8. ITAF (8:29)
9. Audit Scenario (1:42)
10. Standards (2:41)
11. Important Definations (2:36)
CISA Materials
12. Senior Management and GRC (7:27)
13. . Senior Management and Risks (6:42)
14. Organization Structure (5:27)
Domain 1 — Information System Auditing Process
15.Conduct an IS Audit (9:17)
16. IS Audit Report and Presentation samples (4:58)
17 Information Asesst Register (6:12)
18.Audit Risk Assessment (12:30)
19. Audit Planning and managment (7:23)
20. Document Control (3:23)
21. Audit Scenario (44:08)
22. Business process (7:16)
23. Law and regulation (2:20)
24. Evidence (5:56)
25. Sampling (3:58)
Domain 2 – Governance & Management of IT
IT Governance (3:06)
26. Governance and Management of IT (14:34)
27. NIST 800-100 (7:31)
28. Governance – Requirements (7:31)
29. Information System Strategy (4:53)
30. IT Organization (2:55)
31. Maintenace of Polcies and Procedures (5:04)
32. Policy and Procedures Resources (74:39)
33. Legal Compliance (8:38)
34. Quality Managment System (1:59)
35. Mutarity Models (3:22)
36. Process Optmization (3:56)
37. IT Investment Practices (5:34)
38. IT Supplier Selection (5:15)
39. Make or Buy decision (18:12)
40. Risk Managment (10:53)
41. Business Impact Analysis (10:41)
Domain 3 – Information Systems Acquisition, Development, & Implementation
42. Information Systems Acquisition, Development and Implementation (9:28)
43. Project Governance (2:32)
44. Types of Organization (6:38)
45. Project Managment (6:38)
46. Architecture (5:36)
47. Procurment Managment (1:09)
48. Plan Procurment Managment (18:12)
Domain 4 – Information Systems Operations and Business Resilience
49. Information System Operations (6:51)
50. Service Level Management (5:09)
51. Hardware, Software and Network (7:32)
52. Software Licensing (3:15)
53. Capacity Managment (2:49)
54. Incident Managment (5:35)
55. Incident Report Form (5:33)
56. Backup (5:59)
57. Disaster Recovery Plans (3:34)
58. Alternative Sites (8:09)
Domain 5 – Protection of Information Assets
59. Protection of Information Assets (7:13)
60. Access Control (19:23)
61. Network Security (17:08)
62. Cryptography (16:30)
63. Physical security (9:48)
64. Data classification practices. (12:40)
65. Policies and Practices. (24:49)
Teach online with
Very Important Audit Templates
Download
ISMS Controls -Gap Assessment EN.xlsx
Download
ISMS - IT Controls - Gap Assessment.xlsx
Download
IT Audit Checklist_V1.0.xls
Download
ISMS Internal Audit Report_Sample.doc
Download
Security Metrics Procedure V 1.3.doc
Complete and Continue