Certified Information Systems Auditor Video Course

CISA: Certified Information Systems Auditor

Your Isaca CISA exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CISA certification test. Ace your Isaca CISA at the first attempt and obtain the Certified Information Systems Auditor credential with ease.

# of Students
237
# of Lectures
74
Course Length
12 h
Course Rating
4.5
Price $27.49
Today $24.99

Curriculum for CISA Video Course

Lesson 1

  Video Name Time
  1. Introduction 00:54
  2. Audit Process 10:58
  3. Auditing Standards 14:26
  4. Auditing Guidelines 13:36
  5. Cobit Model 02:36
  6. Audit Management 12:38
  7. Internal Control Classifications 14:27
  8. Planning 12:40
  9. Program 07:14
  10. Evidence 14:31
  11. Audit Control Evaluation 12:33
  12. C S A Control Self- Assessment 07:54
  Video Name Time
  1. IT Governance 12:37
  2. Outsourcing and Governance 12:10
  3. Security Policies 08:07
  4. IT Strategy 05:39
  5. Organizational Compliance 02:23
  6. Outsourcing and Globalization 07:27
  7. IT Performance 05:09
  Video Name Time
  1. System And Infrastructure 08:32
  2. Requirements 13:24
  3. Project Management Tools- Part1 11:54
  4. Project Management Tools- Part2 13:38
  5. Applications 10:16
  6. Agile Development 15:06
  7. Monitoring And Controlling 10:38
  8. Acquisition Process 10:59
  9. Testing Process 14:19
  10. Information Systems Maintenance Practices 12:55
  11. Data Conversion Tools 14:15
  Video Name Time
  1. Media Disposal Process 08:41
  2. Post Implementation Review 06:43
  3. Periodic Review 09:32
  4. System Maintenance 07:26
  Video Name Time
  1. IT Service Delivery And Support 11:56
  2. How To Evaluate Service Level Management Practices 03:33
  3. Operations Management 13:04
  4. Databases 09:49
  5. Structured Query Language 10:21
  6. Monitoring Performance 13:48
  7. Source Code And Performance Monitoring 07:21
  8. Patch Management 07:46
  9. Incident Management 12:16
  10. Hardware Component Types 13:00
  11. Network Component Types 12:48
  Video Name Time
  1. I S Auditor Technical Overview 11:17
  2. Security Design 13:21
  3. Monitoring Systems 13:40
  4. Types of Attacks 15:08
  5. Cryptography 08:02
  6. Encryption 05:34
  7. Asymmetric Encryption 11:08
  8. Digital Certificate 14:05
  9. Different Kinds of Attacks 12:08
  10. Access Controls 11:45
  11. Identification and Authentication 13:42
  12. Physical Access Exposure 09:08
  13. Environmental Security 13:50
  14. Network Security Devices and Network Components 13:46
  15. Network Address Translation 07:08
  16. Virtual Private Networks 08:34
  17. Voice System Risks 12:09
  18. Intrusion Detection 04:12
  19. Firewalls 11:10
  20. Firewall Implementation 06:32
  21. Network Access Protection 05:46
  22. Honey Pot 03:46
  23. Risks to Portable And Wireless Devices 11:28
  24. Bluetooth 07:20
  25. OSI Networking 13:03
  26. Managing Data 08:23
  Video Name Time
  1. Business Continuity and Disaster Recovery 10:53
  2. Fault Tolerance 07:36
  3. Business Continuity and Disaster Recovery Regulations 10:07

Student Feedback

5 Stars
4 Stars
3 Stars
2 Stars
1 Star
4.5
Rating: 4.5
Overall Rating: Good.

Similar Courses

Only Registered Members can View Training Courses

Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.

  • Trusted by 1.2M IT Certification Candidates Every Month
  • Hundreds Hours of Videos
  • Instant download After Registration

Already Member? Click here to Login

A confirmation link will be sent to this email address to verify your login

1200+ IT Certification Exams available: Get a free sample of any exam right now!
Try Free Demo

Try Free Demo

  • ABA
  • ACAMS
  • ACFE
  • ACI
  • ACSM
  • Adobe
  • AHIP
  • AHLEI
  • AICPA
  • AIWMI
  • Alfresco
  • Alibaba
  • AMA
  • Amazon
  • AndroidATC
  • APBM
  • API
  • APICS
  • Apple
  • Arista
  • ASIS
  • ASQ
  • Atlassian
  • Autodesk
  • Avaya
  • Axis Communications
  • BACB
  • BCS
  • Blockchain
  • Blue Coat
  • Blue Prism
  • C++ Institute
  • CA Technologies
  • CertNexus
  • Checkpoint
  • CIMA
  • Cisco
  • Citrix
  • CIW
  • Cloudera
  • CNCF
  • CompTIA
  • CSA
  • CyberArk
  • Databricks
  • Dell
  • DMI
  • DSCI
  • EMC
  • Esri
  • Exin
  • Extreme Networks
  • F5
  • FileMaker
  • FINRA
  • Fortinet
  • GAQM
  • GARP
  • Genesys
  • GIAC
  • Google
  • Guidance Software
  • H3C
  • HashiCorp
  • HFMA
  • HIPAA
  • Hitachi
  • HP
  • HRCI
  • Huawei
  • IAPP
  • IBM
  • IFPUG
  • IIA
  • IIBA
  • Informatica
  • Isaca
  • iSAQB
  • ISC
  • iSQI
  • ISTQB
  • ITIL
  • Juniper
  • Lenovo
  • Linux Foundation
  • Logical Operations
  • LPI
  • Magento
  • Marketo
  • McAfee
  • Microsoft
  • Mirantis
  • Mulesoft
  • NACVA
  • NCMA
  • NetSuite
  • Network Appliance
  • NI
  • Nokia
  • Novell
  • Nuage Networks
  • Nutanix
  • OMG
  • Oracle
  • Palo Alto Networks
  • Pegasystems
  • PEOPLECERT
  • PMI
  • PRINCE2
  • Pulse Secure
  • Python Institute
  • QlikView
  • RedHat
  • Riverbed
  • RSA
  • Salesforce
  • SANS
  • SAP
  • SAS Institute
  • Scrum
  • SDI
  • ServiceNow
  • Six Sigma
  • Slack
  • SNIA
  • Snowflake
  • SOA
  • Software Certifications
  • SolarWinds
  • Splunk
  • SpringSource
  • Symantec
  • Teradata
  • Test Prep
  • The Open Group
  • Tibco
  • UiPath
  • Unity Certification
  • VCE
  • Veeam
  • Veritas
  • Vmedu
  • VMware
  • WatchGuard
  • WorldatWork
  • Zend
Next Step
Next Step

Try Free Demo

  • Isaca
Next Step
Next Step