CISA: Certified Information Systems Auditor
Your Isaca CISA exam is just around the corner, right? So, it's high time to find an effective preparation tool! Our training course is what you really need! This is a series of videos led by the experienced IT instructors who will provide you with a detailed overview of the CISA certification test. Ace your Isaca CISA at the first attempt and obtain the Certified Information Systems Auditor credential with ease.
Curriculum for CISA Video Course
Lesson 1
Video Name | Time | |
---|---|---|
1. Introduction | 00:54 | |
2. Audit Process | 10:58 | |
3. Auditing Standards | 14:26 | |
4. Auditing Guidelines | 13:36 | |
5. Cobit Model | 02:36 | |
6. Audit Management | 12:38 | |
7. Internal Control Classifications | 14:27 | |
8. Planning | 12:40 | |
9. Program | 07:14 | |
10. Evidence | 14:31 | |
11. Audit Control Evaluation | 12:33 | |
12. C S A Control Self- Assessment | 07:54 |
Video Name | Time | |
---|---|---|
1. IT Governance | 12:37 | |
2. Outsourcing and Governance | 12:10 | |
3. Security Policies | 08:07 | |
4. IT Strategy | 05:39 | |
5. Organizational Compliance | 02:23 | |
6. Outsourcing and Globalization | 07:27 | |
7. IT Performance | 05:09 |
Video Name | Time | |
---|---|---|
1. System And Infrastructure | 08:32 | |
2. Requirements | 13:24 | |
3. Project Management Tools- Part1 | 11:54 | |
4. Project Management Tools- Part2 | 13:38 | |
5. Applications | 10:16 | |
6. Agile Development | 15:06 | |
7. Monitoring And Controlling | 10:38 | |
8. Acquisition Process | 10:59 | |
9. Testing Process | 14:19 | |
10. Information Systems Maintenance Practices | 12:55 | |
11. Data Conversion Tools | 14:15 |
Video Name | Time | |
---|---|---|
1. Media Disposal Process | 08:41 | |
2. Post Implementation Review | 06:43 | |
3. Periodic Review | 09:32 | |
4. System Maintenance | 07:26 |
Video Name | Time | |
---|---|---|
1. IT Service Delivery And Support | 11:56 | |
2. How To Evaluate Service Level Management Practices | 03:33 | |
3. Operations Management | 13:04 | |
4. Databases | 09:49 | |
5. Structured Query Language | 10:21 | |
6. Monitoring Performance | 13:48 | |
7. Source Code And Performance Monitoring | 07:21 | |
8. Patch Management | 07:46 | |
9. Incident Management | 12:16 | |
10. Hardware Component Types | 13:00 | |
11. Network Component Types | 12:48 |
Video Name | Time | |
---|---|---|
1. I S Auditor Technical Overview | 11:17 | |
2. Security Design | 13:21 | |
3. Monitoring Systems | 13:40 | |
4. Types of Attacks | 15:08 | |
5. Cryptography | 08:02 | |
6. Encryption | 05:34 | |
7. Asymmetric Encryption | 11:08 | |
8. Digital Certificate | 14:05 | |
9. Different Kinds of Attacks | 12:08 | |
10. Access Controls | 11:45 | |
11. Identification and Authentication | 13:42 | |
12. Physical Access Exposure | 09:08 | |
13. Environmental Security | 13:50 | |
14. Network Security Devices and Network Components | 13:46 | |
15. Network Address Translation | 07:08 | |
16. Virtual Private Networks | 08:34 | |
17. Voice System Risks | 12:09 | |
18. Intrusion Detection | 04:12 | |
19. Firewalls | 11:10 | |
20. Firewall Implementation | 06:32 | |
21. Network Access Protection | 05:46 | |
22. Honey Pot | 03:46 | |
23. Risks to Portable And Wireless Devices | 11:28 | |
24. Bluetooth | 07:20 | |
25. OSI Networking | 13:03 | |
26. Managing Data | 08:23 |
Video Name | Time | |
---|---|---|
1. Business Continuity and Disaster Recovery | 10:53 | |
2. Fault Tolerance | 07:36 | |
3. Business Continuity and Disaster Recovery Regulations | 10:07 |
Student Feedback
Similar Courses
Only Registered Members can View Training Courses
Please fill out your email address below in order to view Training Courses. Registration is Free and Easy, You Simply need to provide an email address.
Try Free Demo
Try Free Demo