CISA

0(0 Ratings) 5 Students enrolled
Created by Certy Box Last updated Fri, 04-Sep-2020 English
What will i learn?

Curriculum for this course
161 Lessons 00:00:00 Hours
Managing the IS Audit Function
8 Lessons 00:00:00 Hours
  • Project Management Practices Part 2 00:00:00
  • Development Methods 2 00:00:00
  • IS Audit and Assurance Reporting Guidelines 00:00:00
  • IS Audit Planning 00:00:00
  • Legal Regulatory impacts on IS Audit Planning 00:00:00
  • IS Audit Function Organisation 00:00:00
  • IS Audit Resource Mgmt 00:00:00
  • Quiz
  • ISACA Code of Professional Ethics 00:00:00
  • IS Audit and Assurance General Standards 00:00:00
  • IS Audit and Assurance Performance Standards 00:00:00
  • IS Audit and Assurance Reporting Standards 00:00:00
  • Quiz
  • IS Audit and Assurance General Guidelines 00:00:00
  • IS Audit and Assurance Performance Guidelines 00:00:00
  • IS Audit and Assurance Tools and Techniques 00:00:00
  • Guidelines, Standards & Tools Interrelationships 00:00:00
  • ITAF 00:00:00
  • Quiz
  • Risk Analysis 00:00:00
  • Internal Controls 00:00:00
  • IS Control Objectives 00:00:00
  • COBIT 5 00:00:00
  • General Controls 00:00:00
  • IS Specific Controls 00:00:00
  • Quiz
  • Exercise 00:00:00
  • Audit Objectives 00:00:00
  • Audit Types 00:00:00
  • Audit Methodology 00:00:00
  • Risk-based Auditing 00:00:00
  • Audit Risk and Materiality 00:00:00
  • Risk Assessment and Treatment 00:00:00
  • Quiz
  • Audit Programs 00:00:00
  • Fraud Detection 00:00:00
  • Compliance vs Substantive Testing 00:00:00
  • Evidence 00:00:00
  • Interviewing & Observance 00:00:00
  • Sampling 00:00:00
  • Outsourcing IS Assurance & Security Services 00:00:00
  • Computer-assisted Audit Techniques 00:00:00
  • Evaluating the Control Environment 00:00:00
  • Exit Interviews & Audit Reports 00:00:00
  • Audit Documentation 00:00:00
  • Closing Findings 00:00:00
  • Objectives of CSA 00:00:00
  • Benefits & Disadvantages of CSA 00:00:00
  • Role of the Auditor in CSA 00:00:00
  • CSA Approach & Drivers 00:00:00
  • Integrated Auditing 00:00:00
  • Continuous Auditing 00:00:00
  • Exercise 00:00:00
  • Corporate Governance 00:00:00
  • Governance of Enterprise IT Best Practices 00:00:00
  • IT Governing Committees 00:00:00
  • IT Balanced Scorecard 00:00:00
  • Information Security Governance 00:00:00
  • Enterprise Architecture 00:00:00
  • IS Strategic Planning 00:00:00
  • IT Steering Committee 00:00:00
  • Maturity & Process Improvement Models 00:00:00
  • Value of IT 00:00:00
  • IT Portfolio Management 00:00:00
  • Policies 00:00:00
  • Procedures 00:00:00
  • Developing a Risk Management Program 00:00:00
  • Risk Management Process 00:00:00
  • Human Resources Management 00:00:00
  • Human Resources Management 00:00:00
  • Sourcing Practices 00:00:00
  • Organizational Change Management 00:00:00
  • Financial Management Practices 00:00:00
  • Information Security Management 00:00:00
  • Performance Optimization 00:00:00
  • Exercise 00:00:00
  • IT Roles and Responsibilities 00:00:00
  • Segregation of Duties within IT 00:00:00
  • Segregation of Duties Controls 00:00:00
  • Reviewing Documentation 00:00:00
  • Reviewing Contractual Commitments 00:00:00
  • Reviewing the Business Continuity Plan 00:00:00
  • Evaluating Results & Interviewing Personnel 00:00:00
  • Evaluating Offsite Storage & Security 00:00:00
  • Reviewing Contracts & Insurance Coverage 00:00:00
  • IT Business Continuity Planning 00:00:00
  • Disasters Events 00:00:00
  • Business Continuity Planning Process & Policy 00:00:00
  • Business Continuity Planning Incident Management 00:00:00
  • Business Impact Analysis 00:00:00
  • Development of Business Continuity Plans 00:00:00
  • Components of a Business Continuity Plan 00:00:00
  • Plan Testing 00:00:00
  • Exercise 00:00:00
  • Benefits Realization 00:00:00
  • Project Management Structure 00:00:00
  • Project Management Practices Part 1 00:00:00
  • Project Management Practices Part 2 00:00:00
  • Business Application Development 1 00:00:00
  • Business Application Development 2 00:00:00
  • Virtualization & Cloud Computing Environments 00:00:00
  • Business Application Systems 1 00:00:00
  • Business Application Systems 2 00:00:00
  • Development Methods 1 00:00:00
  • Development Methods 2 00:00:00
  • Infrastructure Development Practices 00:00:00
  • Acquisition Practices 00:00:00
  • Change Management Process & Documentation 00:00:00
  • Testing, Auditing & Configuration Management 00:00:00
  • System Development Tools & Productivity Aids 00:00:00
  • Process Improvement Practices 00:00:00
  • Input/Origination Controls 00:00:00
  • Processing Procedures & Controls 00:00:00
  • Output Controls & Control Assurance 00:00:00
  • Auditing Application Controls 00:00:00
  • Auditing Systems Dev, Acquisition & Maintenance 00:00:00
  • Exercise 00:00:00
  • Management of IS Operations 00:00:00
  • IT Service Management 00:00:00
  • IS Operations 00:00:00
  • Incident and Problem Management & Support 00:00:00
  • Change Management 00:00:00
  • IT Asset Management 00:00:00
  • Computer Hardware Components & Architectures 00:00:00
  • Incident, Problem Management and Support 00:00:00
  • Capacity Management 00:00:00
  • Operating Systems 00:00:00
  • Data Communications Software 00:00:00
  • Data Management 00:00:00
  • Database Management System 00:00:00
  • IS Software Utility & Licensing 00:00:00
  • Network Architectures, Services & Standards 00:00:00
  • OSI Architecture and Application 00:00:00
  • Infrastructure Auditing Best Practices 00:00:00
  • Operations Auditing Best Practices 00:00:00
  • Recovery Objectives, Strategies, & Alternatives 00:00:00
  • Disaster Recovery Plan Development 00:00:00
  • Backup & Restoration 00:00:00
  • Disaster Recovery Testing Methods 00:00:00
  • Exercise 00:00:00
  • IS Management Key Elements 00:00:00
  • IS Management Roles & Responsibilities 00:00:00
  • Classifying Information Assets 00:00:00
  • Fraud Risk Factors 00:00:00
  • Information Security Control Design 00:00:00
  • System Access Permission 00:00:00
  • Mandatory & Discretionary Access Controls 00:00:00
  • Privacy Principles & the IS Auditor Role 00:00:00
  • IS Management Critical Success Factors 00:00:00
  • Information Security & External Parties 00:00:00
  • HR Security and Third Parties 00:00:00
  • Computer Crime Issues & Exposures 00:00:00
  • Security Incident Handling & Response 00:00:00
  • Logical Access Exposures 00:00:00
  • IT Environment Familiarization 00:00:00
  • Logic Access Paths 00:00:00
  • Logical Access Control Software 00:00:00
  • Identification & Authentication 00:00:00
  • Authorization Issues 00:00:00
  • Handling confidential information 00:00:00
  • Exercise 00:00:00
Requirements
+ View more
Description
+ View more
Other related courses
00:00:00 Hours
Updated Mon, 10-Jun-2019
0 0 $12500
00:00:00 Hours
Updated Tue, 15-Jun-2021
0 57 $25000
00:00:00 Hours
Updated Tue, 19-Mar-2024
0 29 $0
00:00:00 Hours
0 35 $0
00:00:00 Hours
Updated Thu, 19-May-2022
0 16 $0
About the instructor
  • 0 Reviews
  • 785 Students
  • 152 Courses
+ View more
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
Buy now
Includes:
  • 00:00:00 Hours On demand videos
  • 161 Lessons
  • Full lifetime access
  • Access on mobile and tv