Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
CISA Domain: IS Operations, Maintenance and Support - Part 1 $74.95
CISA Domain: IS Operations, Maintenance, and Support - Part 2 $74.95
CISA Domain: Protection of Information Assets - Part 1 $74.95
CISA Domain: Protection of Information Assets - Part 2 $74.95
CISA Domain: IS Acquisition, Development and Implementation - Part 3 $74.95

Bundle Price: $199.00
Total Savings: $175.75


CISA Domain: IS Operations, Maintenance and Support - Part 1

Auditing IS functions must take the hardware and infrastructure resources into account. This course examines IS operation and how it is managed along with IS hardware, and the various components that need to be monitored and audited. This course also examines the architecture of the software and the data management systems that are used in an IS environment. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization's information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • recognize IS management operations
  • recognize IS monitoring and support operations
  • recognize IS change management
  • match computer hardware components and architectures with their correct descriptions
  • recognize hardware maintenance and monitoring procedures
  • implement capacity planning
  • describe the different types of information systems operations
  • recognize information systems hardware concepts
  • describe operating systems and access control
  • recognize database communications and management systems
  • recognize tape and disk management systems and utility programs
  • recognize software licensing issues and define digital rights management
  • recognize the different types of review questions asked during infrastructure and operations auditing
  • recognize IS architecture and software concepts
  • recognize how to audit infrastructure and operations

CISA Domain: IS Operations, Maintenance, and Support - Part 2

Enterprise network infrastructures and architectures are an integral part of enterprise environments today and are widely unknown to most users. The IS auditor must have a high level knowledge of these frameworks and a clear communication path to those who control them. This course examines the types of networks that are commonly found in enterprises today and the services and components that are commonly used in them. This course also examines disaster recovery strategies and scenarios that must be put in place to deal with any emergency situations that may occur. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • describe the different types of networks
  • recognize network services and network standards and protocols
  • implement the OSI model in Local Area Networks (LANs)
  • describe the characteristics of Wide Area Networks (WANs)
  • describe the characteristics of wireless networks
  • describe enterprise network architectures
  • describe the characteristics of WANs and wireless networks
  • recognize public Internet infrastructures
  • describe network administration and control features
  • define recovery point objective (RPO) and recovery time objective (RTO)
  • recognize recovery strategies and recovery alternatives
  • recognize disaster recovery plan contents and scenarios
  • describe backup and restoration methods
  • recognize public Internet infrastructures and network administration and control features
  • recognize disaster recovery planning concepts

CISA Domain: Protection of Information Assets - Part 1

One of the main reasons an organization will bring on a CISA is to protect the IS assets of that organization. Resources, both internal and external, need to be secured and access must be controlled at all times. This course examines information security elements and assets, both internal and external, along with the elements that play a role in the protection of those assets. This course also examines the computer crimes that can befall an organization and the incident handling methods that can be used. Finally, this course examines logical access and the methods that can be used to protect assets. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • recognize IS management elements, roles and responsibilities, and asset classifications
  • describe system access permissions and controls
  • recognize the role of an IS auditor in privacy management and the success of IS management
  • recognize information security issues relating to external parties
  • recognize human resources security relating issues to third parties
  • recognize information security elements and assets
  • recognize IS and HR security issues relating to third parties
  • recognize different types of computer crimes and exposures
  • recognize how to handle and respond to security incidents
  • recognize logical access exposures, paths, and controls
  • recognize methods of identification and authentication
  • describe the various situations or procedures where authorization issues can occur
  • recognize how to manage sensitive information
  • recognize issues related to computer crime and incident handling
  • describe logical access and I&A
  • recognize authorization issues and how to manage sensitive information

CISA Domain: Protection of Information Assets - Part 2

Securing the network infrastructure is one of the main reasons an IT department exists in an enterprise environment. The role of a CISA is to audit the security measures and to make sure that the most efficient methods are being used to secure the environment. This course examines the components of the network infrastructure, the common threats they face, and how they can be secured. This course also examines the methods used by a CISA to audit and test the IS security and the internal and external security controls that can be used. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • recognize LAN security
  • recognize client-server security risks and issues
  • recognize wireless security threats and risk mitigation
  • describe Internet security threats and controls
  • recognize the different categories of firewall security systems available
  • recognize examples of firewall implementations and describe firewall issues
  • describe IDS, IPS, honeypots, and honeynets
  • recognize different types of encryption systems
  • describe digital signatures, digital envelope, and public key infrastructure
  • recognize applications of cryptographic systems and encryption risks
  • recognize virus controls and antivirus strategies
  • describe voice-over IP technology
  • describe private branch exchange
  • recognize network infrastructure security issues and controls
  • describe Internet threats and security measures
  • recognize encryption methods
  • recognize virus controls, VoIP, and PBX
  • recognize how to audit the information security management framework
  • recognize how to audit logical access controls
  • describe security testing and investigation techniques
  • recognize how to audit remote access
  • describe computer forensic activities
  • recognize environmental exposures and controls
  • recognize physical access exposures and controls
  • describe mobile computing controls
  • recognize how to audit, test, and investigate IS security
  • recognize how to audit network infrastructure security
  • recognize environmental, physical, and mobile computing controls

CISA Domain: IS Acquisition, Development and Implementation - Part 3

This course examines the auditor's role in auditing physical and software infrastructures and the maintenance of those infrastructures. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization's information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • recognize the project phases of physical architecture analysis
  • recognize the project phases of planning the implementation of infrastructure
  • recognize hardware and software acquisition practices
  • describe the change management process
  • recognize the configuration management process
  • match development tools and productivity aids with their correct descriptions
  • recognize business process improvement practices
  • recognize input and output application controls
  • describe processing procedures and controls
  • recognize how to audit application controls
  • recognize an IS auditor's role in system development and acquisition
  • recognize an IS auditor's role in system maintenance
  • recognize infrastructure development phases and acquisition practices
  • describe information systems maintenance and development tools
  • recognize business process improvement practices and application controls
  • recognize an IS auditor's role in auditing application controls, and system development, acquisition, and maintenance
Register Now
Certified Internet Security Auditor (CISA) Part 2 e-learning bundle
  • Course ID:
    252706
  • Duration:
    13 hours
  • Price:
    $199