Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
CISA: The Process of Auditing Information Systems - Part 1 $74.95
CISA: Governance and Management of IT - Part 1 $74.95
CISA: Protection of Information Assets - Part 2 $74.95
CISA: Information Systems Operations, Maintenance, and Service Management $74.95
CISA: Governance and Management of IT - Part 2 $74.95
CISA: Information Systems Acquisition, Development, and Implementation $74.95
CISA: The Process of Auditing Information Systems - Part 2 $74.95
CISA: Protection of Information Assets - Part 1 $74.95

Bundle Price: $289.00
Total Savings: $310.60


CISA: The Process of Auditing Information Systems - Part 1

Auditing information systems requires professionals to understand, and plan an effective auditing process. This course covers the audit function, including best practices for organizing, planning, and resourcing audit activities. This course also covers industry-recognized audit and assurance standards, guidelines, and tools, as well as effective information systems controls frameworks including COBIT5 and risk analysis. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
  • start the course
  • recognize the task and knowledge statements of domain 1
  • describe characteristics of the IS audit function
  • identify best practices in IS audit resource management
  • identify best practices for planning audits
  • identify the effects of laws and regulations on IS audit planning
  • recognize the ISACA Code of Professional Ethis
  • identify the IS audit and assurance general standards
  • identify the IS audit and assurance performance standards
  • identify the IS audit and assurance reporting standards
  • identify the IS audit and assurance general guidelines
  • identify the IS audit and assurance performance guidelines
  • identify the IS audit and assurance reporting guidelines
  • distinguish between the different categories of IS audit and assurance tools and techniques
  • identify best practices when applying ISACA guidelines, standards, and tools and techniques in relation to each other and external guidelines such as regulatory requirements
  • recognize characteristics of the ITAF reference model
  • identify the steps of the risk management process
  • distinguish between preventive, detective, and corrective controls
  • identify IS different types of IS control objectives
  • describe how the COBIT 5 framework is used as part of IS control
  • identify general controls used for information systems
  • identify IS control procedures
  • identify best practices when planning and managing IS audits

CISA: Governance and Management of IT - Part 1

Performing successful information system audits includes the ability to determine if the organization has an effective governance framework in place, including accountability and monitoring practices that are adhered to. This course covers governance best practices including information security governance, responsible IT governance committee practices, and enterprise architecture. This course also outlines IS strategy, value, and policies best practices including strategic planning, IT portfolio management, policies, and procedures. Finally this course covers best organizational practices for risk management and IT management, including organizational change management, financial management, and human resources management practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
  • start the course
  • recognize the task and knowledge statements of domain 2
  • identify characteristics of corporate governance
  • identify GEIT characteristics and best practices
  • recognize the purpose and responsibilities of IT governing committees
  • describe the purpose and characteristics of an IT balanced scorecard
  • identify IS governance best practices
  • describe the purpose and best practices of EA
  • recognize the role of IS strategic planning in IS audit activities
  • identify role and responsibilities of an IT steering committee
  • distinguish between different maturity process improvement models
  • recognize the financial and nonfinancial value of IT
  • identify characteristics of IT portfolio management
  • identify characteristics and role of policies in the IS audit framework
  • identify characteristics and role of procedures in the IS audit framework
  • identify characteristics of risk management and the steps for developing a risk management program
  • distinguish between the steps of the risk management process; distinguish between qualitative, semiquantitative and quantitative analysis methods
  • identify characteristics of organizational human resource management practices
  • distinguish between different sourcing options for delivering and performing IT functions
  • identify characteristics of organizational change management practices
  • identify characteristics of financial management practices
  • identify characteristics of information security management practices
  • identify characteristics and best practices of performance optimization
  • identify best practices for IT governance, IT risk management, and general IT management in an organization

CISA: Protection of Information Assets - Part 2

IS audit professionals should understand and ensure that an organization's security policies, standards, procedures and controls are aligned and effectively protect the confidentiality, integrity, and availability of the organization's information assets. This course covers network infrastructure security including LAN, client-server, and wireless security, and best practices for auditing overall IS management frameworks. This course also outlines best practices for environmental and physical access controls, including mitigating risk from associated threats. Finally this course covers mobile, social, and cloud asset security best practices, and preventative measures against data leakage. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
  • start the course
  • identify characteristics of LAN security including virtualization
  • identify characteristics of client-server security
  • identify best practices for wireless security
  • distinguish between common internet threats
  • distinguish between different firewall technologies
  • compare IDS and IPS
  • identify cryptography and cryptanalysis
  • identify common cryptosystems
  • classify common cryptosystems
  • identify characteristics of malware and best practices for mitigating risk from them
  • identify characteristics and security issues of VoIP
  • recognize characteristics of PBX
  • identify best practices for auditing information security management frameworks
  • identify best practices for auditing logical access
  • distinguish between different security testing techniques when auditing information security management frameworks
  • identify investigation techniques and best practices when auditing information security management frameworks
  • identify characteristics and best practices for auditing remote access, auditing internet points of presence, and performing network penetration tests
  • identify characteristics and best practices for performing full network assessment reviews, and auditing network change development and authorization, and unauthorized changes activities
  • identify environmental issues and exposures
  • distinguish between different controls for environmental exposures
  • identify best practices for auditing environmental controls
  • identify physical access issues and exposures, and controls for mitigating threats
  • identify best practices for auditing physical access
  • identify mobile computing information security best practices
  • identify peer-to-peer computing information security best practices
  • identify instant messaging information security best practices
  • identify social media information security best practices
  • identify cloud computing information security best practices
  • identify characteristics and best practices for data leak prevention
  • identify challenges and considerations for data leak prevention techniques and practices
  • identify end-user security risks and controls
  • identify best practices for auditing information security management frameworks and mobile, social, and cloud asset protection

CISA: Information Systems Operations, Maintenance, and Service Management

An effective IS audit includes ensuring that an organization's processes for IS operations, maintenance, and service management supports and achieves the organizational strategic goals and objectives. This course covers best practices for IS operations, including management practices, incident and problem management, and change management. IS hardware practices are also covered, including IT asset management, hardware components and architectures, and capacity management activities. Finally this course outlines best practices for IS architecture, software, network infrastructure and operations auditing activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
  • start the course
  • recognize key concepts of domain 4
  • identify characteristics and best practices of IS operations management
  • identify characteristics of IT service management frameworks, and best practices
  • identify best practices for IS operations
  • identify problem management and support/help desk best practices
  • identify characteristics and best practices of change management, release management and quality assurance in IS operations
  • identify characteristics and best practices for IT asset management
  • distinguish between computer hardware components'
  • identify characteristics and best practices for hardware maintenance and hardware monitoring
  • identify characteristics and best practices for capacity planning and monitoring activities
  • identify operating systems features and options
  • identify characteristics of access control software and data communications software
  • identify characteristics and best practices for data management
  • identify characteristics and best practices of a DBMS
  • identify characteristics of utility programs, source code management, end-user computing, and utility programs in IS architecture and software
  • identify characteristics of enterprise network architectures, types of networks, and network services, standards, and protocols
  • identify characteristics of OSI architecture and best practices for applying the OSI model in network architectures
  • identify best practices for auditing and reviewing enterprise architecture, hardware, operating system, database, and network infrastructure
  • identify best practices for auditing and reviewing IS operations, scheduling, and problem management reporting
  • identify best practices for disaster recovery point and time objectives, recovery strategies, and recovery alternatives
  • identify best practices for developing a disaster recovery plan, and organizing and assigning responsibilities within an organization
  • identify backup and restoration options and best practices
  • distinguish between disaster recovery testing methods, and identify best practices for testing disaster recovery plans and activities in an organization
  • identify best practices for invoking disaster recovery plans within an organization
  • identify best practices when auditing IS operations, maintenance, and service management activities within an organization

CISA: Governance and Management of IT - Part 2

IS auditors require the skills and ability to assess an organization's overall structure and division of responsibilities. This course covers best practices for IT organizational structure and responsibility activities including segregation of duties and contractual commitments. This course also outlines best practices for business continuity planning including effective processes, policies, business impact analysis, and plan testing. Finally this course covers specific knowledge for effective business continuity auditing including evaluating test results, offsite storage, and security practices. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
  • start the course
  • distinguish between the different IT roles and responsibilities
  • identify characteristics and best practices of segregation of duties within IT
  • identify characteristics and best practices of segregation of duties controls
  • identify the documents that are reviewed as part of auditing IT governance structure and implementation
  • identify best practices when reviewing contractual commitments as part of auditing IT governance structure and implementation
  • identify characteristics and best practices of IT business continuity planning
  • identify best practices for auditing disaster and other disruptive events procedures
  • identify characteristics and best practices in business continuity planning process and policy activities
  • distinguish between the different classifications of incident and best practices for incident management
  • identify characteristics and best practices of business impact analysis
  • identify the factors and issues for consideration when developing business continuity plans
  • identify the components and best practices of a business continuity plan
  • identify best practices for testing business continuity plans
  • identify the audit procedures to follow when reviewing business continuity plans
  • identify best practices when evaluating prior test results and interviewing key personnel
  • identify best practices when evaluating offsite storage and offsite facility security
  • identify best practices for reviewing alternative processing contracts and insurance coverage
  • identify best practices when auditing the IT organizational structure, implementation practices, and business continuity plans of an organization

CISA: Information Systems Acquisition, Development, and Implementation

A key responsibility of IS auditing professionals is understanding and ensuring that the method in which organizations conduct IS acquisition, development, testing, and implementation activities support and fulfill organizational objectives and strategic goals. This course covers best practices for IS development and project management structure and planning. This course also covers business application systems best practices including virtualization and cloud computing environments, and application development methods. Finally this course provides relevant information on IS maintenance practices, system development activities, application controls, and best practices for auditing application controls. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
  • start the course
  • recognize the task and knowledge statements of domain 3
  • identify the objectives, characteristics, and techniques of benefits realization through portfolio/program management and business case development and approval
  • identify characteristics of the project management structure
  • identify characteristics of project initiation and planning
  • identify characteristics of project execution, controlling, and closure
  • identify characteristics of the SDLC approach and phases, integrated resource management systems, and risk associated with software development
  • identify characteristics of the SDLC approach and phases, integrated resource management systems, and risk associated with software development
  • identify characteristics, key risk areas, and typical controls of virtual and cloud environments
  • distinguish between E-commerce, Electronic Data Interchange, Email, Point-of-sale, electronic banking, electronic finance, payment, and integrated manufacturing business application system characteristics
  • distinguish between electronic funds transfer, ATM, interactive voice response, purchase accounting, image processing, industrial control, AI and expert, business intelligence, decision support, customer relationship management, and supply chain management business application systems characteristics
  • distinguish between structured analysis, design and development techniques, Agile, Prototyping-evolutionary, rapid application, and object-oriented system development methods
  • distinguish between component-based, web-based application, software reengineering, and reverse engineering development methods
  • identify characteristics of physical architecture analysis, infrastructure implementation planning, and critical success factors in infrastructure development activities
  • identify best practices for hardware acquisition, system software acquisition, and system software implementation activities
  • identify characteristics and best practices for the change management process and change management documentation
  • identify characteristics and best practices for testing and auditing change programs, emergency changes, and configuration management
  • identify characteristics and best practices for code generators, computer-aided software engineering, and fourth-generation languages
  • distinguish between BPR methods and techniques, ISO 9126, CMMI, and ISO/IEC 330XX series process improvement practices
  • identify characteristics of input/origination controls
  • identify characteristics of processing procedures and controls
  • identify characteristics of output controls, and business process control assurance best practices
  • identify best practices for auditing application controls
  • identify best practices for auditing systems development, acquisition, and maintenance
  • identify best practices when auditing IS acquisitions, development, and implementation activities within an organization

CISA: The Process of Auditing Information Systems - Part 2

Auditing information systems requires more than a good plan; it requires effectively executing the audit plan, skill in assessing and reporting results, and anticipating necessary changes as the process evolves. This course covers practical knowledge for performing an IS audit, as well as best practices for finalizing an audit, compiling results, and effectively communicating pertinent outcomes. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
  • start the course
  • describe the objectives of an IS audit
  • distinguish between different types of audits
  • identify characteristics of an audit methodology
  • identify best practices in a risk-based audit approach
  • recognize risk influences and best practices when auditing risk for materiality
  • identify risk assessment and risk treatment best practices
  • describe characteristics of audit programs
  • identify best practices for fraud detection when performing IS audits
  • distinguish between compliance and substantive testing when conducting IS audits
  • identify best practices for evaluating and using evidence when conducting IS audits
  • identify best practices when interviewing and observing personnel in performance of their duties
  • identify best practices for sampling as part of an IS audit
  • identify best practices when outsourcing IS assurance and security services for IS audit activities
  • distinguish between different computer-assisted audit techniques and tools
  • identify best practices for evaluating the control environment
  • describe characteristics and best practices for using exit interviews and audit reports to present IS audit findings
  • identify characteristics and best practices of audit documentation
  • identify best practices for IS audit follow-up activities
  • recognize the characteristics and objectives of CSA
  • identify the benefits and disadvantages of CSA
  • describe the auditor's role in a CSA program
  • identify characteristics of the CSA approach and its technology drivers
  • identify best practices for integrating auditing activities in an organization
  • identify best practices for continuous auditing activities in an organization
  • identify best practices for managing risk, communicating results, and CSA during IS audit activities

CISA: Protection of Information Assets - Part 1

Two key components IS auditing professionals evaluate are an organization's IS management activities and logical access practices. This course covers key IS management elements, roles, responsibilities and risk factors, as well as information security control design best practices. This course also outlines effective MAC and DAC controls, privacy principles, and external and third party IS best practices. Finally, this course covers key logical access best practices that IS auditors should evaluate, including exposures, identification and authentication controls, authorization issues, and confidential information handling activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
  • start the course
  • recognize key concepts in domain 5
  • identify characteristics and key elements of information security management and information security management systems
  • distinguish between the different information security roles and responsibilities
  • identify characteristics and best practices of classifying information assets
  • identify fraud risk factors in information security management
  • identify characteristics of information security control design
  • identify characteristics and best practices of system access permission activities
  • recognize characteristics of mandatory and discretionary access controls
  • identify privacy principles, and the IS auditor's role
  • identify the critical success factors of information security management and awareness, training and education best practices
  • identify best practices for information security activities involving external parties
  • identify best practices for human resources activities with third parties
  • identify characteristics of computer crime issues and exposures, and best practices for avoiding negative impacts
  • identify best practices for security incident handling and response activities
  • identify logical access exposures
  • identify best practices for enterprise IT environment familiarization
  • identify best practices when auditing paths of logical access
  • identify logical access control software
  • identify best practices for identification and authentication activities
  • identify features of SSO
  • identify best practices for storing, retrieving, transporting, and disposing confidential information
  • identify best practices for information security management and logical access
Register Now
Certified Information Systems Auditor e-learning bundle
  • Course ID:
    271313
  • Duration:
    n/a
  • Price:
    $289