وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

CISA (Certified Information Systems Auditor)

سرفصل های دوره

Introduction
  • 001. CISA (Certified Information Systems Auditor) Introduction

  • Lesson 1 Audit Fundamentals
  • 001. Learning objectives
  • 002. 1.1 Understanding the Audit Function
  • 003. 1.2 Adhering to ISACA IS Audit and Assurance Standards and Guidelines
  • 004. 1.3 Identifying the Risk Audit Relationship
  • 005. 1.4 Surveying IS Controls
  • 006. Lesson 1 Review

  • Lesson 2 Auditing
  • 001. Learning objectives
  • 002. 2.1 Performing an IS Audit
  • 003. 2.2 Gathering Audit Evidence
  • 004. 2.3 Understanding Sampling Techniques
  • 005. 2.4 Reporting and Communicating Audit Results
  • 006. 2.5 Audit Evolutions
  • 007. Lesson 2 Review

  • Lesson 3 Governance Structure, Processes, and Models
  • 001. Learning objectives
  • 002. 3.1 Understanding Corporate and Information Security Governance (Defining Governance)
  • 003. 3.2 Designing Strategic Plans, Policies, and Procedures
  • 004. 3.3 Surveying IT Organizational Structures and SOD
  • 005. 3.4 Surveying Maturity and Process Implementation Models
  • 006. 3.5 Understanding Performance Optimization
  • 007. 3.6 Real-world Auditing IT Governance
  • 008. Lesson 3 Review

  • Lesson 4 Risk Management
  • 001. Learning objectives
  • 002. 4.1 Evaluating a Risk Management Program
  • 003. 4.2 Conducting a Risk Assessment
  • 004. 4.3 Real-world Auditing Risk Management
  • 005. Lesson 4 Review

  • Lesson 5 Third-Party Relationships
  • 001. Learning objectives
  • 002. 5.1 Examining Outsourcing and Third-Party Management
  • 003. 5.2 Deconstructing Cloud Computing
  • 004. 5.3 Real-world Auditing Third-Party Relationships
  • 005. Lesson 5 Review

  • Lesson 6 Business Continuity
  • 001. Learning objectives
  • 002. 6.1 Defining Business Continuity Planning
  • 003. 6.2 Examining a Business Impact Analysis (BIA)
  • 004. 6.3 Designing Business Continuity Plans
  • 005. 6.4 Evaluating Business Continuity Testing and Readiness
  • 006. 6.5 Real-world Auditing Business Continuity
  • 007. Lesson 6 Review

  • Lesson 7 Project Management
  • 001. Learning objectives
  • 002. 7.1 Developing a Business Case
  • 003. 7.2 Understanding Portfolio Management
  • 004. 7.3 Defining Project Management
  • 005. 7.4 Real-world Auditing Portfolio and Project Management
  • 006. Lesson 7 Review

  • Lesson 8 Application Development
  • 001. Learning objectives
  • 002. 8.1 Exploring Business Application Development
  • 003. 8.2 Identifying Software Development Testing Techniques
  • 004. 8.3 Recognizing Source Code Vulnerabilities
  • 005. 8.4 Real-world Auditing the Development Process
  • 006. Lesson 8 Review

  • Lesson 9 System Acquisition and Implementation
  • 001. Learning objectives
  • 002. 9.1 Exploring Acquisition Processes
  • 003. 9.2 Deconstructing System Implementation
  • 004. 9.3 Recognizing Application Controls
  • 005. 9.4 Understanding Configuration and Change Management
  • 006. 9.5 Real-world Auditing Acquisition and Implementation
  • 007. Lesson 9 Review

  • Lesson 10 IS Operational Management
  • 001. Learning objectives
  • 002. 10.1 Surveying Information Systems Management and Frameworks
  • 003. 10.2 Managing Operational Processes
  • 004. 10.3 Understanding Asset Management
  • 005. 10.4 Real-world Auditing IS Operational Management
  • 006. Lesson 10 Review

  • Lesson 11 Data Management
  • 001. Learning objectives
  • 002. 11.1 Defining Data Management
  • 003. 11.2 Exploring Database Management Systems (DBMS)
  • 004. 11.3 Real-world Auditing Data Management
  • 005. Lesson 11 Review

  • Lesson 12 Network Architecture
  • 001. Learning objectives
  • 002. 12.1 Examining OSI and TCPIP Models
  • 003. 12.2 Exploring Transmission Media and Telecommunications
  • 004. 12.3 Understanding Wireless Networks
  • 005. 12.4 Exploring VoIP
  • 006. 12.5 Real-world Auditing Network Architecture
  • 007. Lesson 12 Review

  • Lesson 13 Disaster Response and Recovery
  • 001. Learning objectives
  • 002. 13.1 Understanding Disaster Reponse and Recovery Objectives
  • 003. 13.2 Identifying Recovery Strategies
  • 004. 13.3 Assessing Backup and Replication Strategies
  • 005. 13.4 Evaluating Disaster Recovery Plan Maintenance
  • 006. 13.5 Real-world Auditing Disaster Response and Recovery
  • 007. Lesson 13 Review

  • Lesson 14 Information Security Program Management
  • 001. Learning objectives
  • 002. 14.1 Surveying Information Security Management Systems (ISMS)
  • 003. 14.2 Identifying Information Security Classifications and Controls
  • 004. 14.3 Exploring Cyberthreats and Adversaries
  • 005. 14.4 Understanding Incident Management
  • 006. 14.5 Evaluating Investigative and Evidence Handling Capabilities
  • 007. 14.6 Real-world Auditing Information Security Program Management
  • 008. Lesson 14 Review

  • Lesson 15 Authentication and Authorization
  • 001. Learning objectives
  • 002. 15.1 Examining Identification and Authentication
  • 003. 15.2 Exploring Access Control
  • 004. 15.3 Monitoring Access
  • 005. 15.4 Real-world Auditing User Access Controls
  • 006. Lesson 15 Review

  • Lesson 16 Infrastructure Security
  • 001. Learning objectives
  • 002. 16.1 Surveying Perimeter Security
  • 003. 16.2 Managing Malware
  • 004. 16.3 Security Endpoint
  • 005. 16.4 Mobile Device Challenges
  • 006. 16.5 Testing Network Infrastructure Security
  • 007. 16.6 Real-world Auditing Infrastructure Security Controls
  • 008. Lesson 16 Review

  • Lesson 17 Cryptography
  • 001. Learning objectives
  • 002. 17.1 Demystifying Encryption
  • 003. 17.2 Applying Asymmetric Encryption
  • 004. 17.3 Examining Hashing and Digital Signatures
  • 005. 17.4 Understanding Digital Certificates
  • 006. 17.5 Identifying Cryptographic Protocols and Attacks
  • 007. 17.6 Real-world Auditing Cryptographic Protocols
  • 008. Lesson 17 Review

  • Lesson 18 Physical and Environmental Security
  • 001. Learning objectives
  • 002. 18.1 Examining Environmental Threats
  • 003. 18.2 Securing People and Places
  • 004. 18.3 Real-world Auditing Environmental and Physical Access
  • 005. Lesson 18 Review

  • Module 1 The Process of Auditing Information Systems
  • 001. Module Intro

  • Module 2 Governance and Management of IT
  • 001. Module Intro

  • Module 3 Information Systems Acquisition, Development, and Implementation
  • 001. Module Intro

  • Module 4 Information Systems Operations, Maintenance, and Service Management
  • 001. Module Intro

  • Module 5 Protection of Information Assets
  • 001. Module Intro

  • Module 6 Acing Your Exam
  • 001. Module Intro
  • 002. Lesson 19 Understanding the Exam Structure
  • 003. Lesson 20 Test Taking Strategies
  • 004. Lesson 21 What to Expect at the Testing Center
  • 005. Lesson 22 Attaining and Maintaining Your CISA Certification

  • Summary
  • 001. CISA (Certified Information Systems Auditor) Summary
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 14230
    حجم: 4325 مگابایت
    مدت زمان: 738 دقیقه
    تاریخ انتشار: 29 خرداد 1402
    دسته بندی محصول
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید