×
Order Processing
Checkout
Full Name:
Email address:
Password:
Retype Password:
Existing User
Existing User
Continue
Exclusive features inside this offer:
30 Days Money Back Guarantee
Instant Certificate of Completion
Lifetime Access
Get up to date Information
Practical Knowledge
Best Teaching Methodology
Quick access, anytime & anywhere
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
ISACA CISA Certification Training Program
Introduction
Introduction (11:14)
What is CISA Certification ? (8:16)
Course flow (4:15)
Case Study (5:24)
ISO 27001 (8:38)
Compensating Controls (3:47)
Important Defination (2:31)
IS Auditor (8:11)
ITAF Standard (7:46)
Types of External Audits (4:08)
Compensating Controls (3:47)
Background
Background needed (4:40)
GRC- Governance, Risk, Compliance (10:35)
Senior Management and GRC (7:23)
Senior Management and Risk (6:38)
Organization Structure (5:23)
Domain 1: The Process of Auditing Information Systems
The process of Audit IS (9:13)
IS Audit Report (4:54)
Information Asesst Register (6:08)
Audit Risk Assessment (12:26)
Audit Planing and managment (7:20)
Document Control (3:18)
Scenario 1 (44:08)
Business process (7:12)
Law and regulation (2:16)
Evidence (5:52)
Sampling (3:53)
Reporting and communication (3:39)
Domain 2: Governance and Management of IT
Governance and Management of IT (14:30)
IT Governance (3:02)
Information System Strategy (4:49)
IT Organization (2:51)
Maintenace of Polcies and Procedures (5:00)
Policy and Procedures Resources (5:24)
Legal Compliance (8:34)
Quality Managment system (1:55)
Mutarity Models (3:18)
Capability Maturity Model Integration _ CMMI Training by KnowledgeHut.com (1:34)
Process optmization (3:52)
IT Investment (5:30)
IT Supplier Selection (5:11)
Make or Buy decision (18:08)
Risk Managment (9:17)
Business Continuity Plan (10:09)
Business Impact Analysis (10:09)
Domain 3: Information Systems Acquisition, Development and Implementation
Information Systems Acquisition, Development and Implementation (9:24)
Project Governance (2:28)
Impoartant Defination (6:49)
Types of Organization (6:40)
Project Managment (4:54)
Architecture (5:32)
Procurment Managment (1:05)
Plan Procurment Managment (18:08)
Requirment Managment (4:22)
Configuration and Change Management (3:22)
Domain 4: Information Systems Operations, Maintenance and Support
Information Systems Operations, Maintenance and Support (6:47)
Service Level Management (5:05)
Hardware Software and Knowledge statment (7:28)
Licences Managment (3:11)
Capacity Managment (2:45)
Incident Mamagment (5:31)
Incident Report Form (5:29)
Backup (5:55)
Disaster Recovery Plans (3:29)
Alternative Sites (8:05)
Domain 5: Protection of Information Assets
Protection of Information Assets (7:09)
Access Control (19:19)
Network Security (17:04)
Cryptography (16:26)
Physical Access barrier (9:44)
Operation Security Control Methods (10:24)
IT Supplier Selection
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock