CISA (Certified Information Systems Auditor)

Video description

Overview
The CISA (Certified Information Systems Auditor) Complete Video Course is an engaging self-paced video training solution that provides learners with 16 hours of personal, visual instruction from an expert trainer who has more than two decades of practical auditing and assurance experience. Through the use of topic-focused instructional videos, you will gain an in-depth understanding of each objective in the CISA exam as well as a deeper understanding of auditing and security.

Description
CISA (Certified Information Systems Auditor) Complete Video Course contains 16 hours of training with content divided into 6 modules with 22 full lessons. In addition to the live trainer discussions, demos, and screencasts, you will find live assessment walk-throughs at the end of each lesson so you can see how to approach and answer questions throughout the course. Sari Greene, best-selling author of the CISSP Complete Video Course and the CISSP Exam Prep Course, has also included 16 real-world auditing videos where she supplies practical tips and information that will help you pass the CISA exam and, just as importantly, better understand the concepts of Information Systems Auditing.

The video lessons in this course review each exam objective, so you can use it as a complete study tool for taking the CISA exam.

Major sections are as follows:

Module 1: The Process of Auditing Information Systems
Lesson 1: Audit Fundamentals
Lesson 2: Auditing

Module 2: Governance and Management of IT
Lesson 3: Governance Structure, Processes, and Models
Lesson 4: Risk Management
Lesson 5: Third-Party Relationships
Lesson 6: Business Continuity

Module 3: Information Systems Acquisition, Development, and Implementation
Lesson 7: Project Management
Lesson 8: Application Development
Lesson 9: System Acquisition and Implementation

Module 4: Information Systems Operations, Maintenance, and Service Management
Lesson 10: IS Operational Management
Lesson 11: Data Management
Lesson 12: Network Architecture
Lesson 13: Disaster Response and Recovery

Module 5: Protection of Information Assets
Lesson 14: Information Security Program Management
Lesson 15: Authentication and Authorization
Lesson 16: Infrastructure Security
Lesson 17: Cryptography
Lesson 18: Physical and Environmental Security

Module 6: Acing Your Exam
Lesson 19: Understanding the Exam Structure
Lesson 20: Test Taking Strategies
Lesson 21: What to Expect at the Testing Center
Lesson 22: Attaining and Maintaining Your CISA Certification

About the Instructor

Sari Greeneis an information security practitioner, author, educator, and entrepreneur. In 2003, Sari founded one of the first dedicated cybersecurity consultancies. She is a recognized leader in the field of cybersecurity and has amassed thousands of hours in the field working with a spectrum of technical, operational, compliance, and management personnel as well as boards of directors, regulators, service providers, and law enforcement agencies.

Sari’s first text wasTools and Techniques for Securing Microsoft Networks, commissioned by Microsoft to train its partner channel, followed soon after by the first edition ofSecurity Policies and Procedures: Principles and Practices. The second edition,Security Program and Policies: Principles and Practices, is currently being used in undergraduate and graduate programs nationwide. She is also the author and presenter of the best-selling Pearson CISSP Complete Video Course and the CISSP Exam Prep course. Sari has published a number of articles related to cybersecurity; has been quoted in theNew York Times,Wall Street Journal, on CNN, and on CNBC; speaks regularly at cybersecurity, legal, financial, and healthcare conferences and workshops around the country; and is a frequent guest lecturer.

Sari serves on the Bangor Savings Bank board of directors and is chair of the risk management committee. She provided expert witness testimony in the groundbreaking PATCO v. Ocean National Bank case, represents industry on the Massachusetts Bankers Association Cybersecurity Task Force, and is a member of the American Bankers Association cybersecurity faculty.

Sari earned her MBA from the University of New Hampshire system. She holds multiple industry accreditations, including CISA, CISSP-ISSMP, CRISC, CISM, MCSE, and NSA/IAM. She is also certified in offshore emergency medicine.

You can contact Sari at sari@sarigreene.com, follow her on Twitter at @sari_greene, or visit her website http://www.sarigreene.com.

Skill Level
Intermediate to advanced

What You Will Learn

  • Every objective on the CISA: Certified Information Systems Auditor exam
  • Tips to prepare for and pass the exam
  • Real-world information systems auditing skills
Who Should Take This Course
Primary audience: Anyone preparing for the ISACA CISA certification examination.
Secondary audience: Anyone interested in learning information systems auditing skills; those interested in learning about security auditing.

Course Requirements
Familiarity with basic auditing and information systems concepts.

About LiveLessons Video Training
Pearson’s LiveLessons video training series publishes the industry’s leading video tutorials for IT pros, developers, sys admins, devops, network engineers, and certification candidates. LiveLessons feature the highest-quality professional skills training led by recognized author instructors published by Addison-Wesley, Cisco Press, Pearson IT Certification, Prentice Hall, Sams, and Que. Topics include IT certification, programming, development, networking, software skills for the home, office, and business, and more. Your purchase provides you with lifetime online access to the content.
http://www.pearsonitcertification.com/livelessons

Table of contents

  1. Introduction
    1. CISA (Certified Information Systems Auditor): Introduction
  2. Module 1: The Process of Auditing Information Systems
    1. Module Intro
  3. Lesson 1: Audit Fundamentals
    1. Learning objectives
    2. 1.1 Understanding the Audit Function
    3. 1.2 Adhering to ISACA IS Audit and Assurance Standards and Guidelines
    4. 1.3 Identifying the Risk / Audit Relationship
    5. 1.4 Surveying IS Controls
    6. Lesson 1 Review
  4. Lesson 2: Auditing
    1. Learning objectives
    2. 2.1 Performing an IS Audit
    3. 2.2 Gathering Audit Evidence
    4. 2.3 Understanding Sampling Techniques
    5. 2.4 Reporting and Communicating Audit Results
    6. 2.5 Audit Evolutions
    7. Lesson 2 Review
  5. Module 2: Governance and Management of IT
    1. Module Intro
  6. Lesson 3: Governance Structure, Processes, and Models
    1. Learning objectives
    2. 3.1 Understanding Corporate and Information Security Governance (Defining Governance)
    3. 3.2 Designing Strategic Plans, Policies, and Procedures
    4. 3.3 Surveying IT Organizational Structures and SOD
    5. 3.4 Surveying Maturity and Process Implementation Models
    6. 3.5 Understanding Performance Optimization
    7. 3.6 Real-world Auditing IT Governance
    8. Lesson 3 Review
  7. Lesson 4: Risk Management
    1. Learning objectives
    2. 4.1 Evaluating a Risk Management Program
    3. 4.2 Conducting a Risk Assessment
    4. 4.3 Real-world Auditing Risk Management
    5. Lesson 4 Review
  8. Lesson 5: Third-Party Relationships
    1. Learning objectives
    2. 5.1 Examining Outsourcing and Third-Party Management
    3. 5.2 Deconstructing Cloud Computing
    4. 5.3 Real-world Auditing Third-Party Relationships
    5. Lesson 5 Review
  9. Lesson 6: Business Continuity
    1. Learning objectives
    2. 6.1 Defining Business Continuity Planning
    3. 6.2 Examining a Business Impact Analysis (BIA)
    4. 6.3 Designing Business Continuity Plans
    5. 6.4 Evaluating Business Continuity Testing and Readiness
    6. 6.5 Real-world Auditing Business Continuity
    7. Lesson 6 Review
  10. Module 3: Information Systems Acquisition, Development, and Implementation
    1. Module Intro
  11. Lesson 7: Project Management
    1. Learning objectives
    2. 7.1 Developing a Business Case
    3. 7.2 Understanding Portfolio Management
    4. 7.3 Defining Project Management
    5. 7.4 Real-world Auditing Portfolio and Project Management
    6. Lesson 7 Review
  12. Lesson 8: Application Development
    1. Learning objectives
    2. 8.1 Exploring Business Application Development
    3. 8.2 Identifying Software Development Testing Techniques
    4. 8.3 Recognizing Source Code Vulnerabilities
    5. 8.4 Real-world Auditing the Development Process
    6. Lesson 8 Review
  13. Lesson 9: System Acquisition and Implementation
    1. Learning objectives
    2. 9.1 Exploring Acquisition Processes
    3. 9.2 Deconstructing System Implementation
    4. 9.3 Recognizing Application Controls
    5. 9.4 Understanding Configuration and Change Management
    6. 9.5 Real-world Auditing Acquisition and Implementation
    7. Lesson 9 Review
  14. Module 4: Information Systems Operations, Maintenance, and Service Management
    1. Module Intro
  15. Lesson 10: IS Operational Management
    1. Learning objectives
    2. 10.1 Surveying Information Systems Management and Frameworks
    3. 10.2 Managing Operational Processes
    4. 10.3 Understanding Asset Management
    5. 10.4 Real-world Auditing IS Operational Management
    6. Lesson 10 Review
  16. Lesson 11: Data Management
    1. Learning objectives
    2. 11.1 Defining Data Management
    3. 11.2 Exploring Database Management Systems (DBMS)
    4. 11.3 Real-world Auditing Data Management
    5. Lesson 11 Review
  17. Lesson 12: Network Architecture
    1. Learning objectives
    2. 12.1 Examining OSI and TCP/IP Models
    3. 12.2 Exploring Transmission Media and Telecommunications
    4. 12.3 Understanding Wireless Networks
    5. 12.4 Exploring VoIP
    6. 12.5 Real-world Auditing Network Architecture
    7. Lesson 12 Review
  18. Lesson 13: Disaster Response and Recovery
    1. Learning objectives
    2. 13.1 Understanding Disaster Reponse and Recovery Objectives
    3. 13.2 Identifying Recovery Strategies
    4. 13.3 Assessing Backup and Replication Strategies
    5. 13.4 Evaluating Disaster Recovery Plan Maintenance
    6. 13.5 Real-world Auditing Disaster Response and Recovery
    7. Lesson 13 Review
  19. Module 5: Protection of Information Assets
    1. Module Intro
  20. Lesson 14: Information Security Program Management
    1. Learning objectives
    2. 14.1 Surveying Information Security Management Systems (ISMS)
    3. 14.2 Identifying Information Security Classifications and Controls
    4. 14.3 Exploring Cyberthreats and Adversaries
    5. 14.4 Understanding Incident Management
    6. 14.5 Evaluating Investigative and Evidence Handling Capabilities
    7. 14.6 Real-world Auditing Information Security Program Management
    8. Lesson 14 Review
  21. Lesson 15: Authentication and Authorization
    1. Learning objectives
    2. 15.1 Examining Identification and Authentication
    3. 15.2 Exploring Access Control
    4. 15.3 Monitoring Access
    5. 15.4 Real-world Auditing User Access Controls
    6. Lesson 15 Review
  22. Lesson 16: Infrastructure Security
    1. Learning objectives
    2. 16.1 Surveying Perimeter Security
    3. 16.2 Managing Malware
    4. 16.3 Security Endpoint
    5. 16.4 Mobile Device Challenges
    6. 16.5 Testing Network Infrastructure Security
    7. 16.6 Real-world Auditing Infrastructure Security Controls
    8. Lesson 16 Review
  23. Lesson 17: Cryptography
    1. Learning objectives
    2. 17.1 Demystifying Encryption
    3. 17.2 Applying Asymmetric Encryption
    4. 17.3 Examining Hashing and Digital Signatures
    5. 17.4 Understanding Digital Certificates
    6. 17.5 Identifying Cryptographic Protocols and Attacks
    7. 17.6 Real-world Auditing Cryptographic Protocols
    8. Lesson 17 Review
  24. Lesson 18: Physical and Environmental Security
    1. Learning objectives
    2. 18.1 Examining Environmental Threats
    3. 18.2 Securing People and Places
    4. 18.3 Real-world Auditing Environmental and Physical Access
    5. Lesson 18 Review
  25. Module 6: Acing Your Exam
    1. Module Intro
    2. Lesson 19: Understanding the Exam Structure
    3. Lesson 20: Test Taking Strategies
    4. Lesson 21: What to Expect at the Testing Center
    5. Lesson 22: Attaining and Maintaining Your CISA Certification
  26. Summary
    1. CISA (Certified Information Systems Auditor): Summary

Product information

  • Title: CISA (Certified Information Systems Auditor)
  • Author(s): Sari Greene
  • Release date: February 2017
  • Publisher(s): Pearson
  • ISBN: 0134677455