Prepare for the globally recognized CISA certification with the comprehensive course Certified Information Systems Auditor. Designed to help you succeed in the exam, it offers interactive lessons, quizzes, test preps, and hands-on labs. With this course, you will gain the expertise to effectively audit, control, and assess IT systems, elevating your career and contributing to the security and integrity of information systems.
Here’s what you will get
The Certified Information Systems Auditor (CISA) certification exam is a globally recognized assessment that validates the knowledge and skills of professionals in information systems auditing, control, and security. Achieving the CISA certification showcases expertise in auditing, evaluating IT infrastructure, and contributes to enhancing career prospects in the field of IT governance, risk management, and cybersecurity. The exam consists of five domains, covering various aspects of information systems auditing, with the highest weightage on the protection of information assets.
Lessons
6+ Lessons | 386+ Exercises | 50+ Quizzes | 50+ Flashcards | 50+ Glossary of terms
TestPrep
85+ Pre Assessment Questions | 3+ Full Length Tests | 85+ Post Assessment Questions | 190+ Practice Test Questions
Hand on lab
10+ LiveLab | 10+ Video tutorials | 16+ Minutes
Video Lessons
32+ Videos | 05:42+ Hours
Lessons 1: Introduction
- CISA Exam Objectives
- Objective Map
Lessons 2: The Audit Process
- Audit Process
- Auditing Standards and Guidelines
- Audit Management
- Evidence
- Audit Control Evaluation
- Control Self-Assessment
- Summary
Lessons 3: Audit Governance and Compliance
- IT Governance and Strategy
- Governance Policies
- Security Policies
- IT Performance
- Summary
Lessons 4: System Infrastructure, Project Management, and Testing
- System Availability and Reliability
- Project Management Tools
- Agile Development
- Monitoring and Controlling
- Testing Process Methodologies
- Information Systems Maintenance Practices
- Data Conversion Tools
- Project Review
- Summary
Lessons 5: IT Service Level Management
- System Communication and Data Exchange
- Service Level Management Practices
- Operations Management
- Database Management
- Patch Management
- Incident Management
- Hardware Component Types
- Summary
Lessons 6: Auditor Technical Overview
- IS Auditor Technical Overview
- Privacy Protection
- Physical Access Exposure and Environmental Security
- Risks to Portable and Wireless Devices
- Information System Attacks, Security Testing, and Monitoring Tools
- Summary
Hands-on LAB Activities
Auditor Technical Overview
- Exploiting SMTP using Metasploit
- Adding a DNS Server
- Examining PKI Certificates
- Connecting to an FTP Server
- Configuring a DHCP Server
- Configuring the TCP/IPv6 Network Properties
- Cracking a Linux Password using John the Ripper
- Using the Social Engineering Toolkit
- Performing SQL Injection with Kali Linux
- Conducting a DoS Attack Using Smurf Attack
Reviews
There are no reviews yet.