O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Certified Information Systems Auditor (CISA)

Video Description

CISA is to Audit what CPA and CA are to Accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the CISA exam administration in June 2011. For purposes of these statements, the terms "enterprise" and "organization" or "organizational" are considered synonymous.

Table of Contents

  1. Lesson 1
    1. Introduction 00:00:55
    2. Audit Process 00:10:59
    3. Auditing Standards 00:14:26
    4. Auditing Guidelines 00:13:36
    5. Cobit Model 00:02:36
    6. Audit Management 00:12:38
    7. Internal Control Classifications 00:14:28
    8. Planning 00:12:40
    9. Program 00:07:14
    10. Evidence 00:14:32
    11. Audit Control Evaluation 00:12:33
    12. C S A Control Self- Assessment 00:07:54
  2. Lesson 2
    1. IT Governance 00:12:37
    2. Outsourcing And Governance 00:12:11
    3. IT Strategy 00:05:39
    4. Governance And Security Policies 00:08:07
    5. Organizational Compliance 00:02:23
    6. Outsourcing And Globalization 00:07:27
    7. IT Performance 00:05:09
  3. Lesson 3
    1. System And Infrastructure 00:14:16
    2. Requirements 00:13:25
    3. Project Management Tools- Part 1 00:11:54
    4. Project Management Tools- Part 2 00:13:38
    5. Applications 00:10:16
    6. Agile Development 00:15:06
    7. Monitoring And Controlling 00:10:38
    8. Acquisition Process 00:11:00
    9. Testing Process 00:14:19
    10. Information Systems Maintenance Practices 00:12:55
    11. Data Conversion Tools 00:08:32
  4. Lesson 4
    1. Media Disposal Process 00:08:41
    2. Post Implementation Review 00:06:43
    3. Periodic Review 00:09:32
    4. System Maintenance 00:07:26
  5. Lesson 5
    1. IT Service Delivery And Support 00:11:56
    2. How To Evalutate Service Level Management Practices 00:03:33
    3. Operations Management 00:13:04
    4. Databases 00:09:49
    5. Structured Query Language 00:10:21
    6. Monitoring Performance 00:13:48
    7. Source Code And Performance Monitoring 00:07:21
    8. Patch Management 00:07:47
    9. Incident Management 00:12:16
    10. Hardware Component Types 00:13:00
    11. Network Component Types 00:12:48
  6. Lesson 6
    1. IS Auditor Technical Overview 00:11:17
    2. Security Design 00:13:22
    3. Monitoring Systems 00:13:40
    4. Types Of Attacks 00:15:09
    5. Cryptography 00:08:02
    6. Encryption 00:05:34
    7. Asymmetric Encryption 00:11:08
    8. Digital Certificate 00:14:06
    9. Different Kinds Of Attacks 00:12:08
    10. Access Controls 00:11:45
    11. Identification And Authenication 00:13:42
    12. Physical Access Exposure 00:09:08
    13. Environmental Security 00:13:50
    14. Network Security Devices And Network Components 00:13:47
    15. Network Address Translation 00:07:09
    16. Virtual Private Networks 00:08:34
    17. Voice System Risks 00:12:09
    18. Intrusion Detection 00:04:13
    19. Firewalls 00:11:11
    20. Firewall Implementation 00:06:32
    21. Network Access Protection 00:05:46
    22. Honey Pot 00:03:47
    23. Risks To Portable And Wireless Devices 00:11:28
    24. Bluetooth 00:07:20
    25. OSI Networking 00:13:03
    26. Managing Data 00:08:23
  7. Lesson 7
    1. Business Continuity And Disaster Recovery 00:10:53
    2. Fault Tolerance 00:07:36
    3. Business Continuity And Disaster Recovery Regulations 00:10:08