https://i122.fastpic.org/big/2023/1025/74/c1231f97786d682fdf9e37ead3f74074.jpeg

The Ultimate Cisa Journey
Published 10/2023
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.21 GB | Duration: 5h 21m

Comprehensive CISA Exam Prep with Real-World Scenarios

What you'll learn
IT infrastructure and implementing controls
Merging their IT systems with top-line business goals
Security, control, management and IT infrastructure development
Develop and implement the outline of a firm's systems
Be able to develop strategies for preventing and responding to cyber-attacks.
Able to evaluate the security of information systems and develop strategies for protecting sensitive information

Requirements
With the CISA, you're riding the wave of IT auditing. You earn a credential that's globally recognized, respected by employers and offers a golden ticket to a prestigious, lucrative career. The sooner you start studying for and pass the CISA Exam, the sooner you'll be ready to make the big career moves.

Description
Are you ready to take your career in IT to the next level? Look no further than the Ultimate CISA Mastery Course! Join me, as I guide you through the challenging journey of becoming a Certified Information Systems Auditor.From the basics of information systems audit to the intricacies of IT governance and security, this comprehensive course will equip you with the knowledge and skills you need to succeed. You'll dive into each of the five domains of CISA and take challenging quizzes to assess your understanding. And when you're ready, the grand final assessment will test your mastery of the course and prepare you for the real-life scenario of the CISA exam.But this course is not just about passing the exam. It's about becoming an expert in the field of information systems audit and opening up a world of opportunities in the field of cybersecurity, IT audit, and governance. With my guidance, you'll gain a deep understanding of the best practices for auditing information systems, managing and overseeing IT operations, and protecting sensitive information.So why wait? Unleash your potential and join me on this exciting journey to become a Certified Information Systems Auditor. Enroll now and start your journey towards mastery today!

Overview
Section 1: Introduction

Lecture 1 Introduction

Section 2: Domain 1 : Information System Auditing Process

Lecture 2 What is IS Audit

Lecture 3 Audit Universe

Lecture 4 Controls

Lecture 5 Controls and it Types

Lecture 6 IT Standards, Polices and Procedures

Lecture 7 IS Auditor's Roles and Responsibilities

Lecture 8 Process of IS Audit

Lecture 9 Planning an IS Audit

Lecture 10 Developing an IS Audit Plan

Lecture 11 Follow up on IS Audit

Lecture 12 Water Marking

Lecture 13 Control Self Assessment - CSA

Lecture 14 Electronic Data Interchange - EDI

Lecture 15 Evidence and Fraud Detection

Lecture 16 CAATs

Lecture 17 CAATs VS Auditor

Lecture 18 Audit Charter

Lecture 19 Types of Risk

Lecture 20 What is Risk

Lecture 21 Managing IS Audit

Lecture 22 IS Audit Life Cycle

Section 3: Domain 2 : Governance and Management of IT

Lecture 23 Introduction

Lecture 24 Governance and Management of IT

Lecture 25 What is Governance

Lecture 26 IT Governance

Lecture 27 Governance vs Management

Lecture 28 IT Frameworks

Lecture 29 Organisational Structure

Lecture 30 IT Resource Management

Lecture 31 Control Identification

Lecture 32 Technical Controls

Lecture 33 Administrative Controls

Lecture 34 IT Performance Management

Lecture 35 IT Service Provider Acquisition and Management

Lecture 36 IT Performance and Reporting

Lecture 37 Quality Assurance And Management

Lecture 38 Business Feasibility Analysis

Lecture 39 System Development Methodologies

Lecture 40 ERM

Lecture 41 Auditor's Role

Lecture 42 SoD

Lecture 43 Closing the Right Supplier

Lecture 44 BPR

Section 4: Domain 3 : IS Acquisition Development and Implementation

Lecture 45 Information System Aquisition Development & Implementation

Lecture 46 Project Governance and Management

Lecture 47 Feasibility Analysis

Lecture 48 Business Case Analysis

Lecture 49 System Development Methodologies

Lecture 50 Information System Aquisition

Lecture 51 Planning Phase - ISADI

Lecture 52 Acquisition Phase - ISADI

Lecture 53 Control Identification

Lecture 54 Control Design

Lecture 55 Access Control

Lecture 56 Application Controls

Lecture 57 Configuration Management

Lecture 58 System Migration

Lecture 59 Release Management

Lecture 60 Development Phase - ISADI

Lecture 61 Maturity Model

Lecture 62 Implementation Phase - ISADI

Lecture 63 Post Implementation Review / PIR

Lecture 64 Conclusion

Section 5: Domain 4 : IS Operations & Business Resilience

Lecture 65 What to expect

Lecture 66 Common Technologies and Architecture

Lecture 67 End User Computing

Lecture 68 Data Governance

Lecture 69 Data Conversion

Lecture 70 Problem Incident Management

Lecture 71 Change Configuration, Release and Patch Management

Lecture 72 IT Service Level Management - SLM

Lecture 73 Database Management

Lecture 74 Business Resilience

Lecture 75 System Resilience

Lecture 76 Business Impact analysis - BIA

Lecture 77 Disaster Recovery Plan - DRP

Lecture 78 BCP

Lecture 79 IS Operations

Lecture 80 Data Backup, Storage and Restore

Lecture 81 Automation

Lecture 82 System Performance Management

Lecture 83 IT Management

Lecture 84 Clusters

Lecture 85 Client-Server Architecture

Lecture 86 Protocols

Lecture 87 RAID

Lecture 88 RPO vs RTO

Lecture 89 EMI and Attenuation

Lecture 90 Capacity Management

Section 6: Domain 5 : Protection of Information Assets

Lecture 91 Introduction

Lecture 92 INFORMATION ASSET SECURITY FRAMEWORKS, STANDARDS AND GUIDLINES

Lecture 93 Identity Access Management - IAM

Lecture 94 Network End Point Security

Lecture 95 Data Classification

Lecture 96 Encryption And Related Techniques

Lecture 97 Public Key Infrastructure - PKI

Lecture 98 Web Based Communication Technologies

Lecture 99 Virtualization Environment

Lecture 100 Security Event Management - SEM

Lecture 101 Security Awareness Training

Lecture 102 IS Attack Methodologies and Techniques

Lecture 103 Security Tools and Techniques

Lecture 104 Evidence Collection and Forensics

Lecture 105 Dead man doors

Lecture 106 Biometrics

Lecture 107 SSO and Kerberos

Lecture 108 Asymmetric Key Encryption

Lecture 109 Symmetric Key Encryption

Lecture 110 OSI Model

Lecture 111 Data Classification

Lecture 112 VoIP

Lecture 113 BOMBS

Lecture 114 XSS, Parameter Tampering and Spear Phishing

Lecture 115 Sateful Firewall

Lecture 116 Pen Testing

Lecture 117 Forensics

Lecture 118 INFORMATION ASSET SECURITY AND CONTORLS

Lecture 119 PRIVACY PRINCIPLE

Section 7: Final Assessment

If you enjoy working with IT and you're always itching to learn what's next, becoming a CISA could be an excellent career fit. Consider the benefits to earning your CISA, and you'll be on the pathway to career success.,CISA Exam and continuing education requirements equip you with the tools and skills to keep pace. The CISA is for you if you crave variety in your work and want to dance on that ever-moving ledge where IT is revolutionizing business functions. In particular, more accounting functions are operating through information systems. The CISA-certified IT auditor remains agile in a forward-thinking field.,Incorporating IT into business functions offers rewards in efficiencies, but it also elevates the risks involved. Employers see CISA holders as the IT auditors best qualified to mitigate those risks, and they're willing to pay a premium for those safeguards. CISA certificate holders make between $83,677 and $107,342 a year, according to PayScale. Security consultants earn between $67,860 and $106,407, while IS auditors earn between $59,647 and $82,159 a year. If you leverage your CISA certificate to become an internal audit director, your salary can climb to $136,082 a year.,IT professionals looking to advance their careers in the field of cybersecurity, IT audit, and governance will benefit from this course.,IT security professionals looking to broaden their knowledge and understanding of information systems audit will benefit from this course.,IT managers looking to understand the best practices for managing and overseeing IT operations will find this course valuable.,This course is designed to prepare individuals for the CISA exam and help them clear it in their first attempt.

rapidgator.net:

Код:
https://rapidgator.net/file/5fd021614d33ba07b11d044133130f26/xmcch.The.Ultimate.Cisa.Journey.part1.rar.html
https://rapidgator.net/file/0249b845f4bfa011d28a8314afa2d21d/xmcch.The.Ultimate.Cisa.Journey.part2.rar.html

uploadgig.com:

Код:
https://uploadgig.com/file/download/0D18bb8d2809dBa4/xmcch.The.Ultimate.Cisa.Journey.part1.rar
https://uploadgig.com/file/download/e360E8aD420c50D8/xmcch.The.Ultimate.Cisa.Journey.part2.rar

nitroflare.com:

Код:
https://nitroflare.com/view/FBE21119DC4D6EF/xmcch.The.Ultimate.Cisa.Journey.part1.rar
https://nitroflare.com/view/837240614B7B4FC/xmcch.The.Ultimate.Cisa.Journey.part2.rar