CISA: Certified Information Systems Auditor

What’s included
$14.99 / $24.99
Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.
Pay once, own it forever
Video Courses
Lesson 1
Lectures | Duration |
---|---|
1. Introduction | 54s |
2. Audit Process | 10m 58s |
3. Auditing Standards | 14m 26s |
4. Auditing Guidelines | 13m 36s |
5. Cobit Model | 2m 36s |
6. Audit Management | 12m 38s |
7. Internal Control Classifications | 14m 27s |
8. Planning | 12m 40s |
9. Program | 7m 14s |
10. Evidence | 14m 31s |
11. Audit Control Evaluation | 12m 33s |
12. C S A Control Self- Assessment | 7m 54s |
1. Introduction
54s
2. Audit Process
10m 58s
3. Auditing Standards
14m 26s
4. Auditing Guidelines
13m 36s
5. Cobit Model
2m 36s
6. Audit Management
12m 38s
7. Internal Control Classifications
14m 27s
8. Planning
12m 40s
9. Program
7m 14s
10. Evidence
14m 31s
11. Audit Control Evaluation
12m 33s
12. C S A Control Self- Assessment
7m 54s
Lesson 2
Lectures | Duration |
---|---|
1. IT Governance | 12m 37s |
2. Outsourcing and Governance | 12m 10s |
3. Security Policies | 8m 7s |
4. IT Strategy | 5m 39s |
5. Organizational Compliance | 2m 23s |
6. Outsourcing and Globalization | 7m 27s |
7. IT Performance | 5m 9s |
1. IT Governance
12m 37s
2. Outsourcing and Governance
12m 10s
3. Security Policies
8m 7s
4. IT Strategy
5m 39s
5. Organizational Compliance
2m 23s
6. Outsourcing and Globalization
7m 27s
7. IT Performance
5m 9s
Lesson 3
Lectures | Duration |
---|---|
1. System And Infrastructure | 8m 32s |
2. Requirements | 13m 24s |
3. Project Management Tools- Part1 | 11m 54s |
4. Project Management Tools- Part2 | 13m 38s |
5. Applications | 10m 16s |
6. Agile Development | 15m 6s |
7. Monitoring And Controlling | 10m 38s |
8. Acquisition Process | 10m 59s |
9. Testing Process | 14m 19s |
10. Information Systems Maintenance Practices | 12m 55s |
11. Data Conversion Tools | 14m 15s |
1. System And Infrastructure
8m 32s
2. Requirements
13m 24s
3. Project Management Tools- Part1
11m 54s
4. Project Management Tools- Part2
13m 38s
5. Applications
10m 16s
6. Agile Development
15m 6s
7. Monitoring And Controlling
10m 38s
8. Acquisition Process
10m 59s
9. Testing Process
14m 19s
10. Information Systems Maintenance Practices
12m 55s
11. Data Conversion Tools
14m 15s
Lesson 4
Lectures | Duration |
---|---|
1. Media Disposal Process | 8m 41s |
2. Post Implementation Review | 6m 43s |
3. Periodic Review | 9m 32s |
4. System Maintenance | 7m 26s |
1. Media Disposal Process
8m 41s
2. Post Implementation Review
6m 43s
3. Periodic Review
9m 32s
4. System Maintenance
7m 26s
Lesson 5
Lectures | Duration |
---|---|
1. IT Service Delivery And Support | 11m 56s |
2. How To Evaluate Service Level Management Practices | 3m 33s |
3. Operations Management | 13m 4s |
4. Databases | 9m 49s |
5. Structured Query Language | 10m 21s |
6. Monitoring Performance | 13m 48s |
7. Source Code And Performance Monitoring | 7m 21s |
8. Patch Management | 7m 46s |
9. Incident Management | 12m 16s |
10. Hardware Component Types | 13m |
11. Network Component Types | 12m 48s |
1. IT Service Delivery And Support
11m 56s
2. How To Evaluate Service Level Management Practices
3m 33s
3. Operations Management
13m 4s
4. Databases
9m 49s
5. Structured Query Language
10m 21s
6. Monitoring Performance
13m 48s
7. Source Code And Performance Monitoring
7m 21s
8. Patch Management
7m 46s
9. Incident Management
12m 16s
10. Hardware Component Types
13m
11. Network Component Types
12m 48s
Lesson 6
Lectures | Duration |
---|---|
1. I S Auditor Technical Overview | 11m 17s |
2. Security Design | 13m 21s |
3. Monitoring Systems | 13m 40s |
4. Types of Attacks | 15m 8s |
5. Cryptography | 8m 2s |
6. Encryption | 5m 34s |
7. Asymmetric Encryption | 11m 8s |
8. Digital Certificate | 14m 5s |
9. Different Kinds of Attacks | 12m 8s |
10. Access Controls | 11m 45s |
11. Identification and Authentication | 13m 42s |
12. Physical Access Exposure | 9m 8s |
13. Environmental Security | 13m 50s |
14. Network Security Devices and Network Components | 13m 46s |
15. Network Address Translation | 7m 8s |
16. Virtual Private Networks | 8m 34s |
17. Voice System Risks | 12m 9s |
18. Intrusion Detection | 4m 12s |
19. Firewalls | 11m 10s |
20. Firewall Implementation | 6m 32s |
21. Network Access Protection | 5m 46s |
22. Honey Pot | 3m 46s |
23. Risks to Portable And Wireless Devices | 11m 28s |
24. Bluetooth | 7m 20s |
25. OSI Networking | 13m 3s |
26. Managing Data | 8m 23s |
1. I S Auditor Technical Overview
11m 17s
2. Security Design
13m 21s
3. Monitoring Systems
13m 40s
4. Types of Attacks
15m 8s
5. Cryptography
8m 2s
6. Encryption
5m 34s
7. Asymmetric Encryption
11m 8s
8. Digital Certificate
14m 5s
9. Different Kinds of Attacks
12m 8s
10. Access Controls
11m 45s
11. Identification and Authentication
13m 42s
12. Physical Access Exposure
9m 8s
13. Environmental Security
13m 50s
14. Network Security Devices and Network Components
13m 46s
15. Network Address Translation
7m 8s
16. Virtual Private Networks
8m 34s
17. Voice System Risks
12m 9s
18. Intrusion Detection
4m 12s
19. Firewalls
11m 10s
20. Firewall Implementation
6m 32s
21. Network Access Protection
5m 46s
22. Honey Pot
3m 46s
23. Risks to Portable And Wireless Devices
11m 28s
24. Bluetooth
7m 20s
25. OSI Networking
13m 3s
26. Managing Data
8m 23s
Lesson 7
Lectures | Duration |
---|---|
1. Business Continuity and Disaster Recovery | 10m 53s |
2. Fault Tolerance | 7m 36s |
3. Business Continuity and Disaster Recovery Regulations | 10m 7s |
1. Business Continuity and Disaster Recovery
10m 53s
2. Fault Tolerance
7m 36s
3. Business Continuity and Disaster Recovery Regulations
10m 7s