->
Oreilly - Certified Information Systems Auditor (CISA) - 300000006A0236
Oreilly - Certified Information Systems Auditor (CISA)
by Integrity Training | Publisher: Stone River eLearning | Release Date: April 2018 | ISBN: 300000006A0236


The Certified Information Systems Auditor (CISA) course covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam. CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA certification is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.
  1. Course Introduction
    • Introduction 00:00:10
    • Course Introduction 00:02:46
    • Instructor Introduction 00:00:52
  2. Module 01 -The Process of Auditing Information Systems
    • Module 01 Introduction 00:01:51
    • Lesson 1: Management of the Audit Function 00:01:41
    • Organization of the IS Audit Function 00:03:13
    • IS Audit Resource Management 00:01:05
    • Audit Planning Part1 00:01:09
    • Audit Planning Part2 00:01:49
    • Audit Planning Part3 00:01:32
    • Audit Planning Part4 00:01:07
    • Audit Planning Part5 00:02:01
    • Effect of Laws and Regulations on IS Audit Planning Part1 00:02:17
    • Effect of Laws and Regulations on IS Audit Planning Part2 00:00:57
    • Effect of Laws and Regulations on IS Audit Planning Part3 00:00:42
    • Effect of Laws and Regulations on IS Audit Planning Part4 00:00:46
    • Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1 00:02:02
    • ISACA IT Audit and Assurance Standards and Guidelines Part2 00:03:25
    • ISACA IT Audit and Assurance Standards and Guidelines Part3 00:00:41
    • ISACA IT Audit and Assurance Standards and Guidelines Part4 00:00:36
    • ISACA IT Audit And Assurance Standards Framework 00:01:19
    • Auditing Standards Part1 00:01:54
    • Auditing Standards Part2 00:01:06
    • Auditing Standards Part3 00:02:45
    • Auditing Standards Part4 00:00:29
    • Auditing Standards Part5 00:01:59
    • Auditing Standards Part6 00:01:26
    • Auditing Standards Part7 00:02:01
    • Auditing Standards Part8 00:00:41
    • Auditing Standards Part9 00:01:06
    • Audit Guidelines Part1 00:00:34
    • Audit Guidelines Part2 00:01:08
    • Audit Guidelines Part3 00:01:38
    • Audit Guidelines Part4 00:03:08
    • Audit Guidelines Part5 00:01:57
    • Audit Guidelines Part6 00:01:28
    • Audit Guidelines Part7 00:01:42
    • Audit Guidelines Part8 00:01:59
    • Audit Guidelines Part9 00:01:57
    • Audit Guidelines Part10 00:01:31
    • Audit Guidelines Part11 00:01:56
    • Audit Guidelines Part12 00:02:02
    • Audit and Assurance Tools and Techniques 00:00:46
    • Relationship Among Standards, Guidelines, and Tools and Techniques 00:01:30
    • Information Technology Assurance Framework 00:00:27
    • Information Technology Assurance Framework Components 00:02:24
    • ITAF General Standards (Section 2200) Part1 00:01:27
    • ITAF General Standards (Section 2200) Part2 00:01:22
    • ITAF Performance Standards (Section 2400) Part1 00:03:03
    • ITAF Performance Standards (Section 2400) Part2 00:02:02
    • ITAF Performance Standards (Section 2400) Part3 00:00:34
    • ITAF Performance Standards (Section 2400) Part4 00:01:10
    • Reporting Standards (Section 2600) Part1 00:00:22
    • Reporting Standards (Section 2600) Part2 00:00:51
    • Reporting Standards (Section 2600) Part3 00:00:54
    • IT Assurance Guidelines (Section 3000) Part1 00:01:16
    • IT Assurance Guidelines (Section 3000) Part2 00:00:51
    • IT Assurance Guidelines (Section 3000) Part3 00:03:23
    • IT Assurance Guidelines (Section 3000) Part4 00:01:31
    • IT Assurance Guidelines (Section 3000) Part5 00:02:06
    • IT Assurance Guidelines (Section 3000) Part6 00:00:21
    • IT Assurance Guidelines (Section 3000) Part7 00:01:23
    • IT Assurance Guidelines (Section 3000) Part8 00:02:11
    • IT Assurance Guidelines (Section 3000) Part9 00:00:46
    • IT Assurance Guidelines (Section 3000) Part10 00:01:58
    • IT Assurance Guidelines (Section 3000) Part11 00:01:40
    • Lesson 3: Risk Analysis 00:00:40
    • Risk Analysis Part1 00:04:21
    • Risk Analysis Part2 00:03:06
    • Risk Analysis Part3 00:02:33
    • Risk Analysis Part4 00:01:27
    • Risk Analysis Part5 00:01:32
    • Risk Analysis Part6 00:04:11
    • Risk Analysis Part7 00:03:31
    • Lesson 4: Internal Controls 00:01:31
    • Internal Control Objectives 00:01:06
    • IS Control Objectives Part1 00:02:34
    • IS Control Objectives Part2 00:01:19
    • IS Control Objectives Part3 00:02:06
    • COBIT 00:00:35
    • General Controls Part1 00:00:48
    • General Controls Part2 00:03:24
    • IS Controls 00:03:41
    • Lesson 5: Performing An IS Audit 00:02:40
    • Performing an IS Audit 00:01:08
    • Classification of Audits 00:02:32
    • Audit Programs Part1 00:01:07
    • Audit Programs Part2 00:02:57
    • Audit Methodology Part1 00:03:03
    • Audit Methodology Part2 00:01:55
    • Audit Methodology Part3 00:01:26
    • Fraud Detection Part1 00:03:25
    • Fraud Detection Part2 00:02:13
    • Risk-Based Auditing Part1 00:01:13
    • Risk-Based Auditing Part2 00:00:53
    • Risk-Based Auditing Part3 00:00:57
    • Audit Risk and Materiality Part1 00:01:11
    • Audit Risk and Materiality Part2 00:01:18
    • Audit Risk and Materiality Part3 00:01:36
    • Audit Risk and Materiality Part4 00:01:05
    • Audit Risk and Materiality Part5 00:00:24
    • Risk Assessment and Treatment Part1 00:00:39
    • Risk Assessment and Treatment Part2 00:00:56
    • Risk Assessment and Treatment Part3 00:01:58
    • Risk Assessment and Treatment Part4 00:01:47
    • Risk Assessment and Treatment Part5 00:00:46
    • Risk Assessment Techniques Part1 00:02:05
    • Risk Assessment Techniques Part2 00:00:47
    • Risk Assessment Techniques Part3 00:00:19
    • Risk Assessment Techniques Part4 00:00:39
    • Audit Objectives Part1 00:01:07
    • Audit Objectives Part2 00:00:40
    • Compliance Versus Substantive Testing Part1 00:01:09
    • Compliance Versus Substantive Testing Part2 00:00:36
    • Compliance Versus Substantive Testing Part3 00:00:32
    • Evidence Part1 00:00:58
    • Evidence Part2 00:01:57
    • Evidence Part3 00:01:14
    • Interviewing and Observing Personnel in the Performance Of Their Duties 00:01:10
    • Sampling Part1 00:01:22
    • Sampling Part2 00:02:20
    • Sampling Part3 00:01:56
    • Using The Services Of Other Auditors And Experts Part1 00:02:05
    • Using The Services Of Other Auditors And Experts Part2 00:00:31
    • Computer-Assisted Audit Techniques (CAAT) Part1 00:00:43
    • Computer-Assisted Audit Techniques (CAAT) Part2 00:00:25
    • Evaluation Of Audit Strengths And Weaknesses Part1 00:00:49
    • Evaluation Of Audit Strengths And Weaknesses Part2 00:02:02
    • Evaluation Of Audit Strengths And Weaknesses Part3 00:00:57
    • Communicating Audit Results Part1 00:00:41
    • Communicating Audit Results Part2 00:01:26
    • Communicating Audit Results Part3 00:00:25
    • Management Implementation Of Recommendations 00:00:22
    • Audit Documentation 00:01:16
    • Lesson 6: Control Self-Assessment 00:00:51
    • Control Self-Assessment Part1 00:01:12
    • Control Self-Assessment Part2 00:01:39
    • Objectives of CSA 00:01:19
    • Benefits of CSA 00:00:57
    • Disadvantages of CSA 00:00:37
    • Auditor Role in CSA 00:01:21
    • Technology Drivers for CSA 00:01:08
    • Traditional Versus CSA Approach 00:00:37
    • Lesson 7: The Evolving IS Audit Process 00:00:10
    • Automated Work Papers Part1 00:01:20
    • Automated Work Papers Part2 00:01:22
    • Integrated Auditing Part1 00:01:32
    • Integrated Auditing Part2 00:00:38
    • Integrated Auditing Part3 00:00:25
    • Continuous Auditing Part1 00:00:42
    • Continuous Auditing Part2 00:01:02
    • Continuous Auditing Part3 00:00:49
    • Continuous Auditing Part4 00:02:13
    • Continuous Auditing Part5 00:00:46
    • Module 01 Review 00:01:37
  3. Module 02 - Governance and Management of IT
    • Module 02 Introduction 00:03:13
    • Lesson 1: Corporate Governance 00:00:18
    • Corporate Governance Part1 00:00:25
    • Corporate Governance Part2 00:00:33
    • Corporate Governance Part3 00:01:34
    • Lesson 2: IT Governance 00:01:02
    • IT Governance Part1 00:00:23
    • IT Governance Part2 00:00:23
    • Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management 00:00:31
    • IT Monitoring and Assurance Practices for Board and Senior Management Part1 00:02:04
    • IT Monitoring and Assurance Practices for Board and Senior Management Part2 00:01:02
    • IT Monitoring and Assurance Practices for Board and Senior Management Part3 00:00:46
    • Best Practices for IT Governance Part1 00:02:29
    • Best Practices for IT Governance Part2 00:00:44
    • Best Practices for IT Governance Part3 00:03:15
    • Best Practices for IT Governance Part4 00:00:53
    • IT Governance Frameworks 00:01:31
    • Audit Role in IT Governance Part1 00:00:38
    • Audit Role in IT Governance Part2 00:01:17
    • Audit Role in IT Governance Part3 00:01:17
    • Audit Role in IT Governance Part4 00:00:32
    • IT Strategy Committee 00:01:14
    • IT Balanced Scorecard Part1 00:00:34
    • IT Balanced Scorecard Part2 00:04:03
    • Information Security Governance Part1 00:01:36
    • Information Security Governance Part2 00:01:46
    • Information Security Governance Part3 00:03:10
    • Information Security Governance Part4 00:01:23
    • Importance of Information Security Governance Part1 00:01:10
    • Importance of Information Security Governance Part2 00:02:09
    • Outcomes of Security Governance Part1 00:01:04
    • Outcomes of Security Governance Part2 00:00:49
    • Effective Information Security Governance 00:00:52
    • Roles and Responsibilities of Senior Management and Board of Directors Part1 00:00:59
    • Roles and Responsibilities of Senior Management and Board of Directors Part2 00:02:09
    • Enterprise Architecture 00:00:45
    • Lesson 4: Information Systems Strategy 00:02:10
    • Strategic Planning Part1 00:00:58
    • Strategic Planning Part2 00:00:43
    • Steering Committee 00:01:34
    • Lesson 5: Maturity and Process Improvement Models 00:00:42
    • Maturity and Process Improvement Models 00:00:38
    • Lesson 6: IT Investment and Allocation Practices 00:01:34
    • IT Investment and Allocation Practices Part1 00:00:15
    • IT Investment and Allocation Practices Part2 00:00:49
    • IT Investment and Allocation Practices Part3 00:00:25
    • IT Investment and Allocation Practices Part4 00:01:23
    • Implement IT Portfolio Management 00:00:48
    • IT Portfolio Management Versus Balanced Scorecard 00:00:30
    • Lesson 7: Policies and Procedures 00:00:11
    • Policies Part1 00:00:43
    • Policies Part2 00:02:32
    • Policies Part3 00:01:20
    • Information Security Policy Part1 00:00:58
    • Information Security Policy Part2 00:01:33
    • Information Security Policy Part3 00:00:31
    • Information Security Policy Part4 00:02:52
    • Information Security Policy Part5 00:01:36
    • Information Security Policy Part6 00:00:29
    • Information Security Policy Part7 00:01:04
    • Procedures Part1 00:02:30
    • Procedures Part2 00:01:32
    • Lesson 8: Risk Management 00:02:02
    • Risk Management 00:03:27
    • Developing a Risk Management Program 00:02:37
    • Risk Management Process Part1 00:00:59
    • Risk Management Process Part2 00:01:56
    • Risk Management Process Part3 00:02:28
    • Risk Management Process Part4 00:01:59
    • Risk Management Process Part5 00:02:20
    • Risk Management Process Part6 00:01:00
    • Risk Analysis Methods Part1 00:00:14
    • Risk Analysis Methods Part2 00:02:15
    • Risk Analysis Methods Part3 00:00:48
    • Risk Analysis Methods Part4 00:05:31
    • Risk Analysis Methods Part5 00:03:50
    • Lesson 9: IS Management Practices 00:00:24
    • Human Resource Management Part1 00:00:17
    • Human Resource Management Part2 00:02:24
    • Human Resource Management Part3 00:04:09
    • Human Resource Management Part4 00:04:14
    • Human Resource Management Part5 00:01:26
    • Human Resource Management Part6 00:03:47
    • Human Resource Management Part7 00:02:52
    • Human Resource Management Part8 00:04:15
    • Human Resource Management Part9 00:01:46
    • Human Resource Management Part10 00:01:17
    • Human Resource Management Part11 00:01:49
    • Human Resource Management Part12 00:02:03
    • Human Resource Management Part13 00:00:54
    • Human Resource Management Part14 00:01:55
    • Organizational Change Management 00:02:23
    • Financial Management Practices 00:02:32
    • Quality Management Part1 00:00:57
    • Quality Management Part2 00:02:48
    • Quality Management Part3 00:01:56
    • Information Security Management 00:00:49
    • Performance Optimization Part1 00:01:27
    • Performance Optimization Part2 00:03:26
    • Performance Optimization Part3 00:00:21
    • Lesson 10: IS Organizational Structure and Responsibilities 00:00:54
    • IS Roles and Responsibilities Part1 00:02:29
    • IS Roles and Responsibilities Part2 00:01:33
    • IS Roles and Responsibilities Part3 00:01:17
    • Segregation of Duties 00:00:36
    • Segregation of Duties Controls Part1 00:02:34
    • Segregation of Duties Controls Part2 00:03:12
    • Compensating Controls for Lack of Segregation 00:04:34
    • Lesson 11: Auditing IT Governance Structure and Implementation 00:01:06
    • Reviewing Documentation Part1 00:00:50
    • Reviewing Documentation Part2 00:00:54
    • Reviewing Contractual Commitments 00:03:55
    • Lesson 12: Business Continuity Planning Part1 00:06:13
    • Business Continuity Planning Part2 00:01:11
    • Business Continuity Planning Part3 00:01:51
    • IS Business Continuity Planning 00:00:54
    • Disasters and Other Disruptive Events Part1 00:02:26
    • Disasters and Other Disruptive Events Part2 00:02:02
    • Business Continuity Planning Process 00:03:20
    • Business Continuity Policy 00:01:13
    • Business Impact Analysis Part1 00:01:38
    • Business Impact Analysis Part2 00:00:46
    • Classification of Operations and Criticality Analysis 00:00:58
    • Development of Business Continuity Plans 00:02:31
    • Other Issues and Plan Development 00:00:49
    • Components of a BCP Part1 00:01:15
    • Components of a BCP Part2 00:02:08
    • BCP Testing Part1 00:01:43
    • BCP Testing Part2 00:01:30
    • BCP Testing Part3 00:00:33
    • BCP Maintenance 00:00:54
    • Summary of BCP 00:00:42
    • Module 02 Review 00:02:26
  4. Module 03 - Information Systems Acquisition, Development and Implementation
    • Lesson 1: Business Realization Part1 00:01:10
    • Business Realization Part2 00:01:28
    • Portfolio/Program Management Part1 00:00:36
    • Portfolio/Program Management Part2 00:01:06
    • Portfolio/Program Management Part3 00:00:44
    • Portfolio/Program Management Part4 00:00:38
    • Portfolio/Program Management Part5 00:00:58
    • Business Case Development and Approval Part1 00:01:12
    • Business Case Development and Approval Part2 00:00:52
    • Benefits Realization Techniques 00:01:37
    • Lesson 2: Project Management Structure 00:00:39
    • Project Context and Environment 00:00:35
    • Project Organizational Forms Part1 00:00:14
    • Project Organizational Forms Part2 00:00:50
    • Project Communication and Culture 00:01:29
    • Project Objectives Part1 00:00:41
    • Project Objectives Part2 00:00:35
    • Project Objectives Part3 00:00:47
    • Roles and Responsibilities of Groups and Individuals Part1 00:00:50
    • Roles and Responsibilities of Groups and Individuals Part2 00:01:20
    • Roles and Responsibilities of Groups and Individuals Part3 00:00:27
    • Lesson 3: Project Management Practices 00:00:47
    • Initiation of a Project 00:00:20
    • Project Planning 00:02:01
    • Example of Project Management for New Software 00:01:44
    • Software Size Estimation 00:01:08
    • Lines of Source Code 00:00:41
    • Function Point Analysis (FPA) 00:00:37
    • Function Points 00:00:51
    • Cost Budgets 00:00:59
    • Software Cost Estimation 00:00:45
    • Scheduling and Establishing the Timeframe 00:00:39
    • Critical Path Methodology 00:01:22
    • Gantt Charts 00:00:52
    • Program Evaluation Review Technique (PERT) 00:00:45
    • Time Box Management 00:00:51
    • General Project Management 00:00:19
    • Project Controlling Part1 00:00:21
    • Project Controlling Part2 00:00:41
    • Management of Resource Usage 00:00:38
    • Management of Risk Part1 00:00:36
    • Management of Risk Part2 00:00:38
    • Closing a Project 00:00:39
    • Lesson 4: Business Application Development Part1 00:00:41
    • Business Application Development Part2 00:01:07
    • Business Application Development Part3 00:00:19
    • Business Application Development Part4 00:02:14
    • Business Application Development Part5 00:00:51
    • Traditional SDLC Approach 00:00:56
    • SDLC Phases 00:00:24
    • SDLC 00:01:12
    • Integrated Resource Management Systems Part1 00:01:08
    • Integrated Resource Management Systems Part2 00:00:50
    • Integrated Resource Management Systems Part3 00:00:30
    • Description of SDLC Phases Part1 00:01:04
    • Description of SDLC Phases Part2 00:01:45
    • Description of SDLC Phases Part3 00:01:53
    • Description of SDLC Phases Part4 00:01:17
    • Description of SDLC Phases Part5 00:00:45
    • Description of SDLC Phases Part6 00:01:08
    • Description of SDLC Phases Part7 00:00:46
    • Description of SDLC Phases Part8 00:01:09
    • Description of SDLC Phases Part9 00:00:51
    • Description of SDLC Phases Part10 00:01:11
    • Description of SDLC Phases Part11 00:02:57
    • Description of SDLC Phases Part12 00:01:08
    • Description of SDLC Phases Part13 00:01:41
    • Description of SDLC Phases Part14 00:01:17
    • Description of SDLC Phases Part15 00:01:02
    • Description of SDLC Phases Part16 00:00:51
    • Description of SDLC Phases Part17 00:00:11
    • Description of SDLC Phases Part18 00:01:42
    • Description of SDLC Phases Part19 00:01:23
    • Description of SDLC Phases Part20 00:01:41
    • Description of SDLC Phases Part21 00:01:09
    • Description of SDLC Phases Part22 00:01:44
    • Description of SDLC Phases Part23 00:01:38
    • Risks Associated with Software Development Part1 00:01:27
    • Risks Associated with Software Development Part2 00:00:38
    • Lesson 5: Business Application Systems 00:00:13
    • Electronic Commerce 00:00:28
    • E-Commerce Models 00:01:13
    • E-Commerce Architectures 00:00:55
    • E-Commerce Risks 00:00:51
    • E-Commerce Requirements 00:00:48
    • E-Commerce Audit and Control Issues or Best Practices 00:00:33
    • Components of PKI 00:02:20
    • Electronic Data Interchange 00:00:52
    • General Requirements of EDI 00:00:50
    • Traditional EDI 00:01:13
    • Web Based EDI 00:00:43
    • EDI Risks and Controls 00:01:03
    • Controls in EDI Environment Part1 00:00:38
    • Controls in EDI Environment Part2 00:00:41
    • Controls in EDI Environment Part3 00:00:44
    • Controls in EDI Environment Part4 00:00:44
    • E-Mail 00:00:55
    • E-Mail Security Issues 00:01:37
    • Standards for E-Mail Security Part1 00:00:39
    • Standards for E-Mail Security Part2 00:00:56
    • Standards for E-Mail Security Part3 00:01:29
    • Point-Of-Sale Systems (POS) 00:00:53
    • Electronic Banking Part1 00:01:58
    • Electronic Banking Part2 00:00:40
    • Risk Management Challenges in E-Banking 00:00:52
    • Risk Management Controls for E-Banking Part1 00:00:55
    • Risk Management Controls for E-Banking Part2 00:00:20
    • Electronic Finance 00:00:41
    • Payment Systems 00:00:21
    • Electronic Money Model 00:00:17
    • Electronic Checks Model 00:00:28
    • Electronic Transfer Model 00:00:11
    • Electronic Funds Transfer 00:00:28
    • Controls in an EFT Environment Part1 00:00:43
    • Controls in an EFT Environment Part2 00:00:48
    • Automated Teller Machines Part1 00:00:48
    • Automated Teller Machines Part2 00:00:55
    • Image Processing Part1 00:01:10
    • Image Processing Part2 00:01:15
    • Business Intelligence 00:01:12
    • Decision Support System (DSS) 00:00:32
    • DSS Frameworks 00:00:29
    • Customer Relation Management (CRM) 00:00:27
    • Supply Chain Management (SCM) 00:01:12
    • Lesson 6: Alternative Forms of Software Project Organization Part1 00:00:27
    • Alternative Forms of Software Project Organization Part2 00:00:24
    • Alternative Forms of Software Project Organization Part3 00:00:49
    • Agile Development 00:00:28
    • Prototyping 00:00:37
    • Rapid Application Development (RAD) 00:01:01
    • Lesson 7: Alternative Development Methods 00:00:48
    • Data Oriented System Development 00:00:37
    • Object Oriented System Development Part1 00:01:35
    • Object Oriented System Development Part2 00:02:13
    • Component-Based Development 00:02:30
    • Web-Based Application Development 00:01:36
    • Software Reengineering 00:00:12
    • Reverse Engineering 00:01:20
    • Lesson 8: Infrastructure Development/Acquisition Practices Part1 00:00:30
    • Infrastructure Development/Acquisition Practices Part2 00:00:35
    • Infrastructure Development/Acquisition Practices Part3 00:01:04
    • Project Phases of Physical Architecture Analysis Part1 00:01:20
    • Project Phases of Physical Architecture Analysis Part2 00:00:27
    • Planning Implementation of Infrastructure Part1 00:00:29
    • Planning Implementation of Infrastructure Part2 00:00:28
    • Critical Success Factors 00:00:22
    • Hardware Acquisition 00:00:52
    • Acquisition Steps Part1 00:01:01
    • Acquisition Steps Part2 00:00:50
    • System Software Acquisition 00:00:27
    • System Software Implementation 00:00:16
    • System Software Change Control Procedures 00:00:29
    • Lesson 9: Information Systems Maintenance Practices 00:00:55
    • Change Management Process Overview 00:00:38
    • Deploying Changes 00:01:04
    • Documentation 00:00:51
    • Testing Changed Programs 00:00:31
    • Auditing Program Changes 00:00:46
    • Emergency Changes 00:02:28
    • Change Exposures (Unauthorized Changes) 00:01:10
    • Configuration Management Part1 00:00:55
    • Configuration Management Part2 00:00:36
    • Lesson 10: System Development Tools And Productivity Aids 00:00:32
    • Code Generators 00:00:17
    • Computer Aided Software Engineering Part1 00:01:07
    • Computer Aided Software Engineering Part2 00:00:36
    • Computer Aided Software Engineering Part3 00:00:32
    • Fourth-Generation Languages (4GL) Part1 00:01:05
    • Fourth-Generation Languages (4GL) Part2 00:01:21
    • Lesson 11: Business Process Reengineering And Process Change Projects 00:01:05
    • Business Process Reengineering And Process Change Projects Continued 00:00:49
    • Benchmarking Process Part1 00:00:35
    • Benchmarking Process Part2 00:00:32
    • The Benchmarking Process 00:00:55
    • ISO 9126 00:00:46
    • Software Capability Maturity Model 00:02:31
    • ISO 15504 00:00:42
    • Lesson 12: Application Controls 00:00:39
    • Inputs Controls Part1 00:01:04
    • Inputs Controls Part2 00:00:40
    • Inputs Controls Part3 00:00:29
    • Inputs Controls Part4 00:00:41
    • Processing Procedures And Controls 00:01:10
    • Processing Controls 00:00:36
    • Data File Control Procedures 00:00:39
    • Output Controls Part1 00:00:11
    • Output Controls Part2 00:00:35
    • Business Process Control Assurance 00:00:49
    • Lesson 13: Auditing Application Controls Part1 00:00:31
    • Auditing Application Controls Part2 00:00:46
    • Risk Assessment Model To Analyze Application Controls 00:01:00
    • Observing And Testing User Performing Procedures 00:00:50
    • Data Integrity Testing 00:00:49
    • Example Of Referential And Relational Integrity 00:04:26
    • Data Integrity In Online Transaction Processing Systems 00:02:08
    • Test Application Systems 00:00:16
    • Continuous Online Auditing 00:00:33
    • Online Auditing Techniques 00:01:19
    • Lesson 14: Auditing Systems Development, Acquisition And Maintenance 00:01:08
    • Project Management 00:00:40
    • Feasibility Study 00:00:34
    • Requirements Definition 00:00:41
    • Software Acquisition Process 00:00:39
    • Detailed Design And Development 00:00:51
    • Testing 00:00:42
    • Implementation Phase 00:00:43
    • Post Implementation Review 00:00:46
    • System Change Procedures And The Program Migration Process 00:00:37
    • Module 03 Review 00:01:23
  5. Module 04 - Information Systems Operations, Maintenance and Support
    • Module 04 Introduction 00:00:48
    • Lesson 1: Information Systems Operations 00:00:27
    • Management of IS Operations 00:00:46
    • Service Management Part1 00:00:34
    • Service Management Part2 00:01:09
    • Service Management Part3 00:00:43
    • Service Management Part4 00:00:31
    • Service Management Part5 00:00:23
    • Service Level Part1 00:00:53
    • Service Level Part2 00:00:24
    • Infrastructure Operations 00:00:38
    • Scheduling Part1 00:00:22
    • Scheduling Part2 00:01:05
    • Monitoring Use of Resources 00:00:32
    • Process of Incident Handling 00:00:25
    • Problem Management 00:00:58
    • Detection, Documentation, Control, Resolution and Reporting of Abnormal Conditions 00:01:06
    • Support/Helpdesk Part1 00:01:15
    • Support/Helpdesk Part2 00:00:54
    • Change Management Process Part1 00:00:43
    • Change Management Process Part2 00:00:40
    • Release Management Part1 00:00:53
    • Release Management Part2 00:01:15
    • Information Security Management 00:00:40
    • Media Sanitization 00:01:37
    • Lesson 2: Information Systems Hardware 00:00:33
    • Computer Hardware Components and Architecture 00:01:10
    • Common Enterprise Backend Devices 00:01:37
    • Specialized Devices 00:01:10
    • Risks 00:00:44
    • Security Control 00:01:01
    • Radiofrequency Identification 00:00:33
    • RFID Applications 00:00:45
    • RFID Risks 00:00:48
    • RFID Security Control 00:00:38
    • Hardware Maintenance Program 00:01:09
    • Hardware Monitoring Procedures 00:00:54
    • Capacity Management Part1 00:00:57
    • Capacity Management Part2 00:01:00
    • Lesson 3: IS Architecture and Software Part1 00:01:47
    • IS Architecture and Software Part2 00:01:14
    • Operating Systems 00:00:54
    • Software Integrity Issues Part1 00:01:48
    • Software Integrity Issues Part2 00:00:30
    • Activity Logging and Reporting Options 00:01:15
    • Data Communication Software 00:00:53
    • Data Management 00:00:43
    • File Organization 00:01:15
    • Database Management Systems Part1 00:00:44
    • Database Management Systems Part2 00:00:40
    • Example of Data in DBMS 00:06:02
    • DBMS Architecture 00:00:56
    • DBMS Metadata Architecture 00:00:52
    • Database Structure 00:01:10
    • Relational Database 00:00:47
    • Database Models 00:03:35
    • Relational Database Model 00:05:10
    • Database Controls 00:02:20
    • Tape and Disk Management Systems 00:00:21
    • Utility Programs 00:00:55
    • Software Licensing Issues Part1 00:01:51
    • Software Licensing Issues Part2 00:01:07
    • Software Licensing Issues Part3 00:01:06
    • Digital Rights Management 00:01:07
    • Lesson 4: Network Infrastructure 00:01:37
    • Enterprise Network Architecture 00:00:37
    • Types of Networks 00:04:03
    • Network Services 00:01:59
    • Network Standards and Protocols 00:01:09
    • OSI Architecture 00:01:16
    • OSI Layers 00:10:46
    • Application of the OSI Model in Network Architectures 00:00:49
    • Local Area Network 00:00:21
    • Network Physical Media Specifications 00:02:58
    • Implementation of WANs 00:00:59
    • LAN Media Access Technologies 00:02:28
    • LAN Components 00:03:10
    • OSI Layer Diagram 00:07:43
    • LAN Technology Selection Criteria 00:00:47
    • Wide Area Networks Part1 00:02:26
    • Wide Area Networks Part2 00:03:10
    • WAN Devices 00:02:05
    • WAN Technologies 00:02:41
    • Wireless Networks 00:00:52
    • Wireless Wide Area Networks 00:00:33
    • Wireless Local Area Networks Part1 00:00:37
    • Wireless Local Area Networks Part2 00:02:24
    • Wireless Security 00:01:44
    • Wireless Application Protocol 00:00:34
    • Risks of Wireless Communications Part1 00:00:17
    • Risks of Wireless Communications Part2 00:01:38
    • World Wide Web Services 00:01:15
    • General Internet Terminology 00:03:34
    • Network Administration and Control 00:00:54
    • Network Performance Metrics 00:01:47
    • Network Management Issues 00:01:25
    • Network Management Tools 00:01:45
    • Client/Server Technology Part1 00:00:41
    • Client/Server Technology Part2 00:01:38
    • Client/Server Technology Part3 00:00:52
    • Client/Server Technology Part4 00:01:35
    • Client/Server Technology Part5 00:00:45
    • Lesson 5: Disaster Recovery Planning 00:00:25
    • Recovery Point Objective and Recovery Time Objective Part1 00:01:05
    • Recovery Point Objective and Recovery Time Objective Part2 00:00:44
    • Recovery Strategies Part1 00:01:07
    • Recovery Strategies Part2 00:00:11
    • Recovery Strategies Part3 00:02:33
    • Application Disaster Recovery Methods Part1 00:01:04
    • Application Disaster Recovery Methods Part2 00:00:52
    • Data Storage Disaster Recovery Methods 00:00:37
    • Telecommunication Networks Disaster Recovery Methods 00:00:24
    • Methods for Network Protection 00:01:40
    • Development of Disaster Recovery Plans 00:00:40
    • Organization and Assignment Of Responsibilities Part1 00:00:53
    • Organization and Assignment Of Responsibilities Part2 00:00:42
    • Organization and Assignment Of Responsibilities Part3 00:00:09
    • Backup and Restoration 00:00:21
    • Off-Site Library Controls 00:01:25
    • Types of Backup Devices and Media Part1 00:00:15
    • Types of Backup Devices and Media Part2 00:00:29
    • Periodic Backup Procedures 00:00:26
    • Frequency of Rotation 00:01:03
    • Backup Schemes 00:01:45
    • Module 04 Review 00:01:02
  6. Module 05 - Protection of Information Assets
    • Module 05 Introduction 00:01:30
    • Lesson 1: Importance Of Information Security 00:01:19
    • Key Elements of Information Security Management 00:01:07
    • Information Security Management Roles and Responsibilities 00:00:15
    • Inventory and Classification of Information Assets Part1 00:00:54
    • Inventory and Classification of Information Assets Part2 00:01:47
    • System Access Permission Part1 00:03:04
    • System Access Permission Part2 00:02:37
    • Mandatory and Discretionary Access Controls 00:02:43
    • Privacy Management Issue and the Role of IS Auditors Part1 00:00:42
    • Privacy Management Issue and the Role of IS Auditors Part2 00:00:37
    • Critical Success Factors to Information Security Management 00:00:55
    • Information Security and External Parties 00:01:16
    • Identification of Risks Related to External Parties 00:01:09
    • Addressing Security When Dealing with Customers 00:02:55
    • Addressing Security and Third-Party Agreements Part1 00:00:41
    • Addressing Security and Third-Party Agreements Part2 00:00:43
    • Human Resources Security and Third Parties Part1 00:01:37
    • Human Resources Security and Third Parties Part2 00:01:26
    • Computer Crime Issues and Exposures Part1 00:02:45
    • Computer Crime Issues and Exposures Part2 00:02:26
    • Types of Computer Crimes Part1 00:01:36
    • Types of Computer Crimes Part2 00:03:44
    • Peer to Peer, Instant Messaging, Data Leakage and Web-Based Technologies 00:02:21
    • Security Incident Handling and Response Part1 00:02:06
    • Security Incident Handling and Response Part2 00:01:32
    • Lesson 2: Logical Access 00:00:25
    • Logical Access Exposures 00:00:43
    • Familiarization with the Enterprise IT Environment 00:00:20
    • Paths of Logical Access 00:01:03
    • General Points of Entry 00:00:17
    • Logical Access Control Software 00:00:41
    • Identification and Authentication 00:01:52
    • Features of Passwords Part1 00:01:09
    • Features of Passwords Part2 00:02:20
    • Identification and Authentication Best Practices 00:03:09
    • Token Devices, One-Time Passwords 00:01:35
    • Management of Biometrics 00:02:47
    • Single Sign-On Part1 00:01:35
    • Single Sign-On Part2 00:01:06
    • Authorization Issues 00:00:38
    • Access Control Lists 00:00:45
    • Logical Access Security Administration 00:01:01
    • Remote Access Security Part1 00:01:41
    • Remote Access Security Part2 00:01:08
    • Common Connectivity Methods Part1 00:02:33
    • Common Connectivity Methods Part2 00:00:21
    • Remote Access Using PDAs 00:01:54
    • Access Issues with Mobile Technology 00:02:13
    • Access Rights to System Logs 00:01:04
    • Tools for Audit Trail Analysis 00:00:55
    • Use of Intrusion Detection 00:01:32
    • Storing, Retrieving, Transporting and Disposing of Confidential Information 00:02:42
    • Lesson 3: Network Infrastructure Security 00:00:44
    • LAN Security 00:00:37
    • Virtualization 00:00:43
    • Client/Server Security Part1 00:01:24
    • Client/Server Security Part2 00:02:21
    • Client/Server Security Part3 00:00:53
    • Wireless Security Threats and Risks Mitigation Part1 00:00:33
    • Wireless Security Threats and Risks Mitigation Part2 00:00:56
    • Internet Threats and Security 00:02:06
    • Network Security Threats 00:03:13
    • Internet Security Control Audits 00:03:00
    • Firewall Security Systems 00:03:52
    • Common Attacks Against a Firewall 00:01:46
    • Examples of Firewall Implementation 00:01:56
    • Intrusion Detection 00:02:09
    • Describing IDS and IPS Deployment 00:02:38
    • Encryption Part1 00:00:48
    • Encryption Part2 00:02:29
    • Uses of Encryption 00:01:39
    • Viruses 00:01:49
    • Technical Controls Against Viruses 00:00:21
    • AV Software 00:01:24
    • Voice Over IP 00:01:18
    • Private Branch Exchange 00:01:05
    • Lesson 4: Auditing Information Security Management Framework Part1 00:00:20
    • Auditing Information Security Management Framework Part2 00:00:43
    • Auditing Logical Access 00:00:45
    • Techniques for Testing Security 00:01:39
    • Lesson 5: Auditing Network Infrastructure Security 00:01:11
    • Auditing Remote Access 00:01:29
    • Network Penetration Test 00:02:56
    • Types of Penetration Tests 00:01:53
    • Full Network Assessment Reviews 00:00:41
    • Development and Authorization of Network Changes 00:00:39
    • Unauthorized Changes 00:01:00
    • Computer Forensics 00:01:33
    • Chain of Evidence 00:02:19
    • Lesson 6: Environmental Exposures and Controls Part1 00:00:04
    • Environmental Exposures and Controls Part2 00:02:26
    • Lesson 7: Physical Access Exposures and Controls 00:00:15
    • Physical Access Exposures 00:01:01
    • Physical Access Controls 00:02:04
    • Auditing Physical Access 00:01:28
    • Lesson 8: Mobile Computing Part1 00:00:13
    • Mobile Computing Part2 00:01:31
    • Module 05 Review 00:01:07
    • Course Closure 00:02:45
  7. Oreilly - Certified Information Systems Auditor (CISA)

    300000006A0236.Certified.Information.Systems.Auditor.CISA.part01.OR.rar

    300000006A0236.Certified.Information.Systems.Auditor.CISA.part02.OR.rar

    300000006A0236.Certified.Information.Systems.Auditor.CISA.part03.OR.rar

    300000006A0236.Certified.Information.Systems.Auditor.CISA.part04.OR.rar

    300000006A0236.Certified.Information.Systems.Auditor.CISA.part05.OR.rar

    300000006A0236.Certified.Information.Systems.Auditor.CISA.part06.OR.rar

    300000006A0236.Certified.Information.Systems.Auditor.CISA.part07.OR.rar

    300000006A0236.Certified.Information.Systems.Auditor.CISA.part08.OR.rar

    300000006A0236.Certified.Information.Systems.Auditor.CISA.part09.OR.rar


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss