Information Systems Auditing: Expert CISA 2016

https://www.skillsoft.com/channel/information-systems-auditing-e36bff80-131b-11e7-822f-df9d5d5ce619?expertiselevel=54544&technologyandversion=54545 https://www.skillsoft.com/channel/information-systems-auditing-e36bff80-131b-11e7-822f-df9d5d5ce619?expertiselevel=54544&technologyandversion=54546
  • 15 Courses | 14h 36m 23s
  • 5 Books | 23h 52m
  • Includes Test Prep
  • 15 Courses | 15h 23m 12s
  • 5 Books | 52h 41m
Likes 63 Likes 63
 
Explore the auditing of information systems, a preventative measure that protects an organization's hardware, data, and  other IS assets.

GETTING STARTED

IS Auditing

  • Playable
    1. 
    Domain 1 Overview
    2m 36s
    NOW PLAYING
  • Playable
    2. 
    Organization of the IS Audit Function
    4m 18s
    UP NEXT

GETTING STARTED

Certified Information Systems Auditor (CISA) 2019: Information System Auditing

  • Playable
    1. 
    Course Overview
    1m 44s
    NOW PLAYING
  • Playable
    2. 
    The Purpose of Auditing
    3m 17s
    UP NEXT

COURSES INCLUDED

IS Auditing
Auditing information systems requires professionals to understand and plan an effective auditing process. Explore the audit function, including best practices for organizing, planning, and resourcing audit activities.
14 videos | 53m has Assessment available Badge
IS Controls
Auditing information systems is key to a successful risk management strategy. Explore the audit function and effective information systems controls frameworks, including COBIT5 and risk analysis.
8 videos | 32m has Assessment available Badge
Performing an Audit
Auditing information systems (ISs) requires a good audit plan and effective execution of that plan. Explore the practical knowledge required for performing an IS audit.
6 videos | 25m has Assessment available Badge
Control Self-assessment (CSA) & Finalizing an Audit
A successful information system audit requires proper assessment and reporting. Explore best practices for finalizing an audit, compiling results, and effectively communicating pertinent outcomes.
19 videos | 1h has Assessment available Badge
Governance, Strategy, Value, & Policies
Information system (IS) audits determine if the organization has an effective governance framework. Explore governance best practices, including IS governance, responsible IT governance committees, and enterprise architecture.
14 videos | 54m has Assessment available Badge
Risk & IT Management
Information system audits examine network infrastructure management controls to determine compliancy. Explore best practices for risk and IT management, including change management, financial management, and human resources management.
9 videos | 43m has Assessment available Badge
IT Governance & Management
IS auditors require skills to assess an organization's overall structure and division of responsibilities. Explore best practices for IT organizational structure, including segregation of duties and contractual commitments.
18 videos | 1h 26m has Assessment available Badge
Benefits, Practices, & Business Application Systems
IS auditing professionals must ensure that IS implementation meets organizational objectives and strategic goals. Explore best practices for IS development, project management, and business application systems best practices.
10 videos | 1h 9m has Assessment available Badge
Development, Maintenance, & Auditing
It's important to ensure your IS implementation meets organizational objectives and strategic goals. Explore IS maintenance practices, system development activities, and application controls auditing.
14 videos | 1h 18m has Assessment available Badge
Information Systems Operations Management
Ensuring your organization has an effective governance framework in place includes managing risks and resources. Explore best practices for IS operations, change management, and IT asset management.
10 videos | 56m has Assessment available Badge
Information Systems Maintenance & Service Management
An effective IS audit should include all aspects of an organization. Explore best practices for IS architecture, software, network infrastructure, and operations auditing activities.
15 videos | 1h 22m has Assessment available Badge
Information Security Management
A key component IS auditing professionals evaluate is an organization's IS management activities. Discover key IS management elements, roles, responsibilities and risk factors, and information security control design best practices.
14 videos | 1h has Assessment available Badge
Protection of Information Assets
A key component IS auditing professionals evaluate is an organization's logical access practices. Explore best practices for identification, authentication, authorization, and confidential information handling activities.
8 videos | 28m has Assessment available Badge
Network Infrastructure Security
IS auditing demands that an organization's policies and procedures protect the confidentiality, integrity, and availability of information assets. Explore network infrastructure security, including LAN, client-server, and wireless security.
12 videos | 59m has Assessment available Badge
Information Asset Security
It is vital that an organization's policies protect all information assets. Explore IS security best practices, including environmental and physical access controls.
20 videos | 1h 17m has Assessment available Badge
SHOW MORE
FREE ACCESS

COURSES INCLUDED

Certified Information Systems Auditor (CISA) 2019: Information System Auditing
Discover keys to conducting a successful audit, its driving processes, and its underlying IT solutions in this 15-video course. Examine controls and audit reporting while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered here include: how information systems (IS) auditing shows whether IT solutions meet business objectives efficiently and effectively; the expectations of conduct for CISA-certified individuals; and how auditing standards provide guidance for conducting efficient audits. Learn about various types of documentation when preparing an IS audit; how to identify client needs that map to business objectives; and different categories of security controls, including internal business process controls, IT controls, and sampling types. You will learn about control objectives required to secure organizational assets along with the controls themselves; planning for audit funding, personnel, and related items; scheduling audit phases; and how to report serious discoveries, including fraud or serious IT vulnerabilities. Finally, see how to generate audit reports, including existing controls which have passed or failed communication with stakeholders after audit recommendations are reported; and how IS auditing identifies weak security controls.
15 videos | 1h 3m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: IT Management Frameworks
Explore how IT management frameworks provide a structured approach to managing and auditing IT assets and how risk assessments often drive the IS audit in this 11-video course, helping learners prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 11-video course include: how IT governance provides a structured approach to ensuring IT solutions are aligned with business goals, including outsourced tasks; how Control Objectives for Information and Related Technologies (COBIT) can ensure business objectives are met by aligning appropriate IT processes; and how Information Technology Infrastructure Library (ITIL) practices can streamline IT service delivery. Learn how International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) standards can result in proper IT governance; how risk management can improve business operations; how to map various risk treatments to threats; and how the Business Model for Information Security (BMIS) encompasses information security planning, implementation, and management. Finally, learn how the Information Technology Assurance Framework (ITAF) is an assurance that an audit is done properly; the purpose of IT balanced scorecards; and how to map common framework characteristics to IS audits.
11 videos | 41m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: Data Privacy & Risk
In this 14-video course, discover how identifying IT asset risks and applying appropriate data privacy standards helps keep sensitive data from unauthorized entities, while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered course include: how the CIA triad (confidentiality, integrity, and availability) enhances IT security; understanding examples of personally identifiable information (PII) and protected health information (PHI); how General Data Protection Regulation (GDPR) assures data privacy; and how to align data protection policies with GDPR. Then learn how Payment Card Industry Data Security Standard (PCI DSS) protects cardholder information; how to identify network devices with insufficient antimalware protection with the free Spiceworks tool; and how Hypertext Transfer Protocol Secure Health Insurance Portability and Accountability Act (HIPAA) protects sensitive medical information. Next, learn how Federal Risk and Authorization Management Program (FedRAMP) standards secure US Government information systems; how to determine the annualized loss expectancy (ALE) value with an online ALE calculator; and how to scan a network by using Network Mapper (Nmap) to determine which devices are present.  Finally, map IT solutions to data privacy requirements.
14 videos | 52m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: IAM & Data Classification
Explore how multifactor authentication (MFA) and role-based access control lessen risks of system compromise and privilege abuse, and how data classification uses tags to organize data, while preparing for the ISACA Certified Information Systems Auditor (CISA) exam in this 16-video course. Key concepts covered include: authentication categories and how authorization follows; how to create Active Directory (AD) users and groups on-premises; and how to create Azure AD users and groups. Learn how MFA enhances security; how to enable MFA for Azure AD users; how to assign built-in Azure roles to AD groups; and how to assign built-in Amazon Web Services (AWS) policies. Next, study the role of identity federation across organizations, including single sign-on (SSO), and learn how resource tagging aids in tracking and granting permissions. Learn to configure shared folder and New Technology File System (NTFS) Windows file system permission, as well as standard Linux file system permissions. Finally, learn to classify Windows Server files with metadata; to use resource and AD attributes to conditionally grant file system permissions; and to create and manage authentication accounts and data tags.
16 videos | 1h 19m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: Performance & Management
Efficient delivery of IT systems includes cost reduction and optimized system performance. In this 15-video course, discover how a structured approach for implementing changes and patches can reduce security incidents and downtime, in preparation for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered here include: how performance is related to service level agreements (SLAs), and differences between SLAs and operational level agreements; how to establish a baseline of normal performance and monitor performance metrics in Windows and Linux environments; and how to monitor performance metrics in a cloud computing environment. Next, learn how to configure cloud-based alerting; about enterprise change and configuration management procedures and terms such as content management system (CMS), configuration management database (CMDB), and configuration item (CI); and enterprise vulnerability management procedures. Learn how to configure which administrators can manage Group Policy Objects (GPOs); how to configure application deployment centrally with System Center Configuration Manager (SCCM); configure Windows patch deployment centrally with SCCM; how to configure Ubuntu Linux to check for updates; and how to tweak IT system performance and implement controlled changes centrally.
15 videos | 1h 13m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: PKI & Data Protection
Explore how public key infrastructure (PKI) provides a hierarchy of digital security certificates used to secure data and authenticate users and devices and how data are protected with encryption and file integrity verification, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: how cryptography protects data; distinguishing between asymmetric and symmetric encryption; steps in the PKI certificate lifecycle; and how to deploy a private Microsoft CA (certificate authority). Next, learn about configuring customized PKI certificate templates; how Transport Layer Security (TLS) and Internet Protocol Security (IPsec) secure network communications; disabling SSLv3 (secure sockets layer) on clients and servers; and configuring an Internet Information Services (IIS) website with a PKI certificate. Then learn about client PKI certificates for website access; how to protect data at rest with Windows Encrypting File System (EFS); and how to protect data at rest with Windows BitLocker. Finally, learn to use SHA-256 (secure hash algorithm) hashing to verify file integrity; and work with PKI certificates to secure data in transit and at rest.
16 videos | 1h 8m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: Virtualization & Cloud
Explore how virtualization provides efficient hardware usage and security boundaries and how cloud computing tracks pooled IT resource usage and charges fees accordingly, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts in this 14-video course include: when to use various virtualization technologies; how to distinguish differences between Type 1 and Type 2 hypervisors; how to install Microsoft Hyper-V hypervisor; and how to configure a Hyper-V virtual network switch. Learn how to create a virtual machine (VM) hosted on Hyper-V; how to secure virtualized environments through dedicated management interfaces, patching, and changing default configurations; and to understand the National Institute of Standards and Technology (NIST) standard characteristics of cloud computing.  Next, learn about map cloud service offerings to business needs; cloud-based security solutions such as the Azure Security Center, distributed denial-of-service (DDoS) mitigation, and Azure network security groups; and how to deploy a Windows VM and a Linux VM in the Azure cloud. Finally, learn to identify cloud services that require endpoint security and to map security solutions to use of virtualization and cloud computing.
14 videos | 1h 14m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: Digital Asset Protection
Security technicians must determine which security controls most effectively protect assets at a reasonable cost. Explore IT maturity models, and endpoint, Internet of Things (IoT), and mobile device security in this 15-video course. Key concepts covered here include: how IT maturity models provide assessments as to whether technology effectively meets business needs; how to map security hardware and software to the Open Systems Interconnection model (OSI model); and how to enable requirements for complex passwords and user account intruder detection. Next, learn to configure endpoint antimalware policy settings centrally with System Center Configuration Manager (SCCM); how to determine when data loss prevention (DLP) solutions are needed for data privacy; and why IoT devices are generally considered unsecure. Learn to use the shodan.io site to locate vulnerable IoT devices; use techniques such as network isolation and changing default settings to harden IoT and mobile devices; and manually harden an Android smartphone. Finally, learn how to configure SCCM policies to ensure mobile device security compliance and compare OSI Layer 3 and Layer 7 security solutions. This course helps learners prepare for the ISACA Certified Information Systems Auditor  (CISA) certification exam.
15 videos | 1h 12m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Explore the variety of methods through which stored data can be secured and made highly available, despite realization of malware threats, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: distinguishing between data and information how they are secured; how to define the relationship between big data and the value of data analytics; and listing methods of securing a storage area network (SAN). Next, learn to enable password authentication for Internet Small Computer Systems Interface (iSCSI) target access; to recognize common security options available with cloud storage; and to ensure that decommissioned storage media do not contain retrievable data artifacts. You will learn how to deploy Structured Query Language (SQL) Database in the Azure cloud; how to implement a database replication strategy; how to protect data with the Windows backup feature; and how to protect data by backing it up to the cloud. Finally, learn how to identify the various forms of social engineering and the related security risks, and how to implement controls that provide data availability.
16 videos | 1h 12m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
This course addresses why and how organizations must have a Disaster Recovery Plan (DRP), for resiliency in the face of malicious attacks, as well as natural and man-made disasters. The DRP is part of the overall Business Continuity Plan (BCP), which ensures the ongoing functionality of business processes. In this course, you will learn a variety of disaster planning strategies, as well as network security configurations order when planning for business disruptions. Learners will explore the auditing process, and what IS auditors need to consider as the audit objective and the audit scope, and which may include reviewing business continuity plans within the organization. This course identifies common redundant array of independent disks (RAID)-level characteristics, and you will learn how to configure RAID 5 in Windows Server 2016. You will learn how to configure Microsoft Azure cloud computing and SQL database georedundancy. Finally, the course explores numerous network security topics, such as wired and wireless network security and network threat mitigation through configuration of firewalls. This course helps learners prepare for the ISACA Certified Information Systems Auditor  (CISA) certification exam.
16 videos | 1h 15m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: System Design & Analysis
This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam, and you will explore systems planning, testing, integration, and delivery to ensure timely delivery of system changes or entire new solutions for security planning. First, you will explore IT system planning, including the system development life cycle, and learn how technicians can evaluate IT solutions to align with business needs. You will examine how IT solutions will require a feasibility analysis to determine whether those solutions can be used or if a new IT solution must be built. You will see that testing and continuous delivery ensures and maintain the stability and security of the solution. This course covers QA (quality assurance) and why QA needs to be adapted for different organizations, based on compliance with laws and regulations relevant to their business. Finally, this course examines IT solution deployment, including continuous integration and delivery, infrastructure deployment, system migration and data conversion, and how to perform a cloud migration assessment.
16 videos | 1h 5m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability
This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam, and explores auditor responsibilities such as identifying network and host weaknesses, reporting them to stakeholders, and suggesting recommendations to improve an organization's security. Learn to distinguish between white, black, and gray box testing, and then explore the benefits of periodic scans for identifying vulnerabilities. Learn how to use pen tests, and evaluate environmental and physical security controls. Next, learn how to use Nessus, a free remote security scanning tool. This course demonstrates how to forge TCP (transmission control protocol) network traffic by using the hping3 tool in Kali Linux. This course demonstrates the OWASP (open-source web application security scanner) ZAP (zed attack proxy) tool to identify web app vulnerabilities. You will learn how to secure traffic by using IPSec (internet security protocol), configure a cloud-based jump box, and about honey pots. Next, learn to secure assets with physical controls and the eavesdropping risk of drones. Finally, learners will be able to identify different types of fire suppression systems.
16 videos | 1h 11m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: Digital Evidence Gathering
This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam, a professional certification that allows information system (IS) auditors to properly follow the IS audit process in risk management. You will learn how to identify assets and threats, hardening IT computing environments, performing IT forensics, and auditing tasks. This course explores the importance of gathering, handling, and storing digital evidence to ensure its admissible in a court of law. Because chain-of-custody laws vary around the world, it is important to know how the evidence was gathered, where it was stored, and who had access to the evidence. Learners will explore digital forensics, chain of custody, order of volatility, and hard disk imaging. You will see a list of common digital forensic hardware and software, and IT component collection as evidence. Finally, this course demonstrates how to use tools in Kali Linux, such as the autopsy forensic browser tool to view user data, and how to retrieve data from an image.
10 videos | 38m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
This course explores the importance of continuously monitoring business processes, and the applicable supporting IT solutions. You will learn how information system (IS) auditing can identify and assist in continuous process improvement. In this course, learners will acquire knowledge of the skills necessary to audit monitoring solutions and business processes. You will explore how to establish baselines to easily detect anomalies. Then learn how to set a baseline for specific systems, like a web server, its normal performance, and the server's normal pattern of network. This course will list various sampling types, such as attribute, variables, and statistical and discovery sampling, which play a role in the audit process. You will learn how to filter logs and enable centralized log collection. Next, explore how to work with optimal settings for packet capturing placement, and for intrusion detection and intrusion prevention systems. This course covers new malware variance, new hardware and software vulnerabilities, as well as other events that impact processes or IT infrastructure, such as the flooding of a data center. This course helps learners prepare for the ISACA Certified Information Systems Auditor  (CISA) certification exam.
11 videos | 52m has Assessment available Badge
Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice
This course explores how to apply the information systems (IS) audit process to ensure adequate risk mitigation for audit planning, security control selection, travelling user vulnerability mitigation, Wi-Fi hardening, and proper PKI (public key infrastructure) key implementation. Learn the importance of having a ISACA CISA (Certified Information Systems Auditor) certification, which indicates you are a professional with the skills necessary as an IT security analyst in performing an IS audit. An IS auditor must have knowledge of the type of business being audited, and need to be able to identify the security posture of an organization within a given specific scenario that falls within the audit scope. When auditing a business, you first look at the type of business, its use of technology, and related security. This course uses real-world business scenarios that include, for example, a marketing company and a financial institution. These scenarios cover how to identify audit planning errors, security control cost effectiveness, determining Wi-Fi weaknesses, determining how keys should be used, and compensating control selection.
8 videos | 24m has Assessment available Badge
SHOW MORE
FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THESE COURSES

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

BOOKS INCLUDED

Book

Fundamentals of Information Risk Management Auditing: An Introduction for Managers and Auditors
Providing insight into information risk management auditing for those considering a career in information risk management, and an introduction for non-specialists, such as those managing technical specialists, this book discusses the risks and controls that you may encounter when performing an audit of information risk, together with suggested mitigation approaches based on those risks and controls.
Book Duration 1h 32m Book Authors By Christopher Wright

Book

Auditor's Guide to Information Systems Auditing
Emphasizing the practical implementation of principles and techniques through the use of realistic case studies, this book was written for those who need to gain a working knowledge of the risks and control opportunities within an IP environment.
Book Duration 6h 41m Book Authors By Richard E. Cascarino

Book

Understanding and Conducting Information Systems Auditing
Featuring examples that are globally applicable, this accessible, non-technical guide covers all major standards and presents information systems as a management tool with practical applications.
Book Duration 4h 13m Book Authors By Arif Ahmed, Veena Hingarh

Book

The Basics of IT Audit: Purposes, Processes, and Practical Information
IT auditing occurs in some form in virtually every organization, private or public, large or small. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA.
Book Duration 5h 8m Book Authors By Stephen D. Gantz

Book

Data Analytics for Internal Auditors
Providing a reference guide for IT and Internal Auditors as well as Fraud Examiners, this book presents information written from the practitioner’s viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting data analytics.
Book Duration 6h 18m Book Authors By Richard E. Cascarino
SHOW MORE
FREE ACCESS

BOOKS INCLUDED

Book

CISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition
Covering all five exam domains developed by the Information Systems Audit and Control Association (ISACA), this effective self-study system features learning objectives at the beginning of each chapter, in-depth explanations of each topic, and accurate practice questions.
Book Duration 15h 12m Book Authors By Peter H. Gregory

Book

CISA: Certified Information Systems Auditor Study Guide, Fourth Edition
Including chapter summary highlights and review questions to help you gauge your understanding of the material, this complete resource provides guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples.
Book Duration 14h 18m Book Authors By Allen Keele, Brian T. O'Hara, David Cannon

Book

IT Auditing: Using Controls to Protect Information Assets, Third Edition
Fully updated to cover leading-edge tools and technologies, this in-depth resource explains, step by step, how to implement a successful, enterprise-wide IT audit program.
Book Duration 12h 17m Book Authors By Brian Wrozek, Chris Davis, Mike Kegerreis, Mike Schiller

Book

Understanding and Conducting Information Systems Auditing
Featuring examples that are globally applicable, this accessible, non-technical guide covers all major standards and presents information systems as a management tool with practical applications.
Book Duration 4h 13m Book Authors By Arif Ahmed, Veena Hingarh

Book

Auditor's Guide to Information Systems Auditing
Emphasizing the practical implementation of principles and techniques through the use of realistic case studies, this book was written for those who need to gain a working knowledge of the risks and control opportunities within an IP environment.
Book Duration 6h 41m Book Authors By Richard E. Cascarino
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Likes 47 Likes 47  
Likes 191 Likes 191