Certified Information Systems Auditor (CISA) 2019: BCP & Network Security

Expert
  • 16 videos | 1h 8m 20s
  • Includes Assessment
  • Earns a Badge
Likes 47 Likes 47
This course addresses why and how organizations must have a Disaster Recovery Plan (DRP), for resiliency in the face of malicious attacks, as well as natural and man-made disasters. The DRP is part of the overall Business Continuity Plan (BCP), which ensures the ongoing functionality of business processes. In this course, you will learn a variety of disaster planning strategies, as well as network security configurations order when planning for business disruptions. Learners will explore the auditing process, and what IS auditors need to consider as the audit objective and the audit scope, and which may include reviewing business continuity plans within the organization. This course identifies common redundant array of independent disks (RAID)-level characteristics, and you will learn how to configure RAID 5 in Windows Server 2016. You will learn how to configure Microsoft Azure cloud computing and SQL database georedundancy. Finally, the course explores numerous network security topics, such as wired and wireless network security and network threat mitigation through configuration of firewalls. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    define which types of solutions provide IT system and data high availability
    describe common characteristics of a disaster recovery plan including RTO and RPO
    describe common characteristics of a business continuity plan, BIA, and related insurance options
    describe common characteristics of an incident response plan
    plan for alternate site usage in the event of a disaster
    identify common RAID level characteristics
    configure RAID 5 in Windows Server 2016
  • configure Azure SQL Database geo-redundancy
    describe common network attacks such as man-in-the-middle attacks, ARP and DNS poisoning, and DDoS
    describe how 802.1X, VLANs, MAC filtering, and other network configuration options can enhance network security
    recognize the different types of firewalls including WAF, their placement such as in the DMZ, and when they should be used
    use the free Wireshark tool to capture and analyze plaintext traffic
    configure Windows Advanced Firewall rules
    configure URL content and keyword filtering on a wireless router
    proactively plan for business interruptions and malicious network activity

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.