Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
Expert
- 16 videos | 1h 8m 20s
- Includes Assessment
- Earns a Badge
This course addresses why and how organizations must have a Disaster Recovery Plan (DRP), for resiliency in the face of malicious attacks, as well as natural and man-made disasters. The DRP is part of the overall Business Continuity Plan (BCP), which ensures the ongoing functionality of business processes. In this course, you will learn a variety of disaster planning strategies, as well as network security configurations order when planning for business disruptions. Learners will explore the auditing process, and what IS auditors need to consider as the audit objective and the audit scope, and which may include reviewing business continuity plans within the organization. This course identifies common redundant array of independent disks (RAID)-level characteristics, and you will learn how to configure RAID 5 in Windows Server 2016. You will learn how to configure Microsoft Azure cloud computing and SQL database georedundancy. Finally, the course explores numerous network security topics, such as wired and wireless network security and network threat mitigation through configuration of firewalls. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedefine which types of solutions provide IT system and data high availabilitydescribe common characteristics of a disaster recovery plan including RTO and RPOdescribe common characteristics of a business continuity plan, BIA, and related insurance optionsdescribe common characteristics of an incident response planplan for alternate site usage in the event of a disasteridentify common RAID level characteristicsconfigure RAID 5 in Windows Server 2016
-
configure Azure SQL Database geo-redundancydescribe common network attacks such as man-in-the-middle attacks, ARP and DNS poisoning, and DDoSdescribe how 802.1X, VLANs, MAC filtering, and other network configuration options can enhance network securityrecognize the different types of firewalls including WAF, their placement such as in the DMZ, and when they should be useduse the free Wireshark tool to capture and analyze plaintext trafficconfigure Windows Advanced Firewall rulesconfigure URL content and keyword filtering on a wireless routerproactively plan for business interruptions and malicious network activity
IN THIS COURSE
-
1m 58s
-
3m 20s
-
5m 26s
-
3m 30s
-
5m 37s
-
2m 29s
-
4m 10s
-
2m 51s
-
3m 50s
-
9m 4s
-
8m 30s
-
4m 10s
-
2m 21s
-
3m 43s
-
2m 30s
-
4m 51s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.