Certified Information Systems Auditor (CISA) 2019: BCP & Network Security

Expert
  • 16 Videos | 1h 15m 20s
  • Includes Assessment
  • Earns a Badge
Likes 47 Likes 47
This course addresses why and how organizations must have a Disaster Recovery Plan (DRP), for resiliency in the face of malicious attacks, as well as natural and man-made disasters. The DRP is part of the overall Business Continuity Plan (BCP), which ensures the ongoing functionality of business processes. In this course, you will learn a variety of disaster planning strategies, as well as network security configurations order when planning for business disruptions. Learners will explore the auditing process, and what IS auditors need to consider as the audit objective and the audit scope, and which may include reviewing business continuity plans within the organization. This course identifies common redundant array of independent disks (RAID)-level characteristics, and you will learn how to configure RAID 5 in Windows Server 2016. You will learn how to configure Microsoft Azure cloud computing and SQL database georedundancy. Finally, the course explores numerous network security topics, such as wired and wireless network security and network threat mitigation through configuration of firewalls. This course helps learners prepare for the ISACA Certified Information Systems Auditor  (CISA) certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    define which types of solutions provide IT system and data high availability
    describe common characteristics of a disaster recovery plan including RTO and RPO
    describe common characteristics of a business continuity plan, BIA, and related insurance options
    describe common characteristics of an incident response plan
    plan for alternate site usage in the event of a disaster
    identify common RAID level characteristics
    configure RAID 5 in Windows Server 2016
  • configure Azure SQL Database geo-redundancy
    describe common network attacks such as man-in-the-middle attacks, ARP and DNS poisoning, and DDoS
    describe how 802.1X, VLANs, MAC filtering, and other network configuration options can enhance network security
    recognize the different types of firewalls including WAF, their placement such as in the DMZ, and when they should be used
    use the free Wireshark tool to capture and analyze plaintext traffic
    configure Windows Advanced Firewall rules
    configure URL content and keyword filtering on a wireless router
    proactively plan for business interruptions and malicious network activity

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 58s
    UP NEXT
  • Playable
    2. 
    High Availability
    3m 20s
  • Locked
    3. 
    Disaster Recovery Plan
    5m 26s
  • Locked
    4. 
    Business Continuity and Business Impact Analysis
    3m 30s
  • Locked
    5. 
    Incident Response Plan
    5m 37s
  • Locked
    6. 
    Alternate Recovery Sites
    2m 29s
  • Locked
    7. 
    RAID
    4m 10s
  • Locked
    8. 
    RAID Configuration
    2m 51s
  • Locked
    9. 
    Data Replication Across Regions
    3m 50s
  • Locked
    10. 
    Wired and Wireless Network Attacks
    9m 4s
  • Locked
    11. 
    Network Threat Mitigation
    8m 30s
  • Locked
    12. 
    Firewalls
    4m 10s
  • Locked
    13. 
    Identify Plaintext Network Traffic
    2m 21s
  • Locked
    14. 
    Implement a Packet Filtering Firewall
    3m 43s
  • Locked
    15. 
    Implement a Content Filtering Firewall
    2m 30s
  • Locked
    16. 
    Exercise: Business Continuity and Network Security
    4m 51s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.