Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
- 11 videos | 47m 30s
- Includes Assessment
- Earns a Badge
This course explores the importance of continuously monitoring business processes, and the applicable supporting IT solutions. You will learn how information system (IS) auditing can identify and assist in continuous process improvement. In this course, learners will acquire knowledge of the skills necessary to audit monitoring solutions and business processes. You will explore how to establish baselines to easily detect anomalies. Then learn how to set a baseline for specific systems, like a web server, its normal performance, and the server's normal pattern of network. This course will list various sampling types, such as attribute, variables, and statistical and discovery sampling, which play a role in the audit process. You will learn how to filter logs and enable centralized log collection. Next, explore how to work with optimal settings for packet capturing placement, and for intrusion detection and intrusion prevention systems. This course covers new malware variance, new hardware and software vulnerabilities, as well as other events that impact processes or IT infrastructure, such as the flooding of a data center. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.
WHAT YOU WILL LEARN
discover the subject areas covered in this coursedescribe how monitoring is an important aspect of the IS auditing processrecognize the importance of monitoring business processes for continuous process improvementlist how various sampling types such as attribute, variable, statistical, and discovery sampling play a role in the audit processfilter Windows logs to show only relevant log entriessend Linux log events to a centralized logging host
plan optimal settings for packet capturing placement and configurationcapture and filter network traffic using the free Wireshark toolrecognize how SIEM systems provide centralized security event monitoring and managementrecognize how an IDS can identify suspicious host and network activitydescribe IS audit sampling and the purpose of SIEM, list IPS characteristics, and capture and filter traffic with Wireshark
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course The Art of Staying Focused