Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring

  • 11 Videos | 52m
  • Includes Assessment
  • Earns a Badge
Likes 26 Likes 26
This course explores the importance of continuously monitoring business processes, and the applicable supporting IT solutions. You will learn how information system (IS) auditing can identify and assist in continuous process improvement. In this course, learners will acquire knowledge of the skills necessary to audit monitoring solutions and business processes. You will explore how to establish baselines to easily detect anomalies. Then learn how to set a baseline for specific systems, like a web server, its normal performance, and the server's normal pattern of network. This course will list various sampling types, such as attribute, variables, and statistical and discovery sampling, which play a role in the audit process. You will learn how to filter logs and enable centralized log collection. Next, explore how to work with optimal settings for packet capturing placement, and for intrusion detection and intrusion prevention systems. This course covers new malware variance, new hardware and software vulnerabilities, as well as other events that impact processes or IT infrastructure, such as the flooding of a data center. This course helps learners prepare for the ISACA Certified Information Systems Auditor  (CISA) certification exam.

WHAT YOU WILL LEARN

  • discover the subject areas covered in this course
    describe how monitoring is an important aspect of the IS auditing process
    recognize the importance of monitoring business processes for continuous process improvement
    list how various sampling types such as attribute, variable, statistical, and discovery sampling play a role in the audit process
    filter Windows logs to show only relevant log entries
    send Linux log events to a centralized logging host
  • plan optimal settings for packet capturing placement and configuration
    capture and filter network traffic using the free Wireshark tool
    recognize how SIEM systems provide centralized security event monitoring and management
    recognize how an IDS can identify suspicious host and network activity
    describe IS audit sampling and the purpose of SIEM, list IPS characteristics, and capture and filter traffic with Wireshark

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 53s
    UP NEXT
  • Playable
    2. 
    Monitoring Overview
    3m 12s
  • Locked
    3. 
    Business Processes
    2m 50s
  • Locked
    4. 
    Sampling Types
    4m 52s
  • Locked
    5. 
    Windows Log Filtering
    5m 7s
  • Locked
    6. 
    Linux Log Forwarding
    5m 15s
  • Locked
    7. 
    Packet Capturing Placement
    4m 58s
  • Locked
    8. 
    Packet Capturing and Analysis
    4m 44s
  • Locked
    9. 
    SIEM
    3m 56s
  • Locked
    10. 
    Intrusion Detection Systems
    5m 18s
  • Locked
    11. 
    Exercise: Security and Business Process Monitoring
    5m 26s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.