Certified Information Systems Auditor (CISA) 2019: Information System Auditing

CISA 2019
  • 15 Videos | 1h 3m 3s
  • Includes Assessment
  • Earns a Badge
Likes 124 Likes 124
Discover keys to conducting a successful audit, its driving processes, and its underlying IT solutions in this 15-video course. Examine controls and audit reporting while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered here include: how information systems (IS) auditing shows whether IT solutions meet business objectives efficiently and effectively; the expectations of conduct for CISA-certified individuals; and how auditing standards provide guidance for conducting efficient audits. Learn about various types of documentation when preparing an IS audit; how to identify client needs that map to business objectives; and different categories of security controls, including internal business process controls, IT controls, and sampling types. You will learn about control objectives required to secure organizational assets along with the controls themselves; planning for audit funding, personnel, and related items; scheduling audit phases; and how to report serious discoveries, including fraud or serious IT vulnerabilities. Finally, see how to generate audit reports, including existing controls which have passed or failed communication with stakeholders after audit recommendations are reported; and how IS auditing identifies weak security controls.

WHAT YOU WILL LEARN

  • recall how IS auditing shows whether IT solutions meet business objectives efficiently and effectively
    recognize expectations of conduct for CISA certified individuals
    recall how auditing standards provide guidance for conducting efficient audits
    interpret various types of documentation when preparing an IS audit
    identify client needs that map to business objectives
    recognize the importance of network documentation
    list different categories of security controls including internal business process controls, IT controls, and sampling types
  • identify control objectives required to secure organizational assets along with the controls themselves
    plan for audit funding, personnel, and related items
    schedule audit phases
    report serious discoveries including fraud or serious IT vulnerabilities
    generate audit reports including which existing controls have passed or failed
    communicate with stakeholders after audit recommendations are reported
    identify how IS auditing identifies weak security controls

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 172 Likes 172  
Likes 1602 Likes 1602  
Likes 354 Likes 354