Certified Information Systems Auditor (CISA) 2019: Information System Auditing

CISA    |    Expert
  • 15 videos | 56m 33s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 286 users Rating 4.6 of 286 users (286)
Discover keys to conducting a successful audit, its driving processes, and its underlying IT solutions in this 15-video course. Examine controls and audit reporting while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered here include: how information systems (IS) auditing shows whether IT solutions meet business objectives efficiently and effectively; the expectations of conduct for CISA-certified individuals; and how auditing standards provide guidance for conducting efficient audits. Learn about various types of documentation when preparing an IS audit; how to identify client needs that map to business objectives; and different categories of security controls, including internal business process controls, IT controls, and sampling types. You will learn about control objectives required to secure organizational assets along with the controls themselves; planning for audit funding, personnel, and related items; scheduling audit phases; and how to report serious discoveries, including fraud or serious IT vulnerabilities. Finally, see how to generate audit reports, including existing controls which have passed or failed communication with stakeholders after audit recommendations are reported; and how IS auditing identifies weak security controls.

WHAT YOU WILL LEARN

  • Recall how is auditing shows whether it solutions meet business objectives efficiently and effectively
    Recognize expectations of conduct for cisa certified individuals
    Recall how auditing standards provide guidance for conducting efficient audits
    Interpret various types of documentation when preparing an is audit
    Identify client needs that map to business objectives
    Recognize the importance of network documentation
    List different categories of security controls including internal business process controls, it controls, and sampling types
  • Identify control objectives required to secure organizational assets along with the controls themselves
    Plan for audit funding, personnel, and related items
    Schedule audit phases
    Report serious discoveries including fraud or serious it vulnerabilities
    Generate audit reports including which existing controls have passed or failed
    Communicate with stakeholders after audit recommendations are reported
    Identify how is auditing identifies weak security controls

IN THIS COURSE

  • 1m 44s
  • 3m 17s
    After completing this video, you will be able to recall how IS auditing shows whether IT solutions meet business objectives efficiently and effectively. FREE ACCESS
  • Locked
    3.  ISACA Code of Conduct
    2m 57s
    After completing this video, you will be able to recognize expectations of conduct for individuals who are CISA certified. FREE ACCESS
  • Locked
    4.  ISACA Auditing Standards
    4m 22s
    Upon completion of this video, you will be able to recall how auditing standards provide guidance for conducting audits efficiently. FREE ACCESS
  • Locked
    5.  Organizational Documentation
    5m 28s
    Learn how to interpret various types of documentation when preparing for an IS audit. FREE ACCESS
  • Locked
    6.  Stakeholder Needs
    3m 54s
    Learn how to identify client needs that match business objectives. FREE ACCESS
  • Locked
    7.  Network Diagrams
    4m 29s
    After completing this video, you will be able to recognize the importance of network documentation. FREE ACCESS
  • Locked
    8.  Security Control Types
    5m 16s
    After completing this video, you will be able to list different categories of security controls, including internal business process controls, IT controls, and sampling types. FREE ACCESS
  • Locked
    9.  Control Objectives and Controls
    4m 16s
    In this video, find out how to identify control objectives required to secure organizational assets along with the controls themselves. FREE ACCESS
  • Locked
    10.  Audit Resource Planning
    4m 17s
    In this video, learn how to plan for funding, personnel, and related items for your audit. FREE ACCESS
  • Locked
    11.  Audit Scheduling
    2m 41s
    In this video, you will learn how to schedule audit phases. FREE ACCESS
  • Locked
    12.  Urgent Incident Discovery
    3m 59s
    In this video, you will report serious discoveries, including fraud or serious IT vulnerabilities. FREE ACCESS
  • Locked
    13.  Audit Reporting
    3m 37s
    During this video, you will learn how to generate audit reports, including which existing controls have passed or failed. FREE ACCESS
  • Locked
    14.  Audit Findings Remediation Follow-Up
    2m 50s
    In this video, learn how to communicate with stakeholders after audit recommendations have been reported. FREE ACCESS
  • Locked
    15.  Exercise: Controls and IS Auditing
    3m 27s
    In this video, you will learn how IS auditing identifies weak security controls. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 44 users Rating 4.8 of 44 users (44)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 120 users Rating 4.6 of 120 users (120)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)
Rating 4.7 of 53 users Rating 4.7 of 53 users (53)