Certified Information Systems Auditor (CISA) 2019: Information System Auditing
CISA
| Expert
- 15 videos | 56m 33s
- Includes Assessment
- Earns a Badge
Discover keys to conducting a successful audit, its driving processes, and its underlying IT solutions in this 15-video course. Examine controls and audit reporting while preparing for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered here include: how information systems (IS) auditing shows whether IT solutions meet business objectives efficiently and effectively; the expectations of conduct for CISA-certified individuals; and how auditing standards provide guidance for conducting efficient audits. Learn about various types of documentation when preparing an IS audit; how to identify client needs that map to business objectives; and different categories of security controls, including internal business process controls, IT controls, and sampling types. You will learn about control objectives required to secure organizational assets along with the controls themselves; planning for audit funding, personnel, and related items; scheduling audit phases; and how to report serious discoveries, including fraud or serious IT vulnerabilities. Finally, see how to generate audit reports, including existing controls which have passed or failed communication with stakeholders after audit recommendations are reported; and how IS auditing identifies weak security controls.
WHAT YOU WILL LEARN
-
Recall how is auditing shows whether it solutions meet business objectives efficiently and effectivelyRecognize expectations of conduct for cisa certified individualsRecall how auditing standards provide guidance for conducting efficient auditsInterpret various types of documentation when preparing an is auditIdentify client needs that map to business objectivesRecognize the importance of network documentationList different categories of security controls including internal business process controls, it controls, and sampling types
-
Identify control objectives required to secure organizational assets along with the controls themselvesPlan for audit funding, personnel, and related itemsSchedule audit phasesReport serious discoveries including fraud or serious it vulnerabilitiesGenerate audit reports including which existing controls have passed or failedCommunicate with stakeholders after audit recommendations are reportedIdentify how is auditing identifies weak security controls
IN THIS COURSE
-
1m 44s
-
3m 17sAfter completing this video, you will be able to recall how IS auditing shows whether IT solutions meet business objectives efficiently and effectively. FREE ACCESS
-
2m 57sAfter completing this video, you will be able to recognize expectations of conduct for individuals who are CISA certified. FREE ACCESS
-
4m 22sUpon completion of this video, you will be able to recall how auditing standards provide guidance for conducting audits efficiently. FREE ACCESS
-
5m 28sLearn how to interpret various types of documentation when preparing for an IS audit. FREE ACCESS
-
3m 54sLearn how to identify client needs that match business objectives. FREE ACCESS
-
4m 29sAfter completing this video, you will be able to recognize the importance of network documentation. FREE ACCESS
-
5m 16sAfter completing this video, you will be able to list different categories of security controls, including internal business process controls, IT controls, and sampling types. FREE ACCESS
-
4m 16sIn this video, find out how to identify control objectives required to secure organizational assets along with the controls themselves. FREE ACCESS
-
4m 17sIn this video, learn how to plan for funding, personnel, and related items for your audit. FREE ACCESS
-
2m 41sIn this video, you will learn how to schedule audit phases. FREE ACCESS
-
3m 59sIn this video, you will report serious discoveries, including fraud or serious IT vulnerabilities. FREE ACCESS
-
3m 37sDuring this video, you will learn how to generate audit reports, including which existing controls have passed or failed. FREE ACCESS
-
2m 50sIn this video, learn how to communicate with stakeholders after audit recommendations have been reported. FREE ACCESS
-
3m 27sIn this video, you will learn how IS auditing identifies weak security controls. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Journey
Cyber Specialist to CISA