CISA 2022: Auditing Scenarios

CISA    |    Expert
  • 9 videos | 39m 15s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
IT technicians and managers are responsible for the safety of IT processing systems and sensitive data. Information system audit processes, if applied effectively, can ensure adequate risk mitigation. In this course, you will explore auditing scenarios, beginning with IT key performance indicators (KPIs), audit planning, and security control cost-effectiveness. Then, you'll learn how to determine Wi-Fi weakness and secure traveling users. Finally, you'll dig into key usage and compensating control selection. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify various key performance indicators (kpis) typically related to information systems
    Apply is auditing techniques to audit planning
    Apply is auditing techniques to security controls
    Apply is auditing techniques to wi-fi configurations
  • Apply is auditing techniques to traveling users
    Apply is auditing techniques to pki key usage
    Apply is auditing techniques to determine effective compensating controls
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 6s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 49s
    After completing this video, you will be able to identify various key performance indicators (KPIs) typically related to information systems. FREE ACCESS
  • Locked
    3.  Audit Planning
    4m 45s
    Learn how to apply IS auditing techniques to audit planning. FREE ACCESS
  • Locked
    4.  Security Control Cost-effectiveness
    5m 7s
    Discover how to apply IS auditing techniques to security controls. FREE ACCESS
  • Locked
    5.  Wi-Fi Weakness
    5m 13s
    Find out how to apply IS auditing techniques to Wi-Fi configurations. FREE ACCESS
  • Locked
    6.  Traveling Users
    4m 58s
    Learn how to apply IS auditing techniques to traveling users. FREE ACCESS
  • Locked
    7.  Key Usage
    5m 25s
    Discover how to apply IS auditing techniques to PKI key usage. FREE ACCESS
  • Locked
    8.  Compensating Control Selection
    5m 15s
    Find out how to apply IS auditing techniques to determine effective compensating controls. FREE ACCESS
  • Locked
    9.  Course Summary
    37s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 21 users Rating 4.6 of 21 users (21)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)