Information Systems Maintenance & Service Management

CISA 2016    |    Expert
  • 15 Videos | 1h 22m 6s
  • Includes Assessment
  • Earns a Badge
Likes 14 Likes 14
An effective IS audit should include all aspects of an organization. Explore best practices for IS architecture, software, network infrastructure, and operations auditing activities.

WHAT YOU WILL LEARN

  • identify operating systems features and options
    identify characteristics of access control software and data communications software
    identify characteristics and best practices for data management
    identify characteristics and best practices of a DBMS
    identify characteristics of utility programs, source code management, end-user computing, and utility programs in IS architecture and software
    identify characteristics of enterprise network architectures, types of networks, and network services, standards, and protocols
    identify characteristics of OSI architecture and best practices for applying the OSI model in network architectures
    identify best practices for auditing and reviewing enterprise architecture, hardware, operating system, database, and network infrastructure
  • identify best practices for auditing and reviewing IS operations, scheduling, and problem management reporting
    identify best practices for disaster recovery point and time objectives, recovery strategies, and recovery alternatives
    identify best practices for developing a disaster recovery plan, and organizing and assigning responsibilities within an organization
    identify backup and restoration options and best practices
    distinguish between disaster recovery testing methods, and identify best practices for testing disaster recovery plans and activities in an organization
    identify best practices for invoking disaster recovery plans within an organization
    identify best practices when auditing IS operations, maintenance, and service management activities within an organization

IN THIS COURSE

  • Playable
    1. 
    Operating Systems
    2m 36s
    UP NEXT
  • Playable
    2. 
    Access Control and Data Communications Software
    4m 57s
  • Locked
    3. 
    Data Management
    3m 11s
  • Locked
    4. 
    Database Management System
    5m 57s
  • Locked
    5. 
    IS Software Utility and Licensing
    7m 16s
  • Locked
    6. 
    Network Architectures, Services, and Standards
    7m 41s
  • Locked
    7. 
    OSI Architecture and Application
    8m 48s
  • Locked
    8. 
    Infrastructure Auditing Best Practices
    5m 14s
  • Locked
    9. 
    Operations Auditing Best Practices
    2m 11s
  • Locked
    10. 
    Recovery Objectives, Strategies, and Alternatives
    8m 50s
  • Locked
    11. 
    Disaster Recovery Plan Development
    6m 19s
  • Locked
    12. 
    Backup and Restoration
    4m 11s
  • Locked
    13. 
    Disaster Recovery Testing Methods
    4m 30s
  • Locked
    14. 
    Invoking Disaster Recovery Plans
    1m 7s
  • Locked
    15. 
    Exercise: Auditing IS Ops and Service Management
    2m 18s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 22 Likes 22  
Likes 20 Likes 20