Certified Information Systems Auditor (CISA) 2019: BCP & Network Security

Expert
  • 16 videos | 1h 8m 20s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 37 users Rating 4.7 of 37 users (37)
This course addresses why and how organizations must have a Disaster Recovery Plan (DRP), for resiliency in the face of malicious attacks, as well as natural and man-made disasters. The DRP is part of the overall Business Continuity Plan (BCP), which ensures the ongoing functionality of business processes. In this course, you will learn a variety of disaster planning strategies, as well as network security configurations order when planning for business disruptions. Learners will explore the auditing process, and what IS auditors need to consider as the audit objective and the audit scope, and which may include reviewing business continuity plans within the organization. This course identifies common redundant array of independent disks (RAID)-level characteristics, and you will learn how to configure RAID 5 in Windows Server 2016. You will learn how to configure Microsoft Azure cloud computing and SQL database georedundancy. Finally, the course explores numerous network security topics, such as wired and wireless network security and network threat mitigation through configuration of firewalls. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define which types of solutions provide it system and data high availability
    Describe common characteristics of a disaster recovery plan including rto and rpo
    Describe common characteristics of a business continuity plan, bia, and related insurance options
    Describe common characteristics of an incident response plan
    Plan for alternate site usage in the event of a disaster
    Identify common raid level characteristics
    Configure raid 5 in windows server 2016
  • Configure azure sql database geo-redundancy
    Describe common network attacks such as man-in-the-middle attacks, arp and dns poisoning, and ddos
    Describe how 802.1x, vlans, mac filtering, and other network configuration options can enhance network security
    Recognize the different types of firewalls including waf, their placement such as in the dmz, and when they should be used
    Use the free wireshark tool to capture and analyze plaintext traffic
    Configure windows advanced firewall rules
    Configure url content and keyword filtering on a wireless router
    Proactively plan for business interruptions and malicious network activity

IN THIS COURSE

  • 1m 58s
  • 3m 20s
    In this video, learn how to define which types of solutions provide high availability for IT systems and data. FREE ACCESS
  • Locked
    3.  Disaster Recovery Plan
    5m 26s
    Upon completion of this video, you will be able to describe common characteristics of a disaster recovery plan, including RTO and RPO. FREE ACCESS
  • Locked
    4.  Business Continuity and Business Impact Analysis
    3m 30s
    Upon completion of this video, you will be able to describe common characteristics of a business continuity plan, business impact analysis, and related insurance options. FREE ACCESS
  • Locked
    5.  Incident Response Plan
    5m 37s
    After completing this video, you will be able to describe common characteristics of an incident response plan. FREE ACCESS
  • Locked
    6.  Alternate Recovery Sites
    2m 29s
    During this video, you will learn how to plan for using an alternate site in the event of a disaster. FREE ACCESS
  • Locked
    7.  RAID
    4m 10s
    In this video, you will identify common characteristics of RAID levels. FREE ACCESS
  • Locked
    8.  RAID Configuration
    2m 51s
    In this video, you will learn how to configure RAID 5 in Windows Server 2016. FREE ACCESS
  • Locked
    9.  Data Replication Across Regions
    3m 50s
    During this video, you will learn how to configure Azure SQL Database geo-redundancy. FREE ACCESS
  • Locked
    10.  Wired and Wireless Network Attacks
    9m 4s
    After completing this video, you will be able to describe common network attacks such as man-in-the-middle attacks, ARP and DNS poisoning, and DDoS attacks. FREE ACCESS
  • Locked
    11.  Network Threat Mitigation
    8m 30s
    Upon completion of this video, you will be able to describe how 802.1X, VLANs, MAC filtering, and other network configuration options can enhance network security. FREE ACCESS
  • Locked
    12.  Firewalls
    4m 10s
    After completing this video, you will be able to recognize the different types of firewalls, including WAF, their placement, such as in the DMZ, and when they should be used. FREE ACCESS
  • Locked
    13.  Identify Plaintext Network Traffic
    2m 21s
    During this video, you will learn how to use the free Wireshark tool to capture and analyze plain text traffic. FREE ACCESS
  • Locked
    14.  Implement a Packet Filtering Firewall
    3m 43s
    In this video, you will learn how to configure Windows Advanced Firewall rules. FREE ACCESS
  • Locked
    15.  Implement a Content Filtering Firewall
    2m 30s
    Find out how to configure URL content and keyword filtering on a wireless router. FREE ACCESS
  • Locked
    16.  Exercise: Business Continuity and Network Security
    4m 51s
    In this video, you will learn how to proactively plan for business interruptions and malicious network activity. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.8 of 24 users Rating 4.8 of 24 users (24)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 102 users Rating 4.4 of 102 users (102)
Rating 4.6 of 198 users Rating 4.6 of 198 users (198)
Rating 4.7 of 53 users Rating 4.7 of 53 users (53)