Certified Information Systems Auditor (CISA) 2019: BCP & Network Security
Expert
- 16 videos | 1h 8m 20s
- Includes Assessment
- Earns a Badge
This course addresses why and how organizations must have a Disaster Recovery Plan (DRP), for resiliency in the face of malicious attacks, as well as natural and man-made disasters. The DRP is part of the overall Business Continuity Plan (BCP), which ensures the ongoing functionality of business processes. In this course, you will learn a variety of disaster planning strategies, as well as network security configurations order when planning for business disruptions. Learners will explore the auditing process, and what IS auditors need to consider as the audit objective and the audit scope, and which may include reviewing business continuity plans within the organization. This course identifies common redundant array of independent disks (RAID)-level characteristics, and you will learn how to configure RAID 5 in Windows Server 2016. You will learn how to configure Microsoft Azure cloud computing and SQL database georedundancy. Finally, the course explores numerous network security topics, such as wired and wireless network security and network threat mitigation through configuration of firewalls. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine which types of solutions provide it system and data high availabilityDescribe common characteristics of a disaster recovery plan including rto and rpoDescribe common characteristics of a business continuity plan, bia, and related insurance optionsDescribe common characteristics of an incident response planPlan for alternate site usage in the event of a disasterIdentify common raid level characteristicsConfigure raid 5 in windows server 2016
-
Configure azure sql database geo-redundancyDescribe common network attacks such as man-in-the-middle attacks, arp and dns poisoning, and ddosDescribe how 802.1x, vlans, mac filtering, and other network configuration options can enhance network securityRecognize the different types of firewalls including waf, their placement such as in the dmz, and when they should be usedUse the free wireshark tool to capture and analyze plaintext trafficConfigure windows advanced firewall rulesConfigure url content and keyword filtering on a wireless routerProactively plan for business interruptions and malicious network activity
IN THIS COURSE
-
1m 58s
-
3m 20sIn this video, learn how to define which types of solutions provide high availability for IT systems and data. FREE ACCESS
-
5m 26sUpon completion of this video, you will be able to describe common characteristics of a disaster recovery plan, including RTO and RPO. FREE ACCESS
-
3m 30sUpon completion of this video, you will be able to describe common characteristics of a business continuity plan, business impact analysis, and related insurance options. FREE ACCESS
-
5m 37sAfter completing this video, you will be able to describe common characteristics of an incident response plan. FREE ACCESS
-
2m 29sDuring this video, you will learn how to plan for using an alternate site in the event of a disaster. FREE ACCESS
-
4m 10sIn this video, you will identify common characteristics of RAID levels. FREE ACCESS
-
2m 51sIn this video, you will learn how to configure RAID 5 in Windows Server 2016. FREE ACCESS
-
3m 50sDuring this video, you will learn how to configure Azure SQL Database geo-redundancy. FREE ACCESS
-
9m 4sAfter completing this video, you will be able to describe common network attacks such as man-in-the-middle attacks, ARP and DNS poisoning, and DDoS attacks. FREE ACCESS
-
8m 30sUpon completion of this video, you will be able to describe how 802.1X, VLANs, MAC filtering, and other network configuration options can enhance network security. FREE ACCESS
-
4m 10sAfter completing this video, you will be able to recognize the different types of firewalls, including WAF, their placement, such as in the DMZ, and when they should be used. FREE ACCESS
-
2m 21sDuring this video, you will learn how to use the free Wireshark tool to capture and analyze plain text traffic. FREE ACCESS
-
3m 43sIn this video, you will learn how to configure Windows Advanced Firewall rules. FREE ACCESS
-
2m 30sFind out how to configure URL content and keyword filtering on a wireless router. FREE ACCESS
-
4m 51sIn this video, you will learn how to proactively plan for business interruptions and malicious network activity. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.