Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring
Expert
- 11 videos | 47m 30s
- Includes Assessment
- Earns a Badge
This course explores the importance of continuously monitoring business processes, and the applicable supporting IT solutions. You will learn how information system (IS) auditing can identify and assist in continuous process improvement. In this course, learners will acquire knowledge of the skills necessary to audit monitoring solutions and business processes. You will explore how to establish baselines to easily detect anomalies. Then learn how to set a baseline for specific systems, like a web server, its normal performance, and the server's normal pattern of network. This course will list various sampling types, such as attribute, variables, and statistical and discovery sampling, which play a role in the audit process. You will learn how to filter logs and enable centralized log collection. Next, explore how to work with optimal settings for packet capturing placement, and for intrusion detection and intrusion prevention systems. This course covers new malware variance, new hardware and software vulnerabilities, as well as other events that impact processes or IT infrastructure, such as the flooding of a data center. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.
WHAT YOU WILL LEARN
-
Discover the subject areas covered in this courseDescribe how monitoring is an important aspect of the is auditing processRecognize the importance of monitoring business processes for continuous process improvementList how various sampling types such as attribute, variable, statistical, and discovery sampling play a role in the audit processFilter windows logs to show only relevant log entriesSend linux log events to a centralized logging host
-
Plan optimal settings for packet capturing placement and configurationCapture and filter network traffic using the free wireshark toolRecognize how siem systems provide centralized security event monitoring and managementRecognize how an ids can identify suspicious host and network activityDescribe is audit sampling and the purpose of siem, list ips characteristics, and capture and filter traffic with wireshark
IN THIS COURSE
-
1m 53s
-
3m 12sUpon completion of this video, you will be able to describe how monitoring is an important aspect of the auditing process. FREE ACCESS
-
2m 50sAfter completing this video, you will be able to recognize the importance of monitoring business processes for continuous improvement. FREE ACCESS
-
4m 52sUpon completion of this video, you will be able to list how various sampling types such as attribute, variable, statistical, and discovery sampling play a role in the audit process. FREE ACCESS
-
5m 7sIn this video, you will filter Windows logs to show only the relevant log entries. FREE ACCESS
-
5m 15sIn this video, you will send Linux log events to a centralized logging server. FREE ACCESS
-
4m 58sDuring this video, you will learn how to plan for optimal settings in packet capturing placement and configuration. FREE ACCESS
-
4m 44sIn this video, you will learn how to capture and filter network traffic using the free Wireshark tool. FREE ACCESS
-
3m 56sAfter completing this video, you will be able to recognize how SIEM systems provide centralized security event monitoring and management. FREE ACCESS
-
5m 18sAfter completing this video, you will be able to recognize how an IDS can identify suspicious host and network activity. FREE ACCESS
-
5m 26sUpon completion of this video, you will be able to describe IS audit sampling and the purpose of SIEM, list IPS characteristics, capture and filter traffic with Wireshark. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.