Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring

Expert
  • 11 videos | 47m 30s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 32 users Rating 4.6 of 32 users (32)
This course explores the importance of continuously monitoring business processes, and the applicable supporting IT solutions. You will learn how information system (IS) auditing can identify and assist in continuous process improvement. In this course, learners will acquire knowledge of the skills necessary to audit monitoring solutions and business processes. You will explore how to establish baselines to easily detect anomalies. Then learn how to set a baseline for specific systems, like a web server, its normal performance, and the server's normal pattern of network. This course will list various sampling types, such as attribute, variables, and statistical and discovery sampling, which play a role in the audit process. You will learn how to filter logs and enable centralized log collection. Next, explore how to work with optimal settings for packet capturing placement, and for intrusion detection and intrusion prevention systems. This course covers new malware variance, new hardware and software vulnerabilities, as well as other events that impact processes or IT infrastructure, such as the flooding of a data center. This course helps learners prepare for the ISACA Certified Information Systems Auditor (CISA) certification exam.

WHAT YOU WILL LEARN

  • Discover the subject areas covered in this course
    Describe how monitoring is an important aspect of the is auditing process
    Recognize the importance of monitoring business processes for continuous process improvement
    List how various sampling types such as attribute, variable, statistical, and discovery sampling play a role in the audit process
    Filter windows logs to show only relevant log entries
    Send linux log events to a centralized logging host
  • Plan optimal settings for packet capturing placement and configuration
    Capture and filter network traffic using the free wireshark tool
    Recognize how siem systems provide centralized security event monitoring and management
    Recognize how an ids can identify suspicious host and network activity
    Describe is audit sampling and the purpose of siem, list ips characteristics, and capture and filter traffic with wireshark

IN THIS COURSE

  • 1m 53s
  • 3m 12s
    Upon completion of this video, you will be able to describe how monitoring is an important aspect of the auditing process. FREE ACCESS
  • Locked
    3.  Business Processes
    2m 50s
    After completing this video, you will be able to recognize the importance of monitoring business processes for continuous improvement. FREE ACCESS
  • Locked
    4.  Sampling Types
    4m 52s
    Upon completion of this video, you will be able to list how various sampling types such as attribute, variable, statistical, and discovery sampling play a role in the audit process. FREE ACCESS
  • Locked
    5.  Windows Log Filtering
    5m 7s
    In this video, you will filter Windows logs to show only the relevant log entries. FREE ACCESS
  • Locked
    6.  Linux Log Forwarding
    5m 15s
    In this video, you will send Linux log events to a centralized logging server. FREE ACCESS
  • Locked
    7.  Packet Capturing Placement
    4m 58s
    During this video, you will learn how to plan for optimal settings in packet capturing placement and configuration. FREE ACCESS
  • Locked
    8.  Packet Capturing and Analysis
    4m 44s
    In this video, you will learn how to capture and filter network traffic using the free Wireshark tool. FREE ACCESS
  • Locked
    9.  SIEM
    3m 56s
    After completing this video, you will be able to recognize how SIEM systems provide centralized security event monitoring and management. FREE ACCESS
  • Locked
    10.  Intrusion Detection Systems
    5m 18s
    After completing this video, you will be able to recognize how an IDS can identify suspicious host and network activity. FREE ACCESS
  • Locked
    11.  Exercise: Security and Business Process Monitoring
    5m 26s
    Upon completion of this video, you will be able to describe IS audit sampling and the purpose of SIEM, list IPS characteristics, capture and filter traffic with Wireshark. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.8 of 44 users Rating 4.8 of 44 users (44)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 34 users Rating 4.5 of 34 users (34)
Rating 4.2 of 1275 users Rating 4.2 of 1275 users (1275)
Rating 4.6 of 120 users Rating 4.6 of 120 users (120)