Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice

Expert
  • 8 videos | 21m 15s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 44 users Rating 4.7 of 44 users (44)
This course explores how to apply the information systems (IS) audit process to ensure adequate risk mitigation for audit planning, security control selection, travelling user vulnerability mitigation, Wi-Fi hardening, and proper PKI (public key infrastructure) key implementation. Learn the importance of having a ISACA CISA (Certified Information Systems Auditor) certification, which indicates you are a professional with the skills necessary as an IT security analyst in performing an IS audit. An IS auditor must have knowledge of the type of business being audited, and need to be able to identify the security posture of an organization within a given specific scenario that falls within the audit scope. When auditing a business, you first look at the type of business, its use of technology, and related security. This course uses real-world business scenarios that include, for example, a marketing company and a financial institution. These scenarios cover how to identify audit planning errors, security control cost effectiveness, determining Wi-Fi weaknesses, determining how keys should be used, and compensating control selection.

WHAT YOU WILL LEARN

  • Discover the subject areas covered in this course
    Apply is auditing techniques to audit planning
    Apply is auditing techniques to security controls
    Apply is auditing techniques to wi-fi configurations
  • Apply is auditing techniques to traveling users
    Apply is auditing techniques to pki key usage
    Apply is auditing techniques to determine effective compensating controls
    Recommend changes based on is auditing standards

IN THIS COURSE

  • 1m 37s
  • 2m 15s
    In this video, find out how to apply auditing techniques to audit planning. FREE ACCESS
  • Locked
    3.  Scenario: Security Control Cost Effectiveness
    2m 52s
    Learn how to apply auditing techniques to security controls. FREE ACCESS
  • Locked
    4.  Scenario: Determine Wi-Fi Weaknesses
    3m 49s
    During this video, you will learn how to apply IS auditing techniques to Wi-Fi configurations. FREE ACCESS
  • Locked
    5.  Scenario: Traveling Users
    3m
    In this video, learn how to apply IS auditing techniques to traveling users. FREE ACCESS
  • Locked
    6.  Scenario: Key Usage
    2m 44s
    Find out how to apply IS auditing techniques to the usage of PKI keys. FREE ACCESS
  • Locked
    7.  Scenario: Compensating Control Selection
    2m 7s
    During this video, you will learn how to apply IS auditing techniques to determine effective compensating controls. FREE ACCESS
  • Locked
    8.  Exercise: IS Audit Recommendations
    2m 51s
    In this video, you will recommend changes based on IS auditing standards. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 292 users Rating 4.5 of 292 users (292)
Rating 4.6 of 62 users Rating 4.6 of 62 users (62)
Rating 4.7 of 62 users Rating 4.7 of 62 users (62)