CISA 2022: Information Systems Management
CISA
| Expert
- 11 videos | 55m 36s
- Includes Assessment
- Earns a Badge
Effective IT management provides a structured approach to managing and auditing IT assets. It also provides a foundation for auditing, an important feature for information system (IS) auditors. In this course, you will discover key facets of information systems management, beginning with system interfaces and end-user computing. Then you will examine change management, configuration management, and vulnerability management. Finally, you will explore group policy configuration delegation, Microsoft Configuration Manager configuration management, Microsoft Configuration Manager patch deployment, and job scheduling. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of system interfaces and how they are used in computing systemsOutline the role of end-user computingDescribe enterprise change management proceduresOutline enterprise configuration management procedures and define terms such as configuration management system (cms), configuration management database (cmdb), and configuration item (ci)Outline enterprise vulnerability management procedures
-
Configure which administrators can manage group policy objects (gpos)Configure application deployment centrally using microsoft configuration managerConfigure windows patch deployment centrally using microsoft configuration managerConfigure ubuntu linux to check for updatesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 10sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
5m 25sAfter completing this video, you will be able to provide an overview of system interfaces and how they are used in computing systems. FREE ACCESS
-
5m 36sUpon completion of this video, you will be able to outline the role of end-user computing. FREE ACCESS
-
7m 37sAfter completing this video, you will be able to describe enterprise change management procedures. FREE ACCESS
-
4m 33sUpon completion of this video, you will be able to outline enterprise configuration management procedures and define terms such as configuration management system (CMS), configuration management database (CMDB), and configuration item (CI). FREE ACCESS
-
6m 1sIn this video, we will outline enterprise vulnerability management procedures. FREE ACCESS
-
6m 8sLearn how to configure which administrators can manage Group Policy Objects (GPOs). FREE ACCESS
-
5m 58sIn this video, discover how to configure application deployment centrally using Microsoft Configuration Manager. FREE ACCESS
-
7m 10sDuring this video, you will learn how to configure Windows patch deployment centrally using Microsoft Configuration Manager. FREE ACCESS
-
5m 3sFind out how to configure Ubuntu Linux to check for updates. FREE ACCESS
-
56sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.