Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
CISA Certification Training
Introduction
Welcome to Master of Project Academy (1:19)
How to Utilize This CISA Training?
Introduction (2:09)
Students Feedback (1:04)
Student Portal (1:51)
Real Projects (3:01)
CISA Certification (2:44)
CISA Exam (3:36)
CISA Course Outline (2:41)
CISA Exam (8:16)
Types of External Audits (4:08)
Course flow (4:15)
Case Study (5:24)
ISO 27001 (8:38)
Important Definition (2:31)
IS Auditor (8:11)
ITAF Standard (7:46)
Compensating Controls (3:47)
Tip #1 - Join LinkedIn Community
Join LinkedIn Community & Follow Latest Updates
Background
Background needed (4:40)
GRC (10:35)
SM and GRC (7:23)
SM and Risk (6:38)
Organization Structure (5:23)
Domain 1: The Process of Auditing Information Systems
The process of Audit IS (9:13)
IS Audit Report (4:54)
Information Asset Register (6:08)
Audit Risk Assessment (12:26)
Audit Planing and Management (7:20)
Document Control (3:18)
Internal Audit - Top 10 IT audit findings and possible solutions (44:08)
Business process (7:12)
Law and regulation (2:16)
Evidence (5:52)
Sampling (3:53)
Reporting and communication (3:39)
Domain 2: Governance and Management of IT
Governance and Management of IT (14:30)
IT Governance (3:02)
Information System Strategy (4:49)
IT Organization (2:51)
Maintenace of Polcies and Procedures (5:00)
Policy and Procedures Resources (5:24)
Legal Compliance (8:34)
Quality Managment system (1:55)
Mutarity Models (3:18)
Capability Maturity Model Integration _ CMMI Training by KnowledgeHut.com (1:34)
Process optmization (3:52)
IT Investment (5:30)
IT Supplier Selection (5:11)
Plan Procurement Management (18:08)
Plan Risk Managment (9:17)
BCP (14:32)
BIA (10:09)
Domain 3: Information Systems Acquisition, Development and Implementation
Information Systems Acquisition, Development and Implementation (9:24)
Project Governance (2:28)
Important Defination (2:31)
Types of Organization (6:40)
Project Managment (4:54)
Architecture (5:32)
Procurment Managment (1:05)
Plan Procurment Managment (18:08)
Requirment Managment (4:22)
Change Managment (3:23)
Domain 4: Information Systems Operations, Maintenance and Support
Backup (5:55)
Service Level (5:05)
Information Systems Operations, Maintenance and Support (6:47)
Licences Managment (3:11)
Alternative Sites (8:05)
Incident Mamagment (5:31)
Hardware Software and Knowledge statment (7:28)
Incident Report Form (5:29)
DRP (3:29)
Capacity Managment (2:45)
Alternative Sites (8:05)
Domain 5: Protection of Information Assets
Protection of Information Assets (7:09)
Access Control (19:19)
Network Security (17:04)
Cryptography (16:26)
Physical Access barrier (9:44)
Operation Security Control Methods (10:24)
Bonus Lecture - Discount for our paid courses
Bonus Lecture - Discount for our paid courses
Operation Security Control Methods
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll to Unlock