CISA Domain: IS Acquisition, Development, and Implementation - Part 1
The acquisition, development, and management of business projects are important in all information systems builds. The CISA must make sure that all these aspects are brought together, and that the ...
CISA Domain: IS Operations, Maintenance and Support - Part 1
Auditing IS functions must take the hardware and infrastructure resources into account. This course examines IS operation and how it is managed along with IS hardware, and the various components that ...
CISA Domain: IS Operations, Maintenance, and Support - Part 2
Enterprise network infrastructures and architectures are an integral part of enterprise environments today and are widely unknown to most users. The IS auditor must have a high level knowledge of ...
CISA Domain: Protection of Information Assets - Part 1
One of the main reasons an organization will bring on a CISA is to protect the IS assets of that organization. Resources, both internal and external, need to be secured and access must be controlled ...
CISA Domain: Protection of Information Assets - Part 2
Securing the network infrastructure is one of the main reasons an IT department exists in an enterprise environment. The role of a CISA is to audit the security measures and to make sure that the ...
CISA Domain: The Process of Auditing Information Systems - Part 1
Auditing Information Systems has become an integral part of business management in both big and small corporate environments. This course examines the starting points for performing and IS audit and ...
CISA Domain: The Process of Auditing Information Systems - Part 2
While performing audits, it is extremely important to classify audit information and to evaluate and document both the controls used and the outcomes of all parts of the audit process. This course ...
CISM 2013: Information Risk Management and Compliance (Part 1)
Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as ...
CISM 2013: Information Risk Management and Compliance (Part 2)
Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, ...
CISM 2013: Information Security Governance (Part 1)
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide ...