Certificate In Certified Information Systems Auditor (CISA) Online Course

Prepare For The CISA Certification Exam

Certificate In Certified Information Systems Auditor (CISA) Online Course

NOW ONLY

RM449

Save RM2050 (82%)
OFF RRP RM2499
Get Info Pack

Prepare For The CISA Certification Exam

The Certified Information Systems Auditor (CISA) course covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.

CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA certification is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.

Course Fast Facts:

  1. Learn the fundamentals of Certified Information Systems Auditor (CISA)
  2. Comprehensive 6 module Accredited Certificate In Certified Information Systems Auditor (CISA) Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Certified Information Systems Auditor (CISA) experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Course Introduction

  • Introduction
  • Course Introduction

Module 01 -The Process of Auditing Information Systems

  • Introduction
  • Lesson 1: Management of the Audit Function
  • Organization of the IS Audit Function
  • IS Audit Resource Management
  • Audit Planning Part1
  • Audit Planning Part2
  • Audit Planning Part3
  • Audit Planning Part4
  • Audit Planning Part5
  • Effect of Laws and Regulations on IS Audit Planning Part1
  • Effect of Laws and Regulations on IS Audit Planning Part2
  • Effect of Laws and Regulations on IS Audit Planning Part3
  • Effect of Laws and Regulations on IS Audit Planning Part4
  • Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1
  • ISACA IT Audit and Assurance Standards and Guidelines Part2
  • ISACA IT Audit and Assurance Standards and Guidelines Part3
  • ISACA IT Audit and Assurance Standards and Guidelines Part4
  • ISACA IT Audit And Assurance Standards Framework
  • Auditing Standards Part1
  • Auditing Standards Part2
  • Auditing Standards Part3
  • Auditing Standards Part4
  • Auditing Standards Part5
  • Auditing Standards Part6
  • Auditing Standards Part7
  • Auditing Standards Part8
  • Auditing Standards Part9
  • Audit Guidelines Part1
  • Audit Guidelines Part2
  • Audit Guidelines Part3
  • Audit Guidelines Part4
  • Audit Guidelines Part5
  • Audit Guidelines Part6
  • Audit Guidelines Part7
  • Audit Guidelines Part8
  • Audit Guidelines Part9
  • Audit Guidelines Part10
  • Audit Guidelines Part11
  • Audit Guidelines Part12
  • Audit and Assurance Tools and Techniques
  • Relationship Among Standards, Guidelines, and Tools and Techniques
  • Information Technology Assurance Framework
  • Information Technology Assurance Framework Components
  • ITAF General Standards (Section 2200) Part1
  • ITAF General Standards (Section 2200) Part2
  • ITAF Performance Standards (Section 2400) Part1
  • ITAF Performance Standards (Section 2400) Part2
  • ITAF Performance Standards (Section 2400) Part3
  • ITAF Performance Standards (Section 2400) Part4
  • Reporting Standards (Section 2600) Part1
  • Reporting Standards (Section 2600) Part2
  • Reporting Standards (Section 2600) Part3
  • IT Assurance Guidelines (Section 3000) Part1
  • IT Assurance Guidelines (Section 3000) Part2
  • IT Assurance Guidelines (Section 3000) Part3
  • IT Assurance Guidelines (Section 3000) Part4
  • IT Assurance Guidelines (Section 3000) Part5
  • IT Assurance Guidelines (Section 3000) Part6
  • IT Assurance Guidelines (Section 3000) Part7
  • IT Assurance Guidelines (Section 3000) Part8
  • IT Assurance Guidelines (Section 3000) Part9
  • IT Assurance Guidelines (Section 3000) Part10
  • IT Assurance Guidelines (Section 3000) Part11
  • Lesson 3: Risk Analysis
  • Risk Analysis Part1
  • Risk Analysis Part2
  • Risk Analysis Part3
  • Risk Analysis Part4
  • Risk Analysis Part5
  • Risk Analysis Part6
  • Risk Analysis Part7
  • Lesson 4: Internal Controls
  • Internal Control Objectives
  • IS Control Objectives Part1
  • IS Control Objectives Part2
  • IS Control Objectives Part3
  • COBIT
  • General Controls Part1
  • General Controls Part2
  • IS Controls
  • Lesson 5: Performing An IS Audit
  • Performing an IS Audit
  • Classification of Audits
  • Audit Programs Part1
  • Audit Programs Part2
  • Audit Methodology Part1
  • Audit Methodology Part2
  • Audit Methodology Part3
  • Fraud Detection Part1
  • Fraud Detection Part2
  • Risk-Based Auditing Part1
  • Risk-Based Auditing Part2
  • Risk-Based Auditing Part3
  • Audit Risk and Materiality Part1
  • Audit Risk and Materiality Part2
  • Audit Risk and Materiality Part3
  • Audit Risk and Materiality Part4
  • Audit Risk and Materiality Part5
  • Risk Assessment and Treatment Part1
  • Risk Assessment and Treatment Part2
  • Risk Assessment and Treatment Part3
  • Risk Assessment and Treatment Part4
  • Risk Assessment and Treatment Part5
  • Risk Assessment Techniques Part1
  • Risk Assessment Techniques Part2
  • Risk Assessment Techniques Part3
  • Risk Assessment Techniques Part4
  • Audit Objectives Part1
  • Audit Objectives Part2
  • Compliance Versus Substantive Testing Part1
  • Compliance Versus Substantive Testing Part2
  • Compliance Versus Substantive Testing Part3
  • Evidence Part1
  • Evidence Part2
  • Evidence Part3
  • Interviewing and Observing Personnel in the Performance Of Their Duties
  • Sampling Part1
  • Sampling Part2
  • Sampling Part3
  • Using The Services Of Other Auditors And Experts Part1
  • Using The Services Of Other Auditors And Experts Part2
  • Computer-Assisted Audit Techniques (CAAT) Part1
  • Computer-Assisted Audit Techniques (CAAT) Part2
  • Evaluation Of Audit Strengths And Weaknesses Part1
  • Evaluation Of Audit Strengths And Weaknesses Part2
  • Evaluation Of Audit Strengths And Weaknesses Part3
  • Communicating Audit Results Part1
  • Communicating Audit Results Part2
  • Communicating Audit Results Part3
  • Management Implementation Of Recommendations
  • Audit Documentation
  • Lesson 6: Control Self-Assessment Part1
  • Control Self-Assessment Part2
  • Control Self-Assessment Part3
  • Objectives of CSA
  • Benefits of CSA
  • Disadvantages of CSA
  • Auditor Role in CSA
  • Technology Drivers for CSA
  • Traditional Versus CSA Approach
  • Lesson 7: The Evolving IS Audit Process
  • Automated Work Papers Part1
  • Automated Work Papers Part2
  • Integrated Auditing Part1
  • Integrated Auditing Part2
  • Integrated Auditing Part3
  • Continuous Auditing Part1
  • Continuous Auditing Part2
  • Continuous Auditing Part3
  • Continuous Auditing Part4
  • Continuous Auditing Part5
  • Section Review

Module 02 - Governance and Management of IT

  • Introduction
  • Lesson 1: Corporate Governance
  • Corporate Governance Part1
  • Corporate Governance Part2
  • Corporate Governance Part3
  • Lesson 2: IT Governance
  • IT Governance Part1
  • IT Governance Part2
  • Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
  • IT Monitoring and Assurance Practices for Board and Senior Management Part1
  • IT Monitoring and Assurance Practices for Board and Senior Management Part2
  • IT Monitoring and Assurance Practices for Board and Senior Management Part3
  • Best Practices for IT Governance Part1
  • Best Practices for IT Governance Part2
  • Best Practices for IT Governance Part3
  • Best Practices for IT Governance Part4
  • IT Governance Frameworks
  • Audit Role in IT Governance Part1
  • Audit Role in IT Governance Part2
  • Audit Role in IT Governance Part3
  • Audit Role in IT Governance Part4
  • IT Strategy Committee
  • IT Balanced Scorecard Part1
  • IT Balanced Scorecard Part2
  • Information Security Governance Part1
  • Information Security Governance Part2
  • Information Security Governance Part3
  • Information Security Governance Part4
  • Importance of Information Security Governance Part1
  • Importance of Information Security Governance Part2
  • Outcomes of Security Governance Part1
  • Outcomes of Security Governance Part2
  • Effective Information Security Governance
  • Roles and Responsibilities of Senior Management and Board of Directors Part1
  • Roles and Responsibilities of Senior Management and Board of Directors Part2
  • Enterprise Architecture
  • Lesson 4: Information Systems Strategy
  • Strategic Planning Part1
  • Strategic Planning Part2
  • Steering Committee
  • Lesson 5: Maturity and Process Improvement Models
  • Maturity and Process Improvement Models
  • Lesson 6: IT Investment and Allocation Practices
  • IT Investment and Allocation Practices Part1
  • IT Investment and Allocation Practices Part2
  • IT Investment and Allocation Practices Part3
  • IT Investment and Allocation Practices Part4
  • Implement IT Portfolio Management
  • IT Portfolio Management Versus Balanced Scorecard
  • Lesson 7: Policies and Procedures
  • Policies Part1
  • Policies Part2
  • Policies Part3
  • Information Security Policy Part1
  • Information Security Policy Part2
  • Information Security Policy Part3
  • Information Security Policy Part4
  • Information Security Policy Part5
  • Information Security Policy Part6
  • Information Security Policy Part7
  • Procedures Part1
  • Procedures Part2
  • Lesson 8: Risk Management
  • Risk Management
  • Developing a Risk Management Program
  • Risk Management Process Part1
  • Risk Management Process Part2
  • Risk Management Process Part3
  • Risk Management Process Part4
  • Risk Management Process Part5
  • Risk Management Process Part6
  • Risk Analysis Methods Part1
  • Risk Analysis Methods Part2
  • Risk Analysis Methods Part3
  • Risk Analysis Methods Part4
  • Risk Analysis Methods Part5
  • Lesson 9: IS Management Practices
  • Human Resource Management Part1
  • Human Resource Management Part2
  • Human Resource Management Part3
  • Human Resource Management Part4
  • Human Resource Management Part5
  • Human Resource Management Part6
  • Human Resource Management Part7
  • Human Resource Management Part8
  • Human Resource Management Part9
  • Human Resource Management Part10
  • Human Resource Management Part11
  • Human Resource Management Part12
  • Human Resource Management Part13
  • Human Resource Management Part14
  • Organizational Change Management
  • Financial Management Practices
  • Quality Management Part1
  • Quality Management Part2
  • Quality Management Part3
  • Information Security Management
  • Performance Optimization Part1
  • Performance Optimization Part2
  • Performance Optimization Part3
  • Lesson 10: IS Organizational Structure and Responsibilities
  • IS Roles and Responsibilities Part1
  • IS Roles and Responsibilities Part2
  • IS Roles and Responsibilities Part3
  • Segregation of Duties
  • Segregation of Duties Controls Part1
  • Segregation of Duties Controls Part2
  • Compensating Controls for Lack of Segregation
  • Lesson 11: Auditing IT Governance Structure and Implementation
  • Reviewing Documentation Part1
  • Reviewing Documentation Part2
  • Reviewing Contractual Commitments
  • Lesson 12: Business Continuity Planning Part1
  • Business Continuity Planning Part2
  • Business Continuity Planning Part3
  • IS Business Continuity Planning
  • Disasters and Other Disruptive Events Part1
  • Disasters and Other Disruptive Events Part2
  • Business Continuity Planning Process
  • Business Continuity Policy
  • Business Impact Analysis Part1
  • Business Impact Analysis Part2
  • Classification of Operations and Criticality Analysis
  • Development of Business Continuity Plans
  • Other Issues and Plan Development
  • Components of a BCP Part1
  • Components of a BCP Part2
  • BCP Testing Part1
  • BCP Testing Part2
  • BCP Testing Part3
  • BCP Maintenance
  • Summary of BCP
  • Section Review

Module 03 - Information Systems Acquisition, Development and Implementation

  • Lesson 1: Business Realization Part1
  • Business Realization Part2
  • Portfolio/Program Management Part1
  • Portfolio/Program Management Part2
  • Portfolio/Program Management Part3
  • Portfolio/Program Management Part4
  • Portfolio/Program Management Part5
  • Business Case Development and Approval Part1
  • Business Case Development and Approval Part2
  • Benefits Realization Techniques
  • Lesson 2: Project Management Structure
  • Project Context and Environment
  • Project Organizational Forms Part1
  • Project Organizational Forms Part2
  • Project Communication and Culture
  • Project Objectives Part1
  • Project Objectives Part2
  • Project Objectives Part3
  • Roles and Responsibilities of Groups and Individuals Part1
  • Roles and Responsibilities of Groups and Individuals Part2
  • Roles and Responsibilities of Groups and Individuals Part3
  • Lesson 3: Project Management Practices
  • Initiation of a Project
  • Project Planning
  • Example of Project Management for New Software
  • Software Size Estimation
  • Lines of Source Code
  • Function Point Analysis (FPA)
  • Function Points
  • Cost Budgets
  • Software Cost Estimation
  • Scheduling and Establishing the Timeframe
  • Critical Path Methodology
  • Gantt Charts
  • Program Evaluation Review Technique (PERT)
  • Time Box Management
  • General Project Management
  • Project Controlling Part1
  • Project Controlling Part2
  • Management of Resource Usage
  • Management of Risk Part1
  • Management of Risk Part2
  • Closing a Project
  • Lesson 4: Business Application Development Part1
  • Business Application Development Part2
  • Business Application Development Part3
  • Business Application Development Part4
  • Business Application Development Part5
  • Traditional SDLC Approach
  • SDLC Phases
  • SDLC
  • Integrated Resource Management Systems Part1
  • Integrated Resource Management Systems Part2
  • Integrated Resource Management Systems Part3
  • Description of SDLC Phases Part1
  • Description of SDLC Phases Part2
  • Description of SDLC Phases Part3
  • Description of SDLC Phases Part4
  • Description of SDLC Phases Part5
  • Description of SDLC Phases Part6
  • Description of SDLC Phases Part7
  • Description of SDLC Phases Part8
  • Description of SDLC Phases Part9
  • Description of SDLC Phases Part10
  • Description of SDLC Phases Part11
  • Description of SDLC Phases Part12
  • Description of SDLC Phases Part13
  • Description of SDLC Phases Part14
  • Description of SDLC Phases Part15
  • Description of SDLC Phases Part16
  • Description of SDLC Phases Part17
  • Description of SDLC Phases Part18
  • Description of SDLC Phases Part19
  • Description of SDLC Phases Part20
  • Description of SDLC Phases Part21
  • Description of SDLC Phases Part22
  • Description of SDLC Phases Part23
  • Risks Associated with Software Development Part1
  • Risks Associated with Software Development Part2
  • Lesson 5: Business Application Systems
  • Electronic Commerce
  • E-Commerce Models
  • E-Commerce Architectures
  • E-Commerce Risks
  • E-Commerce Requirements
  • E-Commerce Audit and Control Issues or Best Practices
  • Components of PKI
  • Electronic Data Interchange
  • General Requirements of EDI
  • Traditional EDI
  • Web Based EDI
  • EDI Risks and Controls
  • Controls in EDI Environment Part1
  • Controls in EDI Environment Part2
  • Controls in EDI Environment Part3
  • Controls in EDI Environment Part4
  • E-Mail
  • E-Mail Security Issues
  • Standards for E-Mail Security Part1
  • Standards for E-Mail Security Part2
  • Standards for E-Mail Security Part3
  • Point-Of-Sale Systems (POS)
  • Electronic Banking Part1
  • Electronic Banking Part2
  • Risk Management Challenges in E-Banking
  • Risk Management Controls for E-Banking Part1
  • Risk Management Controls for E-Banking Part2
  • Electronic Finance
  • Payment Systems
  • Electronic Money Model
  • Electronic Checks Model
  • Electronic Transfer Model
  • Electronic Funds Transfer
  • Controls in an EFT Environment Part1
  • Controls in an EFT Environment Part2
  • Automated Teller Machines Part1
  • Automated Teller Machines Part2
  • Image Processing Part1
  • Image Processing Part2
  • Business Intelligence
  • Decision Support System (DSS)
  • DSS Frameworks
  • Customer Relation Management (CRM)
  • Supply Chain Management (SCM)
  • Lesson 6: Alternative Forms of Software Project Organization Part1
  • Alternative Forms of Software Project Organization Part2
  • Alternative Forms of Software Project Organization Part3
  • Agile Development
  • Prototyping
  • Rapid Application Development (RAD)
  • Lesson 7: Alternative Development Methods
  • Data Oriented System Development
  • Object Oriented System Development Part1
  • Object Oriented System Development Part2
  • Component-Based Development
  • Web-Based Application Development
  • Software Reengineering
  • Reverse Engineering
  • Lesson 8: Infrastructure Development/Acquisition Practices Part1
  • Infrastructure Development/Acquisition Practices Part2
  • Infrastructure Development/Acquisition Practices Part3
  • Project Phases of Physical Architecture Analysis Part1
  • Planning Implementation of Infrastructure Part1
  • Planning Implementation of Infrastructure Part2
  • Critical Success Factors
  • Hardware Acquisition
  • Acquisition Steps Part1
  • Acquisition Steps Part2
  • System Software Acquisition
  • System Software Implementation
  • System Software Change Control Procedures
  • Lesson 9: Information Systems Maintenance Practices
  • Change Management Process Overview
  • Deploying Changes
  • Documentation
  • Testing Changed Programs
  • Auditing Program Changes
  • Emergency Changes
  • Change Exposures (Unauthorized Changes)
  • Configuration Management Part1
  • Configuration Management Part2
  • Lesson 10: System Development Tools And Productivity Aids
  • Code Generators
  • Computer Aided Software Engineering Part1
  • Computer Aided Software Engineering Part2
  • Computer Aided Software Engineering Part3
  • Fourth-Generation Languages (4GL) Part1
  • Fourth-Generation Languages (4GL) Part2
  • Lesson 11: Business Process Reengineering And Process Change Projects
  • Business Process Reengineering And Process Change Projects Continued
  • Benchmarking Process Part1
  • Benchmarking Process Part2
  • The Benchmarking Process
  • ISO 9126
  • Software Capability Maturity Model
  • ISO 15504
  • Lesson 12: Application Controls
  • Inputs Controls Part1
  • Inputs Controls Part2
  • Inputs Controls Part3
  • Inputs Controls Part4
  • Processing Procedures And Controls
  • Processing Controls
  • Data File Control Procedures
  • Output Controls Part1
  • Output Controls Part2
  • Business Process Control Assurance
  • Lesson 13: Auditing Application Controls Part1
  • Auditing Application Controls Part2
  • Risk Assessment Model To Analyze Application Controls
  • Observing And Testing User Performing Procedures
  • Data Integrity Testing
  • Example Of Referential And Relational Integrity
  • Data Integrity In Online Transaction Processing Systems
  • Test Application Systems
  • Continuous Online Auditing
  • Online Auditing Techniques
  • Lesson 14: Auditing Systems Development, Acquisition And Maintenance
  • Project Management
  • Feasibility Study
  • Requirements Definition
  • Software Acquisition Process
  • Detailed Design And Development
  • Testing
  • Implementation Phase
  • Post Implementation Review
  • System Change Procedures And The Program Migration Process
  • Section Review

Module 04 - Information Systems Operations, Maintenance and Support

  • Introduction
  • Lesson 1: Information Systems Operations
  • Management of IS Operations
  • Service Management Part1
  • Service Management Part2
  • Service Management Part3
  • Service Management Part4
  • Service Management Part5
  • Service Level Part1
  • Service Level Part2
  • Infrastructure Operations
  • Scheduling Part1
  • Scheduling Part2
  • Monitoring Use of Resources
  • Process of Incident Handling
  • Problem Management
  • Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions
  • Support/Helpdesk Part1
  • Support/Helpdesk Part2
  • Change Management Process Part1
  • Change Management Process Part2
  • Release Management Part1
  • Release Management Part2
  • Information Security Management
  • Media Sanitization
  • Lesson 2: Information Systems Hardware
  • Computer Hardware Components and Architecture
  • Common Enterprise Backend Devices
  • Specialized Devices
  • Risks
  • Security Control
  • Radiofrequency Identification
  • RFID Applications
  • RFID Risks
  • RFID Security Control
  • Hardware Maintenance Program
  • Hardware Monitoring Procedures
  • Capacity Management Part1
  • Capacity Management Part2
  • Lesson 3: IS Architecture and Software Part1
  • IS Architecture and Software Part2
  • Operating Systems
  • Software Integrity Issues Part1
  • Software Integrity Issues Part2
  • Activity Logging and Reporting Options
  • Data Communication Software
  • Data Management
  • File Organization
  • Database Management Systems Part1
  • Database Management Systems Part2
  • Example of Data in DBMSrchitecture
  • DBMS Metadata Architecture
  • Database Structure
  • Relational Database
  • Database Models
  • Relational Database Model
  • Database Controls
  • Tape and Disk Management Systems
  • Utility Programs
  • Software Licensing Issues Part1
  • Software Licensing Issues Part2
  • Software Licensing Issues Part3
  • Digital Rights Management
  • Lesson 4: Network Infrastructure
  • Enterprise Network Architecture
  • Types of Networks
  • Network Services
  • Network Standards and Protocols
  • OSI Architecture
  • OSI Layers
  • Application of the OSI Model in Network Architectures
  • Local Area Network
  • Network Physical Media Specifications
  • Implementation of WANs
  • LAN Media Access Technologies
  • LAN Components
  • OSI Layer Diagram
  • LAN Technology Selection Criteria
  • Wide Area Networks Part1
  • Wide Area Networks Part2
  • WAN Devices
  • WAN Technologies
  • Wireless Networks
  • Wireless Wide Area Networks
  • Wireless Local Area Networks Part1
  • Wireless Local Area Networks Part2
  • Wireless Security
  • Wireless Application Protocol
  • Risks of Wireless Communications Part1
  • Risks of Wireless Communications Part2
  • World Wide Web Services
  • General Internet Terminology
  • Network Administration and Control
  • Network Performance Metrics
  • Network Management Issues
  • Network Management Tools
  • Client/Server Technology Part1
  • Client/Server Technology Part2
  • Client/Server Technology Part3
  • Client/Server Technology Part4
  • Client/Server Technology Part5
  • Lesson 5: Disaster Recovery Planning
  • Recovery Point Objective and Recovery Time Objective Part1
  • Recovery Point Objective and Recovery Time Objective Part2
  • Recovery Strategies Part1
  • Recovery Strategies Part2
  • Recovery Strategies Part3
  • Application Disaster Recovery Methods Part1
  • Application Disaster Recovery Methods Part2
  • Data Storage Disaster Recovery Methods
  • Telecommunication Networks Disaster Recovery Methods
  • Methods for Network Protection
  • Development of Disaster Recovery Plans
  • Organization and Assignment Of Responsibilities Part1
  • Organization and Assignment Of Responsibilities Part2
  • Organization and Assignment Of Responsibilities Part3
  • Backup and Restoration
  • Off-Site Library Controls
  • Types of Backup Devices and Media Part1
  • Types of Backup Devices and Media Part2
  • Periodic Backup Procedures
  • Frequency of Rotation
  • Backup Schemes
  • Module 04 Review

Module 05 - Protection of Information Assets

  • Introduction
  • Lesson 1: Importance Of Information Security
  • Key Elements of Information Security Management
  • Information Security Management Roles and Responsibilities
  • Inventory and Classification of Information Assets Part1
  • Inventory and Classification of Information Assets Part2
  • System Access Permission Part1
  • System Access Permission Part2
  • Mandatory and Discretionary Access Controls
  • Privacy Management Issue and the Role of IS Auditors Part1
  • Privacy Management Issue and the Role of IS Auditors Part2
  • Critical Success Factors to Information Security Management
  • Information Security and External Parties
  • Identification of Risks Related to External Parties
  • Addressing Security When Dealing with Customers
  • Addressing Security and Third-Party Agreements Part1
  • Addressing Security and Third-Party Agreements Part2
  • Human Resources Security and Third Parties Part1
  • Human Resources Security and Third Parties Part2
  • Computer Crime Issues and Exposures Part1
  • Computer Crime Issues and Exposures Part2
  • Types of Computer Crimes Part1
  • Types of Computer Crimes Part2
  • Peer to Peer, Instant Messaging, Data Leakage and Web-Based Technologies
  • Security Incident Handling and Response Part1
  • Security Incident Handling and Response Part2
  • Lesson 2: Logical Access
  • Logical Access Exposures
  • Familiarization with the Enterprise IT Environment
  • Paths of Logical Access
  • General Points of Entry
  • Logical Access Control Software
  • Identification and Authentication
  • Features of Passwords Part1
  • Features of Passwords Part2
  • Identification and Authentication Best Practices
  • Token Devices, One-Time Passwords
  • Management of Biometrics
  • Single Sign-On Part1
  • Single Sign-On Part2
  • Authorization Issues
  • Access Control Lists
  • Logical Access Security Administration
  • Remote Access Security Part1
  • Remote Access Security Part2
  • Common Connectivity Methods Part1
  • Common Connectivity Methods Part2
  • Remote Access Using PDAs
  • Access Issues with Mobile Technology
  • Access Rights to System Logs
  • Tools for Audit Trail Analysis
  • Use of Intrusion Detection
  • Storing, Retrieving, Transporting and Disposing of Confidential Information
  • Lesson 3: Network Infrastructure Security
  • LAN Security
  • Virtualization
  • Client/Server Security Part1
  • Client/Server Security Part2
  • Client/Server Security Part3
  • Wireless Security Threats and Risks Mitigation Part1
  • Wireless Security Threats and Risks Mitigation Part2
  • Internet Threats and Security
  • Network Security Threats
  • Internet Security Control Audits
  • Firewall Security Systems
  • Common Attacks Against a Firewall
  • Examples of Firewall Implementation
  • Intrusion Detection
  • Describing IDS and IPS Deployment
  • Encryption Part1
  • Encryption Part2
  • Uses of Encryption
  • Viruses
  • Technical Controls Against Viruses
  • AV Software
  • Voice Over IP
  • Private Branch Exchange
  • Lesson 4: Auditing Information Security Management Framework Part1
  • Auditing Information Security Management Framework Part2
  • Auditing Logical Access
  • Techniques for Testing Security
  • Lesson 5: Auditing Network Infrastructure Security
  • Auditing Remote Access
  • Network Penetration Test
  • Types of Penetration Tests
  • Full Network Assessment Reviews
  • Development and Authorization of Network Changes
  • Unauthorized Changes
  • Computer Forensics
  • Chain of Evidence
  • Lesson 6: Environmental Exposures and Controls Part1
  • Environmental Exposures and Controls Part2
  • Lesson 7: Physical Access Exposures and Controls
  • Physical Access Exposures
  • Physical Access Controls
  • Auditing Physical Access
  • Lesson 8: Mobile Computing Part1
  • Mobile Computing Part2
  • Module 05 Review
  • Course Closure

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

About this Course

Prepare For The CISA Certification Exam

The Certified Information Systems Auditor (CISA) course covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.

CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA certification is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.

Course Fast Facts:

  1. Learn the fundamentals of Certified Information Systems Auditor (CISA)
  2. Comprehensive 6 module Accredited Certificate In Certified Information Systems Auditor (CISA) Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Certified Information Systems Auditor (CISA) experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Course Introduction

  • Introduction
  • Course Introduction

Module 01 -The Process of Auditing Information Systems

  • Introduction
  • Lesson 1: Management of the Audit Function
  • Organization of the IS Audit Function
  • IS Audit Resource Management
  • Audit Planning Part1
  • Audit Planning Part2
  • Audit Planning Part3
  • Audit Planning Part4
  • Audit Planning Part5
  • Effect of Laws and Regulations on IS Audit Planning Part1
  • Effect of Laws and Regulations on IS Audit Planning Part2
  • Effect of Laws and Regulations on IS Audit Planning Part3
  • Effect of Laws and Regulations on IS Audit Planning Part4
  • Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1
  • ISACA IT Audit and Assurance Standards and Guidelines Part2
  • ISACA IT Audit and Assurance Standards and Guidelines Part3
  • ISACA IT Audit and Assurance Standards and Guidelines Part4
  • ISACA IT Audit And Assurance Standards Framework
  • Auditing Standards Part1
  • Auditing Standards Part2
  • Auditing Standards Part3
  • Auditing Standards Part4
  • Auditing Standards Part5
  • Auditing Standards Part6
  • Auditing Standards Part7
  • Auditing Standards Part8
  • Auditing Standards Part9
  • Audit Guidelines Part1
  • Audit Guidelines Part2
  • Audit Guidelines Part3
  • Audit Guidelines Part4
  • Audit Guidelines Part5
  • Audit Guidelines Part6
  • Audit Guidelines Part7
  • Audit Guidelines Part8
  • Audit Guidelines Part9
  • Audit Guidelines Part10
  • Audit Guidelines Part11
  • Audit Guidelines Part12
  • Audit and Assurance Tools and Techniques
  • Relationship Among Standards, Guidelines, and Tools and Techniques
  • Information Technology Assurance Framework
  • Information Technology Assurance Framework Components
  • ITAF General Standards (Section 2200) Part1
  • ITAF General Standards (Section 2200) Part2
  • ITAF Performance Standards (Section 2400) Part1
  • ITAF Performance Standards (Section 2400) Part2
  • ITAF Performance Standards (Section 2400) Part3
  • ITAF Performance Standards (Section 2400) Part4
  • Reporting Standards (Section 2600) Part1
  • Reporting Standards (Section 2600) Part2
  • Reporting Standards (Section 2600) Part3
  • IT Assurance Guidelines (Section 3000) Part1
  • IT Assurance Guidelines (Section 3000) Part2
  • IT Assurance Guidelines (Section 3000) Part3
  • IT Assurance Guidelines (Section 3000) Part4
  • IT Assurance Guidelines (Section 3000) Part5
  • IT Assurance Guidelines (Section 3000) Part6
  • IT Assurance Guidelines (Section 3000) Part7
  • IT Assurance Guidelines (Section 3000) Part8
  • IT Assurance Guidelines (Section 3000) Part9
  • IT Assurance Guidelines (Section 3000) Part10
  • IT Assurance Guidelines (Section 3000) Part11
  • Lesson 3: Risk Analysis
  • Risk Analysis Part1
  • Risk Analysis Part2
  • Risk Analysis Part3
  • Risk Analysis Part4
  • Risk Analysis Part5
  • Risk Analysis Part6
  • Risk Analysis Part7
  • Lesson 4: Internal Controls
  • Internal Control Objectives
  • IS Control Objectives Part1
  • IS Control Objectives Part2
  • IS Control Objectives Part3
  • COBIT
  • General Controls Part1
  • General Controls Part2
  • IS Controls
  • Lesson 5: Performing An IS Audit
  • Performing an IS Audit
  • Classification of Audits
  • Audit Programs Part1
  • Audit Programs Part2
  • Audit Methodology Part1
  • Audit Methodology Part2
  • Audit Methodology Part3
  • Fraud Detection Part1
  • Fraud Detection Part2
  • Risk-Based Auditing Part1
  • Risk-Based Auditing Part2
  • Risk-Based Auditing Part3
  • Audit Risk and Materiality Part1
  • Audit Risk and Materiality Part2
  • Audit Risk and Materiality Part3
  • Audit Risk and Materiality Part4
  • Audit Risk and Materiality Part5
  • Risk Assessment and Treatment Part1
  • Risk Assessment and Treatment Part2
  • Risk Assessment and Treatment Part3
  • Risk Assessment and Treatment Part4
  • Risk Assessment and Treatment Part5
  • Risk Assessment Techniques Part1
  • Risk Assessment Techniques Part2
  • Risk Assessment Techniques Part3
  • Risk Assessment Techniques Part4
  • Audit Objectives Part1
  • Audit Objectives Part2
  • Compliance Versus Substantive Testing Part1
  • Compliance Versus Substantive Testing Part2
  • Compliance Versus Substantive Testing Part3
  • Evidence Part1
  • Evidence Part2
  • Evidence Part3
  • Interviewing and Observing Personnel in the Performance Of Their Duties
  • Sampling Part1
  • Sampling Part2
  • Sampling Part3
  • Using The Services Of Other Auditors And Experts Part1
  • Using The Services Of Other Auditors And Experts Part2
  • Computer-Assisted Audit Techniques (CAAT) Part1
  • Computer-Assisted Audit Techniques (CAAT) Part2
  • Evaluation Of Audit Strengths And Weaknesses Part1
  • Evaluation Of Audit Strengths And Weaknesses Part2
  • Evaluation Of Audit Strengths And Weaknesses Part3
  • Communicating Audit Results Part1
  • Communicating Audit Results Part2
  • Communicating Audit Results Part3
  • Management Implementation Of Recommendations
  • Audit Documentation
  • Lesson 6: Control Self-Assessment Part1
  • Control Self-Assessment Part2
  • Control Self-Assessment Part3
  • Objectives of CSA
  • Benefits of CSA
  • Disadvantages of CSA
  • Auditor Role in CSA
  • Technology Drivers for CSA
  • Traditional Versus CSA Approach
  • Lesson 7: The Evolving IS Audit Process
  • Automated Work Papers Part1
  • Automated Work Papers Part2
  • Integrated Auditing Part1
  • Integrated Auditing Part2
  • Integrated Auditing Part3
  • Continuous Auditing Part1
  • Continuous Auditing Part2
  • Continuous Auditing Part3
  • Continuous Auditing Part4
  • Continuous Auditing Part5
  • Section Review

Module 02 - Governance and Management of IT

  • Introduction
  • Lesson 1: Corporate Governance
  • Corporate Governance Part1
  • Corporate Governance Part2
  • Corporate Governance Part3
  • Lesson 2: IT Governance
  • IT Governance Part1
  • IT Governance Part2
  • Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
  • IT Monitoring and Assurance Practices for Board and Senior Management Part1
  • IT Monitoring and Assurance Practices for Board and Senior Management Part2
  • IT Monitoring and Assurance Practices for Board and Senior Management Part3
  • Best Practices for IT Governance Part1
  • Best Practices for IT Governance Part2
  • Best Practices for IT Governance Part3
  • Best Practices for IT Governance Part4
  • IT Governance Frameworks
  • Audit Role in IT Governance Part1
  • Audit Role in IT Governance Part2
  • Audit Role in IT Governance Part3
  • Audit Role in IT Governance Part4
  • IT Strategy Committee
  • IT Balanced Scorecard Part1
  • IT Balanced Scorecard Part2
  • Information Security Governance Part1
  • Information Security Governance Part2
  • Information Security Governance Part3
  • Information Security Governance Part4
  • Importance of Information Security Governance Part1
  • Importance of Information Security Governance Part2
  • Outcomes of Security Governance Part1
  • Outcomes of Security Governance Part2
  • Effective Information Security Governance
  • Roles and Responsibilities of Senior Management and Board of Directors Part1
  • Roles and Responsibilities of Senior Management and Board of Directors Part2
  • Enterprise Architecture
  • Lesson 4: Information Systems Strategy
  • Strategic Planning Part1
  • Strategic Planning Part2
  • Steering Committee
  • Lesson 5: Maturity and Process Improvement Models
  • Maturity and Process Improvement Models
  • Lesson 6: IT Investment and Allocation Practices
  • IT Investment and Allocation Practices Part1
  • IT Investment and Allocation Practices Part2
  • IT Investment and Allocation Practices Part3
  • IT Investment and Allocation Practices Part4
  • Implement IT Portfolio Management
  • IT Portfolio Management Versus Balanced Scorecard
  • Lesson 7: Policies and Procedures
  • Policies Part1
  • Policies Part2
  • Policies Part3
  • Information Security Policy Part1
  • Information Security Policy Part2
  • Information Security Policy Part3
  • Information Security Policy Part4
  • Information Security Policy Part5
  • Information Security Policy Part6
  • Information Security Policy Part7
  • Procedures Part1
  • Procedures Part2
  • Lesson 8: Risk Management
  • Risk Management
  • Developing a Risk Management Program
  • Risk Management Process Part1
  • Risk Management Process Part2
  • Risk Management Process Part3
  • Risk Management Process Part4
  • Risk Management Process Part5
  • Risk Management Process Part6
  • Risk Analysis Methods Part1
  • Risk Analysis Methods Part2
  • Risk Analysis Methods Part3
  • Risk Analysis Methods Part4
  • Risk Analysis Methods Part5
  • Lesson 9: IS Management Practices
  • Human Resource Management Part1
  • Human Resource Management Part2
  • Human Resource Management Part3
  • Human Resource Management Part4
  • Human Resource Management Part5
  • Human Resource Management Part6
  • Human Resource Management Part7
  • Human Resource Management Part8
  • Human Resource Management Part9
  • Human Resource Management Part10
  • Human Resource Management Part11
  • Human Resource Management Part12
  • Human Resource Management Part13
  • Human Resource Management Part14
  • Organizational Change Management
  • Financial Management Practices
  • Quality Management Part1
  • Quality Management Part2
  • Quality Management Part3
  • Information Security Management
  • Performance Optimization Part1
  • Performance Optimization Part2
  • Performance Optimization Part3
  • Lesson 10: IS Organizational Structure and Responsibilities
  • IS Roles and Responsibilities Part1
  • IS Roles and Responsibilities Part2
  • IS Roles and Responsibilities Part3
  • Segregation of Duties
  • Segregation of Duties Controls Part1
  • Segregation of Duties Controls Part2
  • Compensating Controls for Lack of Segregation
  • Lesson 11: Auditing IT Governance Structure and Implementation
  • Reviewing Documentation Part1
  • Reviewing Documentation Part2
  • Reviewing Contractual Commitments
  • Lesson 12: Business Continuity Planning Part1
  • Business Continuity Planning Part2
  • Business Continuity Planning Part3
  • IS Business Continuity Planning
  • Disasters and Other Disruptive Events Part1
  • Disasters and Other Disruptive Events Part2
  • Business Continuity Planning Process
  • Business Continuity Policy
  • Business Impact Analysis Part1
  • Business Impact Analysis Part2
  • Classification of Operations and Criticality Analysis
  • Development of Business Continuity Plans
  • Other Issues and Plan Development
  • Components of a BCP Part1
  • Components of a BCP Part2
  • BCP Testing Part1
  • BCP Testing Part2
  • BCP Testing Part3
  • BCP Maintenance
  • Summary of BCP
  • Section Review

Module 03 - Information Systems Acquisition, Development and Implementation

  • Lesson 1: Business Realization Part1
  • Business Realization Part2
  • Portfolio/Program Management Part1
  • Portfolio/Program Management Part2
  • Portfolio/Program Management Part3
  • Portfolio/Program Management Part4
  • Portfolio/Program Management Part5
  • Business Case Development and Approval Part1
  • Business Case Development and Approval Part2
  • Benefits Realization Techniques
  • Lesson 2: Project Management Structure
  • Project Context and Environment
  • Project Organizational Forms Part1
  • Project Organizational Forms Part2
  • Project Communication and Culture
  • Project Objectives Part1
  • Project Objectives Part2
  • Project Objectives Part3
  • Roles and Responsibilities of Groups and Individuals Part1
  • Roles and Responsibilities of Groups and Individuals Part2
  • Roles and Responsibilities of Groups and Individuals Part3
  • Lesson 3: Project Management Practices
  • Initiation of a Project
  • Project Planning
  • Example of Project Management for New Software
  • Software Size Estimation
  • Lines of Source Code
  • Function Point Analysis (FPA)
  • Function Points
  • Cost Budgets
  • Software Cost Estimation
  • Scheduling and Establishing the Timeframe
  • Critical Path Methodology
  • Gantt Charts
  • Program Evaluation Review Technique (PERT)
  • Time Box Management
  • General Project Management
  • Project Controlling Part1
  • Project Controlling Part2
  • Management of Resource Usage
  • Management of Risk Part1
  • Management of Risk Part2
  • Closing a Project
  • Lesson 4: Business Application Development Part1
  • Business Application Development Part2
  • Business Application Development Part3
  • Business Application Development Part4
  • Business Application Development Part5
  • Traditional SDLC Approach
  • SDLC Phases
  • SDLC
  • Integrated Resource Management Systems Part1
  • Integrated Resource Management Systems Part2
  • Integrated Resource Management Systems Part3
  • Description of SDLC Phases Part1
  • Description of SDLC Phases Part2
  • Description of SDLC Phases Part3
  • Description of SDLC Phases Part4
  • Description of SDLC Phases Part5
  • Description of SDLC Phases Part6
  • Description of SDLC Phases Part7
  • Description of SDLC Phases Part8
  • Description of SDLC Phases Part9
  • Description of SDLC Phases Part10
  • Description of SDLC Phases Part11
  • Description of SDLC Phases Part12
  • Description of SDLC Phases Part13
  • Description of SDLC Phases Part14
  • Description of SDLC Phases Part15
  • Description of SDLC Phases Part16
  • Description of SDLC Phases Part17
  • Description of SDLC Phases Part18
  • Description of SDLC Phases Part19
  • Description of SDLC Phases Part20
  • Description of SDLC Phases Part21
  • Description of SDLC Phases Part22
  • Description of SDLC Phases Part23
  • Risks Associated with Software Development Part1
  • Risks Associated with Software Development Part2
  • Lesson 5: Business Application Systems
  • Electronic Commerce
  • E-Commerce Models
  • E-Commerce Architectures
  • E-Commerce Risks
  • E-Commerce Requirements
  • E-Commerce Audit and Control Issues or Best Practices
  • Components of PKI
  • Electronic Data Interchange
  • General Requirements of EDI
  • Traditional EDI
  • Web Based EDI
  • EDI Risks and Controls
  • Controls in EDI Environment Part1
  • Controls in EDI Environment Part2
  • Controls in EDI Environment Part3
  • Controls in EDI Environment Part4
  • E-Mail
  • E-Mail Security Issues
  • Standards for E-Mail Security Part1
  • Standards for E-Mail Security Part2
  • Standards for E-Mail Security Part3
  • Point-Of-Sale Systems (POS)
  • Electronic Banking Part1
  • Electronic Banking Part2
  • Risk Management Challenges in E-Banking
  • Risk Management Controls for E-Banking Part1
  • Risk Management Controls for E-Banking Part2
  • Electronic Finance
  • Payment Systems
  • Electronic Money Model
  • Electronic Checks Model
  • Electronic Transfer Model
  • Electronic Funds Transfer
  • Controls in an EFT Environment Part1
  • Controls in an EFT Environment Part2
  • Automated Teller Machines Part1
  • Automated Teller Machines Part2
  • Image Processing Part1
  • Image Processing Part2
  • Business Intelligence
  • Decision Support System (DSS)
  • DSS Frameworks
  • Customer Relation Management (CRM)
  • Supply Chain Management (SCM)
  • Lesson 6: Alternative Forms of Software Project Organization Part1
  • Alternative Forms of Software Project Organization Part2
  • Alternative Forms of Software Project Organization Part3
  • Agile Development
  • Prototyping
  • Rapid Application Development (RAD)
  • Lesson 7: Alternative Development Methods
  • Data Oriented System Development
  • Object Oriented System Development Part1
  • Object Oriented System Development Part2
  • Component-Based Development
  • Web-Based Application Development
  • Software Reengineering
  • Reverse Engineering
  • Lesson 8: Infrastructure Development/Acquisition Practices Part1
  • Infrastructure Development/Acquisition Practices Part2
  • Infrastructure Development/Acquisition Practices Part3
  • Project Phases of Physical Architecture Analysis Part1
  • Planning Implementation of Infrastructure Part1
  • Planning Implementation of Infrastructure Part2
  • Critical Success Factors
  • Hardware Acquisition
  • Acquisition Steps Part1
  • Acquisition Steps Part2
  • System Software Acquisition
  • System Software Implementation
  • System Software Change Control Procedures
  • Lesson 9: Information Systems Maintenance Practices
  • Change Management Process Overview
  • Deploying Changes
  • Documentation
  • Testing Changed Programs
  • Auditing Program Changes
  • Emergency Changes
  • Change Exposures (Unauthorized Changes)
  • Configuration Management Part1
  • Configuration Management Part2
  • Lesson 10: System Development Tools And Productivity Aids
  • Code Generators
  • Computer Aided Software Engineering Part1
  • Computer Aided Software Engineering Part2
  • Computer Aided Software Engineering Part3
  • Fourth-Generation Languages (4GL) Part1
  • Fourth-Generation Languages (4GL) Part2
  • Lesson 11: Business Process Reengineering And Process Change Projects
  • Business Process Reengineering And Process Change Projects Continued
  • Benchmarking Process Part1
  • Benchmarking Process Part2
  • The Benchmarking Process
  • ISO 9126
  • Software Capability Maturity Model
  • ISO 15504
  • Lesson 12: Application Controls
  • Inputs Controls Part1
  • Inputs Controls Part2
  • Inputs Controls Part3
  • Inputs Controls Part4
  • Processing Procedures And Controls
  • Processing Controls
  • Data File Control Procedures
  • Output Controls Part1
  • Output Controls Part2
  • Business Process Control Assurance
  • Lesson 13: Auditing Application Controls Part1
  • Auditing Application Controls Part2
  • Risk Assessment Model To Analyze Application Controls
  • Observing And Testing User Performing Procedures
  • Data Integrity Testing
  • Example Of Referential And Relational Integrity
  • Data Integrity In Online Transaction Processing Systems
  • Test Application Systems
  • Continuous Online Auditing
  • Online Auditing Techniques
  • Lesson 14: Auditing Systems Development, Acquisition And Maintenance
  • Project Management
  • Feasibility Study
  • Requirements Definition
  • Software Acquisition Process
  • Detailed Design And Development
  • Testing
  • Implementation Phase
  • Post Implementation Review
  • System Change Procedures And The Program Migration Process
  • Section Review

Module 04 - Information Systems Operations, Maintenance and Support

  • Introduction
  • Lesson 1: Information Systems Operations
  • Management of IS Operations
  • Service Management Part1
  • Service Management Part2
  • Service Management Part3
  • Service Management Part4
  • Service Management Part5
  • Service Level Part1
  • Service Level Part2
  • Infrastructure Operations
  • Scheduling Part1
  • Scheduling Part2
  • Monitoring Use of Resources
  • Process of Incident Handling
  • Problem Management
  • Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions
  • Support/Helpdesk Part1
  • Support/Helpdesk Part2
  • Change Management Process Part1
  • Change Management Process Part2
  • Release Management Part1
  • Release Management Part2
  • Information Security Management
  • Media Sanitization
  • Lesson 2: Information Systems Hardware
  • Computer Hardware Components and Architecture
  • Common Enterprise Backend Devices
  • Specialized Devices
  • Risks
  • Security Control
  • Radiofrequency Identification
  • RFID Applications
  • RFID Risks
  • RFID Security Control
  • Hardware Maintenance Program
  • Hardware Monitoring Procedures
  • Capacity Management Part1
  • Capacity Management Part2
  • Lesson 3: IS Architecture and Software Part1
  • IS Architecture and Software Part2
  • Operating Systems
  • Software Integrity Issues Part1
  • Software Integrity Issues Part2
  • Activity Logging and Reporting Options
  • Data Communication Software
  • Data Management
  • File Organization
  • Database Management Systems Part1
  • Database Management Systems Part2
  • Example of Data in DBMSrchitecture
  • DBMS Metadata Architecture
  • Database Structure
  • Relational Database
  • Database Models
  • Relational Database Model
  • Database Controls
  • Tape and Disk Management Systems
  • Utility Programs
  • Software Licensing Issues Part1
  • Software Licensing Issues Part2
  • Software Licensing Issues Part3
  • Digital Rights Management
  • Lesson 4: Network Infrastructure
  • Enterprise Network Architecture
  • Types of Networks
  • Network Services
  • Network Standards and Protocols
  • OSI Architecture
  • OSI Layers
  • Application of the OSI Model in Network Architectures
  • Local Area Network
  • Network Physical Media Specifications
  • Implementation of WANs
  • LAN Media Access Technologies
  • LAN Components
  • OSI Layer Diagram
  • LAN Technology Selection Criteria
  • Wide Area Networks Part1
  • Wide Area Networks Part2
  • WAN Devices
  • WAN Technologies
  • Wireless Networks
  • Wireless Wide Area Networks
  • Wireless Local Area Networks Part1
  • Wireless Local Area Networks Part2
  • Wireless Security
  • Wireless Application Protocol
  • Risks of Wireless Communications Part1
  • Risks of Wireless Communications Part2
  • World Wide Web Services
  • General Internet Terminology
  • Network Administration and Control
  • Network Performance Metrics
  • Network Management Issues
  • Network Management Tools
  • Client/Server Technology Part1
  • Client/Server Technology Part2
  • Client/Server Technology Part3
  • Client/Server Technology Part4
  • Client/Server Technology Part5
  • Lesson 5: Disaster Recovery Planning
  • Recovery Point Objective and Recovery Time Objective Part1
  • Recovery Point Objective and Recovery Time Objective Part2
  • Recovery Strategies Part1
  • Recovery Strategies Part2
  • Recovery Strategies Part3
  • Application Disaster Recovery Methods Part1
  • Application Disaster Recovery Methods Part2
  • Data Storage Disaster Recovery Methods
  • Telecommunication Networks Disaster Recovery Methods
  • Methods for Network Protection
  • Development of Disaster Recovery Plans
  • Organization and Assignment Of Responsibilities Part1
  • Organization and Assignment Of Responsibilities Part2
  • Organization and Assignment Of Responsibilities Part3
  • Backup and Restoration
  • Off-Site Library Controls
  • Types of Backup Devices and Media Part1
  • Types of Backup Devices and Media Part2
  • Periodic Backup Procedures
  • Frequency of Rotation
  • Backup Schemes
  • Module 04 Review

Module 05 - Protection of Information Assets

  • Introduction
  • Lesson 1: Importance Of Information Security
  • Key Elements of Information Security Management
  • Information Security Management Roles and Responsibilities
  • Inventory and Classification of Information Assets Part1
  • Inventory and Classification of Information Assets Part2
  • System Access Permission Part1
  • System Access Permission Part2
  • Mandatory and Discretionary Access Controls
  • Privacy Management Issue and the Role of IS Auditors Part1
  • Privacy Management Issue and the Role of IS Auditors Part2
  • Critical Success Factors to Information Security Management
  • Information Security and External Parties
  • Identification of Risks Related to External Parties
  • Addressing Security When Dealing with Customers
  • Addressing Security and Third-Party Agreements Part1
  • Addressing Security and Third-Party Agreements Part2
  • Human Resources Security and Third Parties Part1
  • Human Resources Security and Third Parties Part2
  • Computer Crime Issues and Exposures Part1
  • Computer Crime Issues and Exposures Part2
  • Types of Computer Crimes Part1
  • Types of Computer Crimes Part2
  • Peer to Peer, Instant Messaging, Data Leakage and Web-Based Technologies
  • Security Incident Handling and Response Part1
  • Security Incident Handling and Response Part2
  • Lesson 2: Logical Access
  • Logical Access Exposures
  • Familiarization with the Enterprise IT Environment
  • Paths of Logical Access
  • General Points of Entry
  • Logical Access Control Software
  • Identification and Authentication
  • Features of Passwords Part1
  • Features of Passwords Part2
  • Identification and Authentication Best Practices
  • Token Devices, One-Time Passwords
  • Management of Biometrics
  • Single Sign-On Part1
  • Single Sign-On Part2
  • Authorization Issues
  • Access Control Lists
  • Logical Access Security Administration
  • Remote Access Security Part1
  • Remote Access Security Part2
  • Common Connectivity Methods Part1
  • Common Connectivity Methods Part2
  • Remote Access Using PDAs
  • Access Issues with Mobile Technology
  • Access Rights to System Logs
  • Tools for Audit Trail Analysis
  • Use of Intrusion Detection
  • Storing, Retrieving, Transporting and Disposing of Confidential Information
  • Lesson 3: Network Infrastructure Security
  • LAN Security
  • Virtualization
  • Client/Server Security Part1
  • Client/Server Security Part2
  • Client/Server Security Part3
  • Wireless Security Threats and Risks Mitigation Part1
  • Wireless Security Threats and Risks Mitigation Part2
  • Internet Threats and Security
  • Network Security Threats
  • Internet Security Control Audits
  • Firewall Security Systems
  • Common Attacks Against a Firewall
  • Examples of Firewall Implementation
  • Intrusion Detection
  • Describing IDS and IPS Deployment
  • Encryption Part1
  • Encryption Part2
  • Uses of Encryption
  • Viruses
  • Technical Controls Against Viruses
  • AV Software
  • Voice Over IP
  • Private Branch Exchange
  • Lesson 4: Auditing Information Security Management Framework Part1
  • Auditing Information Security Management Framework Part2
  • Auditing Logical Access
  • Techniques for Testing Security
  • Lesson 5: Auditing Network Infrastructure Security
  • Auditing Remote Access
  • Network Penetration Test
  • Types of Penetration Tests
  • Full Network Assessment Reviews
  • Development and Authorization of Network Changes
  • Unauthorized Changes
  • Computer Forensics
  • Chain of Evidence
  • Lesson 6: Environmental Exposures and Controls Part1
  • Environmental Exposures and Controls Part2
  • Lesson 7: Physical Access Exposures and Controls
  • Physical Access Exposures
  • Physical Access Controls
  • Auditing Physical Access
  • Lesson 8: Mobile Computing Part1
  • Mobile Computing Part2
  • Module 05 Review
  • Course Closure

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

We provide a 7 Day Money Back Refund on all Courses

Now Only RM449 Save RM2050 (82%)
OFF RRP RM2499
Delivery Method Online
Get Info Pack

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value RM700)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Internationally recognized by the IAOTS.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Share this course

Course Summary

Course ID No.: 009SRCISA
Delivery Mode: Online
Course Access: Unlimited lifetime
Tutor Support: Yes
Time required: Study at your own pace
Course Duration: 15 Hours
Assessments: Yes
Qualification: Certificate of Completion

Popular Courses and Bundles

Get a FREE Career Planner