• CATALOG
  • MILITARY
  • LOGIN
Franklin Public Schools
Home > Training Programs > Networking > Certified Information Systems Auditor (CISA) (Voucher Included)
CALL
NOW

855.520.6806

Fill out the form below

Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

Certified Information Systems Auditor (CISA) (Voucher Included)

information-systems-auditor-cisa-certification
$1,395.00 (USD)

OVERVIEW

DETAILS

OUTLINE

I. Module 1

    A. Introduction
    B. Audit Process
    C. Auditing Standards
    D. Auditing Guidelines
    E. Cobit Model
    F. Audit Management
    G. Internal Control Classifications
    H. Planning
    I. Program
    J. Evidence
    K. Audit Control Evaluation
    L. C S A Control Self- Assessment

II. Module 2

    A. IT Governance
    B. Outsourcing And Governance
    C. IT Strategy
    D. Governance And Security Policies
    E. Organizational Compliance
    F. Outsourcing And Globalization
    G. Outsourcing
    H. IT Performance

III. Module 3

    A. System And Infrastructure
    B. Requirements
    C. Project Management Tools- Part 1
    D. Project Management Tools- Part 2
    E. Applications
    F. Agile Development
    G. Monitoring And Controlling
    H. Acquisition Process
    I. Testing Process
    J. Information Systems Maintenance Practices
    K. Data Conversion Tools

IV. Module 4

    A. Media Disposal Process
    B. Post Implementation Review
    C. Periodic Review
    D. System Maintenance

V. Module 5

    A. IT Service Delivery And Support
    B. How To Evaluate Service Level Management Practices
    C. Operations Management
    D. Databases
    E. Structured Query Language
    F. Monitoring Performance
    G. Source Code And Performance Monitoring
    H. Patch Management
    I. Incident Management
    J. Hardware Component Types
    K. Network Component Types

VI. Module 6

    A. S Auditor Technical Overview
    B. Security Design
    C. Monitoring Systems
    D. Types Of Attacks
    E. Cryptography
    F. Encryption
    G. Asymmetric Encryption
    H. Digital Certificate
    I. Different Kinds Of Attacks
    J. Access Controls
    K. Identification And Authentication
    L. Physical Access Exposure
    M. Environmental Security
    N. Network Security Devices And Network Components
    O. Network Address Translation
    P. Virtual Private Networks
    Q. Voice System Risks
    R. Intrusion Detection
    S. Firewalls
    T. Firewall Implementation
    U. Network Access Protection
    V. Honey Pot
    W. Risks To Portable And Wireless Devices
    X. Bluetooth
    Y. OSI Networking
    Z. Managing Data

VII. Module 7

    A. Business Continuity And Disaster Recovery
    B. Fault Tolerance
    C. Business Continuity And Disaster Recovery Regulations

REQUIREMENTS

PREREQUISITES

INSTRUCTOR

FAQS

Franklin Public Schools

218 Oak Street
Frankin, MA 02038 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.