• CATALOG
  • MILITARY
  • LOGIN
San Jose State University
Home > Training Programs > Networking > Certified Information Systems Auditor (CISA)
CALL
NOW

855.520.6806

Fill out the form below

Close Window

Thank you for your interest in this program. We should be contacting you shortly.

Close Window

Certified Information Systems Auditor (CISA)

information-systems-auditor-cisa
$795.00 (USD)

OVERVIEW

DETAILS

OUTLINE

I. Module 1
  1.     Introduction
  2.     Audit Process
  3.     Auditing Standards
  4.     Auditing Guidelines
  5.     Cobit Model
  6.     Audit Management
  7.     Internal Control Classifications
  8.     Planning
  9.     Program
  10.     Evidence
  11.     Audit Control Evaluation
  12.     C S A Control Self- Assessment

II. Module 2
  1.     IT Governance
  2.     Outsourcing And Governance
  3.     IT Strategy
  4.     Governance And Security Policies
  5.     Organizational Compliance
  6.     Outsourcing And Globalization
  7.     Outsourcing
  8.     IT Performance

III. Module 3
  1.     System And Infrastructure
  2.     Requirements
  3.     Project Management Tools- Part 1
  4.     Project Management Tools- Part 2
  5.     Applications
  6.     Agile Development
  7.     Monitoring And Controlling
  8.     Acquisition Process
  9.     Testing Process
  10.     Information Systems Maintenance Practices
  11.     Data Conversion Tools

IV. Module 4
  1.     Media Disposal Process
  2.     Post Implementation Review
  3.     Periodic Review
  4.     System Maintenance

V. Module 5
  1.     IT Service Delivery And Support
  2.     How To Evalutate Service Level Management Practices
  3.     Operations Management
  4.     Databases
  5.     Structured Query Language
  6.     Monitoring Performance
  7.     Source Code And Performance Monitoring
  8.     Patch Management
  9.     Incident Management
  10.     Hardware Component Types
  11.     Network Component Types

VI. Module 6

  1.     S Auditor Technical Overview
  2.     Security Design
  3.     Monitoring Systems
  4.     Types Of Attacks
  5.     Cryptography
  6.     Encryption
  7.     Asymmetric Encryption
  8.     Digital Certificate
  9.     Different Kinds Of Attacks
  10.     Access Controls
  11.     Identification And Authentication
  12.     Physical Access Exposure
  13.     Environmental Security
  14.     Network Security Devices And Network Components
  15.     Network Address Translation
  16.     Virtual Private Networks
  17.     Voice System Risks
  18.     Intrusion Detection
  19.     Firewalls
  20.     Firewall Implementation
  21.     Network Access Protection
  22.     Honey Pot
  23.     Risks To Portable And Wireless Devices
  24.     Bluetooth
  25.     OSI Networking
  26.     Managing Data

VII. Module 7

  1.     Business Continuity And Disaster Recovery
  2.     Fault Tolerance
  3.     Business Continuity And Disaster Recovery Regulations

REQUIREMENTS

PREREQUISITES

INSTRUCTOR

FAQS

San Jose State University

One Washington Square
San Jose, CA 95192 US
MAIN CONTENT

Copyright © Education To Go. All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Education To Go. Education To Go and ed2go are registered trademarks of Education To Go, a part of Cengage Learning.