Vi ste ovdje
Overview/Description
IS Governance is an incredibly important part of IS security. Management and monitoring of resources are built into the audit process and the CISA must be aware of the role they will play in the process. This course examines the role of Governance, IT Management and IT Monitoring, and the strategies and models used to evaluate and create policies and procedures within the environment. This course also examines the Risk Management strategies that can be used, and how the CISA plays a role in choosing the correct strategy for the environment. The Certified Information...
Overview/Description
Information Security Management Practices should adhere to the business goals of an organization, aligning to the objectives that management set down for company improvement. This course examines different types of management practices such as human resource management, sourcing management, change management, financial management, and quality management. This course also looks at how segregation of duties is used to better control information security. Finally, this course examines business continuity and impact analysis and how it can be used as part of information...
Overview/Description
Business Application Systems play a substantial role in many corporate infrastructures today. This course examines the role of the auditor in environments where business application systems and agile development systems are being used. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organizationâs information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to...
Overview/Description
This course examines the auditor's role in auditing physical and software infrastructures and the maintenance of those infrastructures. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization's information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination.
Target Audience
Information Systems professionals with an...
Overview/Description
The acquisition, development, and management of business projects are important in all information systems builds. The CISA must make sure that all these aspects are brought together, and that the business model of the organization is adhered to at all times during this process. This course examines how business realization is applied, how project management structures are built, and how project management practices are used to correctly implement the project management structures. This course also examines the business applications that are used, and the processes that...
Overview/Description
Enterprise network infrastructures and architectures are an integral part of enterprise environments today and are widely unknown to most users. The IS auditor must have a high level knowledge of these frameworks and a clear communication path to those who control them. This course examines the types of networks that are commonly found in enterprises today and the services and components that are commonly used in them. This course also examines disaster recovery strategies and scenarios that must be put in place to deal with any emergency situations that may occur. The...
Overview/Description
While performing audits, it is extremely important to classify audit information and to evaluate and document both the controls used and the outcomes of all parts of the audit process. This course examines the audit classification process, how risk-based auditing is performed, how compliance testing is used, and the processes and procedures used to evaluate and document the audit process. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organizationâs...
Overview/Description
Information risk management and compliance is a pivotal part of the role of an information security manager. This course will provide an overview of information risk management and compliance, as well as examine the elements that come into play when creating an information risk management plan and the frameworks and methodologies that are used. This course also examines risk assessment, with special attention to methods of risk identification, risk analysis, compliance, and the calculations used for risk impact analysis. This course prepares you for the Certified...
Overview/Description
Analysis, mitigation, and monitoring play an extremely important role in information risk management and compliance. This course examines how to properly classify and valuate information assets, perform a business impact analysis, and the principles of disaster recovery. You will learn about the options available to deal with risk, effective controls, and ways to ensure your risk management program is integrated into your organization's other life-cycle processes. You will also examine the many responsibilities of an Information Security Manager related to risk monitoring...
Overview/Description
Information Security Governance is a major part of the job role of an Information Security Manager. The goal of information security governance is to establish and maintain a framework to provide assurance that information security strategies are aligned with the business objectives and consistent with applicable laws and regulations. This course looks at the role of information security governance in an organization, the need for senior management support for all policies and procedures that are put in place, the actual role the information security manager, and the core...
- 1 od 3
- ››