Certified Information Systems Auditor (CISA)
Sale Page
The Certified Information Systems Auditor (CISA) course covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.
CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA certification is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.
Course Curriculum
Course Introduction
PreviewIntroduction (0:52)
PreviewCourse Introduction (2:46)
Module 01 -The Process of Auditing Information Systems
PreviewIntroduction (1:51)
StartLesson 1: Management of the Audit Function (1:40)
StartOrganization of the IS Audit Function (3:12)
StartIS Audit Resource Management (1:04)
StartAudit Planning Part1 (1:08)
StartAudit Planning Part2 (1:48)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartAudit Planning Part3 (1:32)
StartAudit Planning Part4 (1:07)
StartAudit Planning Part5 (2:01)
StartEffect of Laws and Regulations on IS Audit Planning Part1 (2:17)
StartEffect of Laws and Regulations on IS Audit Planning Part2 (0:56)
StartEffect of Laws and Regulations on IS Audit Planning Part3 (0:41)
StartEffect of Laws and Regulations on IS Audit Planning Part4 (0:45)
StartLesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1 (2:01)
StartISACA IT Audit and Assurance Standards and Guidelines Part2 (3:25)
StartISACA IT Audit and Assurance Standards and Guidelines Part3 (0:41)
StartISACA IT Audit and Assurance Standards and Guidelines Part4 (0:36)
StartISACA IT Audit And Assurance Standards Framework (1:18)
StartAuditing Standards Part1 (1:53)
StartAuditing Standards Part2 (1:05)
StartAuditing Standards Part3 (2:45)
StartAuditing Standards Part4 (0:28)
StartAuditing Standards Part5 (1:58)
StartAuditing Standards Part6 (1:25)
StartAuditing Standards Part7 (2:00)
StartAuditing Standards Part8 (0:41)
StartAuditing Standards Part9 (1:05)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartAudit Guidelines Part1 (0:33)
StartAudit Guidelines Part2 (1:07)
StartAudit Guidelines Part3 (1:38)
StartAudit Guidelines Part4 (3:07)
StartAudit Guidelines Part5 (1:57)
StartAudit Guidelines Part6 (1:28)
StartAudit Guidelines Part7 (1:41)
StartAudit Guidelines Part8 (1:58)
StartAudit Guidelines Part9 (1:57)
StartAudit Guidelines Part10 (1:31)
StartAudit Guidelines Part11 (1:56)
StartAudit Guidelines Part12 (2:02)
StartAudit and Assurance Tools and Techniques (0:45)
StartRelationship Among Standards, Guidelines, and Tools and Techniques (1:29)
StartInformation Technology Assurance Framework (0:26)
StartInformation Technology Assurance Framework Components (2:23)
StartITAF General Standards (Section 2200) Part1 (1:27)
StartITAF General Standards (Section 2200) Part2 (1:21)
StartITAF Performance Standards (Section 2400) Part1 (3:02)
StartITAF Performance Standards (Section 2400) Part2 (2:01)
StartITAF Performance Standards (Section 2400) Part3 (0:33)
StartITAF Performance Standards (Section 2400) Part4 (1:10)
StartReporting Standards (Section 2600) Part1 (0:21)
StartReporting Standards (Section 2600) Part2 (0:51)
StartReporting Standards (Section 2600) Part3 (0:54)
StartIT Assurance Guidelines (Section 3000) Part1 (1:15)
StartIT Assurance Guidelines (Section 3000) Part2 (0:51)
StartIT Assurance Guidelines (Section 3000) Part3 (1:32)
StartIT Assurance Guidelines (Section 3000) Part4 (1:31)
StartIT Assurance Guidelines (Section 3000) Part5 (2:06)
StartIT Assurance Guidelines (Section 3000) Part6 (0:20)
StartIT Assurance Guidelines (Section 3000) Part7 (1:22)
StartIT Assurance Guidelines (Section 3000) Part8 (2:11)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartIT Assurance Guidelines (Section 3000) Part9 (0:45)
StartIT Assurance Guidelines (Section 3000) Part10 (1:58)
StartIT Assurance Guidelines (Section 3000) Part11 (1:40)
StartLesson 3: Risk Analysis (0:40)
StartRisk Analysis Part1 (4:21)
StartRisk Analysis Part2 (3:06)
StartRisk Analysis Part3 (2:32)
StartRisk Analysis Part4 (1:26)
StartRisk Analysis Part5 (1:31)
StartRisk Analysis Part6 (4:10)
StartRisk Analysis Part7 (3:31)
StartLesson 4: Internal Controls (1:31)
StartInternal Control Objectives (1:05)
StartIS Control Objectives Part1 (2:34)
StartIS Control Objectives Part2 (1:19)
StartIS Control Objectives Part3 (2:06)
StartCOBIT (0:35)
StartGeneral Controls Part1 (0:48)
StartGeneral Controls Part2 (3:23)
StartIS Controls (3:40)
StartLesson 5: Performing An IS Audit (2:39)
StartPerforming an IS Audit (1:08)
StartClassification of Audits (2:32)
StartAudit Programs Part1 (1:07)
StartAudit Programs Part2 (3:02)
StartAudit Methodology Part1 (1:54)
StartAudit Methodology Part2 (1:26)
StartAudit Methodology Part3 (3:25)
StartFraud Detection Part1 (2:56)
StartFraud Detection Part2 (2:13)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartRisk-Based Auditing Part1 (1:12)
StartRisk-Based Auditing Part2 (0:53)
StartRisk-Based Auditing Part3 (0:57)
StartAudit Risk and Materiality Part1 (1:11)
StartAudit Risk and Materiality Part2 (1:18)
StartAudit Risk and Materiality Part3 (1:36)
StartAudit Risk and Materiality Part4 (1:05)
StartAudit Risk and Materiality Part5 (0:23)
StartRisk Assessment and Treatment Part1 (0:39)
StartRisk Assessment and Treatment Part2 (1:57)
StartRisk Assessment and Treatment Part3 (0:45)
StartRisk Assessment and Treatment Part4 (1:46)
StartRisk Assessment and Treatment Part5 (2:04)
StartRisk Assessment Techniques Part1 (0:18)
StartRisk Assessment Techniques Part2 (0:38)
StartRisk Assessment Techniques Part3 (1:06)
StartRisk Assessment Techniques Part4 (1:09)
StartAudit Objectives Part1 (0:56)
StartAudit Objectives Part2 (0:46)
StartCompliance Versus Substantive Testing Part1 (0:31)
StartCompliance Versus Substantive Testing Part2 (0:40)
StartCompliance Versus Substantive Testing Part3 (0:35)
StartEvidence Part1 (1:09)
StartEvidence Part2 (1:13)
StartEvidence Part3 (1:21)
StartInterviewing and Observing Personnel in the Performance Of Their Duties (1:57)
StartSampling Part1 (2:19)
StartSampling Part2 (2:04)
StartSampling Part3 (1:56)
StartUsing The Services Of Other Auditors And Experts Part1 (0:30)
StartUsing The Services Of Other Auditors And Experts Part2 (0:43)
StartComputer-Assisted Audit Techniques (CAAT) Part1 (0:58)
StartComputer-Assisted Audit Techniques (CAAT) Part2 (0:24)
StartEvaluation Of Audit Strengths And Weaknesses Part1 (0:48)
StartEvaluation Of Audit Strengths And Weaknesses Part2 (0:57)
StartEvaluation Of Audit Strengths And Weaknesses Part3 (2:02)
StartCommunicating Audit Results Part1 (0:40)
StartCommunicating Audit Results Part2 (1:26)
StartCommunicating Audit Results Part3 (0:25)
StartManagement Implementation Of Recommendations (0:21)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartAudit Documentation (1:15)
StartLesson 6: Control Self-Assessment Part1 (1:12)
StartControl Self-Assessment Part2 (0:50)
StartControl Self-Assessment Part3 (1:38)
StartObjectives of CSA (1:19)
StartBenefits of CSA (0:56)
StartDisadvantages of CSA (0:36)
StartAuditor Role in CSA (1:21)
StartTechnology Drivers for CSA (1:07)
StartTraditional Versus CSA Approach (1:19)
StartLesson 7: The Evolving IS Audit Process (0:09)
StartAutomated Work Papers Part1 (0:36)
StartAutomated Work Papers Part2 (1:22)
StartIntegrated Auditing Part1 (0:37)
StartIntegrated Auditing Part2 (1:31)
StartIntegrated Auditing Part3 (0:41)
StartContinuous Auditing Part1 (0:24)
StartContinuous Auditing Part2 (1:02)
StartContinuous Auditing Part3 (0:48)
StartContinuous Auditing Part4 (2:12)
StartContinuous Auditing Part5 (0:45)
StartSection Review (1:37)
StartReview Questions
Module 02 – Governance and Management of IT
StartIntroduction (3:12)
StartLesson 1: Corporate Governance (0:17)
StartCorporate Governance Part1 (0:25)
StartCorporate Governance Part2 (0:33)
StartCorporate Governance Part3 (1:33)
StartLesson 2: IT Governance (0:22)
StartIT Governance Part1 (1:02)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartIT Governance Part2 (0:31)
StartLesson 3: IT Monitoring and Assurance Practices for Board and Senior Management (0:23)
StartIT Monitoring and Assurance Practices for Board and Senior Management Part1 (2:03)
StartIT Monitoring and Assurance Practices for Board and Senior Management Part2 (1:01)
StartIT Monitoring and Assurance Practices for Board and Senior Management Part3 (0:45)
StartBest Practices for IT Governance Part1 (0:53)
StartBest Practices for IT Governance Part2 (3:15)
StartBest Practices for IT Governance Part3 (1:30)
StartBest Practices for IT Governance Part4 (1:17)
StartIT Governance Frameworks (0:37)
StartAudit Role in IT Governance Part1 (0:43)
StartAudit Role in IT Governance Part2 (2:28)
StartAudit Role in IT Governance Part3 (1:16)
StartAudit Role in IT Governance Part4 (1:14)
StartIT Strategy Committee (0:32)
StartIT Balanced Scorecard Part1 (0:34)
StartIT Balanced Scorecard Part2 (3:09)
StartInformation Security Governance Part1 (1:45)
StartInformation Security Governance Part2 (1:22)
StartInformation Security Governance Part3 (1:09)
StartInformation Security Governance Part4 (1:35)
StartImportance of Information Security Governance Part1 (0:48)
StartImportance of Information Security Governance Part2 (1:04)
StartOutcomes of Security Governance Part1 (4:03)
StartOutcomes of Security Governance Part2 (2:09)
StartEffective Information Security Governance (0:52)
StartRoles and Responsibilities of Senior Management and Board of Directors Part1 (0:45)
StartRoles and Responsibilities of Senior Management and Board of Directors Part2 (2:08)
StartEnterprise Architecture (1:34)
StartLesson 4: Information Systems Strategy (0:42)
StartStrategic Planning Part1 (0:42)
StartStrategic Planning Part2 (2:10)
StartSteering Committee (0:58)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartLesson 5: Maturity and Process Improvement Models (1:34)
StartMaturity and Process Improvement Models (0:57)
StartLesson 6: IT Investment and Allocation Practices (0:37)
StartIT Investment and Allocation Practices Part1 (0:49)
StartIT Investment and Allocation Practices Part2 (0:14)
StartIT Investment and Allocation Practices Part3 (0:24)
StartIT Investment and Allocation Practices Part4 (0:29)
StartImplement IT Portfolio Management (0:47)
StartIT Portfolio Management Versus Balanced Scorecard (1:23)
StartLesson 7: Policies and Procedures (0:11)
StartPolicies Part1 (0:43)
StartPolicies Part2 (1:20)
StartPolicies Part3 (2:32)
StartInformation Security Policy Part1 (1:32)
StartInformation Security Policy Part2 (0:58)
StartInformation Security Policy Part3 (0:31)
StartInformation Security Policy Part4 (1:35)
StartInformation Security Policy Part5 (2:52)
StartInformation Security Policy Part6 (2:30)
StartInformation Security Policy Part7 (1:03)
StartProcedures Part1 (1:31)
StartProcedures Part2 (2:01)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartLesson 8: Risk Management (0:29)
StartRisk Management (3:27)
StartDeveloping a Risk Management Program (2:37)
StartRisk Management Process Part1 (0:58)
StartRisk Management Process Part2 (2:28)
StartRisk Management Process Part3 (2:19)
StartRisk Management Process Part4 (1:58)
StartRisk Management Process Part5 (1:56)
StartRisk Management Process Part6 (0:59)
StartRisk Analysis Methods Part1 (2:14)
StartRisk Analysis Methods Part2 (0:13)
StartRisk Analysis Methods Part3 (0:47)
StartRisk Analysis Methods Part4 (3:49)
StartRisk Analysis Methods Part5 (5:30)
StartLesson 9: IS Management Practices (0:23)
StartHuman Resource Management Part1 (0:16)
StartHuman Resource Management Part2 (2:23)
StartHuman Resource Management Part3 (4:09)
StartHuman Resource Management Part4 (4:14)
StartHuman Resource Management Part5 (1:26)
StartHuman Resource Management Part6 (2:52)
StartHuman Resource Management Part7 (3:47)
StartHuman Resource Management Part8 (1:46)
StartHuman Resource Management Part9 (4:14)
StartHuman Resource Management Part10 (2:02)
StartHuman Resource Management Part11 (1:49)
StartHuman Resource Management Part12 (1:16)
StartHuman Resource Management Part13 (1:55)
StartHuman Resource Management Part14 (2:31)
StartOrganizational Change Management (2:48)
StartFinancial Management Practices (0:57)
StartQuality Management Part1 (2:23)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartQuality Management Part2 (0:49)
StartQuality Management Part3 (0:53)
StartInformation Security Management (1:56)
StartPerformance Optimization Part1 (1:26)
StartPerformance Optimization Part2 (3:26)
StartPerformance Optimization Part3 (0:54)
StartLesson 10: IS Organizational Structure and Responsibilities (2:29)
StartIS Roles and Responsibilities Part1 (1:16)
StartIS Roles and Responsibilities Part2 (0:36)
StartIS Roles and Responsibilities Part3 (3:11)
StartSegregation of Duties (1:33)
StartSegregation of Duties Controls Part1 (2:33)
StartSegregation of Duties Controls Part2 (4:34)
StartCompensating Controls for Lack of Segregation (0:20)
StartLesson 11: Auditing IT Governance Structure and Implementation (0:49)
StartReviewing Documentation Part1 (0:53)
StartReviewing Documentation Part2 (1:05)
StartReviewing Contractual Commitments (3:55)
StartLesson 12: Business Continuity Planning Part1 (6:12)
StartBusiness Continuity Planning Part2 (1:10)
StartBusiness Continuity Planning Part3 (0:53)
StartIS Business Continuity Planning (1:51)
StartDisasters and Other Disruptive Events Part1 (2:26)
StartDisasters and Other Disruptive Events Part2 (2:01)
StartBusiness Continuity Planning Process (1:13)
StartBusiness Continuity Policy (3:19)
StartBusiness Impact Analysis Part1 (1:38)
StartBusiness Impact Analysis Part2 (0:57)
StartClassification of Operations and Criticality Analysis (0:46)
StartDevelopment of Business Continuity Plans (1:14)
StartOther Issues and Plan Development (2:08)
StartComponents of a BCP Part1 (0:48)
StartComponents of a BCP Part2 (1:42)
StartBCP Testing Part1 (1:29)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartBCP Testing Part2 (2:31)
StartBCP Testing Part3 (0:53)
StartBCP Maintenance (0:33)
StartSummary of BCP (0:42)
StartSection Review (2:26)
StartReview Questions
Module 03 – Information Systems Acquisition, Development and Implementation
StartLesson 1: Business Realization Part1 (1:09)
StartBusiness Realization Part2 (1:27)
StartPortfolio/Program Management Part1 (0:35)
StartPortfolio/Program Management Part2 (1:06)
StartPortfolio/Program Management Part3 (0:43)
StartPortfolio/Program Management Part4 (0:37)
StartPortfolio/Program Management Part5 (0:58)
StartBusiness Case Development and Approval Part1 (1:12)
StartBusiness Case Development and Approval Part2 (0:52)
StartBenefits Realization Techniques (1:37)
StartLesson 2: Project Management Structure (0:38)
StartProject Context and Environment (0:34)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartProject Organizational Forms Part1 (0:14)
StartProject Organizational Forms Part2 (0:49)
StartProject Communication and Culture (1:28)
StartProject Objectives Part1 (0:40)
StartProject Objectives Part2 (0:35)
StartProject Objectives Part3 (0:47)
StartRoles and Responsibilities of Groups and Individuals Part1 (0:49)
StartRoles and Responsibilities of Groups and Individuals Part2 (1:19)
StartRoles and Responsibilities of Groups and Individuals Part3 (0:27)
StartLesson 3: Project Management Practices (0:46)
StartInitiation of a Project (0:20)
StartProject Planning (2:01)
StartExample of Project Management for New Software (1:44)
StartSoftware Size Estimation (1:08)
StartLines of Source Code (0:40)
StartFunction Point Analysis (FPA) (0:37)
StartFunction Points (0:51)
StartCost Budgets (0:58)
StartSoftware Cost Estimation (0:44)
StartScheduling and Establishing the Timeframe (0:39)
StartCritical Path Methodology (1:21)
StartGantt Charts (0:51)
StartProgram Evaluation Review Technique (PERT) (0:44)
StartTime Box Management (0:50)
StartGeneral Project Management (0:18)
StartProject Controlling Part1 (0:21)
StartProject Controlling Part2 (0:41)
StartManagement of Resource Usage (0:38)
StartManagement of Risk Part1 (0:35)
StartManagement of Risk Part2 (0:37)
StartClosing a Project (0:39)
StartLesson 4: Business Application Development Part1 (0:41)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartBusiness Application Development Part2 (1:06)
StartBusiness Application Development Part3 (0:19)
StartBusiness Application Development Part4 (2:14)
StartBusiness Application Development Part5 (0:50)
StartTraditional SDLC Approach (0:55)
StartSDLC Phases (0:23)
StartSDLC (1:11)
StartIntegrated Resource Management Systems Part1 (1:08)
StartIntegrated Resource Management Systems Part2 (0:50)
StartIntegrated Resource Management Systems Part3 (0:29)
StartDescription of SDLC Phases Part1 (1:04)
StartDescription of SDLC Phases Part2 (1:45)
StartDescription of SDLC Phases Part3 (1:52)
StartDescription of SDLC Phases Part4 (1:16)
StartDescription of SDLC Phases Part5 (0:45)
StartDescription of SDLC Phases Part6 (1:08)
StartDescription of SDLC Phases Part7 (0:45)
StartDescription of SDLC Phases Part8 (1:09)
StartDescription of SDLC Phases Part9 (0:51)
StartDescription of SDLC Phases Part10 (1:11)
StartDescription of SDLC Phases Part11 (2:56)
StartDescription of SDLC Phases Part12 (1:07)
StartDescription of SDLC Phases Part13 (1:41)
StartDescription of SDLC Phases Part14 (1:17)
StartDescription of SDLC Phases Part15 (1:02)
StartDescription of SDLC Phases Part16 (0:50)
StartDescription of SDLC Phases Part17 (0:10)
StartDescription of SDLC Phases Part18 (1:41)
StartDescription of SDLC Phases Part19 (1:22)
StartDescription of SDLC Phases Part20 (1:41)
StartDescription of SDLC Phases Part21 (1:08)
StartDescription of SDLC Phases Part22 (1:43)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartDescription of SDLC Phases Part23 (1:38)
StartRisks Associated with Software Development Part1 (1:26)
StartRisks Associated with Software Development Part2 (0:37)
StartLesson 5: Business Application Systems (0:13)
StartElectronic Commerce (0:27)
StartE-Commerce Models (1:12)
StartE-Commerce Architectures (0:55)
StartE-Commerce Risks (0:51)
StartE-Commerce Requirements (0:47)
StartE-Commerce Audit and Control Issues or Best Practices (0:32)
StartComponents of PKI (2:20)
StartElectronic Data Interchange (0:51)
StartGeneral Requirements of EDI (0:50)
StartTraditional EDI (1:13)
StartWeb Based EDI (0:43)
StartEDI Risks and Controls (1:03)
StartControls in EDI Environment Part1 (0:38)
StartControls in EDI Environment Part2 (0:40)
StartControls in EDI Environment Part3 (0:43)
StartControls in EDI Environment Part4 (0:43)
StartE-Mail (0:54)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartE-Mail Security Issues (1:37)
StartStandards for E-Mail Security Part1 (0:39)
StartStandards for E-Mail Security Part2 (0:55)
StartStandards for E-Mail Security Part3 (1:28)
StartPoint-Of-Sale Systems (POS) (0:53)
StartElectronic Banking Part1 (1:57)
StartElectronic Banking Part2 (0:39)
StartRisk Management Challenges in E-Banking (0:51)
StartRisk Management Controls for E-Banking Part1 (0:55)
StartRisk Management Controls for E-Banking Part2 (0:19)
StartElectronic Finance (0:41)
StartPayment Systems (0:20)
StartElectronic Money Model (0:16)
StartElectronic Checks Model (0:28)
StartElectronic Transfer Model (0:11)
StartElectronic Funds Transfer (0:28)
StartControls in an EFT Environment Part1 (0:42)
StartControls in an EFT Environment Part2 (0:47)
StartAutomated Teller Machines Part1 (0:47)
StartAutomated Teller Machines Part2 (0:55)
StartImage Processing Part1 (1:10)
StartImage Processing Part2 (1:14)
StartBusiness Intelligence (1:12)
StartDecision Support System (DSS) (0:31)
StartDSS Frameworks (0:29)
StartCustomer Relation Management (CRM) (0:26)
StartSupply Chain Management (SCM) (1:11)
StartLesson 6: Alternative Forms of Software Project Organization Part1 (0:26)
StartAlternative Forms of Software Project Organization Part2 (0:24)
StartAlternative Forms of Software Project Organization Part3 (0:48)
StartAgile Development (0:27)
StartPrototyping (0:37)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartRapid Application Development (RAD) (1:00)
StartLesson 7: Alternative Development Methods (0:47)
StartData Oriented System Development (0:36)
StartObject Oriented System Development Part1 (1:34)
StartObject Oriented System Development Part2 (2:12)
StartComponent-Based Development (2:29)
StartWeb-Based Application Development (1:36)
StartSoftware Reengineering (0:11)
StartReverse Engineering (1:19)
StartLesson 8: Infrastructure Development/Acquisition Practices Part1 (0:30)
StartInfrastructure Development/Acquisition Practices Part2 (0:34)
StartInfrastructure Development/Acquisition Practices Part3 (1:03)
StartProject Phases of Physical Architecture Analysis Part1 (1:20)
StartProject Phases of Physical Architecture Analysis Part2 (0:26)
StartPlanning Implementation of Infrastructure Part1 (0:28)
StartPlanning Implementation of Infrastructure Part2 (0:27)
StartCritical Success Factors (0:22)
StartHardware Acquisition (0:52)
StartAcquisition Steps Part1 (1:01)
StartAcquisition Steps Part2 (0:50)
StartSystem Software Acquisition (0:26)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartSystem Software Implementation (0:15)
StartSystem Software Change Control Procedures (0:28)
StartLesson 9: Information Systems Maintenance Practices (0:55)
StartChange Management Process Overview (0:37)
StartDeploying Changes (1:04)
StartDocumentation (0:50)
StartTesting Changed Programs (0:31)
StartAuditing Program Changes (0:45)
StartEmergency Changes (2:28)
StartChange Exposures (Unauthorized Changes) (1:09)
StartConfiguration Management Part1 (0:55)
StartConfiguration Management Part2 (0:36)
StartLesson 10: System Development Tools And Productivity Aids (0:31)
StartCode Generators (0:16)
StartComputer Aided Software Engineering Part1 (1:06)
StartComputer Aided Software Engineering Part2 (0:36)
StartComputer Aided Software Engineering Part3 (0:31)
StartFourth-Generation Languages (4GL) Part1 (1:04)
StartFourth-Generation Languages (4GL) Part2 (1:21)
StartLesson 11: Business Process Reengineering And Proce
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
ss Change Projects (1:04)
StartBusiness Process Reengineering And Process Change Projects Continued (0:49)
StartBenchmarking Process Part1 (0:35)
StartBenchmarking Process Part2 (0:31)
StartThe Benchmarking Process (0:54)
StartISO 9126 (0:46)
StartSoftware Capability Maturity Model (2:31)
StartISO 15504 (0:42)
StartLesson 12: Application Controls (0:39)
StartInputs Controls Part1 (1:03)
StartInputs Controls Part2 (0:39)
StartInputs Controls Part3 (0:29)
StartInputs Controls Part4 (0:40)
StartProcessing Procedures And Controls (1:10)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartProcessing Controls (0:35)
StartData File Control Procedures (0:38)
StartOutput Controls Part1 (0:10)
StartOutput Controls Part2 (0:34)
StartBusiness Process Control Assurance (0:48)
StartLesson 13: Auditing Application Controls Part1 (0:31)
StartAuditing Application Controls Part2 (0:46)
StartRisk Assessment Model To Analyze Application Controls (1:00)
StartObserving And Testing User Performing Procedures (0:49)
StartData Integrity Testing (0:49)
StartExample Of Referential And Relational Integrity (4:26)
StartData Integrity In Online Transaction Processing Systems (2:07)
StartTest Application Systems (0:15)
StartContinuous Online Auditing (0:33)
StartOnline Auditing Techniques (1:19)
StartLesson 14: Auditing Systems Development, Acquisition And Maintenance (1:07)
StartProject Management (0:40)
StartFeasibility Study (0:33)
StartRequirements Definition (0:41)
StartSoftware Acquisition Process (0:38)
StartDetailed Design And Development (0:51)
StartTesting (0:41)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartImplementation Phase (0:43)
StartPost Implementation Review (0:46)
StartSystem Change Procedures And The Program Migration Process (0:37)
StartSection Review (1:22)
StartReview Questions
Module 04 – Information Systems Operations, Maintenance and Support
StartIntroduction (0:47)
StartLesson 1: Information Systems Operations (0:27)
StartManagement of IS Operations (0:45)
StartService Management Part1 (0:34)
StartService Management Part2 (1:08)
StartService Management Part3 (0:42)
StartService Management Part4 (0:30)
StartService Management Part5 (0:23)
StartService Level Part1 (0:52)
StartService Level Part2 (0:24)
StartInfrastructure Operations (0:38)
StartScheduling Part1 (0:22)
StartScheduling Part2 (1:04)
StartMonitoring Use of Resources (0:31)
StartProcess of Incident Handling (0:24)
StartProblem Management (0:58)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartDetection,Documentation,Control,Resolution and Reporting of Abnormal Conditions (1:05)
StartSupport/Helpdesk Part1 (1:15)
StartSupport/Helpdesk Part2 (0:53)
StartChange Management Process Part1 (0:42)
StartChange Management Process Part2 (0:40)
StartRelease Management Part1 (0:52)
StartRelease Management Part2 (1:15)
StartInformation Security Management (0:39)
StartMedia Sanitization (1:36)
StartLesson 2: Information Systems Hardware (0:33)
StartComputer Hardware Components and Architecture (1:10)
StartCommon Enterprise Backend Devices (1:36)
StartSpecialized Devices (1:09)
StartRisks (0:43)
StartSecurity Control (1:00)
StartRadiofrequency Identification (0:33)
StartRFID Applications (0:45)
StartRFID Risks (0:48)
StartRFID Security Control (0:37)
StartHardware Maintenance Program (1:08)
StartHardware Monitoring Procedures (0:54)
StartCapacity Management Part1 (0:57)
StartCapacity Management Part2 (1:00)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartLesson 3: IS Architecture and Software Part1 (1:46)
StartIS Architecture and Software Part2 (1:13)
StartOperating Systems (0:53)
StartSoftware Integrity Issues Part1 (1:47)
StartSoftware Integrity Issues Part2 (0:30)
StartActivity Logging and Reporting Options (1:15)
StartData Communication Software (0:53)
StartData Management (0:43)
StartFile Organization (1:14)
StartDatabase Management Systems Part1 (0:44)
StartDatabase Management Systems Part2 (0:40)
StartExample of Data in DBMS (6:02)
StartDBMS Architecture (0:55)
StartDBMS Metadata Architecture (0:51)
StartDatabase Structure (1:10)
StartRelational Database (0:46)
StartDatabase Models (3:34)
StartRelational Database Model (5:09)
StartDatabase Controls (2:20)
StartTape and Disk Management Systems (0:21)
StartUtility Programs (0:54)
StartSoftware Licensing Issues Part1 (1:50)
StartSoftware Licensing Issues Part2 (1:07)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartSoftware Licensing Issues Part3 (1:06)
StartDigital Rights Management (1:06)
StartLesson 4: Network Infrastructure (1:37)
StartEnterprise Network Architecture (0:36)
StartTypes of Networks (4:02)
StartNetwork Services (1:59)
StartNetwork Standards and Protocols (1:08)
StartOSI Architecture (1:16)
StartOSI Layers (10:46)
StartApplication of the OSI Model in Network Architectures (0:49)
StartLocal Area Network (0:21)
StartNetwork Physical Media Specifications (2:57)
StartImplementation of WANs (0:58)
StartLAN Media Access Technologies (2:28)
StartLAN Components (3:10)
StartOSI Layer Diagram (7:43)
StartLAN Technology Selection Criteria (0:47)
StartWide Area Networks Part1 (2:26)
StartWide Area Networks Part2 (3:10)
StartWAN Devices (2:05)
StartWAN Technologies (2:40)
StartWireless Networks (0:51)
StartWireless Wide Area Networks (0:33)
StartWireless Local Area Networks Part1 (0:36)
StartWireless Local Area Networks Part2 (2:24)
StartWireless Security (1:44)
StartWireless Application Protocol (0:34)
StartRisks of Wireless Communications Part1 (0:16)
StartRisks of Wireless Communications Part2 (1:38)
StartWorld Wide Web Services (1:14)
StartGeneral Internet Terminology (3:34)
StartNetwork Administration and Control (0:54)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartNetwork Performance Metrics (1:46)
StartNetwork Management Issues (1:25)
StartNetwork Management Tools (1:45)
StartClient/Server Technology Part1 (0:40)
StartClient/Server Technology Part2 (1:37)
StartClient/Server Technology Part3 (0:51)
StartClient/Server Technology Part4 (1:34)
StartClient/Server Technology Part5 (0:44)
StartLesson 5: Disaster Recovery Planning (0:24)
StartRecovery Point Objective and Recovery Time Objective Part1 (1:04)
StartRecovery Point Objective and Recovery Time Objective Part2 (0:44)
StartRecovery Strategies Part1 (1:07)
StartRecovery Strategies Part2 (0:11)
StartRecovery Strategies Part3 (2:32)
StartApplication Disaster Recovery Methods Part1 (1:04)
StartApplication Disaster Recovery Methods Part2 (0:51)
StartData Storage Disaster Recovery Methods (0:36)
StartTelecommunication Networks Disaster Recovery Methods (0:24)
StartMethods for Network Protection (1:40)
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
StartDevelopment of Disaster Recovery Plans (0:39)
StartOrganization and Assignment Of Responsibilities Part1 (0:52)
StartOrganization and Assignment Of Responsibilities Part2 (0:41)
StartOrganization and Assignment Of Responsibilities Part3 (0:08)
StartBackup and Restoration (0:20)
StartOff-Site Library Controls (1:25)
StartTypes of Backup Devices and Media Part1 (0:14)
StartTypes of Backup Devices and Media Part2 (0:29)
StartPeriodic Backup Procedures (0:25)
StartFrequency of Rotation (1:03)
StartBackup Schemes (1:45)
StartModule 04 Review (1:01)
StartReview Questions
Module 05 – Protection of Information Assets
StartIntroduction (1:30)
StartLesson 1: Importance Of Information Security (1:18)
StartKey Elements of Information Security Management (1:07)
StartInformation Security Management Roles and Responsibilities (0:15)
And more …
Also Get Certified Information Systems Auditor (CISA) Traderknow.com
Visit more course: BOND – STOCK TRADING
Some BOND – STOCK course: Djellala – Training by Ebooks (PDF Files), Also StratagemTrade – Rolling Thunder: The Ultimate Hedging Technique. Also Tom K. eloyd – Successful Stock Signals for Traders and Portfolio Managers: Integrating. Also Daniel T.Ferrera Llewelyn James Martin Armstrong investorsunderground
Visit more course: FOREX TRADING COURSE
Some FX course: Bill Williams Eduard Altmann SMB Simpler Trading Van Tharp Atlas Api Training Trading Template Sunil Mangwani Sunil Mangwani Frank Paul . Also Market Delta Tradingacademy Simplertrading Urbanforex. Also Candlechartscom Dan Sheridan Pipsociety Atlas Api Training TopTradeTools Todd Mitchell Jerry Singh OpenTrader Alexandertrading Daytradingzones . wyckoffanalytics Simplertrading
Available at traderknow.com
Please contact email: [email protected] If you have any question.
Course Features
- Lectures 0
- Quizzes 0
- Duration 50 hours
- Skill level All levels
- Language English
- Students 80
- Assessments Yes