CISA: Certified Information Systems Auditor

Get ready for your exam by enrolling in our comprehensive training course. This course includes a full set of instructional videos designed to equip you with in-depth knowledge essential for passing the certification exam with flying colors.

What’s included

  • 74 : Lectures
  • 12h 36m 40s : Duration
video-file-formats

$14.99/24.99


Lectures
1. Introduction- 54s
2. Audit Process- 10m 58s
3. Auditing Standards- 14m 26s
4. Auditing Guidelines- 13m 36s
5. Cobit Model- 2m 36s
6. Audit Management- 12m 38s
7. Internal Control Classifications- 14m 27s
8. Planning- 12m 40s
9. Program- 7m 14s
10. Evidence- 14m 31s
11. Audit Control Evaluation- 12m 33s
12. C S A Control Self- Assessment- 7m 54s

Lectures
1. IT Governance- 12m 37s
2. Outsourcing and Governance- 12m 10s
3. Security Policies- 8m 7s
4. IT Strategy- 5m 39s
5. Organizational Compliance- 2m 23s
6. Outsourcing and Globalization- 7m 27s
7. IT Performance- 5m 9s

Lectures
1. System And Infrastructure- 8m 32s
2. Requirements- 13m 24s
3. Project Management Tools- Part1- 11m 54s
4. Project Management Tools- Part2- 13m 38s
5. Applications- 10m 16s
6. Agile Development- 15m 6s
7. Monitoring And Controlling- 10m 38s
8. Acquisition Process- 10m 59s
9. Testing Process- 14m 19s
10. Information Systems Maintenance Practices- 12m 55s
11. Data Conversion Tools- 14m 15s

Lectures
1. Media Disposal Process- 8m 41s
2. Post Implementation Review- 6m 43s
3. Periodic Review- 9m 32s
4. System Maintenance- 7m 26s

Lectures
1. IT Service Delivery And Support- 11m 56s
2. How To Evaluate Service Level Management Practices- 3m 33s
3. Operations Management- 13m 4s
4. Databases- 9m 49s
5. Structured Query Language- 10m 21s
6. Monitoring Performance- 13m 48s
7. Source Code And Performance Monitoring- 7m 21s
8. Patch Management- 7m 46s
9. Incident Management- 12m 16s
10. Hardware Component Types- 13m
11. Network Component Types- 12m 48s

Lectures
1. I S Auditor Technical Overview- 11m 17s
2. Security Design- 13m 21s
3. Monitoring Systems- 13m 40s
4. Types of Attacks- 15m 8s
5. Cryptography- 8m 2s
6. Encryption- 5m 34s
7. Asymmetric Encryption- 11m 8s
8. Digital Certificate- 14m 5s
9. Different Kinds of Attacks- 12m 8s
10. Access Controls- 11m 45s
11. Identification and Authentication- 13m 42s
12. Physical Access Exposure- 9m 8s
13. Environmental Security- 13m 50s
14. Network Security Devices and Network Components- 13m 46s
15. Network Address Translation- 7m 8s
16. Virtual Private Networks- 8m 34s
17. Voice System Risks- 12m 9s
18. Intrusion Detection- 4m 12s
19. Firewalls- 11m 10s
20. Firewall Implementation- 6m 32s
21. Network Access Protection- 5m 46s
22. Honey Pot- 3m 46s
23. Risks to Portable And Wireless Devices- 11m 28s
24. Bluetooth- 7m 20s
25. OSI Networking- 13m 3s
26. Managing Data- 8m 23s

Lectures
1. Business Continuity and Disaster Recovery- 10m 53s
2. Fault Tolerance- 7m 36s
3. Business Continuity and Disaster Recovery Regulations- 10m 7s

PassQueen does not provide real Microsoft exam questions. Similarly, PassQueen does not supply real Amazon exam questions. The materials offered by PassQueen lack real questions and answers of certification exams. The CFA Institute neither endorses nor assures the accuracy or quality of PassQueen content. CFA® and Chartered Financial Analyst® are registered trademarks held by the CFA Institute.

Helpful Pages

© 2025 All Rights Reserved passqueen.com.