course

Home / Courses / Information Systems Auditor

Agenda

  • Topic A: The Auditing Process and Auditors
  • Definitions
  • Types of Auditors
  • The Auditing Process (1)
  • The Auditing Process (2)
  • The Auditing Process (3)
  • Audit Planning Process
  • Topic B: Risk Analysis
  • Risk Analysis Defined
  • Assessing Countermeasures
  • Steps of Assessment
  • Motivations for Risk Analysis
  • Topic C: Internal Controls
  • Internal Controls: Objectives & Procedures
  • Internal Control Types
  • Internal Controls (Preventative)
  • Internal Controls (Detective)
  • Internal Controls (Corrective)
  • Goals of Internal Controls
  • General Control Methods/Types
  • Audit Classifications
  • Phases of the Audit Process (Page 1)
  • Phases of the Audit Process (Page 2)
  • Inherent Risks During Audits
  • A Risk-Based Audit Approach
  • Evidence
  • Evidence Gathering Techniques
  • Computer Assisted Audit
  • Control Self-Assessment (CSA)
  • Chapter 1 Review

  • Topic A: The Role of Governance
  • IT Governance
  • Governance Defined
  • Relationship Structure
  • Role of Auditor
  • Practices & Procedures
  • Information Security Governance
  • Results of Security Governance
  • Goals of Security Governance
  • Topic B: Policies, Procedures, and Risk
  • Policies
  • Information Security Policy Document
  • Management Reviews
  • Procedures
  • Risk Management
  • Approaches
  • IT Risk Management
  • Levels
  • Topic C: IT Governance & Personnel Management
  • IS Management Practices
  • Personnel Management
  • Sourcing IS Functions
  • Insourcing and Outsourcing Strategy
  • Change Management
  • Organizational Quality Management
  • Quality Management
  • Performance Management
  • Chapter 2 Review

  • Topic A: Project Management
  • Project Management Structure
  • Example Organizational Chart
  • Practical Project Management
  • 5 Steps
  • Topic B: Software Development and Acquisition
  • Business Application Development
  • Traditional SDLC Approach
  • Software Development Risks
  • Alternative Development Methods
  • Agile Development
  • Prototyping
  • R.A.D.
  • Rapid Application Deployment
  • 4 Stages
  • Other Alternative Development Methods
  • Topic C: Infrastructure Development and Acquisition
  • Infrastructure Development and Acquisition
  • Analysis of Physical Infrastructures
  • 4 Steps to Planning Infrastructure Implementation
  • Hardware / Software Acquisition
  • Maintaining Information Systems
  • Change Management Standards
  • Application Controls
  • Auditor Tasks
  • Input Controls
  • Data Validation Checks
  • Output Controls
  • Chapter 3 Review

  • Topic A: Networking Models
  • Networking Models
  • Advantages of Reference Models
  • The OSI Model
  • Reliability
  • Topic B: IS Network Infrastructure
  • Network Types
  • Network Topology
  • VPN Defined
  • Wireless Specifications
  • Topic C: Business Continuity & Disaster Recovery
  • BCP/DR
  • Definitions
  • 7 Steps to Recovery
  • BCP/DR Incident Classification
  • Business Impact Analysis
  • BIA
  • RPO and RTO
  • Recovery Strategies
  • Topic D: Recovery
  • Categories of Recovery Strategies
  • Business Recovery
  • Facilities, Materials, and Supplies
  • Data Recovery
  • Topic E: Disaster Recovery
  • Disaster Recovery Plan (DRP) Development
  • BCP & DR – Teams
  • BCP Components
  • R.A.I.D.
  • Insurance
  • Business Continuity Plan (BCP) Testing
  • Types of BCP/DR Testing Strategies
  • Auditing BCP/DR
  • Business Continuity Management (BCM) Institutes and Organizations
  • Business Continuity Management (BCM)
  • Chapter 4 Review

  • Topic A: Protecting Data
  • Key Elements, Roles, and Responsibilities
  • Classifying Information Assets
  • System Access Permission
  • Topic B: Threats and Vulnerabilities
  • 4 Categories of Attacks
  • Exposures and Vulnerabilities
  • Topic C: Access Controls
  • Logical Access Paths
  • Identification and Authentication Mechanisms
  • Strong Password Policy
  • Authorization
  • Dealing with Data
  • LAN Security
  • Client-Server Security
  • Firewall
  • Intrusion Prevention Service (IPS)
  • Honeypot (HP)
  • Topic D: Encryption
  • Encryption Mechanisms
  • Symmetric vs. Asymmetric
  • Topic E: Auditing Practices
  • Auditing IS Management Framework
  • Auditing Logical Access
  • Penetration Testing
  • Computer Forensics
  • Chapter 5 Review
Tags
Technical Core Type: Core 4 Vendor: Career Academy Product Line: Other Technical
FREE

Interested in course?


Course Type: Self Paced