Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
Certified Information Systems Auditor (CISA)
Course Introduction
Introduction (0:52)
Course Introduction (2:46)
Module 01 -The Process of Auditing Information Systems
Introduction (1:51)
Lesson 1: Management of the Audit Function (1:40)
Organization of the IS Audit Function (3:12)
IS Audit Resource Management (1:04)
Audit Planning Part1 (1:08)
Audit Planning Part2 (1:48)
Audit Planning Part3 (1:32)
Audit Planning Part4 (1:07)
Audit Planning Part5 (2:01)
Effect of Laws and Regulations on IS Audit Planning Part1 (2:17)
Effect of Laws and Regulations on IS Audit Planning Part2 (0:56)
Effect of Laws and Regulations on IS Audit Planning Part3 (0:41)
Effect of Laws and Regulations on IS Audit Planning Part4 (0:45)
Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1 (2:01)
ISACA IT Audit and Assurance Standards and Guidelines Part2 (3:25)
ISACA IT Audit and Assurance Standards and Guidelines Part3 (0:41)
ISACA IT Audit and Assurance Standards and Guidelines Part4 (0:36)
ISACA IT Audit And Assurance Standards Framework (1:18)
Auditing Standards Part1 (1:53)
Auditing Standards Part2 (1:05)
Auditing Standards Part3 (2:45)
Auditing Standards Part4 (0:28)
Auditing Standards Part5 (1:58)
Auditing Standards Part6 (1:25)
Auditing Standards Part7 (2:00)
Auditing Standards Part8 (0:41)
Auditing Standards Part9 (1:05)
Audit Guidelines Part1 (0:33)
Audit Guidelines Part2 (1:07)
Audit Guidelines Part3 (1:38)
Audit Guidelines Part4 (3:07)
Audit Guidelines Part5 (1:57)
Audit Guidelines Part6 (1:28)
Audit Guidelines Part7 (1:41)
Audit Guidelines Part8 (1:58)
Audit Guidelines Part9 (1:57)
Audit Guidelines Part10 (1:31)
Audit Guidelines Part11 (1:56)
Audit Guidelines Part12 (2:02)
Audit and Assurance Tools and Techniques (0:45)
Relationship Among Standards, Guidelines, and Tools and Techniques (1:29)
Information Technology Assurance Framework (0:26)
Information Technology Assurance Framework Components (2:23)
ITAF General Standards (Section 2200) Part1 (1:27)
ITAF General Standards (Section 2200) Part2 (1:21)
ITAF Performance Standards (Section 2400) Part1 (3:02)
ITAF Performance Standards (Section 2400) Part2 (2:01)
ITAF Performance Standards (Section 2400) Part3 (0:33)
ITAF Performance Standards (Section 2400) Part4 (1:10)
Reporting Standards (Section 2600) Part1 (0:21)
Reporting Standards (Section 2600) Part2 (0:51)
Reporting Standards (Section 2600) Part3 (0:54)
IT Assurance Guidelines (Section 3000) Part1 (1:15)
IT Assurance Guidelines (Section 3000) Part2 (0:51)
IT Assurance Guidelines (Section 3000) Part3 (1:32)
IT Assurance Guidelines (Section 3000) Part4 (1:31)
IT Assurance Guidelines (Section 3000) Part5 (2:06)
IT Assurance Guidelines (Section 3000) Part6 (0:20)
IT Assurance Guidelines (Section 3000) Part7 (1:22)
IT Assurance Guidelines (Section 3000) Part8 (2:11)
IT Assurance Guidelines (Section 3000) Part9 (0:45)
IT Assurance Guidelines (Section 3000) Part10 (1:58)
IT Assurance Guidelines (Section 3000) Part11 (1:40)
Lesson 3: Risk Analysis (0:40)
Risk Analysis Part1 (4:21)
Risk Analysis Part2 (3:06)
Risk Analysis Part3 (2:32)
Risk Analysis Part4 (1:26)
Risk Analysis Part5 (1:31)
Risk Analysis Part6 (4:10)
Risk Analysis Part7 (3:31)
Lesson 4: Internal Controls (1:31)
Internal Control Objectives (1:05)
IS Control Objectives Part1 (2:34)
IS Control Objectives Part2 (1:19)
IS Control Objectives Part3 (2:06)
COBIT (0:35)
General Controls Part1 (0:48)
General Controls Part2 (3:23)
IS Controls (3:40)
Lesson 5: Performing An IS Audit (2:39)
Performing an IS Audit (1:08)
Classification of Audits (2:32)
Audit Programs Part1 (1:07)
Audit Programs Part2 (3:02)
Audit Methodology Part1 (1:54)
Audit Methodology Part2 (1:26)
Audit Methodology Part3 (3:25)
Fraud Detection Part1 (2:56)
Fraud Detection Part2 (2:13)
Risk-Based Auditing Part1 (1:12)
Risk-Based Auditing Part2 (0:53)
Risk-Based Auditing Part3 (0:57)
Audit Risk and Materiality Part1 (1:11)
Audit Risk and Materiality Part2 (1:18)
Audit Risk and Materiality Part3 (1:36)
Audit Risk and Materiality Part4 (1:05)
Audit Risk and Materiality Part5 (0:23)
Risk Assessment and Treatment Part1 (0:39)
Risk Assessment and Treatment Part2 (1:57)
Risk Assessment and Treatment Part3 (0:45)
Risk Assessment and Treatment Part4 (1:46)
Risk Assessment and Treatment Part5 (2:04)
Risk Assessment Techniques Part1 (0:18)
Risk Assessment Techniques Part2 (0:38)
Risk Assessment Techniques Part3 (1:06)
Risk Assessment Techniques Part4 (1:09)
Audit Objectives Part1 (0:56)
Audit Objectives Part2 (0:46)
Compliance Versus Substantive Testing Part1 (0:31)
Compliance Versus Substantive Testing Part2 (0:40)
Compliance Versus Substantive Testing Part3 (0:35)
Evidence Part1 (1:09)
Evidence Part2 (1:13)
Evidence Part3 (1:21)
Interviewing and Observing Personnel in the Performance Of Their Duties (1:57)
Sampling Part1 (2:19)
Sampling Part2 (2:04)
Sampling Part3 (1:56)
Using The Services Of Other Auditors And Experts Part1 (0:30)
Using The Services Of Other Auditors And Experts Part2 (0:43)
Computer-Assisted Audit Techniques (CAAT) Part1 (0:58)
Computer-Assisted Audit Techniques (CAAT) Part2 (0:24)
Evaluation Of Audit Strengths And Weaknesses Part1 (0:48)
Evaluation Of Audit Strengths And Weaknesses Part2 (0:57)
Evaluation Of Audit Strengths And Weaknesses Part3 (2:02)
Communicating Audit Results Part1 (0:40)
Communicating Audit Results Part2 (1:26)
Communicating Audit Results Part3 (0:25)
Management Implementation Of Recommendations (0:21)
Audit Documentation (1:15)
Lesson 6: Control Self-Assessment Part1 (1:12)
Control Self-Assessment Part2 (0:50)
Control Self-Assessment Part3 (1:38)
Objectives of CSA (1:19)
Benefits of CSA (0:56)
Disadvantages of CSA (0:36)
Auditor Role in CSA (1:21)
Technology Drivers for CSA (1:07)
Traditional Versus CSA Approach (1:19)
Lesson 7: The Evolving IS Audit Process (0:09)
Automated Work Papers Part1 (0:36)
Automated Work Papers Part2 (1:22)
Integrated Auditing Part1 (0:37)
Integrated Auditing Part2 (1:31)
Integrated Auditing Part3 (0:41)
Continuous Auditing Part1 (0:24)
Continuous Auditing Part2 (1:02)
Continuous Auditing Part3 (0:48)
Continuous Auditing Part4 (2:12)
Continuous Auditing Part5 (0:45)
Section Review (1:37)
Review Questions
Module 02 - Governance and Management of IT
Introduction (3:12)
Lesson 1: Corporate Governance (0:17)
Corporate Governance Part1 (0:25)
Corporate Governance Part2 (0:33)
Corporate Governance Part3 (1:33)
Lesson 2: IT Governance (0:22)
IT Governance Part1 (1:02)
IT Governance Part2 (0:31)
Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management (0:23)
IT Monitoring and Assurance Practices for Board and Senior Management Part1 (2:03)
IT Monitoring and Assurance Practices for Board and Senior Management Part2 (1:01)
IT Monitoring and Assurance Practices for Board and Senior Management Part3 (0:45)
Best Practices for IT Governance Part1 (0:53)
Best Practices for IT Governance Part2 (3:15)
Best Practices for IT Governance Part3 (1:30)
Best Practices for IT Governance Part4 (1:17)
IT Governance Frameworks (0:37)
Audit Role in IT Governance Part1 (0:43)
Audit Role in IT Governance Part2 (2:28)
Audit Role in IT Governance Part3 (1:16)
Audit Role in IT Governance Part4 (1:14)
IT Strategy Committee (0:32)
IT Balanced Scorecard Part1 (0:34)
IT Balanced Scorecard Part2 (3:09)
Information Security Governance Part1 (1:45)
Information Security Governance Part2 (1:22)
Information Security Governance Part3 (1:09)
Information Security Governance Part4 (1:35)
Importance of Information Security Governance Part1 (0:48)
Importance of Information Security Governance Part2 (1:04)
Outcomes of Security Governance Part1 (4:03)
Outcomes of Security Governance Part2 (2:09)
Effective Information Security Governance (0:52)
Roles and Responsibilities of Senior Management and Board of Directors Part1 (0:45)
Roles and Responsibilities of Senior Management and Board of Directors Part2 (2:08)
Enterprise Architecture (1:34)
Lesson 4: Information Systems Strategy (0:42)
Strategic Planning Part1 (0:42)
Strategic Planning Part2 (2:10)
Steering Committee (0:58)
Lesson 5: Maturity and Process Improvement Models (1:34)
Maturity and Process Improvement Models (0:57)
Lesson 6: IT Investment and Allocation Practices (0:37)
IT Investment and Allocation Practices Part1 (0:49)
IT Investment and Allocation Practices Part2 (0:14)
IT Investment and Allocation Practices Part3 (0:24)
IT Investment and Allocation Practices Part4 (0:29)
Implement IT Portfolio Management (0:47)
IT Portfolio Management Versus Balanced Scorecard (1:23)
Lesson 7: Policies and Procedures (0:11)
Policies Part1 (0:43)
Policies Part2 (1:20)
Policies Part3 (2:32)
Information Security Policy Part1 (1:32)
Information Security Policy Part2 (0:58)
Information Security Policy Part3 (0:31)
Information Security Policy Part4 (1:35)
Information Security Policy Part5 (2:52)
Information Security Policy Part6 (2:30)
Information Security Policy Part7 (1:03)
Procedures Part1 (1:31)
Procedures Part2 (2:01)
Lesson 8: Risk Management (0:29)
Risk Management (3:27)
Developing a Risk Management Program (2:37)
Risk Management Process Part1 (0:58)
Risk Management Process Part2 (2:28)
Risk Management Process Part3 (2:19)
Risk Management Process Part4 (1:58)
Risk Management Process Part5 (1:56)
Risk Management Process Part6 (0:59)
Risk Analysis Methods Part1 (2:14)
Risk Analysis Methods Part2 (0:13)
Risk Analysis Methods Part3 (0:47)
Risk Analysis Methods Part4 (3:49)
Risk Analysis Methods Part5 (5:30)
Lesson 9: IS Management Practices (0:23)
Human Resource Management Part1 (0:16)
Human Resource Management Part2 (2:23)
Human Resource Management Part3 (4:09)
Human Resource Management Part4 (4:14)
Human Resource Management Part5 (1:26)
Human Resource Management Part6 (2:52)
Human Resource Management Part7 (3:47)
Human Resource Management Part8 (1:46)
Human Resource Management Part9 (4:14)
Human Resource Management Part10 (2:02)
Human Resource Management Part11 (1:49)
Human Resource Management Part12 (1:16)
Human Resource Management Part13 (1:55)
Human Resource Management Part14 (2:31)
Organizational Change Management (2:48)
Financial Management Practices (0:57)
Quality Management Part1 (2:23)
Quality Management Part2 (0:49)
Quality Management Part3 (0:53)
Information Security Management (1:56)
Performance Optimization Part1 (1:26)
Performance Optimization Part2 (3:26)
Performance Optimization Part3 (0:54)
Lesson 10: IS Organizational Structure and Responsibilities (2:29)
IS Roles and Responsibilities Part1 (1:16)
IS Roles and Responsibilities Part2 (0:36)
IS Roles and Responsibilities Part3 (3:11)
Segregation of Duties (1:33)
Segregation of Duties Controls Part1 (2:33)
Segregation of Duties Controls Part2 (4:34)
Compensating Controls for Lack of Segregation (0:20)
Lesson 11: Auditing IT Governance Structure and Implementation (0:49)
Reviewing Documentation Part1 (0:53)
Reviewing Documentation Part2 (1:05)
Reviewing Contractual Commitments (3:55)
Lesson 12: Business Continuity Planning Part1 (6:12)
Business Continuity Planning Part2 (1:10)
Business Continuity Planning Part3 (0:53)
IS Business Continuity Planning (1:51)
Disasters and Other Disruptive Events Part1 (2:26)
Disasters and Other Disruptive Events Part2 (2:01)
Business Continuity Planning Process (1:13)
Business Continuity Policy (3:19)
Business Impact Analysis Part1 (1:38)
Business Impact Analysis Part2 (0:57)
Classification of Operations and Criticality Analysis (0:46)
Development of Business Continuity Plans (1:14)
Other Issues and Plan Development (2:08)
Components of a BCP Part1 (0:48)
Components of a BCP Part2 (1:42)
BCP Testing Part1 (1:29)
BCP Testing Part2 (2:31)
BCP Testing Part3 (0:53)
BCP Maintenance (0:33)
Summary of BCP (0:42)
Section Review (2:26)
Review Questions
Module 03 - Information Systems Acquisition, Development and Implementation
Lesson 1: Business Realization Part1 (1:09)
Business Realization Part2 (1:27)
Portfolio/Program Management Part1 (0:35)
Portfolio/Program Management Part2 (1:06)
Portfolio/Program Management Part3 (0:43)
Portfolio/Program Management Part4 (0:37)
Portfolio/Program Management Part5 (0:58)
Business Case Development and Approval Part1 (1:12)
Business Case Development and Approval Part2 (0:52)
Benefits Realization Techniques (1:37)
Lesson 2: Project Management Structure (0:38)
Project Context and Environment (0:34)
Project Organizational Forms Part1 (0:14)
Project Organizational Forms Part2 (0:49)
Project Communication and Culture (1:28)
Project Objectives Part1 (0:40)
Project Objectives Part2 (0:35)
Project Objectives Part3 (0:47)
Roles and Responsibilities of Groups and Individuals Part1 (0:49)
Roles and Responsibilities of Groups and Individuals Part2 (1:19)
Roles and Responsibilities of Groups and Individuals Part3 (0:27)
Lesson 3: Project Management Practices (0:46)
Initiation of a Project (0:20)
Project Planning (2:01)
Example of Project Management for New Software (1:44)
Software Size Estimation (1:08)
Lines of Source Code (0:40)
Function Point Analysis (FPA) (0:37)
Function Points (0:51)
Cost Budgets (0:58)
Software Cost Estimation (0:44)
Scheduling and Establishing the Timeframe (0:39)
Critical Path Methodology (1:21)
Gantt Charts (0:51)
Program Evaluation Review Technique (PERT) (0:44)
Time Box Management (0:50)
General Project Management (0:18)
Project Controlling Part1 (0:21)
Project Controlling Part2 (0:41)
Management of Resource Usage (0:38)
Management of Risk Part1 (0:35)
Management of Risk Part2 (0:37)
Closing a Project (0:39)
Lesson 4: Business Application Development Part1 (0:41)
Business Application Development Part2 (1:06)
Business Application Development Part3 (0:19)
Business Application Development Part4 (2:14)
Business Application Development Part5 (0:50)
Traditional SDLC Approach (0:55)
SDLC Phases (0:23)
SDLC (1:11)
Integrated Resource Management Systems Part1 (1:08)
Integrated Resource Management Systems Part2 (0:50)
Integrated Resource Management Systems Part3 (0:29)
Description of SDLC Phases Part1 (1:04)
Description of SDLC Phases Part2 (1:45)
Description of SDLC Phases Part3 (1:52)
Description of SDLC Phases Part4 (1:16)
Description of SDLC Phases Part5 (0:45)
Description of SDLC Phases Part6 (1:08)
Description of SDLC Phases Part7 (0:45)
Description of SDLC Phases Part8 (1:09)
Description of SDLC Phases Part9 (0:51)
Description of SDLC Phases Part10 (1:11)
Description of SDLC Phases Part11 (2:56)
Description of SDLC Phases Part12 (1:07)
Description of SDLC Phases Part13 (1:41)
Description of SDLC Phases Part14 (1:17)
Description of SDLC Phases Part15 (1:02)
Description of SDLC Phases Part16 (0:50)
Description of SDLC Phases Part17 (0:10)
Description of SDLC Phases Part18 (1:41)
Description of SDLC Phases Part19 (1:22)
Description of SDLC Phases Part20 (1:41)
Description of SDLC Phases Part21 (1:08)
Description of SDLC Phases Part22 (1:43)
Description of SDLC Phases Part23 (1:38)
Risks Associated with Software Development Part1 (1:26)
Risks Associated with Software Development Part2 (0:37)
Lesson 5: Business Application Systems (0:13)
Electronic Commerce (0:27)
E-Commerce Models (1:12)
E-Commerce Architectures (0:55)
E-Commerce Risks (0:51)
E-Commerce Requirements (0:47)
E-Commerce Audit and Control Issues or Best Practices (0:32)
Components of PKI (2:20)
Electronic Data Interchange (0:51)
General Requirements of EDI (0:50)
Traditional EDI (1:13)
Web Based EDI (0:43)
EDI Risks and Controls (1:03)
Controls in EDI Environment Part1 (0:38)
Controls in EDI Environment Part2 (0:40)
Controls in EDI Environment Part3 (0:43)
Controls in EDI Environment Part4 (0:43)
E-Mail (0:54)
E-Mail Security Issues (1:37)
Standards for E-Mail Security Part1 (0:39)
Standards for E-Mail Security Part2 (0:55)
Standards for E-Mail Security Part3 (1:28)
Point-Of-Sale Systems (POS) (0:53)
Electronic Banking Part1 (1:57)
Electronic Banking Part2 (0:39)
Risk Management Challenges in E-Banking (0:51)
Risk Management Controls for E-Banking Part1 (0:55)
Risk Management Controls for E-Banking Part2 (0:19)
Electronic Finance (0:41)
Payment Systems (0:20)
Electronic Money Model (0:16)
Electronic Checks Model (0:28)
Electronic Transfer Model (0:11)
Electronic Funds Transfer (0:28)
Controls in an EFT Environment Part1 (0:42)
Controls in an EFT Environment Part2 (0:47)
Automated Teller Machines Part1 (0:47)
Automated Teller Machines Part2 (0:55)
Image Processing Part1 (1:10)
Image Processing Part2 (1:14)
Business Intelligence (1:12)
Decision Support System (DSS) (0:31)
DSS Frameworks (0:29)
Customer Relation Management (CRM) (0:26)
Supply Chain Management (SCM) (1:11)
Lesson 6: Alternative Forms of Software Project Organization Part1 (0:26)
Alternative Forms of Software Project Organization Part2 (0:24)
Alternative Forms of Software Project Organization Part3 (0:48)
Agile Development (0:27)
Prototyping (0:37)
Rapid Application Development (RAD) (1:00)
Lesson 7: Alternative Development Methods (0:47)
Data Oriented System Development (0:36)
Object Oriented System Development Part1 (1:34)
Object Oriented System Development Part2 (2:12)
Component-Based Development (2:29)
Web-Based Application Development (1:36)
Software Reengineering (0:11)
Reverse Engineering (1:19)
Lesson 8: Infrastructure Development/Acquisition Practices Part1 (0:30)
Infrastructure Development/Acquisition Practices Part2 (0:34)
Infrastructure Development/Acquisition Practices Part3 (1:03)
Project Phases of Physical Architecture Analysis Part1 (1:20)
Project Phases of Physical Architecture Analysis Part2 (0:26)
Planning Implementation of Infrastructure Part1 (0:28)
Planning Implementation of Infrastructure Part2 (0:27)
Critical Success Factors (0:22)
Hardware Acquisition (0:52)
Acquisition Steps Part1 (1:01)
Acquisition Steps Part2 (0:50)
System Software Acquisition (0:26)
System Software Implementation (0:15)
System Software Change Control Procedures (0:28)
Lesson 9: Information Systems Maintenance Practices (0:55)
Change Management Process Overview (0:37)
Deploying Changes (1:04)
Documentation (0:50)
Testing Changed Programs (0:31)
Auditing Program Changes (0:45)
Emergency Changes (2:28)
Change Exposures (Unauthorized Changes) (1:09)
Configuration Management Part1 (0:55)
Configuration Management Part2 (0:36)
Lesson 10: System Development Tools And Productivity Aids (0:31)
Code Generators (0:16)
Computer Aided Software Engineering Part1 (1:06)
Computer Aided Software Engineering Part2 (0:36)
Computer Aided Software Engineering Part3 (0:31)
Fourth-Generation Languages (4GL) Part1 (1:04)
Fourth-Generation Languages (4GL) Part2 (1:21)
Lesson 11: Business Process Reengineering And Process Change Projects (1:04)
Business Process Reengineering And Process Change Projects Continued (0:49)
Benchmarking Process Part1 (0:35)
Benchmarking Process Part2 (0:31)
The Benchmarking Process (0:54)
ISO 9126 (0:46)
Software Capability Maturity Model (2:31)
ISO 15504 (0:42)
Lesson 12: Application Controls (0:39)
Inputs Controls Part1 (1:03)
Inputs Controls Part2 (0:39)
Inputs Controls Part3 (0:29)
Inputs Controls Part4 (0:40)
Processing Procedures And Controls (1:10)
Processing Controls (0:35)
Data File Control Procedures (0:38)
Output Controls Part1 (0:10)
Output Controls Part2 (0:34)
Business Process Control Assurance (0:48)
Lesson 13: Auditing Application Controls Part1 (0:31)
Auditing Application Controls Part2 (0:46)
Risk Assessment Model To Analyze Application Controls (1:00)
Observing And Testing User Performing Procedures (0:49)
Data Integrity Testing (0:49)
Example Of Referential And Relational Integrity (4:26)
Data Integrity In Online Transaction Processing Systems (2:07)
Test Application Systems (0:15)
Continuous Online Auditing (0:33)
Online Auditing Techniques (1:19)
Lesson 14: Auditing Systems Development, Acquisition And Maintenance (1:07)
Project Management (0:40)
Feasibility Study (0:33)
Requirements Definition (0:41)
Software Acquisition Process (0:38)
Detailed Design And Development (0:51)
Testing (0:41)
Implementation Phase (0:43)
Post Implementation Review (0:46)
System Change Procedures And The Program Migration Process (0:37)
Section Review (1:22)
Review Questions
Module 04 - Information Systems Operations, Maintenance and Support
Introduction (0:47)
Lesson 1: Information Systems Operations (0:27)
Management of IS Operations (0:45)
Service Management Part1 (0:34)
Service Management Part2 (1:08)
Service Management Part3 (0:42)
Service Management Part4 (0:30)
Service Management Part5 (0:23)
Service Level Part1 (0:52)
Service Level Part2 (0:24)
Infrastructure Operations (0:38)
Scheduling Part1 (0:22)
Scheduling Part2 (1:04)
Monitoring Use of Resources (0:31)
Process of Incident Handling (0:24)
Problem Management (0:58)
Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions (1:05)
Support/Helpdesk Part1 (1:15)
Support/Helpdesk Part2 (0:53)
Change Management Process Part1 (0:42)
Change Management Process Part2 (0:40)
Release Management Part1 (0:52)
Release Management Part2 (1:15)
Information Security Management (0:39)
Media Sanitization (1:36)
Lesson 2: Information Systems Hardware (0:33)
Computer Hardware Components and Architecture (1:10)
Common Enterprise Backend Devices (1:36)
Specialized Devices (1:09)
Risks (0:43)
Security Control (1:00)
Radiofrequency Identification (0:33)
RFID Applications (0:45)
RFID Risks (0:48)
RFID Security Control (0:37)
Hardware Maintenance Program (1:08)
Hardware Monitoring Procedures (0:54)
Capacity Management Part1 (0:57)
Capacity Management Part2 (1:00)
Lesson 3: IS Architecture and Software Part1 (1:46)
IS Architecture and Software Part2 (1:13)
Operating Systems (0:53)
Software Integrity Issues Part1 (1:47)
Software Integrity Issues Part2 (0:30)
Activity Logging and Reporting Options (1:15)
Data Communication Software (0:53)
Data Management (0:43)
File Organization (1:14)
Database Management Systems Part1 (0:44)
Database Management Systems Part2 (0:40)
Example of Data in DBMS (6:02)
DBMS Architecture (0:55)
DBMS Metadata Architecture (0:51)
Database Structure (1:10)
Relational Database (0:46)
Database Models (3:34)
Relational Database Model (5:09)
Database Controls (2:20)
Tape and Disk Management Systems (0:21)
Utility Programs (0:54)
Software Licensing Issues Part1 (1:50)
Software Licensing Issues Part2 (1:07)
Software Licensing Issues Part3 (1:06)
Digital Rights Management (1:06)
Lesson 4: Network Infrastructure (1:37)
Enterprise Network Architecture (0:36)
Types of Networks (4:02)
Network Services (1:59)
Network Standards and Protocols (1:08)
OSI Architecture (1:16)
OSI Layers (10:46)
Application of the OSI Model in Network Architectures (0:49)
Local Area Network (0:21)
Network Physical Media Specifications (2:57)
Implementation of WANs (0:58)
LAN Media Access Technologies (2:28)
LAN Components (3:10)
OSI Layer Diagram (7:43)
LAN Technology Selection Criteria (0:47)
Wide Area Networks Part1 (2:26)
Wide Area Networks Part2 (3:10)
WAN Devices (2:05)
WAN Technologies (2:40)
Wireless Networks (0:51)
Wireless Wide Area Networks (0:33)
Wireless Local Area Networks Part1 (0:36)
Wireless Local Area Networks Part2 (2:24)
Wireless Security (1:44)
Wireless Application Protocol (0:34)
Risks of Wireless Communications Part1 (0:16)
Risks of Wireless Communications Part2 (1:38)
World Wide Web Services (1:14)
General Internet Terminology (3:34)
Network Administration and Control (0:54)
Network Performance Metrics (1:46)
Network Management Issues (1:25)
Network Management Tools (1:45)
Client/Server Technology Part1 (0:40)
Client/Server Technology Part2 (1:37)
Client/Server Technology Part3 (0:51)
Client/Server Technology Part4 (1:34)
Client/Server Technology Part5 (0:44)
Lesson 5: Disaster Recovery Planning (0:24)
Recovery Point Objective and Recovery Time Objective Part1 (1:04)
Recovery Point Objective and Recovery Time Objective Part2 (0:44)
Recovery Strategies Part1 (1:07)
Recovery Strategies Part2 (0:11)
Recovery Strategies Part3 (2:32)
Application Disaster Recovery Methods Part1 (1:04)
Application Disaster Recovery Methods Part2 (0:51)
Data Storage Disaster Recovery Methods (0:36)
Telecommunication Networks Disaster Recovery Methods (0:24)
Methods for Network Protection (1:40)
Development of Disaster Recovery Plans (0:39)
Organization and Assignment Of Responsibilities Part1 (0:52)
Organization and Assignment Of Responsibilities Part2 (0:41)
Organization and Assignment Of Responsibilities Part3 (0:08)
Backup and Restoration (0:20)
Off-Site Library Controls (1:25)
Types of Backup Devices and Media Part1 (0:14)
Types of Backup Devices and Media Part2 (0:29)
Periodic Backup Procedures (0:25)
Frequency of Rotation (1:03)
Backup Schemes (1:45)
Module 04 Review (1:01)
Review Questions
Module 05 - Protection of Information Assets
Introduction (1:30)
Lesson 1: Importance Of Information Security (1:18)
Key Elements of Information Security Management (1:07)
Information Security Management Roles and Responsibilities (0:15)
Inventory and Classification of Information Assets Part1 (0:53)
Inventory and Classification of Information Assets Part2 (1:46)
System Access Permission Part1 (3:03)
System Access Permission Part2 (2:37)
Mandatory and Discretionary Access Controls (2:42)
Privacy Management Issue and the Role of IS Auditors Part1 (0:41)
Privacy Management Issue and the Role of IS Auditors Part2 (0:36)
Critical Success Factors to Information Security Management (0:54)
Information Security and External Parties (1:16)
Identification of Risks Related to External Parties (1:08)
Addressing Security When Dealing with Customers (2:55)
Addressing Security and Third-Party Agreements Part1 (0:41)
Addressing Security and Third-Party Agreements Part2 (0:42)
Human Resources Security and Third Parties Part1 (1:37)
Human Resources Security and Third Parties Part2 (1:25)
Computer Crime Issues and Exposures Part1 (2:45)
Computer Crime Issues and Exposures Part2 (2:26)
Types of Computer Crimes Part1 (1:36)
Types of Computer Crimes Part2 (3:44)
Peer to Peer, Instant Messaging, Data Leakage and Web-Based Technologies (2:20)
Security Incident Handling and Response Part1 (2:05)
Security Incident Handling and Response Part2 (1:32)
Lesson 2: Logical Access (0:25)
Logical Access Exposures (0:43)
Familiarization with the Enterprise IT Environment (0:19)
Paths of Logical Access (1:02)
General Points of Entry (0:17)
Logical Access Control Software (0:40)
Identification and Authentication (1:51)
Features of Passwords Part1 (1:08)
Features of Passwords Part2 (2:20)
Identification and Authentication Best Practices (3:09)
Token Devices, One-Time Passwords (1:35)
Management of Biometrics (2:47)
Single Sign-On Part1 (1:35)
Single Sign-On Part2 (1:06)
Authorization Issues (0:37)
Access Control Lists (0:44)
Logical Access Security Administration (1:00)
Remote Access Security Part1 (1:41)
Remote Access Security Part2 (1:07)
Common Connectivity Methods Part1 (2:33)
Common Connectivity Methods Part2 (0:21)
Remote Access Using PDAs (1:53)
Access Issues with Mobile Technology (2:13)
Access Rights to System Logs (1:04)
Tools for Audit Trail Analysis (0:55)
Use of Intrusion Detection (1:31)
Storing, Retrieving, Transporting and Disposing of Confidential Information (2:41)
Lesson 3: Network Infrastructure Security (0:43)
LAN Security (0:37)
Virtualization (0:43)
Client/Server Security Part1 (1:24)
Client/Server Security Part2 (2:21)
Client/Server Security Part3 (0:52)
Wireless Security Threats and Risks Mitigation Part1 (0:32)
Wireless Security Threats and Risks Mitigation Part2 (0:56)
Internet Threats and Security (2:06)
Network Security Threats (3:13)
Internet Security Control Audits (3:00)
Firewall Security Systems (3:51)
Common Attacks Against a Firewall (1:46)
Examples of Firewall Implementation (1:55)
Intrusion Detection (2:09)
Describing IDS and IPS Deployment (2:38)
Encryption Part1 (0:48)
Encryption Part2 (2:29)
Uses of Encryption (1:39)
Viruses (1:48)
Technical Controls Against Viruses (0:20)
AV Software (1:24)
Voice Over IP (1:17)
Private Branch Exchange (1:04)
Lesson 4: Auditing Information Security Management Framework Part1 (0:19)
Auditing Information Security Management Framework Part2 (0:43)
Auditing Logical Access (0:45)
Techniques for Testing Security (1:38)
Lesson 5: Auditing Network Infrastructure Security (1:11)
Auditing Remote Access (1:29)
Network Penetration Test (2:56)
Types of Penetration Tests (1:52)
Full Network Assessment Reviews (0:41)
Development and Authorization of Network Changes (0:39)
Unauthorized Changes (1:00)
Computer Forensics (1:33)
Chain of Evidence (2:19)
Lesson 6: Environmental Exposures and Controls Part1 (0:04)
Environmental Exposures and Controls Part2 (2:25)
Lesson 7: Physical Access Exposures and Controls (0:15)
Physical Access Exposures (1:00)
Physical Access Controls (2:04)
Auditing Physical Access (1:28)
Lesson 8: Mobile Computing Part1 (0:12)
Mobile Computing Part2 (1:30)
Module 05 Review (1:07)
Review Questions
Course Closure (2:44)
IT Governance Part1
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock