fbpx
E-learning hossza:
E-learning nyelve:
32 tanóra
Angol
E-learning díja:
275 500 Ft + Áfa

This Certified Information Systems Auditor (CISA) Course provides delegates with in-depth knowledge about the Information Systems Audit process. During this training, they will learn about quality assurance, a systematic approach to determining if a product meets quality standards. They will also learn about disaster recovery plans that contain detailed instructions on responding to unplanned incidents.

The Certified Information Systems Auditor CISA Course is a globally recognized certification, suitable for those aiming to build a career in Information Systems control.

The CISA Certification Course can be beneficial for professionals, including:

  • IT Consultants
  • IT Auditors
  • Risk Management Specialists
  • Compliance Officers
  • Security Professionals
  • IT Managers and Executives
  • Cybersecurity Professionals

There are no formal prerequisites for this CISA Certified Information Systems Auditor Course.

Certified Information Systems Auditor (CISA) is a globally recognized certification that builds upon the previous experience of IS professionals and produces valuable employees with exceptional knowledge of Information Systems auditing, control, and security. This training assists organizations in performing and analyzing IT governance standards to meet the requirements of IT corporate governance.


This Certified Information Systems Auditor (CISA) training will equip learners with the necessary competence and skills to move on to a high-ranking position within the enterprise.

Course Objectives:

  • To attain knowledge of various security testing tools and techniques
  • To learn the techniques that are applicable for audit planning
  • To become familiar with web-based communication technologies
  • To understand the Information System Audit process and how to protect it
  • To gain an in-depth knowledge about how to use system development methodologies
  • To attain knowledge of Audit and Performance Assessment of Internal Control Systems

At the end of this Certified Information Systems Auditor CISA Training, delegates will be able to audit the Information Security Management framework effectively and efficiently. They will also be able to do data encryption using various encryption-related techniques.

 

Domain 1: Information Systems Auditing Process

Module 1: Planning

  • Introduction
  • IS Audit Standards, Guidelines, and Codes of Ethics
  • Business Processes
  • Types of Controls
  • Risk-Based Audit Planning

Module 2: Execution

  • Audit Project Management
  • Sampling Methodology
  • Audit Evidence Collection Techniques
  • Data Analytics
  • Reporting and Communication Techniques
  • Quality Assurance and Improvement of the Audit Process


Domain 2: Governance and Management of IT

Module 3: IT Governance and IT Strategy

  • Introduction to IT Governance and IT Strategy
  • IT-Related Frameworks
  • IT Standards, Policies, and Procedures
  • Organizational Structure
  • Enterprise Architecture
  • Enterprise Risk Management
  • Maturity Models
  • Laws, Regulations, and Industry Standards Affecting the Organization


Module 4: IT Management

  • IT Resource Management
  • IT Service Provider Acquisition and Management
  • IT Performance Monitoring and Reporting
  • Quality Assurance and Quality Management of IT


Domain 3: Information Systems Acquisition and Development

Module 5: Information Systems Acquisition and Development

  • Project Governance and Management
  • Business Case and Feasibility Analysis
  • System Development Methodologies
  • Control Identification and Design

Module 6: Information Systems Implementation

  • Testing Methodologies
  • Configuration and Release Management
  • System Migration, Infrastructure Deployment, and Data Conversion
  • Post-Implementation Review


Domain 4: Information Systems Operations and Business Resilience

 

 Module 7: Information Systems Operations

  • Introduction
  • Common Technology Components
  • IT Asset Management
  • Job Scheduling and Production Process Automation
  • System Interfaces
  • End User Computing
  • Data Governance
  • System Performance Management
  • Problem and Incident Management
  • Change, Configuration, Release, and Patch Management
  • IT Service Level Management
  • Database Management


Module 8: Business Resilience

  • Business Impact Analysis
  • System Resiliency
  • Data Backup, Storage, and Restoration
    • Backup and Restoration
    • Backup Schemes
  • Business Continuity Plan
    • IT Business Continuity Planning
    • Disasters and Other Disruptive Events
    • Business Continuity Policy
    • Business Continuity Planning Incident Management
    • Development of Business Continuity Plans
    • Other Issues in Plan Development
    • Components of a Business Continuity Plan
    • Key Decision-Making Personnel
    • Backup of Required Supplies
    • Insurance
    • Plan Testing
    • Auditing Business Continuity
  • Disaster Recovery Plans

Domain 5: Protection of Information Assets

Module 9: Information Asset Security Frameworks, Standards, and Guidelines

  • Introduction to Asset Security Frameworks, Standards, and Guidelines
  • Auditing the Information Security Management Framework
  • Privacy Principles
  • Physical Access and Environmental Controls
  • Identity and Access Management
  • Network and End-Point Security
  • Shadow IT
  • Data Classification
  • Data Encryption and Encryption Related Techniques
  • Symmetric Key Cryptographic Systems
  • Public (Asymmetric) Key Cryptographic Systems
  • Applications of Cryptographic Systems
  • Public Key Infrastructure
  • Web-Based Communication Technologies
  • Virtualized Environments
  • Mobile, Wireless, and Internet of Things


Module 10: Security Event Management

  • Security Awareness Training and Programmes
  • Information System Attack Methods and Techniques
  • Security Testing Tools and Techniques
  • Incident Response Management
  • Evidence Collection and Forensics

Kérdésed van az e-learninggel kapcsolatban?



Ezek a tanfolyamok és e-learningek is érdekelhetnek

Tekintsd meg néhány további képzésünket a témában


EC-Council Certified Chief Information Security Officer (CCISO) E-learning and Exam
(MFCCISO)
Önálló tanulásra szánt e-learning tananyag

Ár:
499 500 Ft + Áfa
The CCISO certification is an industry-leading program that recognises the real-world experience necessary to succeed at the highest executive levels of information security. Bringing together all the components required for C-Level positions, the CCISO program combines audit management, governance, IS controls, human capital management, strategic program development and the financial expertise vital for leading a highly successful IS program. The CCISO Training Program can be the key to a successful transition to the highest ranks of information security management.
EC-Council Certified Secure Computer User v2 (CSCU) E-learning and Exam
(MFCSCU)
Önálló tanulásra szánt e-learning tananyag

Ár:
79 500 Ft + Áfa
The CSCU training program aims at equipping students with the necessary knowledge and skills to protect their information assets. This course covers the fundamentals of various computer and network security threats, such as identity theft, credit card fraud, phishing, virus and backdoors, email hoaxes, loss of confidential information, hacking attacks and social engineering.
EC-Council Certified Network Defender (CND) E-learning and Exam
(MFCND)
Önálló tanulásra szánt e-learning tananyag

Ár:
429 500 Ft + Áfa
The Certified Network Defender v3 (CND) credential is the most trusted network security certification that employers worldwide value and for good reasons. The comprehensive curriculum focuses on loT security, network virtualization practices for the remote workforce, enhanced cloud security, loT and operational technology (OT) modules, introduction to threat intelligence, in-depth attack surface analysis, and much more. 
EC-Council Certified Ethical Hacker (CEH) v13 AI E-learning and Exam
(MFCEHE)
Önálló tanulásra szánt e-learning tananyag

Ár:
499 500 Ft + Áfa
This accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals.  Introducing CEH v13, the ethical hacking course that redefines cybersecurity training in . Developed by the creators of Certified Ethical Hacker, this latest version integrates advanced AI capabilities. With 20 comprehensive modules and over 550 attack techniques, CEH v13 equips you with the essential skills to excel in cybersecurity.
EC-Council Computer Hacking Forensic Investigator (CHFI) E-learning and Exam
(MFCHFI)
Önálló tanulásra szánt e-learning tananyag

Ár:
429 500 Ft + Áfa
CHFI v10 captures all the essentials of digital forensics analysis and evaluation required for the modern world — tested and approved by veterans and top practitioners of the cyber forensics industry. From identifying the footprints of a breach to collecting evidence for a prosecution, CHFI v10 handholds students through every step of the process with experiential learning. CHFI v10 is engineered by industry practitioners for professionals including those such as forensic analysts, cybercrime investigator, cyber defense forensic analyst, incident responders, information technology auditor, malware analyst, security consultant, chief security officers and aspirants alike.
EC-Council Disaster Recovery Professional (EDRP) E-learning and Exam
(MFEDRP)
Önálló tanulásra szánt e-learning tananyag

Ár:
429 500 Ft + Áfa
The EDRP v3 course identifies vulnerabilities and takes appropriate countermeasures to prevent and mitigate failure risks for an orginization. It also provides the networking professional with a foundation in disaster recovery course principles, including preparation of a disaster recovery plan, assessment of risks in the enterprise, development of policies and procedures, an understanding of the roles and relationships of various members of organisation, implementation of a plan and recovering from a disaster.
EC-Council Certified Incident Handler v2 (ECIH) E-learning and Exam
(MFECIH)
Önálló tanulásra szánt e-learning tananyag

Ár:
229 500 Ft + Áfa
The ECIH program is designed to provide the fundamental skills to handle and respond to the computer security incidents in an information system. The course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. The comprehensive training program will make students proficient in handling as well as responding to various security incidents, such as network security incidents, malicious code incidents and insider attack threats.
EC-Council Certified SOC Analyst E-learning and Exam
(MFCSAE)
Önálló tanulásra szánt e-learning tananyag

Ár:
279 500 Ft + Áfa
The Certified SOC Analyst (CSA) program is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations. CSA is a training and credentialing program that helps the candidate acquire trending and in-demand technical skills through instruction by some of the most experienced trainers in the industry. The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a SOC team. Being an intense 3-day program, it thoroughly covers the fundamentals of SOC operations, before relaying the knowledge of log management and correlation, SIEM deployment, advanced incident detection, and incident response. Additionally, the candidate will learn to manage various SOC processes and collaborate with CSIRT at the time of need. 
EC-Council Certified Penetration Testing Professional (CPENT) E-learning and Exam
(MFCPENT)
Önálló tanulásra szánt e-learning tananyag

Ár:
429 500 Ft + Áfa
EC-Council’s Certified Penetration Testing Professional (CPENT) program teaches you how to perform an effective penetration test in an enterprise network environment that must be attacked, exploited, evaded, and defended. If you have only been working in flat networks, CPENT’s live practice range will teach you to take your skills to the next level by teaching you how to pen test IoT systems, OT systems, how to write your own exploits, build your own tools, conduct advanced binaries exploitation, double pivot to access hidden networks, and also customize scripts/exploits to get into the innermost segments of the network.
EC-Council Certified Web Application Hacking and Security Tester (WAHS) E-learning and Exam
(MFWAHS)
Önálló tanulásra szánt e-learning tananyag

Ár:
199 500 Ft + Áfa
Web Application Hacking and Security has challenges derived from the engaging iLab environments of EC Council – from Certified Ethical Hacker (CEH) to the Certified Penetration Testing Professional (CPENT); from Certified Application Security Engineer (CASE) .Net to Java. But Web Application Hacking and Security goes beyond this to more difficult scenarios as you advance through each problem. Web Application Hacking and Security is like a Capture-The-Flag (CTF) competitions meant to test your hacking skills. But you can keep on trying until you achieve the goal. Test your skills and work alone to solve complex problems or follow the instructor as they do a walkthrough to help you learn Web Application Hacking and Security. Watch your name rise on the leader board, a place where you’ll see who’s cracking the most challenges, who’s making the most progress, who’s cranking out the h@ck$!
EC-Council Ethical Hacking Core Skills E-learning and Exam
(MFEHCS)
Önálló tanulásra szánt e-learning tananyag

Ár:
429 500 Ft + Áfa
In this course you will learn the core skills to build a solid security foundation. You will examine in detail the traffic that traverses the network at the packet and binary level. You will build solid knowledge on the lowest layers of the network. In the course, you will conduct extensive hands-on exercises. You will learn to master the TCP/IP protocol. You will learn essential UNIX and Linux survival skills that separate you from the many security professionals who are Windows centric.
Certified Information Security Manager (CISM) vizsgafelkészítő e-learning
(MFCISME)
Önálló tanulásra szánt e-learning tananyag

Ár:
275 500 Ft + Áfa
The Certified Information Security Manager (CISM) Training equips professionals with the skills and knowledge to safeguard valuable information assets. It is a highly relevant and crucial discipline in a technology-driven landscape. CISM, offered by ISACA, is a globally recognized certification that ensures individuals are well-versed in managing and governing an organization's information security.
Certified Cloud Security Professional (CCSP) vizsgafelkészítő e-learning
(MFCCSPE)
Önálló tanulásra szánt e-learning tananyag

Ár:
275 500 Ft + Áfa
This Certified Cloud Security Professional (CCSP) Certification Training Course is designed to empower delegates with the ability to understand the audit processes, methodologies, and adaptations required in a cloud environment. Delegates will gain insights into transitioning data, infrastructure, and applications from on-premises hardware to the cloud, ultimately boosting hybrid workforce productivity.
Certified Information Systems Security Professional (CISSP) vizsgafelkészítő e-learning
(MFCISSPE)
Önálló tanulásra szánt e-learning tananyag

Ár:
275 500 Ft + Áfa
This Certified Information Systems Security Professional (CISSP) Training Course is designed to provide delegates with a rapid and comprehensive understanding of key CISSP concepts. Through interactive sessions, real-world case studies, and expert guidance, delegates will gain valuable insights into security policies, risk management, cryptography, and access control systems.
Certified General Data Protection Regulation (GDPR) Practitioner vizsgafelkészítő e-learning vizsga voucherrel
(MFGDPRPE)
Önálló tanulásra szánt e-learning tananyag

Ár:
164 500 Ft + Áfa
Certified EU General Data Protection Regulation (EU GDPR) Practitioner Become familiar with principles of data protection and how they apply to personal data. Understand how to manage third-party processors and how to conduct due diligence. Learn how to develop data retention policies and ensure compliance with GDPR