Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This course covers material necessary to take the ISACA CISA (Certified Information Systems Auditor) exam, and explores auditor responsibilities such as identifying network and host weaknesses, reporting them to stakeholders, and suggesting recommendations to improve an organization's security. Learn to distinguish between white, black, and gray box testing, and then explore the benefits of periodic scans for identifying vulnerabilities. Learn how to use pen tests, and evaluate environmental and physical security controls. Next, learn how to use Nessus, a free remote security scanning tool. This course demonstrates how to forge TCP (transmission control protocol) network traffic by using the hping3 tool in Kali Linux. This course demonstrates the OWASP (open-source web application security scanner) ZAP (zed attack proxy) tool to identify web app vulnerabilities. You will learn how to secure traffic by using IPSec (internet security protocol), configure a cloud-based jump box, and about honey pots. Next, learn to secure assets with physical controls and the eavesdropping risk of drones. Finally, learners will be able to identify different types of fire suppression systems.



Expected Duration (hours)
1.1

Lesson Objectives

Certified Information Systems Auditor (CISA) 2019: Testing & Vulnerability

  • discover the subject areas covered in this course
  • distinguish between white, gray, and black-box testing
  • recall the benefits of periodic vulnerability scans and awareness of CVEs
  • use the free Nessus tool to execute a vulnerability scan
  • compare baseline and current network scans to identify changes
  • describe the pen test procedure from reconnaissance to exploiting vulnerabilities
  • forge network traffic using hping3 in Kali Linux
  • use OWASP ZAP to scan a web site for vulnerabilities
  • analyze IPsec network traffic
  • configure a cloud-based jump box to allow access to internal hosts
  • recognize where honeypots can be used to monitor malicious traffic
  • consider potential business process risks related to heating, ventilation, and air conditioning
  • describe methods of securing assets using physical controls
  • describe how drones can present eavesdropping and other risks
  • identify different types of fire suppression
  • differentiate between vulnerability and penetration testing, describe the purpose of a jump box, list physical security examples, and perform a non-credentialed vulnerability scan
  • Course Number:
    it_spcisa19_12_enus

    Expertise Level
    Expert