Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This course explores how to apply the information systems (IS) audit process to ensure adequate risk mitigation for audit planning, security control selection, travelling user vulnerability mitigation, Wi-Fi hardening, and proper PKI (public key infrastructure) key implementation. Learn the importance of having a ISACA CISA (Certified Information Systems Auditor) certification, which indicates you are a professional with the skills necessary as an IT security analyst in performing an IS audit. An IS auditor must have knowledge of the type of business being audited, and need to be able to identify the security posture of an organization within a given specific scenario that falls within the audit scope. When auditing a business, you first look at the type of business, its use of technology, and related security. This course uses real-world business scenarios that include, for example, a marketing company and a financial institution. These scenarios cover how to identify audit planning errors, security control cost effectiveness, determining Wi-Fi weaknesses, determining how keys should be used, and compensating control selection.



Expected Duration (hours)
0.3

Lesson Objectives

Certified Information Systems Auditor (CISA) 2019: Scenario-Based Practice

  • discover the subject areas covered in this course
  • apply IS auditing techniques to audit planning
  • apply IS auditing techniques to security controls
  • apply IS auditing techniques to Wi-Fi configurations
  • apply IS auditing techniques to traveling users
  • apply IS auditing techniques to PKI key usage
  • apply IS auditing techniques to determine effective compensating controls
  • recommend changes based on IS auditing standards
  • Course Number:
    it_spcisa19_15_enus

    Expertise Level
    Expert