Overview/Description
An effective IS audit includes ensuring that an organization's processes for IS operations, maintenance, and service management supports and achieves the organizational strategic goals and objectives. This course covers best practices for IS operations, including management practices, incident and problem management, and change management. IS hardware practices are also covered, including IT asset management, hardware components and architectures, and capacity management activities. Finally this course outlines best practices for IS architecture, software, network infrastructure and operations auditing activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.
Target Audience
Individuals in IS audit, controls and security professions; individuals preparing for the CISA certification exam.
CISA: Information Systems Operations, Maintenance, and Service Management
start the course
recognize key concepts of domain 4
identify characteristics and best practices of IS operations management
identify characteristics of IT service management frameworks, and best practices
identify best practices for IS operations
identify problem management and support/help desk best practices
identify characteristics and best practices of change management, release management and quality assurance in IS operations
identify characteristics and best practices for IT asset management
distinguish between computer hardware components'
identify characteristics and best practices for hardware maintenance and hardware monitoring
identify characteristics and best practices for capacity planning and monitoring activities
identify operating systems features and options
identify characteristics of access control software and data communications software
identify characteristics and best practices for data management
identify characteristics and best practices of a DBMS
identify characteristics of utility programs, source code management, end-user computing, and utility programs in IS architecture and software
identify characteristics of enterprise network architectures, types of networks, and network services, standards, and protocols
identify characteristics of OSI architecture and best practices for applying the OSI model in network architectures
identify best practices for auditing and reviewing enterprise architecture, hardware, operating system, database, and network infrastructure
identify best practices for auditing and reviewing IS operations, scheduling, and problem management reporting
identify best practices for disaster recovery point and time objectives, recovery strategies, and recovery alternatives
identify best practices for developing a disaster recovery plan, and organizing and assigning responsibilities within an organization
identify backup and restoration options and best practices
distinguish between disaster recovery testing methods, and identify best practices for testing disaster recovery plans and activities in an organization
identify best practices for invoking disaster recovery plans within an organization
identify best practices when auditing IS operations, maintenance, and service management activities within an organization