CISA: Information Systems Operations, Maintenance, and Service Management


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
An effective IS audit includes ensuring that an organization's processes for IS operations, maintenance, and service management supports and achieves the organizational strategic goals and objectives. This course covers best practices for IS operations, including management practices, incident and problem management, and change management. IS hardware practices are also covered, including IT asset management, hardware components and architectures, and capacity management activities. Finally this course outlines best practices for IS architecture, software, network infrastructure and operations auditing activities. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.

Target Audience
Individuals in IS audit, controls and security professions; individuals preparing for the CISA certification exam.

Prerequisites
None

Expected Duration (hours)
2.3

Lesson Objectives

CISA: Information Systems Operations, Maintenance, and Service Management

  • start the course
  • recognize key concepts of domain 4
  • identify characteristics and best practices of IS operations management
  • identify characteristics of IT service management frameworks, and best practices
  • identify best practices for IS operations
  • identify problem management and support/help desk best practices
  • identify characteristics and best practices of change management, release management and quality assurance in IS operations
  • identify characteristics and best practices for IT asset management
  • distinguish between computer hardware components'
  • identify characteristics and best practices for hardware maintenance and hardware monitoring
  • identify characteristics and best practices for capacity planning and monitoring activities
  • identify operating systems features and options
  • identify characteristics of access control software and data communications software
  • identify characteristics and best practices for data management
  • identify characteristics and best practices of a DBMS
  • identify characteristics of utility programs, source code management, end-user computing, and utility programs in IS architecture and software
  • identify characteristics of enterprise network architectures, types of networks, and network services, standards, and protocols
  • identify characteristics of OSI architecture and best practices for applying the OSI model in network architectures
  • identify best practices for auditing and reviewing enterprise architecture, hardware, operating system, database, and network infrastructure
  • identify best practices for auditing and reviewing IS operations, scheduling, and problem management reporting
  • identify best practices for disaster recovery point and time objectives, recovery strategies, and recovery alternatives
  • identify best practices for developing a disaster recovery plan, and organizing and assigning responsibilities within an organization
  • identify backup and restoration options and best practices
  • distinguish between disaster recovery testing methods, and identify best practices for testing disaster recovery plans and activities in an organization
  • identify best practices for invoking disaster recovery plans within an organization
  • identify best practices when auditing IS operations, maintenance, and service management activities within an organization
  • Course Number:
    sp_cisb_a06_it_enus

    Expertise Level
    Intermediate