CISA Domain: IS Operations, Maintenance, and Support - Part 2

Target Audience
Expected Duration
Lesson Objectives
Course Number

Enterprise network infrastructures and architectures are an integral part of enterprise environments today and are widely unknown to most users. The IS auditor must have a high level knowledge of these frameworks and a clear communication path to those who control them. This course examines the types of networks that are commonly found in enterprises today and the services and components that are commonly used in them. This course also examines disaster recovery strategies and scenarios that must be put in place to deal with any emergency situations that may occur. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.

Target Audience
Information Systems professionals with an interest in information systems audit, control and security. A minimum of five years of professional information systems auditing, control or security work experience is required for certification.

Expected Duration (hours)

Lesson Objectives

CISA Domain: IS Operations, Maintenance, and Support - Part 2

  • describe the different types of networks
  • recognize network services and network standards and protocols
  • implement the OSI model in Local Area Networks (LANs)
  • describe the characteristics of Wide Area Networks (WANs)
  • describe the characteristics of wireless networks
  • describe enterprise network architectures
  • describe the characteristics of WANs and wireless networks
  • recognize public Internet infrastructures
  • describe network administration and control features
  • define recovery point objective (RPO) and recovery time objective (RTO)
  • recognize recovery strategies and recovery alternatives
  • recognize disaster recovery plan contents and scenarios
  • describe backup and restoration methods
  • recognize public Internet infrastructures and network administration and control features
  • recognize disaster recovery planning concepts
  • Course Number: