Technology Systems Auditing
Technology Systems Auditing, available at $19.99, has an average rating of 3.8, with 183 lectures, 5 quizzes, based on 16 reviews, and has 62 subscribers.
You will learn about Understand the IS audit process Plan audit and Perform risk analysis Put in place internal controls Learn about different phases of IS audit Understand the role of governance in IT/IS Make policies, procedures and identify risks Create information security policy document Conduct management reviews of the policy document Perform risk management Create insourcing and outsourcing strategy Perform organizational quality management Create project management structure Introduce application development best practices Plan IS operations and business resiliency plans Define RPO/RTO Develop disaster recovery plan Protect information assets Identify exposures and vulnerabilities Understand role of encryption in data protection Learn the basics of computer forensics This course is ideal for individuals who are Information systems auditors or Chief information security officers or Manager information security or Manager cyber security or Information system managers or Candidates aspiring for CISA certification It is particularly useful for Information systems auditors or Chief information security officers or Manager information security or Manager cyber security or Information system managers or Candidates aspiring for CISA certification.
Enroll now: Technology Systems Auditing
Summary
Title: Technology Systems Auditing
Price: $19.99
Average Rating: 3.8
Number of Lectures: 183
Number of Quizzes: 5
Number of Published Lectures: 183
Number of Published Quizzes: 5
Number of Curriculum Items: 188
Number of Published Curriculum Objects: 188
Original Price: $199.99
Quality Status: approved
Status: Live
What You Will Learn
- Understand the IS audit process
- Plan audit and Perform risk analysis
- Put in place internal controls
- Learn about different phases of IS audit
- Understand the role of governance in IT/IS
- Make policies, procedures and identify risks
- Create information security policy document
- Conduct management reviews of the policy document
- Perform risk management
- Create insourcing and outsourcing strategy
- Perform organizational quality management
- Create project management structure
- Introduce application development best practices
- Plan IS operations and business resiliency plans
- Define RPO/RTO
- Develop disaster recovery plan
- Protect information assets
- Identify exposures and vulnerabilities
- Understand role of encryption in data protection
- Learn the basics of computer forensics
Who Should Attend
- Information systems auditors
- Chief information security officers
- Manager information security
- Manager cyber security
- Information system managers
- Candidates aspiring for CISA certification
Target Audiences
- Information systems auditors
- Chief information security officers
- Manager information security
- Manager cyber security
- Information system managers
- Candidates aspiring for CISA certification
Information systems have become an integral part of any modern organization. Many of the business processes are now dependent on the information systems and the data contained in these systems is of critical importance to any enterprise. The need to protect and safeguard these systems is also directly proportional to the increase in their usage. With the information systems becoming so important, the attacks and threats including but not limited to ransomware, data theft, hacking, forgery and brute force are also on the rise. More and more attackers are targeting organization with less control and protection. This course prepares the candidates to put in place effective controls and policies to protect their information systems and assets from unauthorized access and leakage.
Information systems auditor course is a comprehensive course designed with the objective of preparing the candidates to be able to familiarize themselves with the IS audit process, governance, management of IT, IS operations, maintenance and support, IS operations and business resilience as well as protection of information assets.
These information systems or assets can be in the form of databases, files, images, documents and software. The course covers the protection methods and techniques regardless of the form the data is residing within the organization.
Overall, the course touches all the aspects required to become an effective information systems auditor and perform the task efficiently. This course also helps the candidates to prepare for the relevant certification
Course Curriculum
Chapter 1: The IS Audit Process
Lecture 1: The IS Audit Process
Lecture 2: Topic A: The Auditing Process and Auditors
Lecture 3: Definitions
Lecture 4: Types of Auditors
Lecture 5: The Auditing Process (1)
Lecture 6: The Auditing Process (2)
Lecture 7: The Auditing Process (3)
Lecture 8: Audit Planning Process
Lecture 9: Topic B: Risk Analysis
Lecture 10: Risk Analysis Defined
Lecture 11: Assessing Countermeasures
Lecture 12: Steps of Assessment
Lecture 13: Motivations for Risk Analysis
Lecture 14: Topic C: Internal Controls
Lecture 15: Internal Controls: Objectives & Procedures
Lecture 16: Internal Control Types
Lecture 17: Internal Controls (Preventative)
Lecture 18: Internal Controls (Detective)
Lecture 19: Internal Controls (Corrective)
Lecture 20: Goals of Internal Controls
Lecture 21: Goals of Internal Controls
Lecture 22: General Control Methods/Types
Lecture 23: The IS Audit Process
Lecture 24: Audit Classifications
Lecture 25: Audit Classifications
Lecture 26: Phases of the Audit Process (Page 1)
Lecture 27: Phases of the Audit Process (Page 2)
Lecture 28: Inherent Risks During Audits
Lecture 29: A Risk-Based Audit Approach
Lecture 30: Evidence
Lecture 31: Evidence Gathering Techniques
Lecture 32: Computer Assisted Audit
Lecture 33: Control Self-Assessment (CSA)
Lecture 34: Chapter 1 Review
Chapter 2: Chapter 2 – Governance and Management of IT
Lecture 1: Chapter 2 – Governance and Management of IT
Lecture 2: Topic A: The Role of Governance
Lecture 3: IT Governance
Lecture 4: IT Governance
Lecture 5: Governance Defined
Lecture 6: Relationship Structure
Lecture 7: Role of Auditor
Lecture 8: Role of Auditor
Lecture 9: Practices & Procedures
Lecture 10: Practices & Procedures
Lecture 11: Information Security Governance
Lecture 12: Information Security Governance
Lecture 13: Information Security Governance
Lecture 14: Information Security Governance
Lecture 15: Results of Security Governance
Lecture 16: Goals of Security Governance
Lecture 17: Topic B: Policies, Procedures, and Risk
Lecture 18: IT Governance
Lecture 19: Policies
Lecture 20: Policies
Lecture 21: Information Security Policy Document
Lecture 22: Information Security Policy Document
Lecture 23: Management Reviews
Lecture 24: Management Reviews
Lecture 25: Procedures
Lecture 26: Procedures
Lecture 27: Risk Management – Approaches
Lecture 28: Risk Management
Lecture 29: IT Risk Management – Levels
Lecture 30: Topic C: IT Governance & Personnel Management
Lecture 31: IS Management Practices
Lecture 32: Personnel Management
Lecture 33: Sourcing IS Functions
Lecture 34: Insourcing and Outsourcing Strategy
Lecture 35: Insourcing and Outsourcing Strategy
Lecture 36: Change Management
Lecture 37: Change Management
Lecture 38: Organizational Quality Management
Lecture 39: Quality Management
Lecture 40: Organizational Quality Management
Lecture 41: Performance Management
Lecture 42: Organizational Quality Management
Lecture 43: Chapter 2 Review
Chapter 3: Chapter 3 – IS Operations, Maintenance, and Support
Lecture 1: IS Operations, Maintenance, and Support
Lecture 2: Topic A: Project Management
Lecture 3: Project Management Structure
Lecture 4: Project Management Structure
Lecture 5: Example Organizational Chart
Lecture 6: Practical Project Management
Lecture 7: Practical Project Management – 5 Steps
Lecture 8: Topic B: Software Development and Acquisition
Lecture 9: Business Application Development
Lecture 10: Business Application Development
Lecture 11: Traditional SDLC Approach
Lecture 12: Software Development Risks
Lecture 13: Alternative Development Methods
Lecture 14: Alternative Development Methods
Lecture 15: Agile Development
Lecture 16: Prototyping
Lecture 17: Prototyping
Lecture 18: R.A.D. – Rapid Application Deployment
Instructors
-
Stone River eLearning
Over 1,000,000 Happy Students
Rating Distribution
- 1 stars: 1 votes
- 2 stars: 0 votes
- 3 stars: 5 votes
- 4 stars: 6 votes
- 5 stars: 4 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024