Key Points
Offered by: ISACA
-
Focus Areas: Information system auditing, governance, risk management, information security, and compliance.
-
Eligibility: Requires at least five years of professional experience in information systems auditing, control, or security; waivers available for certain educational backgrounds.
- Benefits: Validates expertise, enhances career prospects, and increases earning potential in auditing and IT governance.
Example Curriculum
- 23 Law and Regulation (2:20)
- 24. Evidences (5:56)
- 25. Sampling (3:58)
- 26. Governance and Management of IT (14:35)
- 26.Governance and Management of IT (8:14)
- 27. NIST 800-100 (7:31)
- 28. Governance – Requirements (7:31)
- 29. Information System Strategy (4:53)
- 30.IT Organization (2:55)
- 31. Maintenace of Polcies and Procedures (5:04)
- 32. Policy and Procedures Resources (24:53)
- 33. Legal Compliance (8:38)
- 34. Quality Managment System (2:00)
- 35. Mutarity Models (3:23)
- 36. Process optmization (3:56)
- 37. IT Investment Practices (5:34)
- 38. IT Supplier Selection (5:15)
- 39. Make or Buy decision (18:12)
- 40. Risk Managment (10:54)
- 41. Business Impact Analysis (10:41)
- 42. Information Systems Acquisition, Development and Implementation (9:29)
- 43. Project Governance (2:32)
- 44. Types of Organization (6:38)
- 45. Project Managment (6:38)
- 46. Architecture (5:36)
- 47. Procurment Managment (1:09)
- 48. Plan Procurment Managment (18:13)
- 49. IS Operations (6:51)
- 50. Service Level Management (5:09)
- 51. Hardware, Software and Network (7:32)
- 52. Software Licensing (3:15)
- 53. Capacity Managment (2:50)
- 54. Incident Managment (5:35)
- 55. Incident Report Form (5:33)
- 56. Backup (5:59)
- 57. Disaster Recovery Plans (3:34)
- 58. Alternative Sites (8:09)
- 59. Protection of Information Assets (7:13)
- 60 Access Control (19:23)
- 61. Network Security (17:08)
- 62. Cryptography (16:30)
- 63. Physical Security (9:48)
- 64. Data classification- (12:40)
- 65. Policies and Practices. (24:50)
- IT Governance (3:06)
- Lecture 33 - Information Systems Acquisition (9:24)
- Lecture 34 - Project Governance (2:28)
- Lecture 35 - Architecture (5:32)
- Lecture 36 - Requirment Managment (4:22)
- NIST 800-100 (7:31)
Explore Our More Courses
Discover a range of courses designed to elevate your skills and advance your career!
Author
Author
We are one of the world’s leading certification training providers.
We provide online training in disciplines such as Cyber Security, Cloud Computing, Project Management, Digital Marketing, and Data Science among others, where technologies and best practices are changing rapidly and demand for qualified candidates significantly exceeds supply.
Based in UAE, Delhi NCR, India, we have helped over one million professionals and companies across 150+ countries get trained, acquire certifications, and upskill their employees.
Our training courses are designed and updated by 150+ renowned industry experts. Our blended learning approach combines online classes, instructor-led live virtual classrooms, project work, and 24/7 teaching assistance. Our vibrant community of experts and certified professionals is a powerful resource pool of tips, tricks, and insightful advice. More than 40 global training organizations have recognized us as an official provider of certification training.