Kurser

Online kursus 
Online læring, der kan tages, når det passer dig

Certified Information System Auditor (CISA)

Tilmelding Garantifor afholdelse

Få adgang til online kurset.
Tilgængeligt i 365 dage.
DKK  7.999
ekskl. moms
Nr. 72843 P

Dette kursus er rettet mod den internationale certificering Certified Information System Auditor (CISA) 2022. Det er vigtigt at sikre IS Governance og sikkerheden i sine informationssystemer. Kurset gennemgår best practice inden for auditering og kontrol af informationssystemer. Kurserne er på engelsk og foregår online, når det passer dig. Du har adgang til online kursuspakken i 365 dage.

Online kursus

Forbered dig til CISA eksamen

The Certified Information Systems Auditor (CISA) er en verdenskendt standard inden for vurdering, revidering, kontrol og overvågning af virksomheders informationssystemer. Dette kursus undersøger startpunkterne for udførsel og IS audit samt nogle af de standarder, guidelines, værktøjer og teknikker, der kan bruges til at opsætte, styre og monitorere audit-funktionen. Kurset forbereder deltagerne til CISA eksaminationen og følger 2022 ISACA Candidate Information Guide. Eksamen er ikke inkluderet i prisen.

Deltagerprofil

Kurset er til dig, der arbejder med informationssystemer og har interesse for audit af informationssystemer, kontrol og sikkerhed. Det kræver minimum fem års arbejdserfaring med audit af informationssystemer, kontrol eller sikkerhed at få certificeringen.

Udbytte

  • Lær om best practices i forbindelse med audit, control og sikkerhed af informationssystemer
  • Forstå standarder, guidelines, værktøjer og teknikker, der kan bruges til at opsætte, styre og monitorere audit-funktionen
  • Kurset bidrager til at gøre deltagerne klar til CISA-certificeringen

Det får du på onlinekurset

Vi sørger for, at rammerne er i orden, så du kan fokusere på at lære.

Undervisning på engelsk

Undervisning på engelsk

Indhold

CISA 2022: IT Resources & Monitoring
  • Discover the key concepts covered in this course
  • Outline common technology components that constitute an information system (IS)
  • Provide an overview of IT resource management and the role it plays in IS auditing
  • Describe key concepts of service level management, types of service level management, and the service level management process
  • Describe how performance is related to SLAs and the difference between SLAs and operational-level agreements
  • Establish a baseline of normal performance in Windows
  • Monitor performance metrics in a Windows environment
  • Monitor performance metrics in a Linux environment
  • Monitor performance metrics in a cloud computing environment
  • Configure cloud-based alerts
  • Describe quality management in information technology and how organizations can leverage it
  • Provide an overview of various IT quality management frameworks and their basic properties
  • Outline best practices for quality management in an organizational setting
  • Summarize the key concepts covered in this course
  • Course duration: 1 Hour, 15 Minutes
CISA 2022: Information Systems Auditing
  • Discover the key concepts covered in this course
  • Provide an overview of information systems auditing to determine whether IT solutions meet business objectives efficiently and effectively
  • Outline the code of conduct expected by the Information Systems Audit and Control Association (ISACA) of every CISA-certified individual
  • Outline various IS auditing procedures and their purpose, and how they factor into the information systems auditing process
  • Describe ISACA auditing standards and the role they play in the information systems auditing process
  • Describe various business processes and control types, how they're leveraged by organizations, and the role they play in the information systems auditing process
  • Outline the purpose of risk-based auditing and its role in the information systems auditing process
  • Provide an overview of the various types of audits used in information systems auditing
  • Describe the role played by project management in the auditing process and how employing project management best practices can provide more effective and efficient audits
  • Plan for audit funding, personnel, and related items
  • Schedule audit phases
  • Report serious discoveries, including fraud or serious IT vulnerabilities
  • Generate audit reports, including which existing controls have passed or failed
  • Summarize the key concepts covered in this course
  • Course duration: 1 Hour, 34 Minutes
CISA 2022: Virtualization & Cloud Computing
  • Discover the key concepts covered in this course
  • Describe when various virtualization technologies should be used
  • Distinguish between Type 1 and Type 2 hypervisors
  • Install the Microsoft Hyper-V hypervisor
  • Configure a Microsoft Hyper-V virtual network switch
  • Create a virtual machine hosted on Microsoft Hyper-V
  • Secure virtualized environments through dedicated management interfaces, patching, and changing default configurations
  • Define the National Institute of Standards and Technology (NIST) standard characteristics of cloud computing
  • Map cloud service offerings to business needs
  • Describe cloud-based security solutions such as the Azure Security Center, distributed denial-of-service (DDoS) mitigation, and Azure network security groups
  • Deploy a Windows virtual machine in the Microsoft Azure cloud
  • Deploy a Linux virtual machine in the Microsoft Azure cloud
  • Identify cloud services that require endpoint security through the Azure Security Center
  • Summarize the key concepts covered in this course
  • Course duration: 1 Hour, 21 Minutes
CISA 2022: Information Systems Management
  • Discover the key concepts covered in this course
  • Provide an overview of system interfaces and how they are used in computing systems
  • Outline the role of end-user computing
  • Describe enterprise change management procedures
  • Outline enterprise configuration management procedures and define terms such as configuration management system (CMS), configuration management database (CMDB), and configuration item (CI)
  • Outline enterprise vulnerability management procedures
  • Configure which administrators can manage Group Policy Objects (GPOs)
  • Configure application deployment centrally using Microsoft Configuration Manager
  • Configure Windows patch deployment centrally using Microsoft Configuration Manager
  • Configure Ubuntu Linux to check for updates
  • Summarize the key concepts covered in this course
  • Course duration: 56 Minutes
CISA 2022: Projects, Development, & Testing
  • Discover the key concepts covered in this course
  • Provide an overview of project governance and its role in organizational settings
  • Identify best practices that can be employed to improve project governance
  • Recognize the relevance of business cases and feasibility studies
  • Outline system development methodologies, their key features, and their advantages
  • Identify the purpose and role of control identification and design
  • Outline how structured approaches such as Agile and Six Sigma can improve IT system quality
  • Provide an overview of how unit testing isolates larger solutions into smaller components for focused testing
  • Outline how regression testing strives to ensure current changes do not have unintended adverse affects
  • Outline how to test IT solutions to ensure they align with design requirements
  • Outline how integration testing combines modular IT system components that result in a larger solution while ensuring system security and integrity
  • Outline how to monitor IT solution performance under stress
  • Recognize how fuzzing provides large amounts of unexpected data to observe behavior
  • Summarize the key concepts covered in this course
  • Course duration: 1 Hour, 26 Minutes
CISA 2022: Securing Networks & IT Assets
  • Discover the key concepts covered in this course
  • Describe common network attacks such as man-in-the-middle, Address Resolution Protocol (ARP) and domain name system (DNS) poisoning, and distributed denial-of-service (DDoS) attacks
  • Describe how 802.1X, virtual local area networks (VLANs), media access control (MAC) filtering, and other network configuration options can enhance network Security
  • Identify the different types of firewalls, including web application firewalls (WAFs), their placement, and when they should be used
  • Provide an overview of security monitoring and testing tools and techniques
  • Utilize the free Wireshark tool to capture and analyze plaintext network traffic
  • Configure Windows Advanced Firewall
  • Configure URL content and keyword filtering on a wireless router
  • Outline potential business process risks related to heating, ventilation, and air conditioning (HVAC)
  • Describe methods of securing assets using physical controls
  • Describe how drones can present eavesdropping and other risks
  • Identify different types of fire suppression systems
  • Summarize the key concepts covered in this course
  • Course duration: 1 Hour, 45 Minutes
CISA 2022: Protecting Information Assets
  • Discover the key concepts covered in this course
  • Outline how cryptography can be used to protect data
  • Distinguish between asymmetric and symmetric encryption
  • Protect data at rest using Windows Encrypting File System
  • Protect data at rest using Windows BitLocker
  • Use SHA-256 hashing to verify file integrity
  • Identify elements in the public key infrastructure (PKI) hierarchy
  • List the steps in the PKI certificate life cycle
  • Deploy a private Microsoft Certificate Authority (CA)
  • Configure customized PKI certificate templates
  • Request a PKI certificate manually
  • Outline how Transport Layer Security (TLS) and Internet Protocol Security (IPsec) can secure network communications
  • Disable Secure Socket Layer version 3 (SSLv3) on clients and servers
  • Configure an Internet Information Services (IIS) web site with a PKI certificate
  • Require client PKI certificates for web site access
  • Summarize the key concepts covered in this course
  • Course duration: 1 Hour, 24 Minutes
CISA 2022: IT Management Frameworks, Regulations, & Standards
  • Discover the key concepts covered in this course
  • Describe how IT governance provides a structured approach to ensuring IT solutions are aligned with business goals, including outsourced tasksOutline the role of data governance in an organization
  • Describe the respective purpose of IT standards, policies, and procedures and how they are used by organizations to ensure technology is used in the way it's expected
  • Provide an overview of enterprise architecture governance and its purpose
  • Describe how Control Objectives for Information and Related Technologies (COBIT) can ensure business objectives are met by aligning appropriate IT processes
  • Provide an overview of how Information Technology Infrastructure Library (ITIL) practices can streamline IT service delivery
  • Recognize how International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) standards can result in proper IT governance
  • Describe how risk management can improve business operations
  • Map various risk treatments to threats
  • Describe how IT maturity models can assess whether technology is effectively meeting business needs
  • Describe how the BMIS encompasses information security planning, implementation, and management
  • Provide an overview of the ITAF
  • Describe the purpose of IT BSCs
  • Provide an overview of laws, regulations, and standards that can affect an organization
  • Summarize the key concepts covered in this course
  • Course duration: 1 Hour, 29 Minutes
CISA 2022: Auditing, Data Analysis, & Controls
  • Discover the key concepts covered in this course
  • Communicate with stakeholders after audit recommendations are reported
  • Provide an overview of sampling methods and their purpose
  • Describe the purpose of and approach to audit evidence gathering
  • Provide an overview of data analytics and systems auditing
  • Describe the role of the data analyst, including responsibilities and reporting duties
  • Outline the purpose of and approach to auditing quality assurance
  • Interpret various types of documentation when preparing an information systems audit
  • Identify client needs that map to business objectives
  • Describe the importance of diagramming networks
  • Provide an overview of different security control categories, including internal business process controls, IT controls, and sampling types
  • Identify control objectives required to secure organizational assets along with the controls themselves
  • Summarize the key concepts covered in this course
  • Course duration: 1 Hour, 13 Minutes
CISA 2022: Information Systems Development & Implementation
  • Discover the key concepts covered in this course
  • Identify the phases of the SDLC
  • Recognize common project management practices
  • Identify how automated build and deployment processes provide IT solution development efficiencies
  • Describe the key features and concepts surrounding process improvement
  • Deploy an Azure cloud-based infrastructure using a template
  • Plan IT system and data migration to a cloud environment
  • Run an Azure on-premises cloud migration assessment
  • Describe the purpose of post-implementation reviews
  • Provide an overview of the post-implementation review process
  • Outline activities that can be conducted during the post-implementation review process
  • Provide an overview of best practices for conducting post-implementation reviews
  • Summarize the key concepts covered in this course
  • Course duration: 1 Hour, 9 Minutes
 

Tidsforbrug

Kursuspakken består af 10 moduler og hele kursuspakken kan gennemføres på ca. 15 timer. Kurset kan bruges som et opslagsværk.

Form

Denne online kursuspakke består af flere forskellige kurser, som du ved tilmelding har adgang til i 365 dage. Hvert enkelt kursus er opdelt i flere kursusmoduler, som du via en oversigtsmenu kan tage i den rækkefølge, du ønsker. Modulerne indeholder lyd, billeder og tekst, der gennemgår kursusindholdet. Nogle moduler indeholder små videofilm med scenarier og cases. Ved hvert kursus har du mulighed for at teste din forståelse af indholdet med tests, som du kan tage både før, under og efter kurset. Du gennemfører kursusmodulerne via din computer eller tablet med lyd og adgang til Internettet. Du kan selv styre, hvornår du vil tage modulerne – og de kan sættes på pause undervejs. Der bliver indsat bogmærker, der hvor du er nået til, så du altid har mulighed for at fortsætte, hvor du sidst kom til.

Læs mere om vores online kurser og se svar på dine spørgsmål (FAQ).

Certificering

Kurset leder hen mod certificeringen Certified Information Systems Auditor (CISA) 2022. Eksamen bestilles og betales særskilt. Kontakt www.isaca.org for flere informationer om aktuelle betingelser for at opnå certificering. I forbindelse med nogle certificeringer skal du selv oprette dig på udbyderens hjemmeside for at få adgang til eksamen. Vær venligst opmærksom på, at der er overensstemmelse mellem den certificeringsversion, du har forberedt dig på og den version, du bestiller eksamen i.

Søgte du et andet online kursus?

Vi tilbyder en bred vifte af forskellige kurser inden for mange områder. Kontakt os på tlf. 72203000 eller kurser@teknologisk.dk, så vi kan hjælpe med at imødekomme dit behov.

Se desuden listen over vores udvalgte online kurser.

Køb online kurser til flere

Er I en afdeling, en hel virksomhed eller blot flere personer, der ønsker adgang til online kurser, så kontakt os og få et tilbud på tlf. 72203000 eller kurser@teknologisk.dk.