-
CISA: IT Asset Management
After watching this video, you will be able to identify characteristics and best practices for IT asset management.
-
CISA: Computer Hardware Components and Architectures
After watching this video, you will be able to distinguish between computer hardware components and architectures.
-
CISA: Hardware Maintenance and Monitoring
After watching this video, you will be able to identify characteristics and best practices for hardware maintenance and hardware monitoring.
-
CISA: Capacity Management
After watching this video, you will be able to identify characteristics and best practices for capacity management activities.
-
CISA: Incident and Problem Management and Support
After watching this video, you will be able to identify problem management and support/help desk best practices.
-
CISA: Change Management
After watching this video, you will be able to identify characteristics and best practices of change management, release management and quality assurance in IS operations.
-
CISA: IS Operations
After watching this video, you will be able to identify best practices for IS operations.
-
CISA: Auditing IS Development and Implementation
After watching this video, you will be able to identify best practices when auditing IS acquisitions, development, and implementation activities within an organization.
-
CISA: Domain 4 Overview
After watching this video, you will be able to recognize the task and knowledge statements of domain 4.
-
CISA: Management of IS Operations
After watching this video, you will be able to identify characteristics and best practices of IS operations management.
-
CISA: IT Service Management
After watching this video, you will be able to identify characteristics of IT service management frameworks, and best practices.
-
CISA: Infrastructure Auditing Best Practices
After watching this video, you will be able to identify best practices for auditing and reviewing enterprise architecture, hardware, operating system, database, and network infrastructure.
-
CISA: Operations Auditing Best Practices
After watching this video, you will be able to identify best practices for auditing and reviewing IS operations, scheduling, and problem management reporting.
-
CISA: Recovery Objectives, Strategies, and Alternatives
After watching this video, you will be able to identify best practices for disaster recovery point and time objectives, recovery strategies, and recovery alternatives.
-
CISA: Disaster Recovery Plan Development
After watching this video, you will be able to identify best practices for developing a disaster recovery plan, and organizing and assigning responsibilities within an organization.
-
CISA: IS Software Utility and Licensing
After watching this video, you will be able to identify characteristics of utility programs, source code management, end-user computing, and utility programs in IS architecture and software.
-
CISA: Network Architectures, Services, and Standards
After watching this video, you will be able to identify characteristics of enterprise network architectures, types of networks, and network services, standards, and protocols.
-
CISA: OSI Architecture and Application
After watching this video, you will be able to identify characteristics of OSI architecture and best practices for applying the OSI model in network architectures.
-
CISA: Operating Systems
After watching this video, you will be able to identify operating systems features and options.
-
CISA: Access Control and Data Communications Software
After watching this video, you will be able to identify characteristics of access control software and data communications software.
-
CISA: Data Management
After watching this video, you will be able to identify characteristics and best practices for data management.
-
CISA: Database Management System
After watching this video, you will be able to identify characteristics and best practices of a DBMS.
-
CISA: Processing Procedures and Controls
After watching this video, you will be able to identify characteristics of processing procedures and controls.
-
CISA: Output Controls and Control Assurance
After watching this video, you will be able to identify characteristics of output controls, and business process control assurance best practices.
-
CISA: Auditing Application Controls
After watching this video, you will be able to identify best practices for auditing application controls.
-
CISA: Auditing Systems Dev, Acquisition, and Maintenance
After watching this video, you will be able to identify best practices for auditing systems development, acquisition, and maintenance.
-
CISA: Input/Origination Controls
After watching this video, you will be able to identify characteristics of input/origination controls.
-
CISA: Internet Threats and Security
After watching this video, you will be able to distinguish between common internet threats.
-
CISA: Encryption
After watching this video, you will be able to identify cryptography and cryptanalysis.
-
CISA: Malware
After watching this video, you will be able to identify characteristics of malware and best practices for mitigating risk from them.
-
CISA: Voice-over IP
After watching this video, you will be able to identify characteristics and security issues of VoIP.
-
CISA: Logical Access Best Practices
After watching this video, you will be able to identify best practices for information security management and logical access.
-
CISA: LAN Security
After watching this video, you will be able to identify characteristics of LAN security including virtualization.
-
CISA: Client-server Security
After watching this video, you will be able to identify characteristics of client-server security.
-
CISA: Wireless Security Threats and Mitigation
After watching this video, you will be able to identify best practices for wireless security.
-
CISA: Authorization Issues
After watching this video, you will be able to distinguish between different authorization issues and challenges.
-
CISA: Handling Confidential Information
After watching this video, you will be able to identify best practices for storing, retrieving, transporting, and disposing confidential information.
-
CISA: Identification and Authentication
After watching this video, you will be able to identify best practices for identification and authentication activities.
-
CISA: Environmental Issues and Exposures
After watching this video, you will be able to identify environmental issues and exposures.
-
CISA: Environmental Exposure Controls
After watching this video, you will be able to distinguish between different controls for environmental exposures.
-
CISA: Auditing Environmental Controls
After watching this video, you will be able to identify best practices for auditing environmental controls.
-
CISA: Security Testing Techniques
After watching this video, you will be able to distinguish between different security testing techniques when auditing information security management frameworks.
-
CISA: Investigation Techniques
After watching this video, you will be able to identify investigation techniques and best practices when auditing information security management frameworks.
-
CISA: Auditing Remote Access Part 1
After watching this video, you will be able to identify characteristics and best practices for auditing remote access, auditing internet points of presence, and performing network penetration tests.
-
CISA: Auditing Remote Access Part 2
After watching this video, you will be able to identify characteristics and best practices for performing full network assessment reviews, and auditing network change development and authorization, and unauthorized changes activities.
-
CISA: Private Branch Exchange
After watching this video, you will be able to recognize characteristics of PBX.
-
CISA: Auditing IS Management Frameworks Best Practices
After watching this video, you will be able to identify best practices for auditing information security management frameworks.
-
CISA: Auditing Logical Access
After watching this video, you will be able to identify best practices for auditing logical access.
-
CISA: Classifying Information Assets
After watching this video, you will be able to identify characteristics and best practices of classifying information assets.
-
CISA: Fraud Risk Factors
After watching this video, you will be able to identify fraud risk factors in information security management.
-
CISA: Information Security Control Design
After watching this video, you will be able to identify characteristics of controls, control standards and frameworks, and control monitoring and effectiveness practices.
-
CISA: System Access Permission
After watching this video, you will be able to identify characteristics and best practices of system access permission activities.
-
CISA: Auditing IS Ops and Service Management
After watching this video, you will be able to identify best practices when auditing IS operations, maintenance, and service management activities within an organization.
-
CISA: Domain 5 Overview
After watching this video, you will be able to recognize the task and knowledge statements of domain 5.
-
CISA: IS Management Key Elements
After watching this video, you will be able to identify characteristics and key elements of information security management and information security management systems.
-
CISA: IS Management Roles and Responsibilities
After watching this video, you will be able to distinguish between the different information security roles and responsibilities.
-
CISA: Backup and Restoration
After watching this video, you will be able to identify backup and restoration options and best practices.
-
CISA: Disaster Recovery Testing Methods
After watching this video, you will be able to distinguish between disaster recovery testing methods, and identify best practices for testing disaster recovery plans and activities in an organization.
-
CISA: Invoking Disaster Recovery Plans
After watching this video, you will be able to identify best practices for invoking disaster recovery plans within an organization.
-
CISA: Logical Access Exposures
After watching this video, you will be able to identify logical access exposures.
-
CISA: IT Environment Familiarization
After watching this video, you will be able to identify best practices for enterprise IT environment familiarization.
-
CISA: Paths of Logical Access
After watching this video, you will be able to identify characteristics of paths of logical access and general points of entry.
-
CISA: Logical Access Control Software
After watching this video, you will be able to identify logical access control software.
-
CISA: Information Security and External Parties
After watching this video, you will be able to identify best practices for information security activities involving external parties.
-
CISA: HR Security and Third Parties
After watching this video, you will be able to identify best practices for human resources activities with third parties.
-
CISA: Computer Crime Issues and Exposures
After watching this video, you will be able to identify characteristics of computer crime issues and exposures, and best practices for avoiding negative impacts.
-
CISA: Security Incident Handling and Response
After watching this video, you will be able to identify best practices for security incident handling and response activities.
-
CISA: IS Management Critical Success Factors
After watching this video, you will be able to identify the critical success factors of information security management and awareness, training and education best practices.
-
CISA: Mandatory and Discretionary Access Controls
After watching this video, you will be able to recognize characteristics of mandatory and discretionary access controls.
-
CISA: Privacy Principles and the IS Auditor Role
After watching this video, you will be able to identify privacy principles, and the IS auditor's role.
-
CISA: DLP Risk, Limitations, and Considerations
After watching this video, you will be able to identify challenges and considerations for data leak prevention techniques and practices.
-
CISA: End-user Computing Security Risk and Controls
After watching this video, you will be able to identify end-user security risks and controls.
-
CISA: Instant Messaging
After watching this video, you will be able to identify instant messaging information security best practices.
-
CISA: Social Media
After watching this video, you will be able to identify social media information security best practices.
-
CISA: Cloud Computing
After watching this video, you will be able to identify cloud computing information security best practices.
-
CISA: Data Leak Prevention
After watching this video, you will be able to identify characteristics and best practices for data leak prevention.
-
CISA: Physical Access Exposures and Controls
After watching this video, you will be able to identify physical access issues and exposures, and controls for mitigating threats.
-
CISA: Auditing Physical Access
After watching this video, you will be able to identify best practices for auditing physical access.
-
CISA: Mobile Computing
After watching this video, you will be able to identify mobile computing information security best practices.
-
CISA: Peer-to-peer Computing
After watching this video, you will be able to identify peer-to-peer computing information security best practices.
-
CISA: Auditing Information Security Practices
After watching this video, you will be able to identify best practices for auditing information security management frameworks and mobile, social, and cloud asset protection.
-
CISA: Testing, Auditing, and Configuration Management
After watching this video, you will be able to identify characteristics and best practices for testing and auditing change programs, emergency changes, and configuration management.
-
CISA: System Development Tools and Productivity Aids
After watching this video, you will be able to identify characteristics and best practices for code generators, computer-aided software engineering, and fourth-generation languages.
-
CISA: Process Improvement Practices
After watching this video, you will be able to distinguish between BPR methods and techniques, ISO 9126, CMMI, and ISO/IEC 330XX series process improvement practices.
-
CISA: Development Methods Part 2
After watching this video, you will be able to distinguish between component-based, web-based application, software reengineering, and reverse engineering development methods.
-
CISA: Infrastructure Development Practices
After watching this video, you will be able to identify characteristics of physical architecture analysis, infrastructure implementation planning, and critical success factors in infrastructure development activities.
-
CISA: Acquisition Practices
After watching this video, you will be able to identify best practices for hardware acquisition, system software acquisition, and system software implementation activities.
-
CISA: Change Management Process and Documentation
After watching this video, you will be able to identify characteristics and best practices for the change management process and change management documentation.
-
CISA: Business Application Systems Part 1
After watching this video, you will be able to distinguish between e-commerce, electronic data interchange, email, point-of-sale, electronic banking, electronic finance, payment, and integrated manufacturing business application system characteristics.
-
CISA: Business Application Systems Part 2
After watching this video, you will be able to distinguish between electronic funds transfer, ATM, interactive voice response, purchase accounting, image processing, industrial control, AI and expert, business intelligence, decision support, customer relationship management, and supply chain management business application systems characteristics.
-
CISA: Development Methods Part 1
After watching this video, you will be able to distinguish between structured analysis, design and development techniques, Agile, Prototyping-evolutionary, rapid application, and object-oriented system development methods.
-
CISA: IS Audit and Assurance General Guidelines
After watching this video, you will be able to identify the IS audit and assurance general guidelines.
-
CISA: IS Audit and Assurance Performance Guidelines
After watching this video, you will be able to identify the IS audit and assurance performance guidelines.
-
CISA: IS Audit and Assurance Reporting Guidelines
After watching this video, you will be able to identify the IS audit and assurance reporting guidelines.
-
CISA: IS Audit and Assurance Tools and Techniques
After watching this video, you will be able to distinguish between the different categories of IS audit and assurance tools and techniques.
-
CISA: IS Audit and Assurance Performance Standards
After watching this video, you will be able to identify the IS audit and assurance performance standards.
-
CISA: IS Audit and Assurance Reporting Standards
After watching this video, you will be able to identify the IS audit and assurance reporting standards.
-
CISA: The Role of the Auditor in CSA
After watching this video, you will be able to describe the auditor's role in a CSA program.
-
CISA: The CSA Approach and Drivers
After watching this video, you will be able to identify characteristics of the CSA approach and its technology drivers.
-
CISA: Integrated Auditing
After watching this video, you will be able to identify best practices for integrating auditing activities in an organization.
-
CISA: Continuous Auditing
After watching this video, you will be able to identify best practices for continuous auditing activities in an organization.
-
CISA: Audit Documentation
After watching this video, you will be able to identify characteristics and best practices of audit documentation.
-
CISA: Closing Findings
After watching this video, you will be able to identify best practices for IS audit follow-up activities.
-
CISA: Objectives of CSA
After watching this video, you will be able to recognize the characteristics and objectives of CSA.
-
CISA: Benefits and Disadvantages of CSA
After watching this video, you will be able to identify the benefits and disadvantages of CSA.
-
CISA: Exit Interviews and Audit Reports
After watching this video, you will be able to describe characteristics and best practices for using exit interviews and audit reports to present IS audit findings.
-
CISA: Computer-assisted Audit Techniques
After watching this video, you will be able to distinguish between different computer-assisted audit techniques and tools.
-
CISA: Evaluating the Control Environment
After watching this video, you will be able to identify best practices for evaluating the control environment.
-
CISA: Enterprise Architecture
After watching this video, you will be able to describe the purpose and best practices of EA.
-
CISA: IS Strategic Planning
After watching this video, you will be able to recognize the role of IS strategic planning in IS audit activities.
-
CISA: IT Steering Committee
After watching this video, you will be able to identify role and responsibilities of an IT steering committee.
-
CISA: Maturity and Process Improvement Models
After watching this video, you will be able to distinguish between different maturity process improvement models.
-
CISA: Governance of Enterprise IT Best Practices
After watching this video, you will be able to identify GEIT characteristics and best practices.
-
CISA: IT Governing Committees
After watching this video, you will be able to recognize the purpose and responsibilities of IT governing committees.
-
CISA: IT Balanced Scorecard
After watching this video, you will be able to describe the purpose and characteristics of an IT balanced scorecard.
-
CISA: Information Security Governance
After watching this video, you will be able to identify IS governance best practices.
-
CISA: Domain 2 Overview
After watching this video, you will be able to recognize the task and knowledge statements of domain 2.
-
CISA: Corporate Governance
After watching this video, you will be able to identify characteristics of corporate governance.
-
CISA: Conducting an IS Audit
After watching this video, you will be able to identify best practices for managing risk, communicating results, and CSA during IS audit activities.
-
CISA: IS Specific Controls
After watching this video, you will be able to identify IS control procedures.
-
CISA: Planning and Managing IS Audits
After watching this video, you will be able to identify best practices when planning and managing IS audits.
-
CISA: Audit Objectives
After watching this video, you will be able to describe the objectives of an IS audit.
-
CISA: Audit Types
After watching this video, you will be able to distinguish between different types of audits.
-
CISA: IS Control Objectives
After watching this video, you will be able to identify IS different types of IS control objectives.
-
CISA: COBIT 5
After watching this video, you will be able to describe how the COBIT 5 framework is used as part of IS control.
-
CISA: General Controls
After watching this video, you will be able to identify general controls used for information systems.
-
CISA: Guidelines, Standards, and Tools Interrelationships
After watching this video, you will be able to identify best practices when applying ISACA guidelines, standards, and tools and techniques in relation to each other and external guidelines such as regulatory requirements.
-
CISA: ITAF
After watching this video, you will be able to recognize characteristics of the ITAF reference model.
-
CISA: Risk Analysis
After watching this video, you will be able to identify the steps of the risk management process.
-
CISA: Internal Controls
After watching this video, you will be able to distinguish between preventive, detective, and corrective controls.
-
CISA: Evidence
After watching this video, you will be able to identify best practices for evaluating and using evidence when conducting IS audits.
-
CISA: Interviewing and Observance
After watching this video, you will be able to identify best practices when interviewing and observing personnel in performance of their duties.
-
CISA: Sampling
After watching this video, you will be able to identify best practices for sampling as part of an IS audit.
-
CISA: Outsourcing IS Assurance and Security Services
After watching this video, you will be able to identify best practices when outsourcing IS assurance and security services for IS audit activities.
-
CISA: Risk Assessment and Treatment
After watching this video, you will be able to identify risk assessment and risk treatment best practices.
-
CISA: Audit Programs
After watching this video, you will be able to describe characteristics of audit programs.
-
CISA: Fraud Detection
After watching this video, you will be able to identify best practices for fraud detection when performing IS audits.
-
CISA: Compliance vs. Substantive Testing
After watching this video, you will be able to distinguish between compliance and substantive testing when conducting IS audits.
-
CISA: Audit Methodology
After watching this video, you will be able to identify characteristics of an audit methodology.
-
CISA: Risk-based Auditing
After watching this video, you will be able to identify best practices in a risk-based audit approach.
-
CISA: Audit Risk and Materiality
After watching this video, you will be able to recognize risk influences and best practices when auditing risk for materiality.
-
CISA: Evaluating Results and Interviewing Personnel
After watching this video, you will be able to identify best practices when evaluating prior test results and interviewing key personnel.
-
CISA: Development of Business Continuity Plans
After watching this video, you will be able to identify the factors and issues for consideration when developing business continuity plans.
-
CISA: Components of a Business Continuity Plan
After watching this video, you will be able to identify the components and best practices of a business continuity plan.
-
CISA: Plan Testing and Summary
After watching this video, you will be able to identify best practices for testing business continuity plans.
-
CISA: Reviewing the Business Continuity Plan
After watching this video, you will be able to identify the audit procedures to follow when reviewing business continuity plans.
-
CISA: Disasters and Other Disruptive Events
After watching this video, you will be able to identify best practices for auditing disaster and other disruptive events procedures.
-
CISA: Business Continuity Planning Process and Policy
After watching this video, you will be able to identify characteristics and best practices in business continuity planning process and policy activities.
-
CISA: Business Continuity Planning Incident Management
After watching this video, you will be able to distinguish between the different classifications of incident and best practices for incident management.
-
CISA: Business Impact Analysis
After watching this video, you will be able to identify characteristics and best practices of business impact analysis.
-
CISA: IT Business Continuity Planning
After watching this video, you will be able to identify characteristics and best practices of IT business continuity planning.
-
CISA: Project Management Practices Part 1
After watching this video, you will be able to identify characteristics of project initiation and planning.
-
CISA: Project Management Practices Part 2
After watching this video, you will be able to identify characteristics of project execution, controlling, and closure.
-
CISA: Business Application Development Part 1
After watching this video, you will be able to identify characteristics of the SDLC approach and phases, integrated resource management systems, and risk associated with software development.
-
CISA: Virtualization and Cloud Computing Environments
After watching this video, you will be able to identify characteristics, key risk areas, and typical controls of virtual and cloud environments.
-
CISA: Audit Structure, Implementation, and BCP
After watching this video, you will be able to identify best practices when auditing the IT organizational structure, implementation practices, and business continuity plans of an organization.
-
CISA: Domain 3 Overview
After watching this video, you will be able to recognize the task and knowledge statements of domain 3.
-
CISA: Benefits Realization
After watching this video, you will be able to identify the objectives, characteristics, and techniques of benefits realization through portfolio/program management and business case development and approval.
-
CISA: Project Management Structure
After watching this video, you will be able to identify characteristics of the project management structure.
-
CISA: Evaluating Offsite Storage and Security
After watching this video, you will be able to identify best practices when evaluating offsite storage and offsite facility security.
-
CISA: Reviewing Contracts and Insurance Coverage
After watching this video, you will be able to identify best practices for reviewing alternative processing contracts and insurance coverage.
-
CISA: Human Resources Management
After watching this video, you will be able to distinguish between different sourcing options for delivering and performing IT functions.
-
CISA: Sourcing Practices
After watching this video, you will be able to distinguish between different sourcing options for delivering and performing IT functions.
-
CISA: Organizational Change Management
After watching this video, you will be able to identify characteristics of organizational change management practices.
-
CISA: Procedures
After watching this video, you will be able to identify characteristics and role of procedures in the IS audit framework.
-
CISA: Developing a Risk Management Program
After watching this video, you will be able to identify characteristics of risk management and the steps for developing a risk management program.
-
CISA: The Risk Management Process
After watching this video, you will be able to distinguish between the steps of the risk management process; distinguish between qualitative, semiquantitative and quantitative analysis methods.
-
CISA: Value of IT
After watching this video, you will be able to recognize the financial and nonfinancial value of IT.
-
CISA: IT Portfolio Management
After watching this video, you will be able to identify characteristics of IT portfolio management.
-
CISA: Policies
After watching this video, you will be able to identify characteristics and role of policies in the IS audit framework.
-
CISA: Reviewing Documentation
After watching this video, you will be able to identify the documents that are reviewed as part of auditing IT governance structure and implementation.
-
CISA: Reviewing Contractual Commitments
After watching this video, you will be able to identify best practices when reviewing contractual commitments as part of auditing IT governance structure and implementation.
-
CISA: IT Roles and Responsibilities
After watching this video, you will be able to distinguish between the different IT roles and responsibilities.
-
CISA: Segregation of Duties within IT
After watching this video, you will be able to identify characteristics and best practices of segregation of duties within IT.
-
CISA: Segregation of Duties Controls
After watching this video, you will be able to identify characteristics and best practices of segregation of duties controls.
-
CISA: Financial Management Practices
After watching this video, you will be able to identify characteristics of financial management practices.
-
CISA: Information Security Management
After watching this video, you will be able to identify characteristics of information security management practices.
-
CISA: Performance Optimization
After watching this video, you will be able to identify characteristics and best practices of performance optimization.
-
CISA: Recognizing Risk Management Best Practices
After watching this video, you will be able to identify best practices for IT governance, IT risk management, and general IT management in an organization.
-
CISA: Types of Cryptosystems (part 1)
After watching this video, you will be able to identify common cryptosystems.
-
CISA: Types of Cryptosystems (part 2)
After watching this video, you will be able to identify common cryptosystems.
-
CISA: ISACA Code of Professional Ethics
After watching this video, you will be able to recognize the ISACA code of professional ethics.
-
CISA: IS Audit and Assurance General Standards
After watching this video, you will be able to identify the IS audit and assurance general standards.
-
CISA: Organization of the IS Audit Function
After watching this video, you will be able to describe characteristics of the IS audit function.
-
CISA: IS Audit Resource Management
After watching this video, you will be able to identify best practices in IS audit resource management.
-
CISA: IS Audit Planning
After watching this video, you will be able to identify best practices for planning audits.
-
CISA: Legal and Regulatory Impacts on IS Audit Planning
After watching this video, you will be able to identify the effects of laws and regulations on IS audit planning.
-
CISA: Domain 1 Overview
After watching this video, you will be able to recognize the task and knowledge statements of domain 1.
-
CISA: Intrusion Detection and Intrusion Prevention
After watching this video, you will be able to Compare IDS and IPS.
-
CISA: Firewall Technologies
After watching this video, you will be able to distinguish between different firewall technologies.
-
CISA: Business Application Development Part 2
After watching this video, you will be able to identify characteristics of the SDLC approach and phases, integrated resource management systems, and risk associated with software development.