Essential CISA
-
Section 1: The Process Of Auditing Information Systems Domain
-
Chapter 1: Some Organizations, Laws, Standards And Frameworks
-
Chapter 2: ISAAS
-
Chapter 3: From Governance To Procedures
-
Chapter 4: KGI, CSF, KPI And KRI
-
Chapter 5: ALE, RTO, RPO, SDO, MTO, MTD and AIW
-
Chapter 6: Risk Appetite, Tolerance And Capacity
-
Chapter 7: From Threats To Controls
-
Chapter 8: Risk Management
-
Chapter 9: Sampling
-
Chapter 10: IS Auditor Duties For The Process Of Auditing Information System Domain
-
Section 2: The Governance And Management Of IT Domain
-
Chapter 11: Security Concepts
-
Chapter 12: Roles, Responsibilities, and a RACI Matrix
-
Chapter 13: Human Resources, Or HR
-
Chapter 14: Outsourcing
-
Chapter 15: Cloud Computing
-
Chapter 16: Capital Expenditures And Operational Expenditures
-
Chapter 17: BCP, DRP and BIA
-
Chapter 18: Plan Testing
-
Chapter 19: Enterprise Architecture
-
Chapter 20: Governance
-
Chapter 21: Information Security Policy
-
Chapter 22: Information Technology Management Practices
-
Chapter 23: IT Organizational Structure Roles And Responsibilities
-
Chapter 24: IS Auditor Duties For The Governance And Management Of It Domain
-
Section 3: The Information Systems Acquisition, Development And Implementation Domain
-
Chapter 25: Project Management
-
Chapter 26: Benefits Realization
-
Chapter 27: The Software Development Life Cycle, Or SDLC
-
Chapter 28: Software Development
-
Chapter 29: E-Commerce
-
Chapter 30: EDI
-
Chapter 31: Email
-
Chapter 32: Electric Money
-
Chapter 33: Integrated Manufacturing System, Or IMS
-
Chapter 34: Industrial Control Systems, Or ICS
-
Chapter 35: Artificial Intelligence And Expert Systems
-
Chapter 36: Business Intelligence, Or BI
-
Chapter 37: Decision Support System, Or DSS
-
Chapter 38: Re-Engineering
-
Chapter 39: Other Business Applications
-
Chapter 40: Infrastructure
-
Chapter 41: Managing Change, Configuration, Patches And Releases
-
Chapter 42: Application Controls
-
Chapter 43: IS Auditor Duties For Information Systems Acquisition, Development And Implementation
-
Section 4: The Information Systems Operations, Maintenance And Service Management Domain
-
Chapter 44: Information Systems Operations
-
Chapter 45: Hardware Architecture
-
Chapter 46: Operating Systems
-
Chapter 47: Database Management
-
Chapter 48: Third-Party Software
-
Chapter 49: Network Infrastructure
-
Chapter 50: Internet Concepts
-
Chapter 51: Telecommunications
-
Chapter 52: IS Auditor Duties For The Information Systems Operations, Maintenance And Service Management Domain
-
Section 5: The Protection Of Information Assets Domain
-
Chapter 53: Asset Classification
-
Chapter 54: Security Awareness And Training
-
Chapter 55: External Parties
-
Chapter 56: Computer Crime
-
Chapter 57: Logical Access
-
Chapter 58: Remote Connectivity
-
Chapter 59: Media Handling
-
Chapter 60: Network Security
-
Chapter 61: Firewalls
-
Chapter 62: Intrusion Detection
-
Chapter 63: Encryption
-
Chapter 64: Penetration Testing
-
Chapter 65: Environmental Issues
-
Chapter 66: Data Leakage Prevention, Or DLP
-
Chapter 67: Physical Access
-
Chapter 68: IS Auditor Duties For The Protection Of Information Assets Domain
1652 Private Road 3532, Quinlan TX 75474
Phone number: 800-337-1500
Phone number: 800-337-1500
Copyright © 2025