Essential CISA

  • Section 1: The Process Of Auditing Information Systems Domain
  •     Chapter 1: Some Organizations, Laws, Standards And Frameworks
  •     Chapter 2: ISAAS
  •     Chapter 3: From Governance To Procedures
  •     Chapter 4: KGI, CSF, KPI And KRI
  •     Chapter 5: ALE, RTO, RPO, SDO, MTO, MTD and AIW
  •     Chapter 6: Risk Appetite, Tolerance And Capacity
  •     Chapter 7: From Threats To Controls
  •     Chapter 8: Risk Management
  •     Chapter 9: Sampling
  •     Chapter 10: IS Auditor Duties For The Process Of Auditing Information System Domain
  • Section 2: The Governance And Management Of IT Domain
  •     Chapter 11: Security Concepts
  •     Chapter 12: Roles, Responsibilities, and a RACI Matrix
  •     Chapter 13: Human Resources, Or HR
  •     Chapter 14: Outsourcing
  •     Chapter 15: Cloud Computing
  •     Chapter 16: Capital Expenditures And Operational Expenditures
  •     Chapter 17: BCP, DRP and BIA
  •     Chapter 18: Plan Testing
  •     Chapter 19: Enterprise Architecture
  •     Chapter 20: Governance
  •     Chapter 21: Information Security Policy
  •     Chapter 22: Information Technology Management Practices
  •     Chapter 23: IT Organizational Structure Roles And Responsibilities
  •     Chapter 24: IS Auditor Duties For The Governance And Management Of It Domain
  • Section 3: The Information Systems Acquisition, Development And Implementation Domain
  •     Chapter 25: Project Management
  •     Chapter 26: Benefits Realization
  •     Chapter 27: The Software Development Life Cycle, Or SDLC
  •     Chapter 28: Software Development
  •     Chapter 29: E-Commerce
  •     Chapter 30: EDI
  •     Chapter 31: Email
  •     Chapter 32: Electric Money
  •     Chapter 33: Integrated Manufacturing System, Or IMS
  •     Chapter 34: Industrial Control Systems, Or ICS
  •     Chapter 35: Artificial Intelligence And Expert Systems
  •     Chapter 36: Business Intelligence, Or BI
  •     Chapter 37: Decision Support System, Or DSS
  •     Chapter 38: Re-Engineering
  •     Chapter 39: Other Business Applications
  •     Chapter 40: Infrastructure
  •     Chapter 41: Managing Change, Configuration, Patches And Releases
  •     Chapter 42: Application Controls
  •     Chapter 43: IS Auditor Duties For Information Systems Acquisition, Development And Implementation
  • Section 4: The Information Systems Operations, Maintenance And Service Management Domain
  •     Chapter 44: Information Systems Operations
  •     Chapter 45: Hardware Architecture
  •     Chapter 46: Operating Systems
  •     Chapter 47: Database Management
  •     Chapter 48: Third-Party Software
  •     Chapter 49: Network Infrastructure
  •     Chapter 50: Internet Concepts
  •     Chapter 51: Telecommunications
  •     Chapter 52: IS Auditor Duties For The Information Systems Operations, Maintenance And Service Management Domain
  • Section 5: The Protection Of Information Assets Domain
  •     Chapter 53: Asset Classification
  •     Chapter 54: Security Awareness And Training
  •     Chapter 55: External Parties
  •     Chapter 56: Computer Crime
  •     Chapter 57: Logical Access
  •     Chapter 58: Remote Connectivity
  •     Chapter 59: Media Handling
  •     Chapter 60: Network Security
  •     Chapter 61: Firewalls
  •     Chapter 62: Intrusion Detection
  •     Chapter 63: Encryption
  •     Chapter 64: Penetration Testing
  •     Chapter 65: Environmental Issues
  •     Chapter 66: Data Leakage Prevention, Or DLP
  •     Chapter 67: Physical Access
  •     Chapter 68: IS Auditor Duties For The Protection Of Information Assets Domain
Created with