Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Through in-depth modules, real-world scenarios, and practice questions, participants gain a solid understanding of auditing principles, risk assessment, and the controls necessary to safeguard valuable information assets. This course is ideal for professionals aspiring to enhance their careers in IT audit, security, or compliance and prepares them thoroughly for the CISA certification exam. It not only focuses on exam preparation but also develops practical skills that can be immediately applied in the workplace, making it highly valuable for IT auditors, security consultants, compliance officers, and risk managers.
Syllabus
- Course 1: CISA Certified Information Systems Auditor: Unit 1
- Course 2: CISA Certified Information Systems Auditor: Unit 2
- Course 3: CISA Certified Information Systems Auditor: Unit 3
- Course 4: CISA Certified Information Systems Auditor: Unit 4
- Course 5: CISA Certified Information Systems Auditor: Unit 5
Courses
-
In this course, you'll delve into the fundamental concepts of auditing, gaining a deep understanding of its critical role in enhancing organizational security. You'll learn the art of audit project management, including effective data sampling techniques and the application of industry-standard frameworks. By the end of this course, you'll not only appreciate the importance of audits but also be empowered to help organizations improve their information security practices.
-
This course delves into the critical aspects of IT management, including change management, vulnerability patch management, and vendor management. You will gain the expertise to identify and mitigate risks in these vital areas, and explore the intricate legal and ethical concerns surrounding data governance, and understand the diverse laws that govern data protection, storage, and usage. This course also covers the essential standards and practices for governance, ensuring you are well-versed in compliance and regulatory requirements. It offers important insights into the role of a CISA auditor and teaches how to plan for and manage enterprise risk effectively. By the end of this course, you will have a robust understanding of IT management principles and the skills to apply them in real-world scenarios.
-
This course delves into the essentials of information project management, offering insights into effective project frameworks and software development methodologies. You'll gain a robust understanding of technical controls, ensuring that your organization can swiftly and securely deploy new technologies while mitigating risks. Additionally, you'll explore application controls and data validation techniques, essential for maintaining data integrity. The course also covers system testing and post-implementation evaluation, vital for disaster recovery and business continuity. By the end of this course, you'll have the knowledge to ensure that your organization remains resilient and up-to-date in an ever-changing environment.
-
This course is designed to equip you with the essential skills to safeguard your organization's mission-critical operations. You will learn how to anticipate and mitigate system failures, build robust redundancy into your networks, and align IT solutions with business goals. This course offers a unique perspective, focusing on auditing from a strategic standpoint to ensure continuous business operations. Whether you're an aspiring auditor or a seasoned professional, this course will enhance your ability to maintain business continuity and support organizational success.
-
This course dives into cutting-edge technology concepts essential for safeguarding data in today's digital landscape. You will learn core security principles, including authentication and access controls, and gain a deep understanding of identity and access management. You will develop foundational knowledge needed to implement secure data enclaves, a critical skill for auditors and IT specialists. Additionally, you'll explore secure design principles, covering both network and IT infrastructures, as well as physical security measures. By the end of this course, you will have the know-how to design and manage robust security frameworks, ensuring data integrity and confidentiality.
Taught by
Pearson