Learn your way! Get started

Certified Information Systems Auditor CISA, Part 4 of 5: Operations and Support

with expert Kenneth Mayer


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 3/1/2018
Level Intermediate
Runtime 2h 48m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

The goal of this course is to talk about operations maintenance and support practices and the expected level of service delivered. The purpose is for the CISA to be able to understand and provide assurance and to meet the strategic objectives of the organization. This course is part of a series covering the ISACA Certified Information Systems Auditor (CISA).

Prerequisites

This is part 4 of the series.

Learning Paths

This course will help you prepare for the following certification and exam:
Certified Information Systems Auditor

Meet the expert

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Course outline



Operation, Hardware, and Software

Information Systems Operations (19:07)
  • Introduction (00:33)
  • Management of IS Operations (00:46)
  • Control Functions (02:56)
  • IT Services (00:23)
  • Service Level (01:17)
  • Infrastructure Operations (00:38)
  • Scheduling (01:27)
  • Monitor Resource Usage (00:55)
  • Problem Management (00:58)
  • Abnormal Conditions (01:05)
  • Access to Logs (01:15)
  • Support/Helpdesk (00:53)
  • Change Management Process (01:23)
  • Release Management (02:07)
  • Information Security Management (00:39)
  • Media Sanitization (01:36)
  • Summary (00:08)
Information Systems Hardware (13:10)
  • Introduction (00:35)
  • Computer Hardware Components and Architecture (01:10)
  • Common Enterprise Backend Devices (01:37)
  • Specialized Devices (01:09)
  • Risks (00:43)
  • Security Control (01:01)
  • RFID (01:17)
  • RFID Risks (00:48)
  • RFID Security Control (00:38)
  • Hardware Maintenance Program (01:09)
  • Hardware Monitoring Procedures (00:54)
  • Capacity Management (00:57)
  • Capacity Management Continued (00:59)
  • Summary (00:08)
IS Architecture and Software (39:13)
  • Introduction (01:48)
  • IS Architecture and Software (01:14)
  • Operating Systems (00:54)
  • Software Integrity Issues (02:18)
  • Activity Logging and Reporting Options (01:15)
  • Data Communication Software (00:53)
  • Database Management (02:41)
  • Database Management Continued (00:40)
  • Example of Data in DBMS (06:02)
  • DBMS Architecture (00:56)
  • Data Definition Language (00:51)
  • Database Structures (01:10)
  • Relational Database (00:46)
  • Database Models (03:35)
  • Relational Database Model (05:09)
  • Data Integrity Controls (02:20)
  • Tape and Disk Management Systems (00:21)
  • Utility Programs (00:54)
  • Software Licensing Issues (01:50)
  • Software Licensing Issues Continued (02:13)
  • Digital Rights Management (01:06)
  • Summary (00:08)

Network Infrastructure

Network Infrastructure (40:05)
  • Introduction (01:38)
  • Enterprise Network Architecture (00:37)
  • Types of Networks (05:46)
  • LAN Components (00:15)
  • Network Standards and Protocols (01:08)
  • OSI Architecture (01:16)
  • OSI Layers (10:46)
  • Application to Network Architecture (05:07)
  • LAN Media Access Technologies (05:38)
  • OSI Layer Diagram (07:42)
  • Summary (00:08)
LANs and WANs (37:48)
  • Introduction (01:38)
  • LAN Technology Selection Criteria (00:47)
  • Wide Area Networks (02:27)
  • WAN Message Transmission Techniques (03:10)
  • WAN Devices (02:04)
  • Point-to-Point Protocol (03:32)
  • Wireless WANs and LANs (03:34)
  • Wireless Security (02:35)
  • Risks of Wireless Communications (01:38)
  • World Wide Web Services (01:15)
  • General Internet Terminology (03:34)
  • Network Controls (02:41)
  • Network Management Issues and Tools (03:10)
  • Client/Server Technology (00:40)
  • Client/Server Technology Continued (04:04)
  • Risks of Middleware (00:43)
  • Summary (00:08)
Disaster Recovery Planning (19:00)
  • Introduction (00:26)
  • RPO and RTO (01:49)
  • Recovery Strategies (01:18)
  • Hot and Cold Sites (03:36)
  • Disaster Recovery Methods (01:52)
  • Redundancy (01:40)
  • Development of Disaster Recovery Plans (00:39)
  • Organization and Assignment of Responsibilities (01:43)
  • Backup and Restoration (00:20)
  • Offsite Storage (01:25)
  • Types of Backup Devices and Media (00:44)
  • Periodic Backup Procedures and Rotation Frequency (01:28)
  • Backup Scheme (01:44)
  • Summary (00:08)