Certified Information Systems Auditor CISA, Part 1 of 5: Auditing Systems

with expert Kenneth Mayer

This course discusses the process of auditing information systems covering the practice of IS auditing, methodology and procedures to provide audits and assist the organization to protect their information systems. First, develop risk based IT audit strategy in compliance with IT audits. Second, plan specific audits. Third, conduct audits on standards and objectives to stakeholders. Fourth, conduct followups and status reports to ensure appropriate actions have been taken. The goal is to provide a framework and guidelines that you can follow to implement audit plans. This course is part of a series covering the ISACA Certified Information Systems Auditor (CISA).


Intermediate | 3h 46m | March 01, 2018

Security

Course Outline


Kenneth Mayer

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.




Explore Our Blogs, Courses and Webinars