Certified Information Systems Auditor CISA, Part 4 of 5: Operations and Support
Interactive

Certified Information Systems Auditor CISA, Part 4 of 5: Operations and Support

LearnNow Online
Updated Aug 21, 2018

Course description

The goal of this course is to talk about operations maintenance and support practices and the expected level of service delivered. The purpose is for the CISA to be able to understand and provide assurance and to meet the strategic objectives of the organization. This course is part of a series covering the ISACA Certified Information Systems Auditor (CISA).

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

This is part 4 of the series.


Meet the expert

Kenneth Mayer

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Video Runtime

168 Minutes

Time to complete

208 Minutes

Course Outline

Operation, Hardware, and Software

Information Systems Operations (19:07)

  • Introduction (00:33)
  • Management of IS Operations (00:46)
  • Control Functions (02:56)
  • IT Services (00:23)
  • Service Level (01:17)
  • Infrastructure Operations (00:38)
  • Scheduling (01:27)
  • Monitor Resource Usage (00:55)
  • Problem Management (00:58)
  • Abnormal Conditions (01:05)
  • Access to Logs (01:15)
  • Support/Helpdesk (00:53)
  • Change Management Process (01:23)
  • Release Management (02:07)
  • Information Security Management (00:39)
  • Media Sanitization (01:36)
  • Summary (00:08)

Information Systems Hardware (13:10)

  • Introduction (00:35)
  • Computer Hardware Components and Architecture (01:10)
  • Common Enterprise Backend Devices (01:37)
  • Specialized Devices (01:09)
  • Risks (00:43)
  • Security Control (01:01)
  • RFID (01:17)
  • RFID Risks (00:48)
  • RFID Security Control (00:38)
  • Hardware Maintenance Program (01:09)
  • Hardware Monitoring Procedures (00:54)
  • Capacity Management (00:57)
  • Capacity Management Continued (00:59)
  • Summary (00:08)

IS Architecture and Software (39:13)

  • Introduction (01:48)
  • IS Architecture and Software (01:14)
  • Operating Systems (00:54)
  • Software Integrity Issues (02:18)
  • Activity Logging and Reporting Options (01:15)
  • Data Communication Software (00:53)
  • Database Management (02:41)
  • Database Management Continued (00:40)
  • Example of Data in DBMS (06:02)
  • DBMS Architecture (00:56)
  • Data Definition Language (00:51)
  • Database Structures (01:10)
  • Relational Database (00:46)
  • Database Models (03:35)
  • Relational Database Model (05:09)
  • Data Integrity Controls (02:20)
  • Tape and Disk Management Systems (00:21)
  • Utility Programs (00:54)
  • Software Licensing Issues (01:50)
  • Software Licensing Issues Continued (02:13)
  • Digital Rights Management (01:06)
  • Summary (00:08)
Network Infrastructure

Network Infrastructure (40:05)

  • Introduction (01:38)
  • Enterprise Network Architecture (00:37)
  • Types of Networks (05:46)
  • LAN Components (00:15)
  • Network Standards and Protocols (01:08)
  • OSI Architecture (01:16)
  • OSI Layers (10:46)
  • Application to Network Architecture (05:07)
  • LAN Media Access Technologies (05:38)
  • OSI Layer Diagram (07:42)
  • Summary (00:08)

LANs and WANs (37:48)

  • Introduction (01:38)
  • LAN Technology Selection Criteria (00:47)
  • Wide Area Networks (02:27)
  • WAN Message Transmission Techniques (03:10)
  • WAN Devices (02:04)
  • Point-to-Point Protocol (03:32)
  • Wireless WANs and LANs (03:34)
  • Wireless Security (02:35)
  • Risks of Wireless Communications (01:38)
  • World Wide Web Services (01:15)
  • General Internet Terminology (03:34)
  • Network Controls (02:41)
  • Network Management Issues and Tools (03:10)
  • Client/Server Technology (00:40)
  • Client/Server Technology Continued (04:04)
  • Risks of Middleware (00:43)
  • Summary (00:08)

Disaster Recovery Planning (19:00)

  • Introduction (00:26)
  • RPO and RTO (01:49)
  • Recovery Strategies (01:18)
  • Hot and Cold Sites (03:36)
  • Disaster Recovery Methods (01:52)
  • Redundancy (01:40)
  • Development of Disaster Recovery Plans (00:39)
  • Organization and Assignment of Responsibilities (01:43)
  • Backup and Restoration (00:20)
  • Offsite Storage (01:25)
  • Types of Backup Devices and Media (00:44)
  • Periodic Backup Procedures and Rotation Frequency (01:28)
  • Backup Scheme (01:44)
  • Summary (00:08)
;