Special welcome gift. Get 30% off your first purchase with code “TOTALLYLEARN”. Find out more!

  • Categories
    • Agile Management
    • Business Analysis
    • Cloud Computing
    • Cyber Security
    • DevOps
    • IT Service Management
    • Project Management
    • Quality Management
    • IT Networking
    • Home
    • Courses
      • Agile Management
      • Business Analysis
      • Cloud Computing
      • Cyber Security
      • DevOps
      • IT Service Management
      • Project Management
      • Quality Management
      • IT Networking
    • About Us
    • Contact
    • Blog
    • Verification
    Pay
    Pay

    Curriculum

    • 6 Sections
    • 130 Lessons
    • 24 Hours
    Expand all sectionsCollapse all sections
    • Information System Auditing Process
      29
      • 1.1
        Audit Planning
      • 1.2
        Key Aspects – Audit Planning
      • 1.3
        QAE – Audit Planning
      • 1.4
        Audit Charter
      • 1.5
        Electronic Data Interchange (EDI)
      • 1.6
        Internal Controls
      • 1.7
        Internal Controls – Key Aspects
      • 1.8
        Internal Controls – QAE
      • 1.9
        What is Risk?
      • 1.10
        Understanding Vulnerabilities and threats
      • 1.11
        Types of Risks
      • 1.12
        Risk response methodology
      • 1.13
        Key Aspects – Risk based Audit Planning
      • 1.14
        QAE – Risk based Audit Planning
      • 1.15
        Steps of Risk Assessment
      • 1.16
        Key Aspects: Audit Project Management
      • 1.17
        QAE – Audit Project Management
      • 1.18
        Sampling Methodology
      • 1.19
        Compliance and Substantive Testing
      • 1.20
        Audit Evidence Collection Techniques
      • 1.21
        Continous Auditing Techniques
      • 1.22
        Data Analytics
      • 1.23
        Reporting and Communication Techniques
      • 1.24
        Control Self Assessment
      • 1.25
        IS Internal Audit Function
      • 1.26
        Managing third party IS Auditors and other experts
      • 1.27
        Agile Auditing
      • 1.28
        Quality Assurance of Audit Process
      • 1.29
        Use of Artificial Intelligence in Audit Process
    • Governance and Management of IT
      20
      • 2.1
        Key Aspects Enterprise Governance of Information and Technology
      • 2.2
        QAE Enterprise Governance of Information and Technology
      • 2.3
        IT Standards, Policies and Procedures
      • 2.4
        Approaches for Policy Development (Top down & Bottom up)
      • 2.5
        Organizational Structure – Roles and Responsibility of Various Functions
      • 2.6
        IT Strategy & Steering Commitee
      • 2.7
        Enterprise Architecture
      • 2.8
        Risk Treatment
      • 2.9
        Risk Analysis Methods
      • 2.10
        Enterprise Risk Management.
      • 2.11
        Maturity Models
      • 2.12
        Laws, Regulations and Industry Standards Affecting the Organization
      • 2.13
        IT Resource Management Training Scheduling and Time Reporting Terms
      • 2.14
        IT Service Provider Acquisition and Management
      • 2.15
        IT Performance Monitoring and Reporting
      • 2.16
        Balanced Score Card
      • 2.17
        IT Performance Monitoring and Reporting
      • 2.18
        Quality Assurance and Quality Management of IT
      • 2.19
        Data Privacy Program and Principles
      • 2.20
        Data Classification
    • Information System Acquisition and Development and Implementation
      15
      • 3.1
        Project Evaluation Methods
      • 3.2
        Business Case and Feasibility Analysis
      • 3.3
        Agile System Development Methodology
      • 3.4
        Object Oriented system development methodology
      • 3.5
        Prototype & Rapid Application Development (RAD)
      • 3.6
        Key Aspects – System Development Methodologies
      • 3.7
        QAE – System Development Methodologies
      • 3.8
        Check Digit
      • 3.9
        Parity Bit, Checksum and CRC
      • 3.10
        Key Aspects – Control Identification and Design and Balancing
      • 3.11
        QAE – Control Identification and Design and Balancing
      • 3.12
        Testing Methodologies
      • 3.13
        System Migration, Infrastructure Deployment and Data Conversion
      • 3.14
        Post-implementation Review
      • 3.15
        Configuration & Release Management
    • Information System Operations, Maintenance and Support
      23
      • 4.1
        RFID
      • 4.2
        IT Asset Management
      • 4.3
        Job Scheduling and Production Process Automation
      • 4.4
        End-user Computing
      • 4.5
        Systems Performance Management
      • 4.6
        Problem and Incident Management
      • 4.7
        Network Management Tools
      • 4.8
        Change, Configuration, Release and Patch Management
      • 4.9
        IT Service Level Management
      • 4.10
        Relational database model
      • 4.11
        Database Normalization
      • 4.12
        Database checks and controls
      • 4.13
        DBA Roles and Responsibilites & SoD
      • 4.14
        Database Management
      • 4.15
        Business Impact Analysis
      • 4.16
        System Resiliency
      • 4.17
        Business Continuity Plan
      • 4.18
        Types of Backup
      • 4.19
        RTO & RPO
      • 4.20
        Alternate Recovery Site
      • 4.21
        Disaster Recovery Plans
      • 4.22
        DRP – Test Methods
      • 4.23
        Operational Log Management
    • Protection of Information Assests
      42
      • 5.1
        Information Security Management Framework
      • 5.2
        Privacy Principles
      • 5.3
        Physical Access and Environmental Controls
      • 5.4
        Fire Supression Systems
      • 5.5
        Single Sign On
      • 5.6
        Factor of Authentication
      • 5.7
        Key Aspects – Identity and Access Management
      • 5.8
        QAE 1 – Identity and Access Management
      • 5.9
        Biometrics
      • 5.10
        OSI Layers
      • 5.11
        Firewall Types
      • 5.12
        Firewall Implementation
      • 5.13
        Next Generation Firewalls (NGFW)
      • 5.14
        Unified Threat Management (UTM)
      • 5.15
        Virtual Private Network
      • 5.16
        Network LAN Components
      • 5.17
        Network Physical Devices
      • 5.18
        Other Network Devices
      • 5.19
        Voice over Internet Protocols (VoIP)
      • 5.20
        Wireless Network
      • 5.21
        Email Security
      • 5.22
        Classification of Information Assets
      • 5.23
        Data Encryption and Encryption-related Techniques
      • 5.24
        Other Encryption Techniques
      • 5.25
        Public Key Infrastructure
      • 5.26
        Cloud Computing
      • 5.27
        Security Awareness Training and Programs
      • 5.28
        Information System Attack Methods and Techniques
      • 5.29
        Key Aspects – Information System Attack Methods and Techniques
      • 5.30
        QAE – Information System Attack Methods and Techniques
      • 5.31
        Security Testing Tools and Techniques
      • 5.32
        IDS & IPS
      • 5.33
        Incident Response Management
      • 5.34
        Evidence Collection and Forensics
      • 5.35
        Zero Trust
      • 5.36
        Privilege Access Management
      • 5.37
        Directory Services
      • 5.38
        Identity as a Service (IaaS)
      • 5.39
        Digital Right Management (DRM)
      • 5.40
        Federated Identity Management (FIM)
      • 5.41
        Data Loss Prevention (DLP)
      • 5.42
        Virtualization
    • Practice Questions
      1
      • 6.1
        Practice Questions – Set 1 to Set 30
    This content is protected, please login and enroll in the course to view this content!
    Risk Analysis Methods
    Prev
    Maturity Models
    Next
    Contact Sale

    Categories

    • Agile Management
    • Project Management
    • Cloud Computing
    • Data Science
    • DevOps
    • BI And Visualization
    • Cyber Security
    • Web Development

    Approach

    • Sales Support
    • No Hidden Fee
    • Transparency
    • 24/7 Support

    24*7 Support

    • Sales Support
    • Discounts
    • Contact us
    • Verification
    • Linkedin
    • Instagram
    • Google Business
    • Refer & Earn

    Important

    • Privacy Policy
    • Refund Policy
    • Terms & Conditions
    • Corporate Trainings

    © Totallylearn.com. All Rights Reserved. Totally Learn

    Connect with us

    PMP®,PMI®, PMI-ACP® and PMBOK® are registered marks of the Project Management Institute, Inc. MongoDB®, Mongo and the leaf logo are the registered trademarks of MongoDB, Inc.

    HomeCourses
    Search

    Search

      Account

      Login with your site account

      Lost your password?

      • ←
      • Contact Us
        Contact Form

      • WhatsApp