Special welcome gift. Get 30% off your first purchase with code “TOTALLYLEARN”. Find out more!

  • Categories
    • Agile Management
    • Business Analysis
    • Cloud Computing
    • Cyber Security
    • DevOps
    • IT Service Management
    • Project Management
    • Quality Management
    • IT Networking
    • Home
    • Courses
      • Agile Management
      • Business Analysis
      • Cloud Computing
      • Cyber Security
      • DevOps
      • IT Service Management
      • Project Management
      • Quality Management
      • IT Networking
    • About Us
    • Contact
    • Blog
    • Verification
    Pay
    Pay

    Curriculum

    • 6 Sections
    • 130 Lessons
    • 24 Hours
    Expand all sectionsCollapse all sections
    • Information System Auditing Process
      29
      • 1.1
        Audit Planning
      • 1.2
        Key Aspects – Audit Planning
      • 1.3
        QAE – Audit Planning
      • 1.4
        Audit Charter
      • 1.5
        Electronic Data Interchange (EDI)
      • 1.6
        Internal Controls
      • 1.7
        Internal Controls – Key Aspects
      • 1.8
        Internal Controls – QAE
      • 1.9
        What is Risk?
      • 1.10
        Understanding Vulnerabilities and threats
      • 1.11
        Types of Risks
      • 1.12
        Risk response methodology
      • 1.13
        Key Aspects – Risk based Audit Planning
      • 1.14
        QAE – Risk based Audit Planning
      • 1.15
        Steps of Risk Assessment
      • 1.16
        Key Aspects: Audit Project Management
      • 1.17
        QAE – Audit Project Management
      • 1.18
        Sampling Methodology
      • 1.19
        Compliance and Substantive Testing
      • 1.20
        Audit Evidence Collection Techniques
      • 1.21
        Continous Auditing Techniques
      • 1.22
        Data Analytics
      • 1.23
        Reporting and Communication Techniques
      • 1.24
        Control Self Assessment
      • 1.25
        IS Internal Audit Function
      • 1.26
        Managing third party IS Auditors and other experts
      • 1.27
        Agile Auditing
      • 1.28
        Quality Assurance of Audit Process
      • 1.29
        Use of Artificial Intelligence in Audit Process
    • Governance and Management of IT
      20
      • 2.1
        Key Aspects Enterprise Governance of Information and Technology
      • 2.2
        QAE Enterprise Governance of Information and Technology
      • 2.3
        IT Standards, Policies and Procedures
      • 2.4
        Approaches for Policy Development (Top down & Bottom up)
      • 2.5
        Organizational Structure – Roles and Responsibility of Various Functions
      • 2.6
        IT Strategy & Steering Commitee
      • 2.7
        Enterprise Architecture
      • 2.8
        Risk Treatment
      • 2.9
        Risk Analysis Methods
      • 2.10
        Enterprise Risk Management.
      • 2.11
        Maturity Models
      • 2.12
        Laws, Regulations and Industry Standards Affecting the Organization
      • 2.13
        IT Resource Management Training Scheduling and Time Reporting Terms
      • 2.14
        IT Service Provider Acquisition and Management
      • 2.15
        IT Performance Monitoring and Reporting
      • 2.16
        Balanced Score Card
      • 2.17
        IT Performance Monitoring and Reporting
      • 2.18
        Quality Assurance and Quality Management of IT
      • 2.19
        Data Privacy Program and Principles
      • 2.20
        Data Classification
    • Information System Acquisition and Development and Implementation
      15
      • 3.1
        Project Evaluation Methods
      • 3.2
        Business Case and Feasibility Analysis
      • 3.3
        Agile System Development Methodology
      • 3.4
        Object Oriented system development methodology
      • 3.5
        Prototype & Rapid Application Development (RAD)
      • 3.6
        Key Aspects – System Development Methodologies
      • 3.7
        QAE – System Development Methodologies
      • 3.8
        Check Digit
      • 3.9
        Parity Bit, Checksum and CRC
      • 3.10
        Key Aspects – Control Identification and Design and Balancing
      • 3.11
        QAE – Control Identification and Design and Balancing
      • 3.12
        Testing Methodologies
      • 3.13
        System Migration, Infrastructure Deployment and Data Conversion
      • 3.14
        Post-implementation Review
      • 3.15
        Configuration & Release Management
    • Information System Operations, Maintenance and Support
      23
      • 4.1
        RFID
      • 4.2
        IT Asset Management
      • 4.3
        Job Scheduling and Production Process Automation
      • 4.4
        End-user Computing
      • 4.5
        Systems Performance Management
      • 4.6
        Problem and Incident Management
      • 4.7
        Network Management Tools
      • 4.8
        Change, Configuration, Release and Patch Management
      • 4.9
        IT Service Level Management
      • 4.10
        Relational database model
      • 4.11
        Database Normalization
      • 4.12
        Database checks and controls
      • 4.13
        DBA Roles and Responsibilites & SoD
      • 4.14
        Database Management
      • 4.15
        Business Impact Analysis
      • 4.16
        System Resiliency
      • 4.17
        Business Continuity Plan
      • 4.18
        Types of Backup
      • 4.19
        RTO & RPO
      • 4.20
        Alternate Recovery Site
      • 4.21
        Disaster Recovery Plans
      • 4.22
        DRP – Test Methods
      • 4.23
        Operational Log Management
    • Protection of Information Assests
      42
      • 5.1
        Information Security Management Framework
      • 5.2
        Privacy Principles
      • 5.3
        Physical Access and Environmental Controls
      • 5.4
        Fire Supression Systems
      • 5.5
        Single Sign On
      • 5.6
        Factor of Authentication
      • 5.7
        Key Aspects – Identity and Access Management
      • 5.8
        QAE 1 – Identity and Access Management
      • 5.9
        Biometrics
      • 5.10
        OSI Layers
      • 5.11
        Firewall Types
      • 5.12
        Firewall Implementation
      • 5.13
        Next Generation Firewalls (NGFW)
      • 5.14
        Unified Threat Management (UTM)
      • 5.15
        Virtual Private Network
      • 5.16
        Network LAN Components
      • 5.17
        Network Physical Devices
      • 5.18
        Other Network Devices
      • 5.19
        Voice over Internet Protocols (VoIP)
      • 5.20
        Wireless Network
      • 5.21
        Email Security
      • 5.22
        Classification of Information Assets
      • 5.23
        Data Encryption and Encryption-related Techniques
      • 5.24
        Other Encryption Techniques
      • 5.25
        Public Key Infrastructure
      • 5.26
        Cloud Computing
      • 5.27
        Security Awareness Training and Programs
      • 5.28
        Information System Attack Methods and Techniques
      • 5.29
        Key Aspects – Information System Attack Methods and Techniques
      • 5.30
        QAE – Information System Attack Methods and Techniques
      • 5.31
        Security Testing Tools and Techniques
      • 5.32
        IDS & IPS
      • 5.33
        Incident Response Management
      • 5.34
        Evidence Collection and Forensics
      • 5.35
        Zero Trust
      • 5.36
        Privilege Access Management
      • 5.37
        Directory Services
      • 5.38
        Identity as a Service (IaaS)
      • 5.39
        Digital Right Management (DRM)
      • 5.40
        Federated Identity Management (FIM)
      • 5.41
        Data Loss Prevention (DLP)
      • 5.42
        Virtualization
    • Practice Questions
      1
      • 6.1
        Practice Questions – Set 1 to Set 30
    This content is protected, please login and enroll in the course to view this content!
    IT Resource Management Training Scheduling and Time Reporting Terms
    Prev
    IT Performance Monitoring and Reporting
    Next
    Contact Sale

    Categories

    • Agile Management
    • Project Management
    • Cloud Computing
    • Data Science
    • DevOps
    • BI And Visualization
    • Cyber Security
    • Web Development

    Approach

    • Sales Support
    • No Hidden Fee
    • Transparency
    • 24/7 Support

    24*7 Support

    • Sales Support
    • Discounts
    • Contact us
    • Verification
    • Linkedin
    • Instagram
    • Google Business
    • Refer & Earn

    Important

    • Privacy Policy
    • Refund Policy
    • Terms & Conditions
    • Corporate Trainings

    © Totallylearn.com. All Rights Reserved. Totally Learn

    Connect with us

    PMP®,PMI®, PMI-ACP® and PMBOK® are registered marks of the Project Management Institute, Inc. MongoDB®, Mongo and the leaf logo are the registered trademarks of MongoDB, Inc.

    HomeCourses
    Search

    Search

      Account

      Login with your site account

      Lost your password?

      • ←
      • Contact Us
        Contact Form

      • WhatsApp