Cademy logoCademy Marketplace

Course Images

Certified Information Systems Professional - Complete Video Training

Certified Information Systems Professional - Complete Video Training

By John Academy

4.3(43)
  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 48 hours

  • All levels

Description

Description:

A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field.

Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc.

In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System.

Assessment:

  • At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.
  • Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.

Certification:

  • After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.
  • Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.

Who is this Course for?

Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic background.

Requirements

Our Certified Information Systems Professional - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

Career Path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

The Process of Auditing Information Systems
Management of the Audit FunctionFREE 00:20:00
ISACA IT Audit and Assurance Standards and Guidelines 01:16:00
Risk Analysis 00:21:00
Internal Controls 00:17:00
Performing An IS Audit 01:07:00
Control Self-Assessment 00:09:00
The Evolving IS Audit Process 00:12:00
Governance and Management of IT
Corporate Governance 00:06:00
IT Governance 00:02:00
IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00
Information Systems Strategy 00:05:00
Maturity and Process Improvement Models 00:01:00
IT Investment and Allocation Practices 00:05:00
Policies and Procedures 00:17:00
Risk Management 00:31:00
IS Management Practices 00:50:00
IS Organizational Structure and Responsibilities 00:17:00
Auditing IT Governance Structure and Implementation 00:06:00
Business Continuity Planning 00:37:00
Information Systems Acquisition, Development and Implementation
Business Realization 01:21:00
Project Management Structure 00:08:00
Project Management Practices 00:18:00
Business Application Development 00:42:00
Business Application Systems 00:38:00
Alternative Forms of Software Project Organization 00:03:00
Alternative Development Methods 00:10:00
Infrastructure Development/Acquisition Practices 00:09:00
Information Systems Maintenance Practices 00:09:00
System Development Tools And Productivity Aids 00:05:00
Business Process Reengineering And Process Change Projects 00:08:00
Application Controls 00:07:00
Auditing Application Controls 00:14:00
Auditing Systems Development, Acquisition And Maintenance 00:08:00
Information Systems Operations, Maintenance and Support
Information Systems Operations 00:19:00
Information Systems Hardware 00:13:00
IS Architecture and Software 00:39:00
Network Infrastructure 01:16:00
Disaster Recovery Planning 00:19:00
Protection of Information Assets
Importance Of Information Security 00:43:00
Logical Access 00:37:00
Network Infrastructure Security 00:39:00
Auditing Information Security Management Framework 00:03:00
Auditing Network Infrastructure Security 00:13:00
Environmental Exposures and Controls 00:02:00
Physical Access Exposures and Controls 00:05:00
Mobile Computing 00:05:00
Information Security Governance
Information Security Governance OverviewFREE 00:25:00
Effective Information Security Governance 00:24:00
Information Security Concepts and Technologies 00:20:00
Information Security Manager 00:09:00
Scope and Charter of Information Security Governance 00:10:00
Information Security Governance Metrics 00:23:00
Information Security Strategy Overview 00:02:00
Creating Information Security Strategy 00:36:00
Determining Current State Of Security 00:06:00
Information Security Strategy Development 00:10:00
Strategy Resources 00:40:00
Strategy Constraints 00:07:00
Action Plan to Implement Strategy 00:20:00
Information Risk Management
Risk Management Overview 00:16:00
Good Information Security Risk Management 00:15:00
Information Security Risk Management Concepts 00:13:00
Implementing Risk Management 00:17:00
Risk Assessment 00:39:00
Controls Countermeasures 00:23:00
Recovery Time Objectives 00:18:00
Risk Monitoring and Communication 00:04:00
Information Security Program Development
Development of Information Security Program 00:11:00
Information Security Program Objectives 00:09:00
Information Security Program Development Concepts 00:14:00
Scope and Charter of Information Security Program Development 00:22:00
Information Security Management Framework 00:16:00
Information Security Framework Components 00:12:00
Information Security Program Resources 01:04:00
Implementing an Information Security Program 00:27:00
Information Infrastructure and Architecture 00:14:00
Information Security Program 00:14:00
Security Program Services and Operational Activities 00:45:00
Information Security Incident Management
Incident Management Overview 00:28:00
Incident Response Procedures 00:29:00
Incident Management Organization 00:19:00
Incident Management Resources 00:36:00
Incident Management Objectives 00:14:00
Incident Management Metrics and Indicators 00:17:00
Current State of Incident Response Capability 00:11:00
Developing an Incident Response Plan 00:32:00
BCP DRP 00:36:00
Testing Response and Recovery Plans 00:10:00
Executing the Plan 00:27:00
Information Systems Security Officer
Risk ManagementFREE 00:58:00
Security Management 00:58:00
Authentication 01:01:00
Access Control 01:20:00
Security Models 01:01:00
Operations Security 01:10:00
Symmetric Cryptography and Hashing 01:19:00
Asymmetric Cryptography and PKI 01:31:00
Network Connections 01:28:00
Network Protocols and Devices 01:31:00
Telephony, VPNs and Wireless 01:13:00
Security Architecture 01:02:00
Software Development Security 01:05:00
Database Security and System Development 01:00:00
Malware and Software Attacks 00:17:00
Business Continuity 00:44:00
Disaster Recovery 00:53:00
Incident Management, Law, and Ethics 01:06:00
Physical 00:38:00
Information Systems Security Professional
Security and Risk ManagementFREE 00:24:00
Asset Security 00:12:00
Security Engineering 00:15:00
Communication and Network Security 00:10:00
Identity and Access Management 00:10:00
Security Assessment and Testing 00:12:00
Security Operations 00:36:00
Software Development Security 00:13:00
Certificate and Transcript
Order Your Certificates and Transcripts 00:00:00

About The Provider

Tags

Reviews