CISA Domain: IS Operations, Maintenance, and Support – Part 2
Information Systems professionals with an interest in information systems audit, control and security. A minimum of five years of professional information systems auditing, control or security work experience is required for certification.
Please contact us for information about prerequisites.
Enterprise network infrastructures and architectures are an integral part of enterprise environments today and are widely unknown to most users. The IS auditor must have a high level knowledge of these frameworks and a clear communication path to those who control them. This course examines the types of networks that are commonly found in enterprises today and the services and components that are commonly used in them. This course also examines disaster recovery strategies and scenarios that must be put in place to deal with any emergency situations that may occur. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organizations information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
Enterprise Network Architectures
- describe the different types of networks
- recognize network services and network standards and protocols
- implement the OSI model in Local Area Networks (LANs)
- describe the characteristics of Wide Area Networks (WANs)
- describe the characteristics of wireless networks
- describe enterprise network architectures
- describe the characteristics of WANs and wireless networks
Internet, Network Admin, Disaster Recovery
- recognize public Internet infrastructures
- describe network administration and control features
- define recovery point objective (RPO) and recovery time objective (RTO)
- recognize recovery strategies and recovery alternatives
- recognize disaster recovery plan contents and scenarios
- describe backup and restoration methods
- recognize public Internet infrastructures and network administration and control features
- recognize disaster recovery planning concepts