- 8 Sections
- 62 Lessons
- 40 Hours
Expand all sectionsCollapse all sections
- PERSIAPAN2
- 1. INFORMATION SYSTEM AUDITING PROCESS10
- 2.11.1. IS Audit Standards, Guidelines and Codes of Ethics
- 2.21.2. Types of Audits, Assessments and Reviews
- 2.31.3. Risk-based Audit Planning
- 2.41.4. Types of Controls and Considerations
- 2.51.5. Audit Project Management
- 2.61.6. Audit Testing and Sampling Methodology
- 2.71.7. Audit Evidence Collection Techniques
- 2.81.8. Audit Data Analytics
- 2.91.9. Reporting and Communication Techniques
- 2.101.10. Quality Assurance and Improvement of the Audit Process
- 2. GOVERNANCE AND MANAGEMENT OF IT11
- 3.12.1. Laws, Regulations and Industry Standards
- 3.22.2. Organizational Structure, IT Governance and IT Strategy
- 3.32.3. IT Policies, Standards, Procedures and Guidelines
- 3.42.4. Enterprise Architecture and Considerations
- 3.52.5. Enterprise Risk Management
- 3.62.6. Data Privacy Program and Principles
- 3.72.7. Data Governance and Classification
- 3.82.8. IT Resource Management
- 3.92.9. IT Vendor Management
- 3.102.10. IT Performance Monitoring and Reporting
- 3.112.11. Quality Assurance and Quality Management of IT
- 3. INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT AND IMPLEMENTATION8
- 4.13.1. Project Governance and Management
- 4.23.2. Business Case and Feasibility Analysis
- 4.33.3. System Development Methodologies
- 4.43.4. Control Identification and Design
- 4.53.5. System Readiness and Implementation Testing
- 4.63.6. Implementation Configuration and Release Management
- 4.73.7. System Migration, Infrastructure Deployment and Data Conversion
- 4.83.8. Post-implementation Review
- 4. INFORMATION SYSTEMS OPERATIONS AND BUSINESS RESILIENCE16
- 5.14.1. IT Components
- 5.24.2. IT Asset Management
- 5.34.3. Job Scheduling and Production Process Automation
- 5.44.4. System Interfaces
- 5.54.5. End-User Computing and Shadow IT
- 5.64.6. Systems Availability and Capacity Management
- 5.74.7. Problem and Incident Management
- 5.84.8. IT Change, Configuration and Patch Management
- 5.94.9. Operational Log Management
- 5.104.10. IT Service Level Management
- 5.114.11. Database Management
- 5.124.12. Business Impact Analysis (BIA)
- 5.134.13. System and Operational Resilience
- 5.144.14. Data Backup, Storage, and Restoration
- 5.154.15. Business Continuity Plan (BCP)
- 5.164.16. Disaster Recovery Plans (DRPs)
- 5. PROTECTION OF INFORMATION ASSETS15
- 6.15.1. Information Asset Security Frameworks, Standards, and Guidelines
- 6.25.2. Physical and Environmental Controls
- 6.35.3. Identity and Access Management
- 6.45.4. Network and Endpoint Security
- 6.55.5. Data Loss Prevention
- 6.65.6. Data Encryption
- 6.75.7. Public Key Infrastructure
- 6.85.8. Cloud and Virtualized Environments
- 6.95.9. Mobile, Wireless and Internet of Things Devices
- 6.105.10. Security Awareness Training and Programs
- 6.115.11. Information System Attack Methods and Techniques
- 6.125.12. Security Testing Tools and Techniques
- 6.135.13. Security Monitoring Logs, Tools and Techniques
- 6.145.14. Security Incident Response Management
- 6.155.15. Evidence Collection and Forensics
- CISA EXAM SIMULATIONS6
- 7.1CISA Exam Simulation 160 Minutes50 Questions
- 7.2CISA Exam Simulation 260 Minutes50 Questions
- 7.3CISA Exam Simulation 360 Minutes50 Questions
- 7.4CISA Complete Exam Simulation A240 Minutes150 Questions
- 7.5CISA Complete Exam Simulation B240 Minutes150 Questions
- 7.6CISA Complete Exam Simulation C240 Minutes150 Questions
- PENUTUPAN2
Post-Test
Prev