Booking options
£22
£22
On-Demand course
48 hours
All levels
A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field.
Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc.
In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System.
At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.
Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.
After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.
Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.
Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.
As there is no experience and qualification required for this course, it is available for all students from any academic background.
Our Certified Information Systems Professional - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
The Process of Auditing Information Systems | |||
Management of the Audit Function | FREE | 00:20:00 | |
ISACA IT Audit and Assurance Standards and Guidelines | 01:16:00 | ||
Risk Analysis | 00:21:00 | ||
Internal Controls | 00:17:00 | ||
Performing An IS Audit | 01:07:00 | ||
Control Self-Assessment | 00:09:00 | ||
The Evolving IS Audit Process | 00:12:00 | ||
Governance and Management of IT | |||
Corporate Governance | 00:06:00 | ||
IT Governance | 00:02:00 | ||
IT Monitoring and Assurance Practices for Board and Senior Management | 00:40:00 | ||
Information Systems Strategy | 00:05:00 | ||
Maturity and Process Improvement Models | 00:01:00 | ||
IT Investment and Allocation Practices | 00:05:00 | ||
Policies and Procedures | 00:17:00 | ||
Risk Management | 00:31:00 | ||
IS Management Practices | 00:50:00 | ||
IS Organizational Structure and Responsibilities | 00:17:00 | ||
Auditing IT Governance Structure and Implementation | 00:06:00 | ||
Business Continuity Planning | 00:37:00 | ||
Information Systems Acquisition, Development and Implementation | |||
Business Realization | 01:21:00 | ||
Project Management Structure | 00:08:00 | ||
Project Management Practices | 00:18:00 | ||
Business Application Development | 00:42:00 | ||
Business Application Systems | 00:38:00 | ||
Alternative Forms of Software Project Organization | 00:03:00 | ||
Alternative Development Methods | 00:10:00 | ||
Infrastructure Development/Acquisition Practices | 00:09:00 | ||
Information Systems Maintenance Practices | 00:09:00 | ||
System Development Tools And Productivity Aids | 00:05:00 | ||
Business Process Reengineering And Process Change Projects | 00:08:00 | ||
Application Controls | 00:07:00 | ||
Auditing Application Controls | 00:14:00 | ||
Auditing Systems Development, Acquisition And Maintenance | 00:08:00 | ||
Information Systems Operations, Maintenance and Support | |||
Information Systems Operations | 00:19:00 | ||
Information Systems Hardware | 00:13:00 | ||
IS Architecture and Software | 00:39:00 | ||
Network Infrastructure | 01:16:00 | ||
Disaster Recovery Planning | 00:19:00 | ||
Protection of Information Assets | |||
Importance Of Information Security | 00:43:00 | ||
Logical Access | 00:37:00 | ||
Network Infrastructure Security | 00:39:00 | ||
Auditing Information Security Management Framework | 00:03:00 | ||
Auditing Network Infrastructure Security | 00:13:00 | ||
Environmental Exposures and Controls | 00:02:00 | ||
Physical Access Exposures and Controls | 00:05:00 | ||
Mobile Computing | 00:05:00 | ||
Information Security Governance | |||
Information Security Governance Overview | FREE | 00:25:00 | |
Effective Information Security Governance | 00:24:00 | ||
Information Security Concepts and Technologies | 00:20:00 | ||
Information Security Manager | 00:09:00 | ||
Scope and Charter of Information Security Governance | 00:10:00 | ||
Information Security Governance Metrics | 00:23:00 | ||
Information Security Strategy Overview | 00:02:00 | ||
Creating Information Security Strategy | 00:36:00 | ||
Determining Current State Of Security | 00:06:00 | ||
Information Security Strategy Development | 00:10:00 | ||
Strategy Resources | 00:40:00 | ||
Strategy Constraints | 00:07:00 | ||
Action Plan to Implement Strategy | 00:20:00 | ||
Information Risk Management | |||
Risk Management Overview | 00:16:00 | ||
Good Information Security Risk Management | 00:15:00 | ||
Information Security Risk Management Concepts | 00:13:00 | ||
Implementing Risk Management | 00:17:00 | ||
Risk Assessment | 00:39:00 | ||
Controls Countermeasures | 00:23:00 | ||
Recovery Time Objectives | 00:18:00 | ||
Risk Monitoring and Communication | 00:04:00 | ||
Information Security Program Development | |||
Development of Information Security Program | 00:11:00 | ||
Information Security Program Objectives | 00:09:00 | ||
Information Security Program Development Concepts | 00:14:00 | ||
Scope and Charter of Information Security Program Development | 00:22:00 | ||
Information Security Management Framework | 00:16:00 | ||
Information Security Framework Components | 00:12:00 | ||
Information Security Program Resources | 01:04:00 | ||
Implementing an Information Security Program | 00:27:00 | ||
Information Infrastructure and Architecture | 00:14:00 | ||
Information Security Program | 00:14:00 | ||
Security Program Services and Operational Activities | 00:45:00 | ||
Information Security Incident Management | |||
Incident Management Overview | 00:28:00 | ||
Incident Response Procedures | 00:29:00 | ||
Incident Management Organization | 00:19:00 | ||
Incident Management Resources | 00:36:00 | ||
Incident Management Objectives | 00:14:00 | ||
Incident Management Metrics and Indicators | 00:17:00 | ||
Current State of Incident Response Capability | 00:11:00 | ||
Developing an Incident Response Plan | 00:32:00 | ||
BCP DRP | 00:36:00 | ||
Testing Response and Recovery Plans | 00:10:00 | ||
Executing the Plan | 00:27:00 | ||
Information Systems Security Officer | |||
Risk Management | FREE | 00:58:00 | |
Security Management | 00:58:00 | ||
Authentication | 01:01:00 | ||
Access Control | 01:20:00 | ||
Security Models | 01:01:00 | ||
Operations Security | 01:10:00 | ||
Symmetric Cryptography and Hashing | 01:19:00 | ||
Asymmetric Cryptography and PKI | 01:31:00 | ||
Network Connections | 01:28:00 | ||
Network Protocols and Devices | 01:31:00 | ||
Telephony, VPNs and Wireless | 01:13:00 | ||
Security Architecture | 01:02:00 | ||
Software Development Security | 01:05:00 | ||
Database Security and System Development | 01:00:00 | ||
Malware and Software Attacks | 00:17:00 | ||
Business Continuity | 00:44:00 | ||
Disaster Recovery | 00:53:00 | ||
Incident Management, Law, and Ethics | 01:06:00 | ||
Physical | 00:38:00 | ||
Information Systems Security Professional | |||
Security and Risk Management | FREE | 00:24:00 | |
Asset Security | 00:12:00 | ||
Security Engineering | 00:15:00 | ||
Communication and Network Security | 00:10:00 | ||
Identity and Access Management | 00:10:00 | ||
Security Assessment and Testing | 00:12:00 | ||
Security Operations | 00:36:00 | ||
Software Development Security | 00:13:00 | ||
Certificate and Transcript | |||
Order Your Certificates and Transcripts | 00:00:00 |