• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

Course Images

Certified Information Systems Professional - Complete Video Training

Certified Information Systems Professional - Complete Video Training

By John Academy

4.3(43)
  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 48 hours

  • All levels

Description

Description:

A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field.

Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc.

In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System.

Assessment:
  • At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.

  • Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.

Certification:
  • After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.

  • Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.

Who is this Course for?

Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic background.

Requirements

Our Certified Information Systems Professional - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.

Career Path

After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.

The Process of Auditing Information Systems

Management of the Audit Function

FREE

00:20:00

ISACA IT Audit and Assurance Standards and Guidelines

01:16:00

Risk Analysis

00:21:00

Internal Controls

00:17:00

Performing An IS Audit

01:07:00

Control Self-Assessment

00:09:00

The Evolving IS Audit Process

00:12:00

Governance and Management of IT

Corporate Governance

00:06:00

IT Governance

00:02:00

IT Monitoring and Assurance Practices for Board and Senior Management

00:40:00

Information Systems Strategy

00:05:00

Maturity and Process Improvement Models

00:01:00

IT Investment and Allocation Practices

00:05:00

Policies and Procedures

00:17:00

Risk Management

00:31:00

IS Management Practices

00:50:00

IS Organizational Structure and Responsibilities

00:17:00

Auditing IT Governance Structure and Implementation

00:06:00

Business Continuity Planning

00:37:00

Information Systems Acquisition, Development and Implementation

Business Realization

01:21:00

Project Management Structure

00:08:00

Project Management Practices

00:18:00

Business Application Development

00:42:00

Business Application Systems

00:38:00

Alternative Forms of Software Project Organization

00:03:00

Alternative Development Methods

00:10:00

Infrastructure Development/Acquisition Practices

00:09:00

Information Systems Maintenance Practices

00:09:00

System Development Tools And Productivity Aids

00:05:00

Business Process Reengineering And Process Change Projects

00:08:00

Application Controls

00:07:00

Auditing Application Controls

00:14:00

Auditing Systems Development, Acquisition And Maintenance

00:08:00

Information Systems Operations, Maintenance and Support

Information Systems Operations

00:19:00

Information Systems Hardware

00:13:00

IS Architecture and Software

00:39:00

Network Infrastructure

01:16:00

Disaster Recovery Planning

00:19:00

Protection of Information Assets

Importance Of Information Security

00:43:00

Logical Access

00:37:00

Network Infrastructure Security

00:39:00

Auditing Information Security Management Framework

00:03:00

Auditing Network Infrastructure Security

00:13:00

Environmental Exposures and Controls

00:02:00

Physical Access Exposures and Controls

00:05:00

Mobile Computing

00:05:00

Information Security Governance

Information Security Governance Overview

FREE

00:25:00

Effective Information Security Governance

00:24:00

Information Security Concepts and Technologies

00:20:00

Information Security Manager

00:09:00

Scope and Charter of Information Security Governance

00:10:00

Information Security Governance Metrics

00:23:00

Information Security Strategy Overview

00:02:00

Creating Information Security Strategy

00:36:00

Determining Current State Of Security

00:06:00

Information Security Strategy Development

00:10:00

Strategy Resources

00:40:00

Strategy Constraints

00:07:00

Action Plan to Implement Strategy

00:20:00

Information Risk Management

Risk Management Overview

00:16:00

Good Information Security Risk Management

00:15:00

Information Security Risk Management Concepts

00:13:00

Implementing Risk Management

00:17:00

Risk Assessment

00:39:00

Controls Countermeasures

00:23:00

Recovery Time Objectives

00:18:00

Risk Monitoring and Communication

00:04:00

Information Security Program Development

Development of Information Security Program

00:11:00

Information Security Program Objectives

00:09:00

Information Security Program Development Concepts

00:14:00

Scope and Charter of Information Security Program Development

00:22:00

Information Security Management Framework

00:16:00

Information Security Framework Components

00:12:00

Information Security Program Resources

01:04:00

Implementing an Information Security Program

00:27:00

Information Infrastructure and Architecture

00:14:00

Information Security Program

00:14:00

Security Program Services and Operational Activities

00:45:00

Information Security Incident Management

Incident Management Overview

00:28:00

Incident Response Procedures

00:29:00

Incident Management Organization

00:19:00

Incident Management Resources

00:36:00

Incident Management Objectives

00:14:00

Incident Management Metrics and Indicators

00:17:00

Current State of Incident Response Capability

00:11:00

Developing an Incident Response Plan

00:32:00

BCP DRP

00:36:00

Testing Response and Recovery Plans

00:10:00

Executing the Plan

00:27:00

Information Systems Security Officer

Risk Management

FREE

00:58:00

Security Management

00:58:00

Authentication

01:01:00

Access Control

01:20:00

Security Models

01:01:00

Operations Security

01:10:00

Symmetric Cryptography and Hashing

01:19:00

Asymmetric Cryptography and PKI

01:31:00

Network Connections

01:28:00

Network Protocols and Devices

01:31:00

Telephony, VPNs and Wireless

01:13:00

Security Architecture

01:02:00

Software Development Security

01:05:00

Database Security and System Development

01:00:00

Malware and Software Attacks

00:17:00

Business Continuity

00:44:00

Disaster Recovery

00:53:00

Incident Management, Law, and Ethics

01:06:00

Physical

00:38:00

Information Systems Security Professional

Security and Risk Management

FREE

00:24:00

Asset Security

00:12:00

Security Engineering

00:15:00

Communication and Network Security

00:10:00

Identity and Access Management

00:10:00

Security Assessment and Testing

00:12:00

Security Operations

00:36:00

Software Development Security

00:13:00

Certificate and Transcript

Order Your Certificates and Transcripts

00:00:00

About The Provider

Tags

Reviews