This plan includes
- Limited free courses access
- Play & Pause Course Videos
- Video Recorded Lectures
- Learn on Mobile/PC/Tablet
- Quizzes and Real Projects
- Lifetime Course Certificate
- Email & Chat Support
What you'll learn?
- Become an Information System Auditor or information Security Professional, Achieve your career goals by getting all that you need to know to support your way!
- Learn the fundamentals of IT Audit and Key aspects of Internal and External Auditing
- Understand Information System and Information Security Governance and Risk Management Process and control assessment.
- Understand the Process of Information System Acquisition and IT Project Management metrics!
- Understand Software development, Software testing, changeover and management, and configuration management process.
- Understand The IT System Components, how to make it available, and able to adapt to changes, and how to plan for Disasters and Incidents management.
- Understand how to build the Information System that supports Business requirements and Business Objectives and maintain the security of this system.
- Understand the Key Security requirements and best practices to audit and validate during audit engagements and control assessment
- Gain an understanding of many foundational topics such as (IT Network, Cloud, Virtualization, Cryptography, Network Security, Endpoint Security, and more!
Course Overview
Pre-requisites
- No Requirements
- Everything will be explained from scratch, however basic understanding for IT and Security will be beneficial to keep the pace!
Target Audience
- Security analysts, GRC Analysts and Managers
- Students who need to gain an understanding in Infosec and cybersecurity
- People who are interested in pursuing this certification
- Accountants and Financial Analysts
- IT Managers, and Analysts who want to understand and advance their career
- Auditors Risk practitioners and compliance specialists
- Anyone interested in the subject of the training
Curriculum 52 Lectures
-
Section 1 : Course Introduction
- Lecture 2 :
- What is CISA Certification
-
Section 2 : Security Foundations
- Lecture 1 :
- The Security Objective and CIA Triad
- Lecture 2 :
- Security vs Privacy and Essential Security Terms
- Lecture 3 :
- Privacy Requirements and regulations
- Lecture 4 :
- Security Vulnerabilities Overview
- Lecture 5 :
- Cyber Kill Chain, the Process of Hacking into systems
- Lecture 6 :
- Cyber attacks Explanations - DoS DDoS Bufferoverflow and MiTM
- Lecture 7 :
- Cyber attacks Explanations - DoS DDoS Bufferoverflow and MiTM
- Lecture 8 :
- Web Application Attacks
- Lecture 9 :
- Malware Types and Other Attacks
- Lecture 10 :
- Password Attacks and Rainbow Tables
-
Section 3 : Personnel and Supply Chain Security
- Lecture 1 :
- Social Engineering
- Lecture 2 :
- Security Awareness Program
- Lecture 3 :
- Securing Supply chain Risk Management
-
Section 4 : AAA
- Lecture 1 :
- The IAAA Framework
- Lecture 2 :
- MFA and Biometric
- Lecture 3 :
- Single Sign on (SSO) and Reduced Sign on (RSO)
- Lecture 4 :
- Authorisation and Access Control Models
- Lecture 5 :
- Owner and Custodian and their responsibilities in Assets and data prote
-
Section 5 : Physical Security
- Lecture 1 :
- What is Physical Security
- Lecture 2 :
- Physical Access Control System 1
- Lecture 3 :
- Physical Access Control System 2
- Lecture 4 :
- Environmental Controls - Securing Power Sources
- Lecture 5 :
- Environmental Controls - Fire Threat and Controls
- Lecture 6 :
- Physical Security Best Practices
-
Section 6 : Data Security
- Lecture 1 :
- Data Lifecylce
- Lecture 2 :
- Roles in Data and Assets Protection
- Lecture 3 :
- Privacy Regulation Roles
- Lecture 4 :
- Data Security Measures
- Lecture 5 :
- Data Classification
- Lecture 6 :
- Data Destruction
- Lecture 7 :
- RACI Matrix
-
Section 7 : Cryptography
- Lecture 1 :
- Cryptography Overview
- Lecture 2 :
- Symmetric Encryption
- Lecture 3 :
- Asymmetric Encryption Overview
- Lecture 4 :
- Asymmetric Encryption Benefits
- Lecture 5 :
- Digital Certificate
- Lecture 6 :
- Public Key Infrastructure
- Lecture 7 :
- Integrity Hashing and Salting
- Lecture 8 :
- Encryption vs Hashing vs Encdoing
- Lecture 9 :
- Digital Signature
- Lecture 10 :
- Cryptography Applications in IT
-
Section 8 : Network Security
- Lecture 1 :
- Organization IT Infrastructure and Security Overview
- Lecture 2 :
- Network Segmentation and VLANs
- Lecture 3 :
- Firewalls
- Lecture 4 :
- Network Admission Control
- Lecture 5 :
- DMZ and Bastian Host
- Lecture 6 :
- Proxy, Load Balancer, Email Security
-
Section 9 : Endpoint Security
- Lecture 1 :
- End-user Security Software Overview
- Lecture 2 :
- Endpoint Protection Platform Overview - EPP
- Lecture 3 :
- Endpoint security best practices
Our learners work at
Frequently Asked Questions
-
How do i access the course after purchase?
It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time. -
Are these video based online self-learning courses?
Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic. -
Can i play & pause the course as per my convenience?
Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on. -
How do i contact the instructor for any doubts or questions?
Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want. -
Do i need a pc to access the course or can i do it on mobile & tablet as well?
Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly. -
Do i get any certificate for the courses?
Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion. -
For how long can i access my course on the platform?
You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions. -
Is there any free trial?
Currently, we do not offer any free trial. -
Can i cancel anytime?
Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
Instructor
38953 Course Views
10 Courses