CBT Nuggets – ISACA CISA 2016 Leave a comment

01 – CISA Overview
02 – The Process of Auditing Information Systems
03 – IT Audit Standards, Guidelines, Tools and Techniques, and Code of Ethics
04 – Audit Risk Assessment
05 – Business Processes
06 – Control Objectives
07 – Audit Planning and Management
08 – Laws and Regulations
09 – Evidence
10 – Sampling Methodologies

11 – Reporting and Communications
12 – Audit Quality Assurance
13 – Types of Audits
14 – Governance and Management of IT
15 – Information Systems Strategy
16 – Standards, Governance and Frameworks
17 – IT Organization
18 – Legal Compliance
19 – Enterprise Architecture
20 – Maintenance of Policies and Procedures

21 – Maturity Models
22 – Process Optimization
23 – IT Investment Strategies
24 – IT Vendor Selection and Management
25 – IT Risk Management
26 – Control Processes
27 – Quality Management Systems
28 – IT Performance Monitoring and Reporting
29 – BCP – Business Impact Analysis
30 – BCP Maintenance and Testing

31 – BCP – Invoke and Return to Normal
32 – Information Systems Acquisition, Development and Implementation
33 – Benefits Realization
34 – Vendor Management
35 – Project Governance
36 – Project Management
37 – Risk Management
38 – Requirements Management
39 – Application Architecture
40 – Methodologies

41 – Control Objectives and Techniques
42 – Testing
43 – Configuration and Change Management
44 – System Migration and Deployment
45 – Project Success Criteria
46 – Post-Implementation Reviews
47 – Information Systems Operations, Maintenance & Support
48 – Service Level Frameworks
49 – Service Level Management
50 – Monitor 3rd Party Compliance

51 – Architecture
52 – Computer Hardware, Software and Networks
53 – Software Resiliency Tools and Techniques
54 – Software Licensing and Inventory Interfaces
55 – Managing Schedules
56 – System Interface Integrity
57 – Capacity Planning
58 – Performance Monitoring
59 – Data Backup
60 – Database Administration Practices

61 – Data Quality and Retention
62 – Problem and Incident Management
63 – Managing Change to Production Environments
64 – Risks and Controls for End User Computing
65 – Disaster Recovery Legal and Contractual Issues
66 – Business Impact of Disaster Recovery
67 – Disaster Recovery Plan Maintenance
68 – Alternate Processing Sites
69 – Disaster Recovery Testing
70 – Invoking Disaster Recovery

71 – Protection of Information Assets
72 – Information Asset Protection
73 – Privacy Principles
74 – Security Controls
75 – Environmental Protection
76 – Physical Access Controls
77 – Logical Access Controls
78 – Identification and Authentication
79 – Virtual Systems
80 – Mobile Devices

81 – Voice Communication
82 – Internet Security, Protocols and Techniques
83 – Network Security Concerns
84 – Data Encryption
85 – Public Key Infrastructure
86 – Peer to Peer Computing
87 – Data Classification Standards
88 – Handling Confidential Data
89 – Data Leakage
90 – End-User Computing Security

91 – Security Awareness Program
92 – Cyber Attacks
93 – Detection Tools
94 – Security Testing Techniques
95 – Security Incidents
96 – Handling of Evidence
97 – Fraud Risk Factors
98 – Passing the Exam

Leave a Reply