5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Collections     Cybersecurity Collection     Security Solutions     Certified Internet Systems Auditor (CISA)
An effective IS audit includes ensuring that an organization's processes for IS operations, maintenance, and service management supports and achieves the organizational strategic goals and objectives. This course covers best practices for IS operations, including management practices, incident and problem management, and change management. IS hardware practices are also covered, including IT asset management, hardware components and architectures, and capacity management activities. Finally this course outlines best practices for IS architecture, software, network infrastructure and operations auditing activities. This course is one of a series in the learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.

Objectives

Information Systems Operations

  • start the course
  • recognize key concepts of domain 4
  • identify characteristics and best practices of IS operations management
  • identify characteristics of IT service management frameworks, and best practices
  • identify best practices for IS operations
  • identify problem management and support/help desk best practices
  • identify characteristics and best practices of change management, release management and quality assurance in IS operations

Information Systems Hardware

  • identify characteristics and best practices for IT asset management
  • distinguish between computer hardware components'
  • identify characteristics and best practices for hardware maintenance and hardware monitoring
  • identify characteristics and best practices for capacity planning and monitoring activities

IS Architecture and Software

  • identify operating systems features and options
  • identify characteristics of access control software and data communications software
  • identify characteristics and best practices for data management
  • identify characteristics and best practices of a DBMS
  • identify characteristics of utility programs, source code management, end-user computing, and utility programs in IS architecture and software

IS Network Infrastructure

  • identify characteristics of enterprise network architectures, types of networks, and network services, standards, and protocols
  • identify characteristics of OSI architecture and best practices for applying the OSI model in network architectures

Auditing Infrastructure and Operations

  • identify best practices for auditing and reviewing enterprise architecture, hardware, operating system, database, and network infrastructure
  • identify best practices for auditing and reviewing IS operations, scheduling, and problem management reporting

Disaster Recovery Planning

  • identify best practices for disaster recovery point and time objectives, recovery strategies, and recovery alternatives
  • identify best practices for developing a disaster recovery plan, and organizing and assigning responsibilities within an organization
  • identify backup and restoration options and best practices
  • distinguish between disaster recovery testing methods, and identify best practices for testing disaster recovery plans and activities in an organization
  • identify best practices for invoking disaster recovery plans within an organization

Practice: IS Ops and Service Management

  • identify best practices when auditing IS operations, maintenance, and service management activities within an organization