Certified Information Systems Auditor CISA, Part 4 of 5: Operations and Support
with expert Kenneth Mayer
Course description
The goal of this course is to talk about operations maintenance and support practices and the expected level of service delivered. The purpose is for the CISA to be able to understand and provide assurance and to meet the strategic objectives of the organization. This course is part of a series covering the ISACA Certified Information Systems Auditor (CISA).
Prerequisites
This is part 4 of the series.
Learning Paths
This course will help you prepare for the following certification and exam:
Certified Information Systems Auditor
Meet the expert
As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.
Course outline
Operation, Hardware, and Software
Information Systems Operations (19:07)
- Introduction (00:33)
- Management of IS Operations (00:46)
- Control Functions (02:56)
- IT Services (00:23)
- Service Level (01:17)
- Infrastructure Operations (00:38)
- Scheduling (01:27)
- Monitor Resource Usage (00:55)
- Problem Management (00:58)
- Abnormal Conditions (01:05)
- Access to Logs (01:15)
- Support/Helpdesk (00:53)
- Change Management Process (01:23)
- Release Management (02:07)
- Information Security Management (00:39)
- Media Sanitization (01:36)
- Summary (00:08)
Information Systems Hardware (13:10)
- Introduction (00:35)
- Computer Hardware Components and Architecture (01:10)
- Common Enterprise Backend Devices (01:37)
- Specialized Devices (01:09)
- Risks (00:43)
- Security Control (01:01)
- RFID (01:17)
- RFID Risks (00:48)
- RFID Security Control (00:38)
- Hardware Maintenance Program (01:09)
- Hardware Monitoring Procedures (00:54)
- Capacity Management (00:57)
- Capacity Management Continued (00:59)
- Summary (00:08)
IS Architecture and Software (39:13)
- Introduction (01:48)
- IS Architecture and Software (01:14)
- Operating Systems (00:54)
- Software Integrity Issues (02:18)
- Activity Logging and Reporting Options (01:15)
- Data Communication Software (00:53)
- Database Management (02:41)
- Database Management Continued (00:40)
- Example of Data in DBMS (06:02)
- DBMS Architecture (00:56)
- Data Definition Language (00:51)
- Database Structures (01:10)
- Relational Database (00:46)
- Database Models (03:35)
- Relational Database Model (05:09)
- Data Integrity Controls (02:20)
- Tape and Disk Management Systems (00:21)
- Utility Programs (00:54)
- Software Licensing Issues (01:50)
- Software Licensing Issues Continued (02:13)
- Digital Rights Management (01:06)
- Summary (00:08)
Network Infrastructure
Network Infrastructure (40:05)
- Introduction (01:38)
- Enterprise Network Architecture (00:37)
- Types of Networks (05:46)
- LAN Components (00:15)
- Network Standards and Protocols (01:08)
- OSI Architecture (01:16)
- OSI Layers (10:46)
- Application to Network Architecture (05:07)
- LAN Media Access Technologies (05:38)
- OSI Layer Diagram (07:42)
- Summary (00:08)
LANs and WANs (37:48)
- Introduction (01:38)
- LAN Technology Selection Criteria (00:47)
- Wide Area Networks (02:27)
- WAN Message Transmission Techniques (03:10)
- WAN Devices (02:04)
- Point-to-Point Protocol (03:32)
- Wireless WANs and LANs (03:34)
- Wireless Security (02:35)
- Risks of Wireless Communications (01:38)
- World Wide Web Services (01:15)
- General Internet Terminology (03:34)
- Network Controls (02:41)
- Network Management Issues and Tools (03:10)
- Client/Server Technology (00:40)
- Client/Server Technology Continued (04:04)
- Risks of Middleware (00:43)
- Summary (00:08)
Disaster Recovery Planning (19:00)
- Introduction (00:26)
- RPO and RTO (01:49)
- Recovery Strategies (01:18)
- Hot and Cold Sites (03:36)
- Disaster Recovery Methods (01:52)
- Redundancy (01:40)
- Development of Disaster Recovery Plans (00:39)
- Organization and Assignment of Responsibilities (01:43)
- Backup and Restoration (00:20)
- Offsite Storage (01:25)
- Types of Backup Devices and Media (00:44)
- Periodic Backup Procedures and Rotation Frequency (01:28)
- Backup Scheme (01:44)
- Summary (00:08)