Certified Information Systems Professional - Complete Video Training

Provided by

Enquire about this course

About the course

Certified Information Systems Professional - Complete Video Training
 
Description:
A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional – Complete Video Training course provides you extensive lessons about the Information System field.
 
Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc.
 
In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System.
 
Assessment:
  • At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not.
  • Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.
Certification:
  • After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement.
  • Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24.
Who is this Course for?
Certified Information Systems Professional – Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills.
 
As there is no experience and qualification required for this course, it is available for all students from any academic background.
 
Requirements
Our Certified Information Systems Professional – Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
 
Career Path
After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market.
 
The Process of Auditing Information Systems
Management of the Audit Function
ISACA IT Audit and Assurance Standards and Guidelines
Risk Analysis
Internal Controls
Performing An IS Audit
Control Self-Assessment
The Evolving IS Audit Process
 
Governance and Management of IT
Corporate Governance
IT Governance
IT Monitoring and Assurance Practices for Board and Senior Management
Information Systems Strategy
Maturity and Process Improvement Models
IT Investment and Allocation Practices
Policies and Procedures
Risk Management
IS Management Practices
IS Organizational Structure and Responsibilities
Auditing IT Governance Structure and Implementation
Business Continuity Planning
 
Information Systems Acquisition, Development and Implementation
Business Realization
Project Management Structure
Project Management Practices
Business Application Development
Business Application Systems
Alternative Forms of Software Project Organization
Alternative Development Methods
Infrastructure Development/Acquisition Practices
Information Systems Maintenance Practices
System Development Tools And Productivity Aids
Business Process Reengineering And Process Change Projects
Application Controls
Auditing Application Controls
Auditing Systems Development, Acquisition And Maintenance
 
Information Systems Operations, Maintenance and Support
Information Systems Operations
Information Systems Hardware
IS Architecture and Software
Network Infrastructure
Disaster Recovery Planning
 
Protection of Information Assets
Importance Of Information Security
Logical Access
Network Infrastructure Security
Auditing Information Security Management Framework
Auditing Network Infrastructure Security
Environmental Exposures and Controls
Physical Access Exposures and Controls
Mobile Computing
 
Information Security Governance
Information Security Governance Overview
Effective Information Security Governance
Information Security Concepts and Technologies
Information Security Manager
Scope and Charter of Information Security Governance
Information Security Governance Metrics
Information Security Strategy Overview
Creating Information Security Strategy
Determining Current State Of Security
Information Security Strategy Development
Strategy Resources
Strategy Constraints
Action Plan to Implement Strategy
 
Information Risk Management
Risk Management Overview
Good Information Security Risk Management
Information Security Risk Management Concepts
Implementing Risk Management
Risk Assessment
Controls Countermeasures
Recovery Time Objectives
Risk Monitoring and Communication
 
Information Security Program Development
Development of Information Security Program
Information Security Program Objectives
Information Security Program Development Concepts
Scope and Charter of Information Security Program Development
Information Security Management Framework
Information Security Framework Components
Information Security Program Resources
Implementing an Information Security Program
Information Infrastructure and Architecture
Information Security Program
Security Program Services and Operational Activities
 
Information Security Incident Management
Incident Management Overview
Incident Response Procedures
Incident Management Organization
Incident Management Resources
Incident Management Objectives
Incident Management Metrics and Indicators
Current State of Incident Response Capability
Developing an Incident Response Plan
BCP DRP
Testing Response and Recovery Plans
Executing the Plan
 
Information Systems Security Officer
Risk Management
Security Management
Authentication
Access Control
Security Models
Operations Security
Symmetric Cryptography and Hashing
Asymmetric Cryptography and PKI
Network Connections
Network Protocols and Devices
Telephony, VPNs and Wireless
Security Architecture
Software Development Security
Database Security and System Development
Malware and Software Attacks
Business Continuity
Disaster Recovery
Incident Management, Law, and Ethics
Physical
 
Information Systems Security Professional
Security and Risk Management
Asset Security
Security Engineering
Communication and Network Security
Identity and Access Management
Security Assessment and Testing
Security Operations
Software Development Security

Enquire

Start date Location / delivery
No fixed date Online

Related article

A new centre for cyber security research and training has been co-founded by Imperial College London. Imperial College London (ICL) has founded a n...