Épisodes

  • Introduction of CISA Essentials
    Nov 2 2024

    Part 1: Foundations of Information Systems Auditing

    Part 2: IT Governance and Management

    Part 3: Acquisition, Development, and Implementation of Information Systems

    Part 4: Information Systems Operations and Business Resilience

    Part 5: Protection of Information Assets

    Part 6: Advanced Topics and Emerging Trends

    Part 7: CISA Exam Preparation and Career Development

    Afficher plus Afficher moins
    13 min
  • Foundations of IS Auditing
    Nov 2 2024

    I. Introduction to Information Systems Auditing

    II. Scope and Evolution of Information Systems Auditing

    III. The Certified Information Systems Auditor (CISA) Certification

    IV. Adhering to Auditing Standards and Frameworks

    V. Utilizing Additional Frameworks and Standards

    VI. The Risk-Based Audit Approach

    VII. Risk Assessment in Information Systems Auditing

    VIII. Audit Planning and Execution Process

    IX. Communication in the Audit Process

    X. The Audit Report and Recommendations

    XI. Conclusion

    Afficher plus Afficher moins
    20 min
  • IT Governance and Management
    Nov 2 2024

    I. Introduction to IT Governance and Management

    II. The Cornerstone: Principles and Best Practices

    III. Establishing a Clear Organizational Structure

    IV. Aligning IT Strategy with Business Objectives

    V. Utilizing the Balanced Scorecard Approach

    VI. IT Resource Management and Optimization

    VII. Technological Resource Optimization

    VIII. Implementing Robust IT Portfolio Management

    IX. IT Performance Measurement and Monitoring

    X. Utilizing IT Balanced Scorecards and Dashboards

    XI. The Role of IT Policies, Procedures, and Standards

    XII. Collaborative Development and Effective Communication

    XIII. Developing Detailed Procedures and Standards

    XIV. The Continuous Process of IT Governance and Management

    XV. Looking Ahead: Information Systems Acquisition, Development, and Implementation

    Afficher plus Afficher moins
    23 min
  • IS Acquisition, Development, and Implementation
    Nov 2 2024

    I. Introduction: Setting the Stage for Information Systems Implementation

    II. Project Management Methodologies: Providing a Framework for Success

    III. Agile Methodologies: Embracing Flexibility and Collaboration

    IV. Systems Development Life Cycle (SDLC): A Structured Path to System Creation

    V. Planning Phase: Laying the Foundation for Project Success

    VI. Analysis Phase: Gathering and Documenting Detailed Requirements

    VII. Design Phase: Translating Requirements into a System Blueprint

    VIII. Testing: Ensure System Quality and Reliability

    IX. Implementation Phase: Bringing the Design to Life

    X. Deployment: Transitioning to the New System

    XI. Post-Implementation Review: Evaluating Project Success and Identifying Lessons Learned

    XII. Maintenance and Support: Ensuring System Longevity and Effectiveness

    XIII. Future Trends in Information Systems Development

    XIV. Conclusion: The Importance of Strategic Information Systems Implementation

    Afficher plus Afficher moins
    20 min
  • IS Operations and Business Resilience
    Nov 2 2024

    I. Introduction: Setting the Stage for Operational Excellence

    II. The Cornerstone: IT Service Management (ITSM)

    III. Key Components of Effective ITSM

    IV. Ensuring Stability and Reliability: Incident and Problem Management

    V. Building Business Resilience: BCP and DR

    VI. Optimizing Performance and Capacity: Proactive Measures

    VII. Conclusion: The Interconnected Nature of IT Operations and Business Resilience

    Afficher plus Afficher moins
    17 min
  • Protection of Information Assets
    Nov 2 2024

    I. Introduction: The Importance of Information Asset Protection

    II. The Foundation: Information Security Governance

    III. Striking a Balance: Security and Usability

    IV. Controlling Access, Managing Identities

    V. Evolving Approaches: IAM and Zero Trust

    VI. Securing the Network, Leveraging Cryptography

    VII. Navigating the Landscape: Data Privacy and Protection Regulations

    VIII. Privacy by Design: Embracing PETs

    IX. Building a Culture of Security: Awareness and Training

    X. Conclusion: A Dynamic and Evolving Field

    Afficher plus Afficher moins
    27 min