Certified Information Systems Professional - Complete Video Training
Course
Online
Description
-
Type
Course
-
Level
Advanced
-
Methodology
Online
-
Class hours
54h
-
Duration
Flexible
-
Start date
Different dates available
A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional – Complete Video Training course provides you extensive lessons about the Information System field.
Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc.
In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System.
Important information
Price for Emagister users:
Facilities
Location
Start date
Start date
About this course
Certified Information Systems Professional – Complete Video Training is certified by CPD Qualifications Standards and IAO. This makes it perfect for anyone trying to learn potential professional skills.
As there is no experience and qualification required for this course, it is available for all students from any academic background.
Our Certified Information Systems Professional – Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.
On receiving your request an academic officer from the course will call you to explain everything about the course, including how you can sign up, payment options and enrollment periods.
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 6 years
Subjects
- Security Officer
- Risk
- Access
- Risk Management
- Governance
- Audit
- Auditing
- Information Systems
- Network
- Network security
- IT Auditing
- Project
- Systems
- Security Management
- Security Manager
- IT risk
- Management of Risk
- Communication Training
- Network Training
Teachers and trainers (1)
John Adams John
Instructor
Course programme
COURSE CURRICULUM
The Process of Auditing Information Systems
- Management of the Audit Function
- ISACA IT Audit and Assurance Standards and Guidelines
- Risk Analysis
- Internal Controls
- Performing An IS Audit
- Control Self-Assessment
- The Evolving IS Audit Process
Governance and Management of IT
- Corporate Governance
- IT Governance
- IT Monitoring and Assurance Practices for Board and Senior Management
- Information Systems Strategy
- Maturity and Process Improvement Models
- IT Investment and Allocation Practices
- Policies and Procedures
- Risk Management
- IS Management Practice
- IS Organizational Structure and Responsibilities
- Auditing IT Governance Structure and Implementation
- Business Continuity Planning
Information Systems Acquisition, Development and Implementation
- Business Realization
- Project Management Structure
- Project Management Practices
- Business Application Development
- Business Application Systems
- Alternative Forms of Software Project Organization
- Alternative Development Methods
- Infrastructure Development/Acquisition Practices
- Information Systems Maintenance Practices
- System Development Tools And Productivity Aids
- Business Process Reengineering And Process Change Projects
- Application Controls
- Auditing Application Controls
- Auditing Systems Development, Acquisition And Maintenance
Information Systems Operations, Maintenance and Support
- Information Systems Operations
- Information Systems Hardware
- IS Architecture and Software
- Network Infrastructure
- Disaster Recovery Planning
Protection of Information Assets
- Importance Of Information Security
- Logical Access
- Network Infrastructure Security
- Auditing Information Security Management Framework
- Auditing Network Infrastructure Security
- Environmental Exposures and Controls
- Physical Access Exposures and Controls
- Mobile Computing
Information Security Governance
- Information Security Governance Overview9
- Effective Information Security Governance9
- Information Security Concepts and Technologies9
- Information Security Manager9
- Scope and Charter of Information Security Governance9
- Information Security Governance Metrics9
- Information Security Strategy Overview9
- Creating Information Security Strategy9
- Determining Current State Of Security9
- Information Security Strategy Development9
- Strategy Resources99
- Strategy Constraints9
- Action Plan to Implement Strategy9
Information Risk Management
- Risk Management Overview9
- Good Information Security Risk Management9
- Information Security Risk Management Concepts9
- Implementing Risk Management9
- Risk Assessment99
- Controls Countermeasures9
- Recovery Time Objectives9
- Risk Monitoring and Communication9
Information Security Program Development
- Development of Information Security Program9
- Information Security Program Objectives9
- Information Security Program Development Concepts9
- Scope and Charter of Information Security Program Development9
- Information Security Management Framework9
- Information Security Framework Components9
- Information Security Program Resources9
- Implementing an Information Security Program9
- Information Infrastructure and Architecture9
- Information Security Program9
- Security Program Services and Operational Activities9
Information Security Incident Management
- Incident Management Overview9
- Incident Response Procedures9
- Incident Management Organization9
- Incident Management Resources9
- Incident Management Objectives9
- Incident Management Metrics and Indicators9
- Current State of Incident Response Capability
- Developing an Incident Response Plan9
- BCP DRP9
- Testing Response and Recovery Plans9
- Executing the Plan9
Information Systems Security Officer
- Risk Management
- Security Management
- Authentication
- Access Control
- Security Models
- Operations Security
- Symmetric Cryptography and Hashing
- Asymmetric Cryptography and PKI
- Network Connections
- Network Protocols and Devices
- Telephony, VPNs and Wireless
- Security Architecture
- Software Development Security
- Database Security and System Development
- Malware and Software Attacks
- Business Continuity
- Disaster Recovery
- Incident Management, Law, and Ethics
- Physical
Information Systems Security Professional
- Security and Risk Management
- Asset Security
- Security Engineering
- Communication and Network Security
- Identity and Access Management
- Security Assessment and Testing
- Security Operations
- Software Development Security
Certified Information Systems Professional - Complete Video Training