Certified Information Systems Professional - Complete Video Training

Course

Online

Save 79%

Special Emagister price

£ 79 £ 379 VAT inc.

Description

  • Type

    Course

  • Level

    Advanced

  • Methodology

    Online

  • Class hours

    54h

  • Duration

    Flexible

  • Start date

    Different dates available

A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional – Complete Video Training course provides you extensive lessons about the Information System field.

Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc.

In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System.

Important information

Price for Emagister users:

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course


Certified Information Systems Professional – Complete Video Training is certified by CPD Qualifications Standards and IAO. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic background.

Our Certified Information Systems Professional – Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation.


On receiving your request an academic officer from the course will call you to explain everything about the course, including how you can sign up, payment options and enrollment periods.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2020

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 6 years

Subjects

  • Security Officer
  • Risk
  • Access
  • Risk Management
  • Governance
  • Audit
  • Auditing
  • Information Systems
  • Network
  • Network security
  • IT Auditing
  • Project
  • Systems
  • Security Management
  • Security Manager
  • IT risk
  • Management of Risk
  • Communication Training
  • Network Training

Teachers and trainers (1)

John Adams John

John Adams John

Instructor

Course programme

COURSE CURRICULUM

The Process of Auditing Information Systems

  • Management of the Audit Function
  • ISACA IT Audit and Assurance Standards and Guidelines
  • Risk Analysis
  • Internal Controls
  • Performing An IS Audit
  • Control Self-Assessment
  • The Evolving IS Audit Process

Governance and Management of IT

  • Corporate Governance
  • IT Governance
  • IT Monitoring and Assurance Practices for Board and Senior Management
  • Information Systems Strategy
  • Maturity and Process Improvement Models
  • IT Investment and Allocation Practices
  • Policies and Procedures
  • Risk Management
  • IS Management Practice
  • IS Organizational Structure and Responsibilities
  • Auditing IT Governance Structure and Implementation
  • Business Continuity Planning

Information Systems Acquisition, Development and Implementation

  • Business Realization
  • Project Management Structure
  • Project Management Practices
  • Business Application Development
  • Business Application Systems
  • Alternative Forms of Software Project Organization
  • Alternative Development Methods
  • Infrastructure Development/Acquisition Practices
  • Information Systems Maintenance Practices
  • System Development Tools And Productivity Aids
  • Business Process Reengineering And Process Change Projects
  • Application Controls
  • Auditing Application Controls
  • Auditing Systems Development, Acquisition And Maintenance

Information Systems Operations, Maintenance and Support

  • Information Systems Operations
  • Information Systems Hardware
  • IS Architecture and Software
  • Network Infrastructure
  • Disaster Recovery Planning

Protection of Information Assets

  • Importance Of Information Security
  • Logical Access
  • Network Infrastructure Security
  • Auditing Information Security Management Framework
  • Auditing Network Infrastructure Security
  • Environmental Exposures and Controls
  • Physical Access Exposures and Controls
  • Mobile Computing

Information Security Governance

  • Information Security Governance Overview9
  • Effective Information Security Governance9
  • Information Security Concepts and Technologies9
  • Information Security Manager9
  • Scope and Charter of Information Security Governance9
  • Information Security Governance Metrics9
  • Information Security Strategy Overview9
  • Creating Information Security Strategy9
  • Determining Current State Of Security9
  • Information Security Strategy Development9
  • Strategy Resources99
  • Strategy Constraints9
  • Action Plan to Implement Strategy9

Information Risk Management

  • Risk Management Overview9
  • Good Information Security Risk Management9
  • Information Security Risk Management Concepts9
  • Implementing Risk Management9
  • Risk Assessment99
  • Controls Countermeasures9
  • Recovery Time Objectives9
  • Risk Monitoring and Communication9

Information Security Program Development

  • Development of Information Security Program9
  • Information Security Program Objectives9
  • Information Security Program Development Concepts9
  • Scope and Charter of Information Security Program Development9
  • Information Security Management Framework9
  • Information Security Framework Components9
  • Information Security Program Resources9
  • Implementing an Information Security Program9
  • Information Infrastructure and Architecture9
  • Information Security Program9
  • Security Program Services and Operational Activities9

Information Security Incident Management

  • Incident Management Overview9
  • Incident Response Procedures9
  • Incident Management Organization9
  • Incident Management Resources9
  • Incident Management Objectives9
  • Incident Management Metrics and Indicators9
  • Current State of Incident Response Capability
  • Developing an Incident Response Plan9
  • BCP DRP9
  • Testing Response and Recovery Plans9
  • Executing the Plan9

Information Systems Security Officer

  • Risk Management
  • Security Management
  • Authentication
  • Access Control
  • Security Models
  • Operations Security
  • Symmetric Cryptography and Hashing
  • Asymmetric Cryptography and PKI
  • Network Connections
  • Network Protocols and Devices
  • Telephony, VPNs and Wireless
  • Security Architecture
  • Software Development Security
  • Database Security and System Development
  • Malware and Software Attacks
  • Business Continuity
  • Disaster Recovery
  • Incident Management, Law, and Ethics
  • Physical

Information Systems Security Professional

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Certified Information Systems Professional - Complete Video Training

Special Emagister price

£ 79 £ 379 VAT inc.