23 OCT 2025 - We are back! If you have been following us over the last few years, you will know that the last 2 months have been rough. We website was practically not loading. Sorry for the mess. We are back though and everything should run smoothly now. New servers. Updated domains. And new owners. We invite you all to start uploading torrents again!
TORRENT DETAILS
Information Systems Auditor
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Information systems have become an integral part of any modern organization. Many of the business processes are now dependent on the information systems and the data contained in these systems is of critical importance to any enterprise. The need to protect and safeguard these systems is also directly proportional to the increase in their usage. With the information systems becoming so important, the attacks and threats including but not limited to ransomware, data theft, hacking, forgery and brute force are also on the rise. More and more attackers are targeting organization with less control and protection. This course prepares the candidates to put in place effective controls and policies to protect their information systems and assets from unauthorized access and leakage.
Information systems auditor course is a comprehensive course designed with the objective of preparing the candidates to be able to familiarize themselves with the IS audit process, governance, management of IT, IS operations, maintenance and support, IS operations and business resilience as well as protection of information assets.
These information systems or assets can be in the form of databases, files, images, documents and software. The course covers the protection methods and techniques regardless of the form the data is residing within the organization.
After successfully completing this course, the students will be able to:
· Understand the IS audit process
· Plan audit
· Perform risk analysis
· Put in place internal controls
· Learn about different phases of IS audit
· Understand the role of governance in IT/IS
· Make policies, procedures and identify risks
· Create information security policy document
· Conduct management reviews of the policy document
· Perform risk management
· Create in-sourcing and outsourcing strategy
· Perform organizational quality management
· Create project management structure
· Introduce application development best practices
· Plan IS operations and business resiliency plans
· Define RPO/RTO
· Develop disaster recovery plan
· Protect information assets
· Identify exposures and vulnerabilities
· Understand role of encryption in data protection
· Learn the basics of computer forensics
Overall, the course touches all the aspects required to become an effective information systems auditor and perform the taks efficiently. This course also helps the candidates to prepare for the relevant certification, i.e., CISA as the exam topics are in alignment with the concepts taught in this course.
Who this course is for:
· Information systems auditors
· Chief information security officers
· Manager information security
· Manager cyber security
· Information system managers
· Candidates aspiring for CISA certification
Requirements
It is expected that the candidates taking part in this course have a basic know-how of the information security management, business critical information, cyber security, data loss protection and other technologies.
However, this course comprehensively covers the topics related to information systems auditing and policy making.
Last Updated 4/2022
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
.pad/0
15 B
.pad/1
28 B
.pad/2
34 B
TutsNode.com.txt
63 B
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/1. The IS Audit Process.srt
2.1 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/10. Risk Analysis Defined.mp4
37.6 MB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/10. Risk Analysis Defined.srt
12.4 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/11. Assessing Countermeasures.mp4
47.9 MB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/11. Assessing Countermeasures.srt
20.3 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/13. Motivations for Risk Analysis.srt
4.5 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/14. Topic C Internal Controls.srt
979 B
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/15. Internal Controls Objectives & Procedures.srt
9 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/16. Internal Control Types.srt
8.1 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/17. Internal Controls (Preventative).srt
1.1 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/18. Internal Controls (Detective).srt
1.5 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/2. Topic A The Auditing Process and Auditors.srt
817 B
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/20. Goals of Internal Controls.srt
1.7 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/23. The IS Audit Process.srt
2 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/24. Audit Classifications.srt
1.2 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/25. Audit Classifications.srt
7 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/26. Phases of the Audit Process (Page 1).srt
1.5 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/27. Phases of the Audit Process (Page 2).srt
5.7 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/28. Inherent Risks During Audits.srt
1.5 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/29. A Risk-Based Audit Approach.srt
2.7 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/3. Definitions.srt
5.5 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/31. Evidence Gathering Techniques.srt
1.6 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/32. Computer Assisted Audit.srt
877 B
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/33. Control Self-Assessment (CSA).srt
1.6 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/34. Chapter 1 Review.srt
2.9 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/4. Types of Auditors.srt
7 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/5. The Auditing Process.srt
2.4 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/6. The Auditing Process.srt
2.5 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/7. The Auditing Process.srt
5.6 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/8. Audit Planning Process.srt
18.8 KB
[TutsNode.com] - Information Systems Auditor/1. The IS Audit Process/9. Topic B Risk Analysis.srt
914 B
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/1. Governance and Management of IT.srt
1.3 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/11. Information Security Governance.srt
2.4 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/12. Information Security Governance.srt
7.1 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/14. Information Security Governance.srt
823 B
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/19. Policies.srt
7.7 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/2. Topic A The Role of Governance.srt
603 B
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/20. Policies.srt
6 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/21. Information Security Policy Document.srt
10.1 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/25. Procedures.srt
7 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/27. Risk Management - Approaches.srt
6.4 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/3. IT Governance.srt
6.2 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/31. IS Management Practices.srt
5.5 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/32. Personnel Management.srt
9.8 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/33. Sourcing IS Functions.srt
12.2 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/35. Insourcing and Outsourcing Strategy.srt
14 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/37. Change Management.srt
9 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/39. Quality Management.srt
5.8 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/4. IT Governance.srt
5.4 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/41. Performance Management.srt
13.3 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/43. Chapter 2 Review.srt
5.5 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/5. Governance Defined.srt
2.8 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/6. Relationship Structure.srt
1.4 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/8. Role of Auditor.srt
5.9 KB
[TutsNode.com] - Information Systems Auditor/2. Governance and Management of IT/9. Practices & Procedures.srt
1.7 KB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/11. Traditional SDLC Approach.srt
11 KB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/12. Software Development Risks.srt
7.5 KB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/15. Agile Development.srt
6.3 KB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/22. Infrastructure Development and Acquisition.mp4
46.6 MB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/22. Infrastructure Development and Acquisition.srt
13 KB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/25. Hardware Software Acquisition.srt
12.4 KB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/3. Project Management Structure.srt
14.1 KB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/4. Project Management Structure.srt
13.6 KB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/5. Example Organizational Chart.srt
10.6 KB
[TutsNode.com] - Information Systems Auditor/3. IS Operations, Maintenance, and Support/6. Practical Project Management.srt
7.6 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/10. VPN Defined.mp4
37 MB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/10. VPN Defined.srt
10.5 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/11. Wireless Specifications.srt
6.5 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/14. Definitions.srt
7.6 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/15. BCPDR - 7 Steps to Recovery.srt
10.3 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/17. Business Impact Analysis - BIA.srt
6.5 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/18. RPO and RTO.srt
7.3 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/19. Recovery Strategies.srt
9 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/20. Topic D Recovery.mp4
183.9 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/21. Topic D Recovery.mp4
183.9 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/22. Categories of Recovery Strategies.srt
7 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/24. Facilities, Materials, and Supplies.srt
7.4 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/26. Data Recovery.srt
6.2 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/30. BCP Components.srt
8.6 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/31. R.A.I.D..srt
5.9 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/34. Types of BCPDR Testing Strategies.srt
5.6 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/8. Network Types.srt
11.9 KB
[TutsNode.com] - Information Systems Auditor/4. IS Operations and Business Resilience/9. Network Topology.srt
14.6 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/14. Identification and Authentication Mechanisms.srt
10 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/15. Strong Password Policy.srt
8.9 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/18. Dealing with Data.srt
5.9 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/2. Topic A Protecting Data.mp4
461.3 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/20. Client-Server Security.srt
7.9 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/25. Encryption Mechanisms.srt
5.5 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/27. Symmetric vs. Asymmetric.srt
8.2 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/28. Topic E Auditing Practices.mp4
303.9 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/31. Penetration Testing.srt
5.4 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/33. Computer Forensics.srt
8.1 KB
[TutsNode.com] - Information Systems Auditor/5. Protection of Information Assets/9. Exposures and Vulnerabilities.srt