Header Fragment
Logo

A career growth machine

Home All Students Certifications Training Interview Plans Contact Us
  
× Home All Students
AI Resume Builder & Interview
Certifications Training
Books
Interview Plans Contact Us
FAQ
Login

Chapter 2: INFORMATION SYSTEMS AUDITING PROCESS-PLANNING-Types of Audits, Assessments, and Reviews
Chapter 9: INFORMATION SYSTEMS AUDITING PROCESS-EXECUTION-Reporting and Communication Techniques
Chapter 10: INFORMATION SYSTEMS AUDITING PROCESS-EXECUTION-Quality Assurance and Improvement of Audit Process
Chapter 24: INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT & IMPLEMENTATION-INFORMATION SYSTEMS ACQUISITION AND DEVELOPMENT-System Development Methodologies
Chapter 27: INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT & IMPLEMENTATION-INFORMATION SYSTEMS IMPLEMENTATION-Implementation Configuration and Release Management
Chapter 28: INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT & IMPLEMENTATION-INFORMATION SYSTEMS IMPLEMENTATION-System Migration, Infrastructure Deployment, and Data Conversion
Chapter 30: INFORMATION SYSTEMS OPERATIONS & BUSINESS RESILIENCE-INFORMATION SYSTEMS OPERATIONS-IT Components
Chapter 31: INFORMATION SYSTEMS OPERATIONS & BUSINESS RESILIENCE-INFORMATION SYSTEMS OPERATIONS-IT Asset Management
Chapter 34: INFORMATION SYSTEMS OPERATIONS & BUSINESS RESILIENCE-INFORMATION SYSTEMS OPERATIONS-Shadow IT and End-User Computing
Chapter 35: INFORMATION SYSTEMS OPERATIONS & BUSINESS RESILIENCE-INFORMATION SYSTEMS OPERATIONS-Systems Availability and Capacity Management
Chapter 37: INFORMATION SYSTEMS OPERATIONS & BUSINESS RESILIENCE-INFORMATION SYSTEMS OPERATIONS-IT Change, Configuration, and Patch Management
Chapter 38: INFORMATION SYSTEMS OPERATIONS & BUSINESS RESILIENCE-INFORMATION SYSTEMS OPERATIONS-Operational Log Management
Chapter 40: INFORMATION SYSTEMS OPERATIONS & BUSINESS RESILIENCE-INFORMATION SYSTEMS OPERATIONS-Database Management
Chapter 46: PROTECTION OF INFORMATION ASSETS-INFORMATION ASSET SECURITY AND CONTROL-Information Asset Security Frameworks, Standards, and Guidelines
Chapter 48: PROTECTION OF INFORMATION ASSETS-INFORMATION ASSET SECURITY AND CONTROL-Identity and Access Management
Chapter 52: PROTECTION OF INFORMATION ASSETS-INFORMATION ASSET SECURITY AND CONTROL-Public Key Infrastructure
Chapter 54: PROTECTION OF INFORMATION ASSETS-INFORMATION ASSET SECURITY AND CONTROL-Mobile, Wireless, and Internet-of-Things Devices
Chapter 55: PROTECTION OF INFORMATION ASSETS-SECURITY EVENT MANAGEMENT-Security Awareness Training and Programs
Chapter 64: Secondary Classifications – Tasks-Communicate and collect feedback on audit progress, findings, results, and recommendations with stakeholders.
Chapter 65: Secondary Classifications – Tasks-Conduct post-audit follow up to evaluate whether identified risk has been sufficiently addressed.
Chapter 66: Secondary Classifications – Tasks-Utilize data analytics tools to enhance audit processes.
Chapter 68: Secondary Classifications – Tasks-Evaluate audit processes as part of quality assurance and improvement programs.
Chapter 71: Secondary Classifications – Tasks-Evaluate the organization's management of IT policies and practices, including compliance with legal and regulatory requirements.
Chapter 72: Secondary Classifications – Tasks-Evaluate IT resource and project management for alignment with the organization's strategies and objectives.
Chapter 74: Secondary Classifications – Tasks-Determine whether the organization has defined ownership of IT risk, controls, and standards.
Chapter 75: Secondary Classifications – Tasks-Evaluate the monitoring and reporting of IT key performance indicators (KPIs) and IT key risk indicators (KRIs).
Chapter 76: Secondary Classifications – Tasks-Evaluate the organization's ability to continue business operations.
Chapter 78: Secondary Classifications – Tasks-Evaluate whether the business cases related to information systems meet business objectives.
Chapter 79: Secondary Classifications – Tasks-Evaluate whether IT vendor selection and contract management processes meet business, legal, and regulatory requirements.
Chapter 81: Secondary Classifications – Tasks-Evaluate controls at all stages of the information systems development life cycle.
Chapter 84: Secondary Classifications – Tasks-Evaluate whether effective processes are in place to support end users.
Chapter 86: Secondary Classifications – Tasks-Conduct periodic review of information systems and enterprise architecture (EA) to determine alignment with organizational objectives.
Chapter 87: Secondary Classifications – Tasks-Evaluate whether IT operations and maintenance practices support the organization's objectives.
Chapter 91: Secondary Classifications – Tasks-Evaluate data classification practices for alignment with the organization's data governance program, privacy program, and applicable external requirements.
Chapter 93: Secondary Classifications – Tasks-Evaluate the organization's change, configuration, release, and patch management programs.
Chapter 94: Secondary Classifications – Tasks-Evaluate the organization's log management program.
Chapter 95: Secondary Classifications – Tasks-Evaluate the organization's policies and practices related to asset life cycle management.
Chapter 96: Secondary Classifications – Tasks-Evaluate risk associated with shadow IT and end-user computing (EUC) to determine effectiveness of compensating controls.
Chapter 99: Secondary Classifications – Tasks-Utilize technical security testing to identify potential vulnerabilities.
Chapter 100: Secondary Classifications – Tasks-Evaluate logical, physical, and environmental controls to verify the confidentiality, integrity, and availability of information assets.
Chapter 101: Secondary Classifications – Tasks-Evaluate the organization's security awareness training program.
Chapter 102: Secondary Classifications – Tasks-Provide guidance to the organization in order to improve the quality and control of information systems.
Chapter 103: Secondary Classifications – Tasks-Evaluate potential opportunities and risks associated with emerging technologies, regulations, and industry practices.

Combo Packages at a Discount: Get one that best fits your learning needs.