The Complete Guide for CISA Examination Preparation:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Milton
Auerbach Publishers, Incorporated
2020
|
Schriftenreihe: | Internal Audit and IT Audit Ser
|
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (273 Seiten) |
ISBN: | 9780429644092 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048220285 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220516s2020 |||| o||u| ||||||eng d | ||
020 | |a 9780429644092 |9 978-0-429-64409-2 | ||
035 | |a (ZDB-30-PQE)EBC6388574 | ||
035 | |a (ZDB-30-PAD)EBC6388574 | ||
035 | |a (ZDB-89-EBL)EBL6388574 | ||
035 | |a (OCoLC)1319620622 | ||
035 | |a (DE-599)BVBBV048220285 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.4038011 | |
100 | 1 | |a Cascarino, Richard E. |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Complete Guide for CISA Examination Preparation |
264 | 1 | |a Milton |b Auerbach Publishers, Incorporated |c 2020 | |
264 | 4 | |c ©2020 | |
300 | |a 1 Online-Ressource (273 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Internal Audit and IT Audit Ser | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- The Complete Guide for CISA Examination Preparation -- Chapter 1 Introduction to the CISA Examination -- The Examination Itself -- Becoming Certified -- Experience Requirements -- Educational Waivers -- Passing the Examination -- CISA Job Practice Domains and Task and Knowledge Statements -- ISACA's Code of Professional Ethics -- The ISACA Standards -- Continuous Professional Education (CPE) -- Chapter 2 Domain 1 - The Process of Auditing Information Systems -- The First Task -- The Second Task -- The Third Task -- The Fourth Task -- The Final Stage -- Knowledge Statements -- Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics, and Other Applicable Standards -- Understanding the Fundamental Business Processes -- Control Principles Related to Controls in Information Systems -- Reliability and Integrity of Information -- Compliance with Policies, Plans, Procedures, Laws, and Regulations -- Safeguarding of Assets -- Effectiveness and Efficiency of Operations -- Risk-Based Audit Planning and Audit Project Management Techniques -- Inherent Risk -- Control Risk -- Audit Risk -- Planning the Audit Project -- Quality of the Internal Control Framework -- Competence of Management -- Complexity of Transactions -- Liquidity of Assets -- Ethical Climate and Employee Morale -- Auditor Understanding of the Applicable Laws and Regulations That Affect the Scope, Evidence Collection and Preservation, and Frequency of Audits -- Evidence Collection Techniques -- Audit Techniques -- Automated Audit Tools -- Domain 1 - Examination Tips -- Domain 1 - Practice Questions -- Domain One - Review Questions and Hands-On Exercise -- Domain 1 - Answers to Practice Questions -- Exercise 1 Sample Answer | |
505 | 8 | |a Chapter 3 Domain 2 - Governance and Management of IT -- Governance in General -- IT Architecture -- IT Policies and Standards -- Project Management -- Role of the Project Management Office (PMO) -- Resource Management -- Project Planning -- Function Point Analysis -- Project Tracking and Oversight -- Project Management Tools -- GANTT or Bar Charts -- Program Evaluation Review Techniques (Also Known as a Network Diagram) -- Critical Path Method -- Timebox Management -- Management of Resource Usage -- Auditor's Role in the Project Management Process -- Audit Risk Assessment -- Audit Planning -- Domain 2 - Practice Questions -- Domain 2 - Review Questions and Hands-on Exercise -- Exercise 2 - Audit of Customer Receivables -- You are required to: -- Exercise 2 Sample Answer -- Domain 2 - Answers to Practice Questions -- Chapter 4 Domain 3 - Information Systems Acquisition, Development, and Implementation -- Systems Acquisition -- Cloud-Based Systems Acquisition -- Systems Development -- The SDLC -- The Iterative Model -- Prototyping and Rapid Application Development (RAD) -- Agile Methodologies -- Lean Methodology -- Systems Implementation -- Systems Maintenance Review -- Domain 3 - Practice Questions -- Domain 3 - Review Questions and Hands-On Exercise -- Exercise 3 -- Required -- Exercise 3 Sample Answer -- Domain 3 - Answers to Practice Questions -- Chapter 5 Domain 4 - Information Systems Operations, Maintenance, and Service Management -- Hardware -- CPU -- Peripherals -- Memory -- Computer Types -- Networks -- Storage -- Communications -- Input -- Output -- Control -- Systems Software -- Auditing Operating Systems -- People -- Job Scheduling -- System Interfaces -- Frameworks -- ITIL -- Change Management -- Change Management in the Use of Cloud-Based Applications -- Problem Management -- Auditing Change Control -- Service Management | |
505 | 8 | |a Disaster Recovery Planning -- Auditing Service Delivery -- Domain 4 - Practice Questions -- Domain 4 - Review Questions and Hands-On Exercise -- Exercise 4 -- Exercise 4 Sample Answer -- Domain 4 - Answers to Practice Questions -- Chapter 6 Domain 5 - Protection of Information Assets -- Protection of Information Assets -- Privacy Principles -- Design, Implementation, Maintenance, Monitoring, and Reporting of Security Controls -- Physical and Environmental Controls and Supporting Practices for the Protection of Information Assets -- Physical Access Controls for the Identification, Authentication, and Restriction of Users -- Environmental Controls -- Logical Access Controls for the Identification, Authentication, and Restriction of Users -- Risk and Controls Associated with Virtualization of Systems -- Risks and Controls Associated with the Use of Mobile and Wireless Devices -- Voice Communications Security -- Network and Internet Security Devices, Protocols, and Techniques -- Configuration, Implementation, Operation, and Maintenance of Network Security Controls -- Encryption-Related Techniques and Their Uses -- Public Key Infrastructure (PKI) Components and Digital Signature Techniques -- Peer-to-Peer Computing, Instant Messaging, and Web-Based Technologies -- Data Classification Standards Related to the Protection of Information Assets -- Storage, Retrieval, Transportation, and Disposal of Confidential Information Assets -- Data Leakage -- Risks in End-User Computing -- Implementing a Security Awareness Program -- Information System Attack Methods and Techniques -- Prevention and Detection Tools and Control Techniques -- Malware -- Phishing -- Pharming -- Password Attacks -- Denial of Service (DoS) Attacks -- 'Man in the Middle' (MITM) attacks -- Drive-By Downloads -- Rogue Software -- Ransomware -- Spyware and Adware -- Social Engineering | |
505 | 8 | |a Security Testing Techniques -- Penetration Testing and Vulnerability Scanning -- Monitoring and Responding to Security Incidents -- Forensic Investigation and Procedures in Collection and Preservation of the Data and Evidence -- Domain 5 - Practice Questions -- Domain 5 - Review Questions and Hands-On Exercise -- Exercise 5 -- Exercise 5 Sample Answer -- Domain 5 - Answers to Practice Questions -- Chapter 7 Preparing for the Examination -- Appendix A: Glossary of Terms -- Appendix B: CISA Sample Examination - Choose Any 150 Questions -- Appendix C: Sample Examination Answers -- Index | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Cascarino, Richard E. |t The Complete Guide for CISA Examination Preparation |d Milton : Auerbach Publishers, Incorporated,c2020 |z 9781138308763 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033601031 |
Datensatz im Suchindex
_version_ | 1804184000771653632 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Cascarino, Richard E. |
author_facet | Cascarino, Richard E. |
author_role | aut |
author_sort | Cascarino, Richard E. |
author_variant | r e c re rec |
building | Verbundindex |
bvnumber | BV048220285 |
collection | ZDB-30-PQE |
contents | Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- The Complete Guide for CISA Examination Preparation -- Chapter 1 Introduction to the CISA Examination -- The Examination Itself -- Becoming Certified -- Experience Requirements -- Educational Waivers -- Passing the Examination -- CISA Job Practice Domains and Task and Knowledge Statements -- ISACA's Code of Professional Ethics -- The ISACA Standards -- Continuous Professional Education (CPE) -- Chapter 2 Domain 1 - The Process of Auditing Information Systems -- The First Task -- The Second Task -- The Third Task -- The Fourth Task -- The Final Stage -- Knowledge Statements -- Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics, and Other Applicable Standards -- Understanding the Fundamental Business Processes -- Control Principles Related to Controls in Information Systems -- Reliability and Integrity of Information -- Compliance with Policies, Plans, Procedures, Laws, and Regulations -- Safeguarding of Assets -- Effectiveness and Efficiency of Operations -- Risk-Based Audit Planning and Audit Project Management Techniques -- Inherent Risk -- Control Risk -- Audit Risk -- Planning the Audit Project -- Quality of the Internal Control Framework -- Competence of Management -- Complexity of Transactions -- Liquidity of Assets -- Ethical Climate and Employee Morale -- Auditor Understanding of the Applicable Laws and Regulations That Affect the Scope, Evidence Collection and Preservation, and Frequency of Audits -- Evidence Collection Techniques -- Audit Techniques -- Automated Audit Tools -- Domain 1 - Examination Tips -- Domain 1 - Practice Questions -- Domain One - Review Questions and Hands-On Exercise -- Domain 1 - Answers to Practice Questions -- Exercise 1 Sample Answer Chapter 3 Domain 2 - Governance and Management of IT -- Governance in General -- IT Architecture -- IT Policies and Standards -- Project Management -- Role of the Project Management Office (PMO) -- Resource Management -- Project Planning -- Function Point Analysis -- Project Tracking and Oversight -- Project Management Tools -- GANTT or Bar Charts -- Program Evaluation Review Techniques (Also Known as a Network Diagram) -- Critical Path Method -- Timebox Management -- Management of Resource Usage -- Auditor's Role in the Project Management Process -- Audit Risk Assessment -- Audit Planning -- Domain 2 - Practice Questions -- Domain 2 - Review Questions and Hands-on Exercise -- Exercise 2 - Audit of Customer Receivables -- You are required to: -- Exercise 2 Sample Answer -- Domain 2 - Answers to Practice Questions -- Chapter 4 Domain 3 - Information Systems Acquisition, Development, and Implementation -- Systems Acquisition -- Cloud-Based Systems Acquisition -- Systems Development -- The SDLC -- The Iterative Model -- Prototyping and Rapid Application Development (RAD) -- Agile Methodologies -- Lean Methodology -- Systems Implementation -- Systems Maintenance Review -- Domain 3 - Practice Questions -- Domain 3 - Review Questions and Hands-On Exercise -- Exercise 3 -- Required -- Exercise 3 Sample Answer -- Domain 3 - Answers to Practice Questions -- Chapter 5 Domain 4 - Information Systems Operations, Maintenance, and Service Management -- Hardware -- CPU -- Peripherals -- Memory -- Computer Types -- Networks -- Storage -- Communications -- Input -- Output -- Control -- Systems Software -- Auditing Operating Systems -- People -- Job Scheduling -- System Interfaces -- Frameworks -- ITIL -- Change Management -- Change Management in the Use of Cloud-Based Applications -- Problem Management -- Auditing Change Control -- Service Management Disaster Recovery Planning -- Auditing Service Delivery -- Domain 4 - Practice Questions -- Domain 4 - Review Questions and Hands-On Exercise -- Exercise 4 -- Exercise 4 Sample Answer -- Domain 4 - Answers to Practice Questions -- Chapter 6 Domain 5 - Protection of Information Assets -- Protection of Information Assets -- Privacy Principles -- Design, Implementation, Maintenance, Monitoring, and Reporting of Security Controls -- Physical and Environmental Controls and Supporting Practices for the Protection of Information Assets -- Physical Access Controls for the Identification, Authentication, and Restriction of Users -- Environmental Controls -- Logical Access Controls for the Identification, Authentication, and Restriction of Users -- Risk and Controls Associated with Virtualization of Systems -- Risks and Controls Associated with the Use of Mobile and Wireless Devices -- Voice Communications Security -- Network and Internet Security Devices, Protocols, and Techniques -- Configuration, Implementation, Operation, and Maintenance of Network Security Controls -- Encryption-Related Techniques and Their Uses -- Public Key Infrastructure (PKI) Components and Digital Signature Techniques -- Peer-to-Peer Computing, Instant Messaging, and Web-Based Technologies -- Data Classification Standards Related to the Protection of Information Assets -- Storage, Retrieval, Transportation, and Disposal of Confidential Information Assets -- Data Leakage -- Risks in End-User Computing -- Implementing a Security Awareness Program -- Information System Attack Methods and Techniques -- Prevention and Detection Tools and Control Techniques -- Malware -- Phishing -- Pharming -- Password Attacks -- Denial of Service (DoS) Attacks -- 'Man in the Middle' (MITM) attacks -- Drive-By Downloads -- Rogue Software -- Ransomware -- Spyware and Adware -- Social Engineering Security Testing Techniques -- Penetration Testing and Vulnerability Scanning -- Monitoring and Responding to Security Incidents -- Forensic Investigation and Procedures in Collection and Preservation of the Data and Evidence -- Domain 5 - Practice Questions -- Domain 5 - Review Questions and Hands-On Exercise -- Exercise 5 -- Exercise 5 Sample Answer -- Domain 5 - Answers to Practice Questions -- Chapter 7 Preparing for the Examination -- Appendix A: Glossary of Terms -- Appendix B: CISA Sample Examination - Choose Any 150 Questions -- Appendix C: Sample Examination Answers -- Index |
ctrlnum | (ZDB-30-PQE)EBC6388574 (ZDB-30-PAD)EBC6388574 (ZDB-89-EBL)EBL6388574 (OCoLC)1319620622 (DE-599)BVBBV048220285 |
dewey-full | 658.4038011 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4038011 |
dewey-search | 658.4038011 |
dewey-sort | 3658.4038011 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07502nmm a2200397zc 4500</leader><controlfield tag="001">BV048220285</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220516s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780429644092</subfield><subfield code="9">978-0-429-64409-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6388574</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6388574</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6388574</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1319620622</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048220285</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.4038011</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cascarino, Richard E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Complete Guide for CISA Examination Preparation</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Milton</subfield><subfield code="b">Auerbach Publishers, Incorporated</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (273 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Internal Audit and IT Audit Ser</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- The Complete Guide for CISA Examination Preparation -- Chapter 1 Introduction to the CISA Examination -- The Examination Itself -- Becoming Certified -- Experience Requirements -- Educational Waivers -- Passing the Examination -- CISA Job Practice Domains and Task and Knowledge Statements -- ISACA's Code of Professional Ethics -- The ISACA Standards -- Continuous Professional Education (CPE) -- Chapter 2 Domain 1 - The Process of Auditing Information Systems -- The First Task -- The Second Task -- The Third Task -- The Fourth Task -- The Final Stage -- Knowledge Statements -- Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics, and Other Applicable Standards -- Understanding the Fundamental Business Processes -- Control Principles Related to Controls in Information Systems -- Reliability and Integrity of Information -- Compliance with Policies, Plans, Procedures, Laws, and Regulations -- Safeguarding of Assets -- Effectiveness and Efficiency of Operations -- Risk-Based Audit Planning and Audit Project Management Techniques -- Inherent Risk -- Control Risk -- Audit Risk -- Planning the Audit Project -- Quality of the Internal Control Framework -- Competence of Management -- Complexity of Transactions -- Liquidity of Assets -- Ethical Climate and Employee Morale -- Auditor Understanding of the Applicable Laws and Regulations That Affect the Scope, Evidence Collection and Preservation, and Frequency of Audits -- Evidence Collection Techniques -- Audit Techniques -- Automated Audit Tools -- Domain 1 - Examination Tips -- Domain 1 - Practice Questions -- Domain One - Review Questions and Hands-On Exercise -- Domain 1 - Answers to Practice Questions -- Exercise 1 Sample Answer</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 3 Domain 2 - Governance and Management of IT -- Governance in General -- IT Architecture -- IT Policies and Standards -- Project Management -- Role of the Project Management Office (PMO) -- Resource Management -- Project Planning -- Function Point Analysis -- Project Tracking and Oversight -- Project Management Tools -- GANTT or Bar Charts -- Program Evaluation Review Techniques (Also Known as a Network Diagram) -- Critical Path Method -- Timebox Management -- Management of Resource Usage -- Auditor's Role in the Project Management Process -- Audit Risk Assessment -- Audit Planning -- Domain 2 - Practice Questions -- Domain 2 - Review Questions and Hands-on Exercise -- Exercise 2 - Audit of Customer Receivables -- You are required to: -- Exercise 2 Sample Answer -- Domain 2 - Answers to Practice Questions -- Chapter 4 Domain 3 - Information Systems Acquisition, Development, and Implementation -- Systems Acquisition -- Cloud-Based Systems Acquisition -- Systems Development -- The SDLC -- The Iterative Model -- Prototyping and Rapid Application Development (RAD) -- Agile Methodologies -- Lean Methodology -- Systems Implementation -- Systems Maintenance Review -- Domain 3 - Practice Questions -- Domain 3 - Review Questions and Hands-On Exercise -- Exercise 3 -- Required -- Exercise 3 Sample Answer -- Domain 3 - Answers to Practice Questions -- Chapter 5 Domain 4 - Information Systems Operations, Maintenance, and Service Management -- Hardware -- CPU -- Peripherals -- Memory -- Computer Types -- Networks -- Storage -- Communications -- Input -- Output -- Control -- Systems Software -- Auditing Operating Systems -- People -- Job Scheduling -- System Interfaces -- Frameworks -- ITIL -- Change Management -- Change Management in the Use of Cloud-Based Applications -- Problem Management -- Auditing Change Control -- Service Management</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Disaster Recovery Planning -- Auditing Service Delivery -- Domain 4 - Practice Questions -- Domain 4 - Review Questions and Hands-On Exercise -- Exercise 4 -- Exercise 4 Sample Answer -- Domain 4 - Answers to Practice Questions -- Chapter 6 Domain 5 - Protection of Information Assets -- Protection of Information Assets -- Privacy Principles -- Design, Implementation, Maintenance, Monitoring, and Reporting of Security Controls -- Physical and Environmental Controls and Supporting Practices for the Protection of Information Assets -- Physical Access Controls for the Identification, Authentication, and Restriction of Users -- Environmental Controls -- Logical Access Controls for the Identification, Authentication, and Restriction of Users -- Risk and Controls Associated with Virtualization of Systems -- Risks and Controls Associated with the Use of Mobile and Wireless Devices -- Voice Communications Security -- Network and Internet Security Devices, Protocols, and Techniques -- Configuration, Implementation, Operation, and Maintenance of Network Security Controls -- Encryption-Related Techniques and Their Uses -- Public Key Infrastructure (PKI) Components and Digital Signature Techniques -- Peer-to-Peer Computing, Instant Messaging, and Web-Based Technologies -- Data Classification Standards Related to the Protection of Information Assets -- Storage, Retrieval, Transportation, and Disposal of Confidential Information Assets -- Data Leakage -- Risks in End-User Computing -- Implementing a Security Awareness Program -- Information System Attack Methods and Techniques -- Prevention and Detection Tools and Control Techniques -- Malware -- Phishing -- Pharming -- Password Attacks -- Denial of Service (DoS) Attacks -- 'Man in the Middle' (MITM) attacks -- Drive-By Downloads -- Rogue Software -- Ransomware -- Spyware and Adware -- Social Engineering</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Security Testing Techniques -- Penetration Testing and Vulnerability Scanning -- Monitoring and Responding to Security Incidents -- Forensic Investigation and Procedures in Collection and Preservation of the Data and Evidence -- Domain 5 - Practice Questions -- Domain 5 - Review Questions and Hands-On Exercise -- Exercise 5 -- Exercise 5 Sample Answer -- Domain 5 - Answers to Practice Questions -- Chapter 7 Preparing for the Examination -- Appendix A: Glossary of Terms -- Appendix B: CISA Sample Examination - Choose Any 150 Questions -- Appendix C: Sample Examination Answers -- Index</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Cascarino, Richard E.</subfield><subfield code="t">The Complete Guide for CISA Examination Preparation</subfield><subfield code="d">Milton : Auerbach Publishers, Incorporated,c2020</subfield><subfield code="z">9781138308763</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033601031</subfield></datafield></record></collection> |
id | DE-604.BV048220285 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:50:30Z |
indexdate | 2024-07-10T09:32:23Z |
institution | BVB |
isbn | 9780429644092 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033601031 |
oclc_num | 1319620622 |
open_access_boolean | |
physical | 1 Online-Ressource (273 Seiten) |
psigel | ZDB-30-PQE |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Auerbach Publishers, Incorporated |
record_format | marc |
series2 | Internal Audit and IT Audit Ser |
spelling | Cascarino, Richard E. Verfasser aut The Complete Guide for CISA Examination Preparation Milton Auerbach Publishers, Incorporated 2020 ©2020 1 Online-Ressource (273 Seiten) txt rdacontent c rdamedia cr rdacarrier Internal Audit and IT Audit Ser Description based on publisher supplied metadata and other sources Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- The Complete Guide for CISA Examination Preparation -- Chapter 1 Introduction to the CISA Examination -- The Examination Itself -- Becoming Certified -- Experience Requirements -- Educational Waivers -- Passing the Examination -- CISA Job Practice Domains and Task and Knowledge Statements -- ISACA's Code of Professional Ethics -- The ISACA Standards -- Continuous Professional Education (CPE) -- Chapter 2 Domain 1 - The Process of Auditing Information Systems -- The First Task -- The Second Task -- The Third Task -- The Fourth Task -- The Final Stage -- Knowledge Statements -- Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics, and Other Applicable Standards -- Understanding the Fundamental Business Processes -- Control Principles Related to Controls in Information Systems -- Reliability and Integrity of Information -- Compliance with Policies, Plans, Procedures, Laws, and Regulations -- Safeguarding of Assets -- Effectiveness and Efficiency of Operations -- Risk-Based Audit Planning and Audit Project Management Techniques -- Inherent Risk -- Control Risk -- Audit Risk -- Planning the Audit Project -- Quality of the Internal Control Framework -- Competence of Management -- Complexity of Transactions -- Liquidity of Assets -- Ethical Climate and Employee Morale -- Auditor Understanding of the Applicable Laws and Regulations That Affect the Scope, Evidence Collection and Preservation, and Frequency of Audits -- Evidence Collection Techniques -- Audit Techniques -- Automated Audit Tools -- Domain 1 - Examination Tips -- Domain 1 - Practice Questions -- Domain One - Review Questions and Hands-On Exercise -- Domain 1 - Answers to Practice Questions -- Exercise 1 Sample Answer Chapter 3 Domain 2 - Governance and Management of IT -- Governance in General -- IT Architecture -- IT Policies and Standards -- Project Management -- Role of the Project Management Office (PMO) -- Resource Management -- Project Planning -- Function Point Analysis -- Project Tracking and Oversight -- Project Management Tools -- GANTT or Bar Charts -- Program Evaluation Review Techniques (Also Known as a Network Diagram) -- Critical Path Method -- Timebox Management -- Management of Resource Usage -- Auditor's Role in the Project Management Process -- Audit Risk Assessment -- Audit Planning -- Domain 2 - Practice Questions -- Domain 2 - Review Questions and Hands-on Exercise -- Exercise 2 - Audit of Customer Receivables -- You are required to: -- Exercise 2 Sample Answer -- Domain 2 - Answers to Practice Questions -- Chapter 4 Domain 3 - Information Systems Acquisition, Development, and Implementation -- Systems Acquisition -- Cloud-Based Systems Acquisition -- Systems Development -- The SDLC -- The Iterative Model -- Prototyping and Rapid Application Development (RAD) -- Agile Methodologies -- Lean Methodology -- Systems Implementation -- Systems Maintenance Review -- Domain 3 - Practice Questions -- Domain 3 - Review Questions and Hands-On Exercise -- Exercise 3 -- Required -- Exercise 3 Sample Answer -- Domain 3 - Answers to Practice Questions -- Chapter 5 Domain 4 - Information Systems Operations, Maintenance, and Service Management -- Hardware -- CPU -- Peripherals -- Memory -- Computer Types -- Networks -- Storage -- Communications -- Input -- Output -- Control -- Systems Software -- Auditing Operating Systems -- People -- Job Scheduling -- System Interfaces -- Frameworks -- ITIL -- Change Management -- Change Management in the Use of Cloud-Based Applications -- Problem Management -- Auditing Change Control -- Service Management Disaster Recovery Planning -- Auditing Service Delivery -- Domain 4 - Practice Questions -- Domain 4 - Review Questions and Hands-On Exercise -- Exercise 4 -- Exercise 4 Sample Answer -- Domain 4 - Answers to Practice Questions -- Chapter 6 Domain 5 - Protection of Information Assets -- Protection of Information Assets -- Privacy Principles -- Design, Implementation, Maintenance, Monitoring, and Reporting of Security Controls -- Physical and Environmental Controls and Supporting Practices for the Protection of Information Assets -- Physical Access Controls for the Identification, Authentication, and Restriction of Users -- Environmental Controls -- Logical Access Controls for the Identification, Authentication, and Restriction of Users -- Risk and Controls Associated with Virtualization of Systems -- Risks and Controls Associated with the Use of Mobile and Wireless Devices -- Voice Communications Security -- Network and Internet Security Devices, Protocols, and Techniques -- Configuration, Implementation, Operation, and Maintenance of Network Security Controls -- Encryption-Related Techniques and Their Uses -- Public Key Infrastructure (PKI) Components and Digital Signature Techniques -- Peer-to-Peer Computing, Instant Messaging, and Web-Based Technologies -- Data Classification Standards Related to the Protection of Information Assets -- Storage, Retrieval, Transportation, and Disposal of Confidential Information Assets -- Data Leakage -- Risks in End-User Computing -- Implementing a Security Awareness Program -- Information System Attack Methods and Techniques -- Prevention and Detection Tools and Control Techniques -- Malware -- Phishing -- Pharming -- Password Attacks -- Denial of Service (DoS) Attacks -- 'Man in the Middle' (MITM) attacks -- Drive-By Downloads -- Rogue Software -- Ransomware -- Spyware and Adware -- Social Engineering Security Testing Techniques -- Penetration Testing and Vulnerability Scanning -- Monitoring and Responding to Security Incidents -- Forensic Investigation and Procedures in Collection and Preservation of the Data and Evidence -- Domain 5 - Practice Questions -- Domain 5 - Review Questions and Hands-On Exercise -- Exercise 5 -- Exercise 5 Sample Answer -- Domain 5 - Answers to Practice Questions -- Chapter 7 Preparing for the Examination -- Appendix A: Glossary of Terms -- Appendix B: CISA Sample Examination - Choose Any 150 Questions -- Appendix C: Sample Examination Answers -- Index Erscheint auch als Druck-Ausgabe Cascarino, Richard E. The Complete Guide for CISA Examination Preparation Milton : Auerbach Publishers, Incorporated,c2020 9781138308763 |
spellingShingle | Cascarino, Richard E. The Complete Guide for CISA Examination Preparation Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- The Complete Guide for CISA Examination Preparation -- Chapter 1 Introduction to the CISA Examination -- The Examination Itself -- Becoming Certified -- Experience Requirements -- Educational Waivers -- Passing the Examination -- CISA Job Practice Domains and Task and Knowledge Statements -- ISACA's Code of Professional Ethics -- The ISACA Standards -- Continuous Professional Education (CPE) -- Chapter 2 Domain 1 - The Process of Auditing Information Systems -- The First Task -- The Second Task -- The Third Task -- The Fourth Task -- The Final Stage -- Knowledge Statements -- Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics, and Other Applicable Standards -- Understanding the Fundamental Business Processes -- Control Principles Related to Controls in Information Systems -- Reliability and Integrity of Information -- Compliance with Policies, Plans, Procedures, Laws, and Regulations -- Safeguarding of Assets -- Effectiveness and Efficiency of Operations -- Risk-Based Audit Planning and Audit Project Management Techniques -- Inherent Risk -- Control Risk -- Audit Risk -- Planning the Audit Project -- Quality of the Internal Control Framework -- Competence of Management -- Complexity of Transactions -- Liquidity of Assets -- Ethical Climate and Employee Morale -- Auditor Understanding of the Applicable Laws and Regulations That Affect the Scope, Evidence Collection and Preservation, and Frequency of Audits -- Evidence Collection Techniques -- Audit Techniques -- Automated Audit Tools -- Domain 1 - Examination Tips -- Domain 1 - Practice Questions -- Domain One - Review Questions and Hands-On Exercise -- Domain 1 - Answers to Practice Questions -- Exercise 1 Sample Answer Chapter 3 Domain 2 - Governance and Management of IT -- Governance in General -- IT Architecture -- IT Policies and Standards -- Project Management -- Role of the Project Management Office (PMO) -- Resource Management -- Project Planning -- Function Point Analysis -- Project Tracking and Oversight -- Project Management Tools -- GANTT or Bar Charts -- Program Evaluation Review Techniques (Also Known as a Network Diagram) -- Critical Path Method -- Timebox Management -- Management of Resource Usage -- Auditor's Role in the Project Management Process -- Audit Risk Assessment -- Audit Planning -- Domain 2 - Practice Questions -- Domain 2 - Review Questions and Hands-on Exercise -- Exercise 2 - Audit of Customer Receivables -- You are required to: -- Exercise 2 Sample Answer -- Domain 2 - Answers to Practice Questions -- Chapter 4 Domain 3 - Information Systems Acquisition, Development, and Implementation -- Systems Acquisition -- Cloud-Based Systems Acquisition -- Systems Development -- The SDLC -- The Iterative Model -- Prototyping and Rapid Application Development (RAD) -- Agile Methodologies -- Lean Methodology -- Systems Implementation -- Systems Maintenance Review -- Domain 3 - Practice Questions -- Domain 3 - Review Questions and Hands-On Exercise -- Exercise 3 -- Required -- Exercise 3 Sample Answer -- Domain 3 - Answers to Practice Questions -- Chapter 5 Domain 4 - Information Systems Operations, Maintenance, and Service Management -- Hardware -- CPU -- Peripherals -- Memory -- Computer Types -- Networks -- Storage -- Communications -- Input -- Output -- Control -- Systems Software -- Auditing Operating Systems -- People -- Job Scheduling -- System Interfaces -- Frameworks -- ITIL -- Change Management -- Change Management in the Use of Cloud-Based Applications -- Problem Management -- Auditing Change Control -- Service Management Disaster Recovery Planning -- Auditing Service Delivery -- Domain 4 - Practice Questions -- Domain 4 - Review Questions and Hands-On Exercise -- Exercise 4 -- Exercise 4 Sample Answer -- Domain 4 - Answers to Practice Questions -- Chapter 6 Domain 5 - Protection of Information Assets -- Protection of Information Assets -- Privacy Principles -- Design, Implementation, Maintenance, Monitoring, and Reporting of Security Controls -- Physical and Environmental Controls and Supporting Practices for the Protection of Information Assets -- Physical Access Controls for the Identification, Authentication, and Restriction of Users -- Environmental Controls -- Logical Access Controls for the Identification, Authentication, and Restriction of Users -- Risk and Controls Associated with Virtualization of Systems -- Risks and Controls Associated with the Use of Mobile and Wireless Devices -- Voice Communications Security -- Network and Internet Security Devices, Protocols, and Techniques -- Configuration, Implementation, Operation, and Maintenance of Network Security Controls -- Encryption-Related Techniques and Their Uses -- Public Key Infrastructure (PKI) Components and Digital Signature Techniques -- Peer-to-Peer Computing, Instant Messaging, and Web-Based Technologies -- Data Classification Standards Related to the Protection of Information Assets -- Storage, Retrieval, Transportation, and Disposal of Confidential Information Assets -- Data Leakage -- Risks in End-User Computing -- Implementing a Security Awareness Program -- Information System Attack Methods and Techniques -- Prevention and Detection Tools and Control Techniques -- Malware -- Phishing -- Pharming -- Password Attacks -- Denial of Service (DoS) Attacks -- 'Man in the Middle' (MITM) attacks -- Drive-By Downloads -- Rogue Software -- Ransomware -- Spyware and Adware -- Social Engineering Security Testing Techniques -- Penetration Testing and Vulnerability Scanning -- Monitoring and Responding to Security Incidents -- Forensic Investigation and Procedures in Collection and Preservation of the Data and Evidence -- Domain 5 - Practice Questions -- Domain 5 - Review Questions and Hands-On Exercise -- Exercise 5 -- Exercise 5 Sample Answer -- Domain 5 - Answers to Practice Questions -- Chapter 7 Preparing for the Examination -- Appendix A: Glossary of Terms -- Appendix B: CISA Sample Examination - Choose Any 150 Questions -- Appendix C: Sample Examination Answers -- Index |
title | The Complete Guide for CISA Examination Preparation |
title_auth | The Complete Guide for CISA Examination Preparation |
title_exact_search | The Complete Guide for CISA Examination Preparation |
title_exact_search_txtP | The Complete Guide for CISA Examination Preparation |
title_full | The Complete Guide for CISA Examination Preparation |
title_fullStr | The Complete Guide for CISA Examination Preparation |
title_full_unstemmed | The Complete Guide for CISA Examination Preparation |
title_short | The Complete Guide for CISA Examination Preparation |
title_sort | the complete guide for cisa examination preparation |
work_keys_str_mv | AT cascarinoricharde thecompleteguideforcisaexaminationpreparation |