Certified Information Systems Professional - Complete Video Training

Location
Online
Dates
Can be taken anytime
Course Type
Professional Training Course
Accreditation
Yes (Details)
Language
English
Price
$379 $136 only

Course Overview

A certificate in Information technology from an internationally recognized institution will increase your career opportunity very much. The Certified Information Systems Professional - Complete Video Training course provides you extensive lessons about the Information System field.

Divided into four parts, the course teaches you how to be a certified auditor, security manager, security officer and security professional. Certified Information Systems Auditor (CISA) section illustrates you the process of auditing information systems while the Certified Information Security Manager (CISM) part deals with the information security issues. Here, you will learn the system of information security program development, incident management, and risk management. Next, Certified Information Systems Security Officer (CISSO) course teaches how to be an excellent information system security officer by utilising the information system in the security field. Finally, the Certified Information Systems Security Professional (CISSP) section shows you the path for becoming a security professional by focusing the security issues such as asset security, communication and network security, security operations, etc.

In short, the bundle video course will help you to achieve certification in above four fields and helps you to know the practical knowledge about Information System.

Who should take this course

Certified Information Systems Professional - Complete Video Training is certified by CPD Qualifications Standards and IAO. This makes it perfect for anyone trying to learn potential professional skills.

As there is no experience and qualification required for this course, it is available for all students from any academic background.

Accreditation

CPD

Course content

COURSE CURRICULUM

The Process of Auditing Information Systems

  • Management of the Audit Function
  • ISACA IT Audit and Assurance Standards and Guidelines
  • Risk Analysis
  • Internal Controls
  • Performing An IS Audit
  • Control Self-Assessment
  • The Evolving IS Audit Process

Governance and Management of IT

  • Corporate Governance
  • IT Governance
  • IT Monitoring and Assurance Practices for Board and Senior Management
  • Information Systems Strategy
  • Maturity and Process Improvement Models
  • IT Investment and Allocation Practices
  • Policies and Procedures
  • Risk Management
  • IS Management Practice
  • IS Organizational Structure and Responsibilities
  • Auditing IT Governance Structure and Implementation
  • Business Continuity Planning

Information Systems Acquisition, Development and Implementation

  • Business Realization
  • Project Management Structure
  • Project Management Practices
  • Business Application Development
  • Business Application Systems
  • Alternative Forms of Software Project Organization
  • Alternative Development Methods
  • Infrastructure Development/Acquisition Practices
  • Information Systems Maintenance Practices
  • System Development Tools And Productivity Aids
  • Business Process Reengineering And Process Change Projects
  • Application Controls
  • Auditing Application Controls
  • Auditing Systems Development, Acquisition And Maintenance

Information Systems Operations, Maintenance and Support

  • Information Systems Operations
  • Information Systems Hardware
  • IS Architecture and Software
  • Network Infrastructure
  • Disaster Recovery Planning

Protection of Information Assets

  • Importance Of Information Security
  • Logical Access
  • Network Infrastructure Security
  • Auditing Information Security Management Framework
  • Auditing Network Infrastructure Security
  • Environmental Exposures and Controls
  • Physical Access Exposures and Controls
  • Mobile Computing

Information Security Governance

  • Information Security Governance Overview9
  • Effective Information Security Governance9
  • Information Security Concepts and Technologies9
  • Information Security Manager9
  • Scope and Charter of Information Security Governance9
  • Information Security Governance Metrics9
  • Information Security Strategy Overview9
  • Creating Information Security Strategy9
  • Determining Current State Of Security9
  • Information Security Strategy Development9
  • Strategy Resources99
  • Strategy Constraints9
  • Action Plan to Implement Strategy9

Information Risk Management

  • Risk Management Overview9
  • Good Information Security Risk Management9
  • Information Security Risk Management Concepts9
  • Implementing Risk Management9
  • Risk Assessment99
  • Controls Countermeasures9
  • Recovery Time Objectives9
  • Risk Monitoring and Communication9

Information Security Program Development

  • Development of Information Security Program9
  • Information Security Program Objectives9
  • Information Security Program Development Concepts9
  • Scope and Charter of Information Security Program Development9
  • Information Security Management Framework9
  • Information Security Framework Components9
  • Information Security Program Resources9
  • Implementing an Information Security Program9
  • Information Infrastructure and Architecture9
  • Information Security Program9
  • Security Program Services and Operational Activities9

Information Security Incident Management

  • Incident Management Overview9
  • Incident Response Procedures9
  • Incident Management Organization9
  • Incident Management Resources9
  • Incident Management Objectives9
  • Incident Management Metrics and Indicators9
  • Current State of Incident Response Capability
  • Developing an Incident Response Plan9
  • BCP DRP9
  • Testing Response and Recovery Plans9
  • Executing the Plan9

Information Systems Security Officer

  • Risk Management
  • Security Management
  • Authentication
  • Access Control
  • Security Models
  • Operations Security
  • Symmetric Cryptography and Hashing
  • Asymmetric Cryptography and PKI
  • Network Connections
  • Network Protocols and Devices
  • Telephony, VPNs and Wireless
  • Security Architecture
  • Software Development Security
  • Database Security and System Development
  • Malware and Software Attacks
  • Business Continuity
  • Disaster Recovery
  • Incident Management, Law, and Ethics
  • Physical

Information Systems Security Professional

  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communication and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

Assessment:

  • At the end of the course, you will be required to sit an online multiple-choice test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful.
  • Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam.

Certification:

In addition to the course price there is an additional charge for certificate. After you have successfully passed the final exam, you will be able to order an Accredited Certificate of Achievement at the following price:

  • Hard Copy by post - GBP39.00
  • Soft Copy PDF via email - GBP24.00

About Course Provider

We are a company who is best known for offering awarding body accredited online courses that are available for anyone who wishes to acquire a certification and take their professional life to the next level.

As an online learning site, we are aware of the fact that there are a lot of people out there who considers themselves to be a curious learner but the courses that they are interested in are not available in the area. So, we have decided to give them a chance to learn in a convenient way – in their own convenient place and time.

Frequently asked questions

{{ item.question }}