Course details

Certified Information Systems Auditor (CISA) 2019: BCP & Network Security

Certified Information Systems Auditor (CISA) 2019: BCP & Network Security


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This course addresses why and how organizations must have a Disaster Recovery Plan (DRP), for resiliency in the face of malicious attacks, as well as natural and man-made disasters. The DRP is part of the overall Business Continuity Plan (BCP), which ensures the ongoing functionality of business processes. In this course, you will learn a variety of disaster planning strategies, as well as network security configurations order when planning for business disruptions. Learners will explore the auditing process, and what IS auditors need to consider as the audit objective and the audit scope, and which may include reviewing business continuity plans within the organization. This course identifies common redundant array of independent disks (RAID)-level characteristics, and you will learn how to configure RAID 5 in Windows Server 2016. You will learn how to configure Microsoft Azure cloud computing and SQL database georedundancy. Finally, the course explores numerous network security topics, such as wired and wireless network security and network threat mitigation through configuration of firewalls. This course helps learners prepare for the ISACA Certified Information Systems Auditor  (CISA) certification exam.



Expected Duration (hours)
1.1

Lesson Objectives

Certified Information Systems Auditor (CISA) 2019: BCP & Network Security

  • discover the key concepts covered in this course
  • define which types of solutions provide IT system and data high availability
  • describe common characteristics of a disaster recovery plan including RTO and RPO
  • describe common characteristics of a business continuity plan, BIA, and related insurance options
  • describe common characteristics of an incident response plan
  • plan for alternate site usage in the event of a disaster
  • identify common RAID level characteristics
  • configure RAID 5 in Windows Server 2016
  • configure Azure SQL Database geo-redundancy
  • describe common network attacks such as man-in-the-middle attacks, ARP and DNS poisoning, and DDoS
  • describe how 802.1X, VLANs, MAC filtering, and other network configuration options can enhance network security
  • recognize the different types of firewalls including WAF, their placement such as in the DMZ, and when they should be used
  • use the free Wireshark tool to capture and analyze plaintext traffic
  • configure Windows Advanced Firewall rules
  • configure URL content and keyword filtering on a wireless router
  • proactively plan for business interruptions and malicious network activity
  • Course Number:
    it_spcisa19_10_enus

    Expertise Level
    Expert