Course details

Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring

Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This course explores the importance of continuously monitoring business processes, and the applicable supporting IT solutions. You will learn how information system (IS) auditing can identify and assist in continuous process improvement. In this course, learners will acquire knowledge of the skills necessary to audit monitoring solutions and business processes. You will explore how to establish baselines to easily detect anomalies. Then learn how to set a baseline for specific systems, like a web server, its normal performance, and the server's normal pattern of network. This course will list various sampling types, such as attribute, variables, and statistical and discovery sampling, which play a role in the audit process. You will learn how to filter logs and enable centralized log collection. Next, explore how to work with optimal settings for packet capturing placement, and for intrusion detection and intrusion prevention systems. This course covers new malware variance, new hardware and software vulnerabilities, as well as other events that impact processes or IT infrastructure, such as the flooding of a data center. This course helps learners prepare for the ISACA Certified Information Systems Auditor  (CISA) certification exam.



Expected Duration (hours)
0.8

Lesson Objectives

Certified Information Systems Auditor (CISA) 2019: Continuous Monitoring

  • discover the subject areas covered in this course
  • describe how monitoring is an important aspect of the IS auditing process
  • recognize the importance of monitoring business processes for continuous process improvement
  • list how various sampling types such as attribute, variable, statistical, and discovery sampling play a role in the audit process
  • filter Windows logs to show only relevant log entries
  • send Linux log events to a centralized logging host
  • plan optimal settings for packet capturing placement and configuration
  • capture and filter network traffic using the free Wireshark tool
  • recognize how SIEM systems provide centralized security event monitoring and management
  • recognize how an IDS can identify suspicious host and network activity
  • describe IS audit sampling and the purpose of SIEM, list IPS characteristics, and capture and filter traffic with Wireshark
  • Course Number:
    it_spcisa19_14_enus

    Expertise Level
    Expert