We may earn an affiliate commission when you visit our partners.
Course image
Stone River eLearning

The Technology Systems Auditing course has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams.

Read more

The Technology Systems Auditing course has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams.

If you’re a professional with experience of participating, leading and directing information system projects, this IT Systems Auditing course will help you prepare for a lucrative and highly sought after position in this exciting and challenging field of information technology.

Completing this course showcases your knowledge of IS auditing, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within an enterprise. After completing this training course you will be able to leverage standards, manage vulnerabilities, you will understand ensure compliance, offer solutions, institute controls and deliver value to an enterprise, and the acquisition process and testing process.

IT Systems Auditing is one of the most popular and high-demand IT employment options available. The course offers the ability for students to gain comprehensive knowledge in concepts that are required to get into the field of IT Systems Auditing.

Get your start in the world of IT Systems Auditing by taking this course today. Part 2 of this course is also available to complete your education.

This course is in no way sponsored or endorsed by, or in any way affiliated with, ISACA.

This course is in 2 parts. Please purchase Part 1 as well for complete course.

Enroll now

What's inside

Learning objectives

  • It audit process
  • It governance
  • Systems and infrastructure lifecycle management
  • It service delivery and support
  • Protection of information assets
  • Business continuity and disaster recovery

Syllabus

Module 04 - Information Systems Operations, Maintenance and Support (continue...
Lesson 3: IS Architecture and Software Part1
IS Architecture and Software Part2
Read more
Operating Systems
Software Integrity Issues Part1
Software Integrity Issues Part2
Activity Logging and Reporting Options
Data Communication Software
Data Management
File Organization
Database Management Systems Part1
Database Management Systems Part2
Example of Data in DBMS
DBMS Architecture
DBMS Metadata Architecture
Database Structure
Relational Database
Database Models
Relational Database Model
Database Controls
Tape and Disk Management Systems
Utility Programs
Software Licensing Issues Part1
Software Licensing Issues Part2
Software Licensing Issues Part3
Digital Rights Management
Lesson 4: Network Infrastructure
Enterprise Network Architecture
Types of Networks
Network Services
Network Standards and Protocols
OSI Architecture
OSI Layers
Application of the OSI Model in Network Architectures
Local Area Network
Network Physical Media Specifications
Implementation of WANs
LAN Media Access Technologies
LAN Components
OSI Layer Diagram
LAN Technology Selection Criteria
Wide Area Networks Part1
Wide Area Networks Part2
WAN Devices
WAN Technologies
Wireless Networks
Wireless Wide Area Networks
Wireless Local Area Networks Part1
Wireless Local Area Networks Part2
Wireless Security
Wireless Application Protocol
Risks of Wireless Communications Part1
Risks of Wireless Communications Part2
World Wide Web Services
General Internet Terminology
Network Administration and Control
Network Performance Metrics
Network Management Issues
Network Management Tools
Client/Server Technology Part1
Client/Server Technology Part2
Client/Server Technology Part3
Client/Server Technology Part4
Client/Server Technology Part5
Lesson 5: Disaster Recovery Planning
Recovery Point Objective and Recovery Time Objective Part1
Recovery Point Objective and Recovery Time Objective Part2
Recovery Strategies Part1
Recovery Strategies Part2
Recovery Strategies Part3
Application Disaster Recovery Methods Part1
Application Disaster Recovery Methods Part2
Data Storage Disaster Recovery Methods
Telecommunication Networks Disaster Recovery Methods
Methods for Network Protection
Development of Disaster Recovery Plans
Organization and Assignment Of Responsibilities Part1
Organization and Assignment Of Responsibilities Part2
Organization and Assignment Of Responsibilities Part3
Backup and Restoration
Off-Site Library Controls
Types of Backup Devices and Media Part1
Types of Backup Devices and Media Part2
Periodic Backup Procedures
Frequency of Rotation
Backup Schemes
Module 04 Review
Module 04 - Quiz
Module 05 - Protection of Information Assets

Download Supporting files here

Lesson 1: Importance Of Information Security
Key Elements of Information Security Management
Information Security Management Roles and Responsibilities
Inventory and Classification of Information Assets Part1
Inventory and Classification of Information Assets Part2
System Access Permission Part1
System Access Permission Part2
Mandatory and Discretionary Access Controls
Privacy Management Issue and the Role of IS Auditors Part1
Privacy Management Issue and the Role of IS Auditors Part2

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers infrastructure lifecycle management, protection of information assets, and disaster recovery, which are the core concerns and duties of an IS auditor
Highlights the key responsibilities of information security management professionals, which may overlap with those of an IS auditor
Offers comprehensive coverage of network infrastructure and wireless technology, essential areas of knowledge for general IT professionals
Teaches the importance of privacy management, a significant aspect of data protection

Save this course

Save Technology Systems Auditing (Part 2 of 2) to your list so you can find it easily later:
Save

Reviews summary

Course content missing

According to students, this course is missing essential materials students need to complete their studies. Missing Course Materials impacts the quality of this course.

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Technology Systems Auditing (Part 2 of 2) with these activities:
Operating Systems
Refresh your knowledge of operating system concepts, such as processes, memory management, and file systems, to enhance your understanding of the course material.
Browse courses on Operating Systems
Show steps
  • Review different types of operating systems, such as Linux, Windows, and macOS.
  • Review the functions and responsibilities of an operating system, such as managing hardware, software, and data.
  • Review common operating system commands and utilities.
Information Security
Refresh your knowledge of concepts, principles, and techniques in information security to ensure a solid understanding of the course material.
Browse courses on Information Security
Show steps
  • Review key terms and concepts in information security, such as confidentiality, integrity, and availability.
  • Review common threats and vulnerabilities to information systems, such as malware, phishing, and hacking.
  • Review best practices for protecting information assets, such as access control, encryption, and intrusion detection.
Show all two activities

Career center

Learners who complete Technology Systems Auditing (Part 2 of 2) will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst protects data by developing and implementing security measures, such as firewalls, intrusion detection systems, and encryption. They also monitor networks and systems for suspicious activity and investigate security breaches when they occur. This course may be useful for aspiring Information Security Analysts, as it covers the protection of information assets, including data management, database management systems, network security, and disaster recovery planning.
IT Auditor
An IT Auditor examines an organization's IT infrastructure, business systems, and computer systems. IT Auditors may work in-house for the organization, or may be employed by an audit firm, which provides auditing services to clients. This course may be useful for aspiring IT Auditors, as it covers the IT audit process, IT governance, systems and infrastructure lifecycle management, IT service delivery and support, protection of information assets, and business continuity and disaster recovery.
Database Administrator
A Database Administrator manages and maintains an organization's database systems. They ensure that databases are available, secure, and performant. Database Administrators also work with developers and other IT staff to ensure that data is used effectively and efficiently. This course may be useful for aspiring Database Administrators, as it covers database management systems, data management, and disaster recovery planning.
Systems Analyst
A Systems Analyst designs, develops, and implements computer systems for businesses and organizations. They work with stakeholders to gather requirements, design solutions, and test systems to ensure they meet the needs of the organization. This course may be useful for aspiring Systems Analysts, as it covers systems and infrastructure lifecycle management, IT service delivery and support, and database management systems.
Security Consultant
A Security Consultant helps organizations to improve their security posture. They assess an organization's security risks, develop and implement security plans, and provide training and support to employees. This course may be useful for aspiring Security Consultants, as it covers the protection of information assets, network security, and disaster recovery planning.
Network Administrator
A Network Administrator manages and maintains an organization's computer networks. They ensure that networks are available, secure, and performant. Network Administrators also work with users and other IT staff to troubleshoot network problems and provide technical support. This course may be useful for aspiring Network Administrators, as it covers network infrastructure, network security, and disaster recovery planning.
IT Compliance Manager
An IT Compliance Manager ensures that an organization's IT systems comply with applicable laws and regulations. They develop and implement compliance policies and procedures, and they oversee the work of the IT compliance team. This course may be useful for aspiring IT Compliance Managers, as it covers IT governance, risk management, and disaster recovery planning.
IT Project Manager
An IT Project Manager plans, implements, and manages IT projects. They work with stakeholders to define project scope, develop project plans, and track project progress. This course may be useful for aspiring IT Project Managers, as it covers systems and infrastructure lifecycle management, IT service delivery and support, and disaster recovery planning.
IT Manager
An IT Manager is responsible for the planning, implementation, and management of an organization's IT systems. They work with senior management to develop and implement IT strategies, and they oversee the work of IT staff. This course may be useful for aspiring IT Managers, as it covers IT governance, systems and infrastructure lifecycle management, IT service delivery and support, and disaster recovery planning.
IT Risk Manager
An IT Risk Manager identifies, assesses, and manages IT risks. They work with senior management to develop and implement risk management strategies, and they oversee the work of the IT risk management team. This course may be useful for aspiring IT Risk Managers, as it covers IT governance, risk management, and disaster recovery planning.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for the overall security of an organization's IT systems. They develop and implement security policies and procedures, and they oversee the work of the IT security team. This course may be useful for aspiring CISOs, as it covers the protection of information assets, network security, and disaster recovery planning.
IT Architect
An IT Architect designs and develops the architecture of an organization's IT systems. They work with stakeholders to define system requirements, develop system designs, and oversee the implementation of systems. This course may be useful for aspiring IT Architects, as it covers systems and infrastructure lifecycle management, IT service delivery and support, and disaster recovery planning.
Business Analyst
A Business Analyst helps organizations to improve their business processes. They analyze business needs, design solutions, and implement changes to improve efficiency and effectiveness. This course may be useful for aspiring Business Analysts, as it covers systems and infrastructure lifecycle management, IT service delivery and support, and risk management.
Data Scientist
A Data Scientist uses data to solve business problems. They collect, analyze, and interpret data to identify trends and patterns. Data Scientists also develop and implement data-driven solutions to improve business outcomes. This course may be useful for aspiring Data Scientists, as it covers data management, database management systems, and risk management.
Software Developer
A Software Developer designs, develops, and implements software applications. They work with stakeholders to define software requirements, develop software designs, and oversee the implementation of software. This course may be useful for aspiring Software Developers, as it covers software integrity issues, database management systems, and network security.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Technology Systems Auditing (Part 2 of 2).
Focuses on safeguarding enterprise information and information systems from a variety of threats, with a focus on security controls.
Is designed to help readers prepare for the CISSP exam. It covers all ten domains of information security.
Covers the essential concepts of auditing information systems. It valuable resource for students and professionals who want to learn more about this topic.
Provides a practical approach to network security. It focuses on real-world threats and provides in-depth coverage of security techniques and tools.
This guide emphasizes risk management in information security. It provides hands-on instruction in assessing and mitigating risk using established industry methodologies.
Helps readers learn how to identify and mitigate network security weaknesses.
Provides guidance on how to develop and implement a business continuity and disaster recovery plan.
Provides practical advice on how to plan for and recover from a network disaster.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Technology Systems Auditing (Part 2 of 2).
Technology Systems Auditing (Part 1 of 2)
Most relevant
Cutting-Edge Blockchain Security Mechanisms
Network Security
System Validation (2): Model process behaviour
Information Systems Auditing: Information Systems...
Security and Auditing in Ethereum
QMS Auditor / Lead Auditor Course
Information Systems Auditing, Controls and Assurance
Artificial Intelligence Auditing, AI Tools & Cybersecurity
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser