• LOGIN
  • No products in the cart.

Pursue the best position in IT Networking career through our award-winning IT Cyber Security (CISA, CISM, CISSP) course within a few weeks. This career matching e-learning methods assist you to get high value in your role along with attaining a gradual promotion. Besides, the lucid learning procedures provide you with the utmost benefits with scanty amount of cost.

The IT Cyber Security (CISA, CISM, CISSP) course incorporates instructor-led demonstrations and visual presentation where the instructors illustrate the actual world view in order to develop your skills and knowledge. Our courseware always emphasizes the actual world view and skill-set improvement.

By purchasing this bundle course you will receive the following courses:

  • Certified Information systems Auditor ( CISA)
  • Certified Information security Manager ( CISM)
  • Certified information systems Security Professional (CISSP)

Who is this course for?

The course entertains the learners who want to kick-start their career in IT Security learning all the effective aspects related to this field.

The course also allows those people who are really busy with their work and can’t find out time to go through the course. As it has time flexibility, you can take this course at your own pace from anywhere. Besides, it is cost-effective that can easily enable you to take the course.

The course has unlimited access. So, you can go through the contents at any time again and again. Pass rates of exams for professional project management qualifications are just as high for those attending distance learning courses as for traditional classroom courses.

Certification:

Certificates can be obtained at an additional cost of £14 for PDF, £29 for Printed Hardcopy format and £39 for Both PDF and Hardcopy Certificates.

Requirements

The course is fully compatible with PC, Mac, Laptop, Tablet, and any Smartphones. If you have an available internet connection, you can access it at your own pace.

Career path

At the end of the course, you will be able to pursue careers in-

  • Cyber Security expert
  • IT Security Specialist
  • Network Monitoring expert
  • Project Management expert
  • Volatile Software Development
  • Network Monitoring efficient
  • IT Security Analyst

Course Curriculum

CISA - Certified Information Systems Auditor
The Process of Auditing Information Systems
Management of the Audit Function FREE 00:20:00
ISACA IT Audit and Assurance Standards and Guidelines 01:16:00
Risk Analysis 00:21:00
Internal Controls 00:17:00
Performing An IS Audit 01:07:00
Control Self-Assessment 00:09:00
The Evolving IS Audit Process 00:12:00
Governance and Management of IT
Corporate Governance 00:06:00
IT Governance 00:02:00
IT Monitoring and Assurance Practices for Board and Senior Management 00:40:00
Information Systems Strategy 00:05:00
Maturity and Process Improvement Models 00:01:00
IT Investment and Allocation Practices 00:05:00
Policies and Procedures 00:17:00
Risk Management 00:31:00
IS Management Practices 00:50:00
IS Organizational Structure and Responsibilities 00:17:00
Auditing IT Governance Structure and Implementation 00:06:00
Business Continuity Planning 00:37:00
Information Systems Acquisition, Development and Implementation
Business Realization 01:21:00
Project Management Structure 00:08:00
Project Management Practices 00:18:00
Business Application Development 00:42:00
Business Application Systems 00:38:00
Alternative Forms of Software Project Organization 00:03:00
Alternative Development Methods 00:10:00
Infrastructure Development/Acquisition Practices 00:09:00
Information Systems Maintenance Practices 00:09:00
System Development Tools And Productivity Aids 00:05:00
Business Process Reengineering And Process Change Projects 00:08:00
Application Controls 00:07:00
Auditing Application Controls 00:14:00
Auditing Systems Development, Acquisition And Maintenance 00:08:00
Information Systems Operations, Maintenance and Support
Information Systems Operations 00:19:00
Information Systems Hardware 00:13:00
IS Architecture and Software 00:39:00
Network Infrastructure 01:16:00
Disaster Recovery Planning 00:19:00
Protection of Information Assets
Importance Of Information Security 00:43:00
Logical Access 00:37:00
Network Infrastructure Security 00:39:00
Auditing Information Security Management Framework 00:03:00
Auditing Network Infrastructure Security 00:13:00
Environmental Exposures and Controls 00:02:00
Physical Access Exposures and Controls 00:05:00
Mobile Computing 00:05:00
CISM - Certified Information Security Manager
Information Security Governance
Information Security Governance Overview FREE 00:25:00
Effective Information Security Governance 00:24:00
Information Security Concepts and Technologies 00:20:00
Information Security Manager 00:09:00
Scope and Charter of Information Security Governance 00:10:00
Information Security Governance Metrics 00:23:00
Information Security Strategy Overview 00:02:00
Creating Information Security Strategy 00:36:00
Determining Current State Of Security 00:06:00
Information Security Strategy Development 00:10:00
Strategy Resources 00:40:00
Strategy Constraints 00:07:00
Action Plan to Implement Strategy 00:20:00
Information Risk Management
Risk Management Overview 00:16:00
Good Information Security Risk Management 00:15:00
Information Security Risk Management Concepts 00:13:00
Implementing Risk Management 00:17:00
Risk Assessment 00:39:00
Controls Countermeasures 00:23:00
Recovery Time Objectives 00:18:00
Risk Monitoring and Communication 00:04:00
Information Security Program Development
Development of Information Security Program 00:11:00
Information Security Program Objectives 00:09:00
Information Security Program Development Concepts 00:14:00
Scope and Charter of Information Security Program Development 00:22:00
Auditing Information Security Management Framework 00:03:00
Information Security Framework Components 00:12:00
Information Security Program Resources 01:04:00
Implementing an Information Security Program 00:27:00
Information Infrastructure and Architecture 00:14:00
Development of Information Security Program 00:11:00
Security Program Services and Operational Activities 00:45:00
Information Security Incident Management
Incident Management Overview 00:28:00
Incident Response Procedures 00:29:00
Incident Management Organization 00:19:00
Incident Management Resources 00:36:00
Incident Management Objectives 00:14:00
Incident Management Metrics and Indicators 00:17:00
Current State of Incident Response Capability 00:11:00
Developing an Incident Response Plan 00:32:00
BCP DRP 00:36:00
Testing Response and Recovery Plans 00:10:00
Executing the Plan 00:27:00
CISSP - Certified information Systems Security Professional
Information Systems Security
Security and Risk Management FREE 00:24:00
Asset Security 00:12:00
Security Engineering 00:15:00
Communication and Network Security 00:10:00
Identity and Access Management 00:10:00
Security Assessment and Testing 00:12:00
Security Operations 00:36:00
Software Development Security 00:13:00
Assessment

Course Reviews

4.7

4.7
7 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

388 STUDENTS ENROLLED
COPYRIGHT © 2017 STPAULSCOLLEGE.CO.UK