Course Description:
An ISACA Certified Information Systems Auditor is recognized as one of the leading authorities in the areas of IS auditing, control, and information security. This CISA training course provides you with in-depth coverage of the five CISA domains that are covered on the CISA exam. These domains include auditing information systems; IT governance and management of IT; information systems acquisition, development, and implementation; information systems operations, maintenance, and support; and protection of information assets.
?
The CISA On-Demand course is now part of Polaris Accelerate.
Topics covered in the course include:
Target Student:This course is designed for the following students:
Those individuals seeking certification in CISA training.
Prerequisites: Students should possess the following experience before attending the course:
IT professionals must have 5 years or more of IS audit, control, assurance and security experience.
IT professionals must have 5 years or more of IS audit, control, assurance and security experience.
The preponderance of network traffic, particularly web traffic, was an expected outcome of the pivotal role that the Internet has come to play in our daily lives. The sheer volume of traffic and complexity of protocols creates a very diverse and everchanging landscape within which the network analyst must navigate.
Network Forensics and Investigation teaches attendees to differentiate between normal and abnormal network traffic, track the flow of packets through a network, and attribute conversations and actions taken over a network segment to specific hosts or users. This course focuses on research, filtering, and comparative analysis to identify and attribute the different types of activity on a network. Students will learn how to follow conversations across a wide range of protocols and through redirection and how to develop custom filters for non-dissected protocols. On Day 5 of the course, you will participate in a team-based capture-the-flag exercise to test your new skills.
Topics covered in the course include:
Target Student:This course is designed for the following
Virtual Live Instructor
Free Training Materials
Convenient Scheduling
This was the class I needed.
The instructor Jeff took his time and made sure we understood each topic before moving to the next. He answered all of our questions, and I don't know about the rest of the students, but was very pleased with this experience.
I finally understand how to use Excel.
-Amanda T (Yale New Haven Hospital).
Great class!
We were able to cover a lot of information in one day without getting overwhelmed.
-Maria R (Microsoft).
We offer private Cybersecurity group training services for organizations looking to upskill their team members with a live-instructor.
Training options include:
Learn more about how Cybersecurity Private Group Training from Business Computer Skills can help your team.