CISA certified information systems auditor exam guide

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. This up-to-date self-study system delivers complete coverage of every topic on the 2019 version of the CIS...

Full description

Bibliographic Details
Main Author: Gregory, Peter H.
Format: eBook
Language:English
Published: New York McGraw-Hill Education 2020
Edition:Fourth edition
Series:All-in-one
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
Table of Contents:
  • Other Policies
  • Processes and Procedures
  • Standards
  • Enterprise Architecture
  • Applicable Laws, Regulations, and Standards
  • Risk Management
  • The Risk Management Program
  • The Risk Management Process
  • Risk Treatment
  • IT Management Practices
  • Personnel Management
  • Sourcing
  • Change Management
  • Financial Management
  • Quality Management
  • Portfolio Management
  • Controls Management
  • Security Management
  • Performance and Capacity Management
  • Organization Structure and Responsibilities
  • Roles and Responsibilities
  • Segregation of Duties
  • Auditing IT Governance
  • Includes bibliographical references and index
  • Auditing Documentation and Records
  • Auditing Contracts
  • Auditing Outsourcing
  • Chapter Review
  • Quick Review
  • Questions
  • Answers
  • Chapter 3 The Audit Process
  • Audit Management
  • The Audit Charter
  • The Audit Program
  • Strategic Audit Planning
  • Audit and Technology
  • Audit Laws and Regulations
  • ISACA Auditing Standards
  • ISACA Code of Professional Ethics
  • ISACA Audit and Assurance Standards
  • ISACA Audit and Assurance Guidelines
  • Risk Analysis
  • Auditors' Risk Analysis and the Corporate Risk Management Program
  • Evaluating Business Processes
  • Identifying Business Risks
  • Risk Mitigation
  • Countermeasures Assessment
  • Monitoring
  • Controls
  • Control Classification
  • Internal Control Objectives
  • IS Control Objectives
  • General Computing Controls
  • IS Controls
  • Performing an Audit
  • Audit Objectives
  • Types of Audits
  • Compliance vs. Substantive Testing
  • Audit Methodology and Project Management
  • Audit Evidence
  • Reliance on the Work of Other Auditors
  • Audit Data Analytics
  • Reporting Audit Results
  • Other Audit Topics
  • Control Self-Assessment
  • CSA Advantages and Disadvantages
  • The CSA Life Cycle
  • Cover
  • ABOUT THE AUTHOR
  • Title Page
  • Copyright Page
  • Dedication
  • CONTENTS AT A GLANCE
  • CONTENTS
  • Acknowledgments
  • Introduction
  • Chapter 1 Becoming a CISA
  • Benefits of CISA Certification
  • The CISA Certification Process
  • Experience Requirements
  • ISACA Code of Professional Ethics
  • ISACA IS Standards
  • The Certification Exam
  • Exam Preparation
  • Before the Exam
  • Day of the Exam
  • After the Exam
  • Applying for CISA Certification
  • Retaining Your CISA Certification
  • Continuing Education
  • CPE Maintenance Fees
  • Revocation of Certification
  • CISA Exam Preparation Pointers
  • Summary
  • Chapter 2 IT Governance and Management
  • IT Governance Practices for Executives and Boards of Directors
  • IT Governance
  • IT Governance Frameworks
  • IT Strategy Committee
  • The Balanced Scorecard
  • Information Security Governance
  • IT Strategic Planning
  • The IT Steering Committee
  • Policies, Processes, Procedures, and Standards
  • Information Security Policy
  • Privacy Policy
  • Data Classification Policy
  • System Classification Policy
  • Site Classification Policy
  • Access Control Policy
  • Mobile Device Policy
  • Social Media Policy