CISA Domain: Protection of Information Assets - Part 1 New Horizons Jordan
Price: TBA
  • Duration: 3 Hours

Course details

One of the main reasons an organization will bring on a CISA is to protect the IS assets of that organization. Resources, both internal and external, need to be secured and access must be controlled at all times. This course examines information security elements and assets, both internal and external, along with the elements that play a role in the protection of those assets. This course also examines the computer crimes that can befall an organization and the incident handling methods that can be used. Finally, this course examines logical access and the methods that can be used to protect assets. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization€™s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination.

  • recognize IS management elements, roles and responsibilities, and asset classifications
  • describe system access permissions and controls
  • recognize the role of an IS auditor in privacy management and the success of IS management
  • recognize information security issues relating to external parties
  • recognize human resources security relating issues to third parties
  • recognize information security elements and assets
  • recognize IS and HR security issues relating to third parties
  • recognize different types of computer crimes and exposures
  • recognize how to handle and respond to security incidents
  • recognize logical access exposures, paths, and controls
  • recognize methods of identification and authentication
  • describe the various situations or procedures where authorization issues can occur
  • recognize how to manage sensitive information
  • recognize issues related to computer crime and incident handling
  • describe logical access and I&A
  • recognize authorization issues and how to manage sensitive information
Updated on 10 November, 2015

About New Horizons Jordan

As changes in technology have accelerated, it’s become even more essential for people to master technology to be productive, invaluable employees who optimize, program and invent solutions—and even grow companies of their own. For 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer ctheirses and certifications. they’re now the world’s largest independent IT training company, and they continue to lead:
  • 300 computer training centers in 70 countries (and counting)
  • Largest Guaranteed-to-Run ctheirse schedule in the world
  • Ranked in the top 5% of the industry for training quality and customer satisfaction
  • Official training partner for technology leaders such as Microsoft, Cisco, CompTIA and VMware
  • Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide
  • World’s largest Cisco-authorized training partner
See all New Horizons Jordan courses
Are you from New Horizons Jordan ? Claim your course!
Courses you can instantly connect with... Do an online course on CISA starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or