1 | Introduction Preview | 23:48 |
2 | ITAF | 29:17 |
3 | Impact Of Regulations on IS Audit | 30:59 |
4 | Electronic Data Interchange | 40:46 |
5 | Electronic Funds Transfer | 37:48 |
6 | Summary Part 1 | 12:51 |
7 | Information Systems Auditing Process Part 1 Preview | 38:32 |
8 | Materiality | 31:37 |
9 | Execution Audit Project Management | 35:42 |
10 | Sampling | 13:26 |
11 | Data Analytics | 26:23 |
12 | Reporting and Communication Techniques | 25:17 |
13 | Summary of Part 2 | 07:44 |
Practice Test - Domain 1 |
14 | Governance and Management of IT Part 1 | 32:31 |
15 | IS Auditor & Strategy Committee | 25:49 |
16 | IT - Related Frameworks | 15:37 |
17 | Information Security Policies | 20:07 |
18 | Organizational Structure | 21:17 |
19 | Specimen - IT Department Structure | 19:53 |
20 | Shortcut | 19:36 |
21 | Summary of part 1 | 09:09 |
22 | Governance and Management of IT Part 2 | 16:41 |
23 | Risk Management Process | 18:55 |
24 | Maturity Models | 15:54 |
25 | Part B- IT Management IT Resource Management | 22:25 |
26 | Termination Policies | 17:11 |
27 | IT Service Provider Acquisition and Management Part 1 | 26:43 |
28 | IT Service Provider Acquisition and Management Part 2 | 19:06 |
29 | Governance in Outsourcing | 09:44 |
30 | IT Performance Monitoring and Reporting | 18:30 |
31 | Summary of Part 2 | 10:35 |
Practice Test - Domain 2 |
32 | Information System Acquisition, Development & Implementation Part 1 | 17:34 |
33 | Roles And Responsibilities | 16:34 |
34 | Program Management Techniques | 16:09 |
35 | Project Planning | 16:52 |
36 | Project Controlling And Monitoring | 18:17 |
37 | System Development Methods 1 | 15:51 |
38 | Requirements Definition | 17:40 |
39 | Summary Part 1 | 19:20 |
40 | Information System Acquisition, Development & Implementation Part 2 | 17:37 |
41 | BPR and Process Change Projects | 15:51 |
42 | Hardware Acquisition | 21:47 |
43 | Control Identification and Design | 20:53 |
44 | Walkthrough for various types of Input Validation | 16:55 |
45 | IS Auditors Tasks | 18:19 |
46 | Testing Methodologies | 12:00 |
47 | Testing Classifications | 18:48 |
48 | Application Testing | 19:33 |
49 | System Implementation | 14:46 |
Practice Test - Domain 3 |
50 | Information System Operations, Maintenance and Support Part 1 | 20:02 |
51 | Memory Cards or Flash Drives Risks | 17:31 |
52 | IT Asset Management | 22:19 |
53 | System Interfaces | 12:37 |
54 | Data Governance | 14:23 |
55 | Access Control Software | 18:48 |
56 | Problem and Incident Management | 11:58 |
57 | Summary Part 1 | 11:20 |
58 | Information System Operations, Maintenance and Support Part 2 | 19:04 |
59 | IT Service Level Management | 10:38 |
60 | Database Management System | 20:32 |
61 | Database Controls | 16:42 |
62 | Business Resilence Business Impact Analysis | 25:55 |
63 | Cost Factors | 17:00 |
64 | Data Backup, Storage and Restoration | 19:54 |
65 | Security and Control of Offsite Facilities | 19:46 |
66 | Summary Part 2 | 16:03 |
67 | Information System Operations, Maintenance and Support Part 3 | 19:23 |
68 | IT Business Continuity Planning | 19:21 |
69 | Business Continuity Planning Process | 17:32 |
70 | Components of Business Continuity Plan | 21:53 |
71 | Specifications | 17:08 |
72 | Disaster Recovery Plans | 18:30 |
73 | Recovery Strategies | 20:54 |
74 | DRP Scenario Preview | 19:42 |
75 | Summary Part 3 | 11:03 |
Practice Test - Domain 4 |
76 | Protection of Information Assets Part 1 | 20:02 |
77 | Privacy | 17:31 |
78 | Physical and Environmental Controls | 22:19 |
79 | Physical Access Issues and Exposures | 12:37 |
80 | Identity and Access Management | 14:23 |
81 | Logical Access | 18:48 |
82 | Identify Creation and Access Request | 11:58 |
83 | Identification and Authentication | 11:20 |
84 | Features of Passwords | 19:04 |
85 | Signature | 10:38 |
86 | Remote Access | 20:32 |
87 | Federated Identity Management | 16:42 |
88 | Summary Part 1 | 25:55 |
89 | Protection Of Information Assets Part 2 | 17:00 |
90 | Network Services | 19:54 |
91 | OSI Layers | 19:46 |
92 | LAN Components | 16:03 |
93 | Wide Area Networks | 19:23 |
94 | WAN Technologies | 19:21 |
95 | Internet Terminologies | 17:32 |
96 | Client Server Technology | 21:53 |
97 | Internet Security Controls | 17:08 |
98 | Firewall Implementation | 18:30 |
99 | Summary Part 2 | 20:54 |
100 | Protection Of Information Assets Part 3 | 19:42 |
101 | Data Encryption and Encrytion Related Techniques | 11:03 |
102 | Digital Signatures | 14:36 |
103 | Public Key Infrastructure | 03:55 |
104 | Types of Certificate | 04:19 |
105 | Web Based Communication Technologies | 11:36 |
106 | Email Security Issues | 08:27 |
107 | Social Media | 08:07 |
108 | Cloud Computing | 09:54 |
109 | Summary Part 3 | 09:24 |
110 | Protection Of Information Assets Part 4 | 14:54 |
111 | Mobile, Wireless and IOT | 06:08 |
112 | MDM | 04:40 |
113 | AD HOC Networks | 10:45 |
114 | Information System Attack Methods And Techniques | 11:23 |
115 | Common Attacks Methods 2 | 11:25 |
116 | Common Attacks Methods 3 | 10:50 |
117 | Viruses | 04:31 |
118 | Security Monitoring Tools and Techniques | 22:53 |
119 | Logging and Reporting of Computer Access Violations | 08:36 |
120 | Bypassing Security and Comensating Controls | 09:15 |
121 | Types of Penetration Test | 05:30 |
122 | Security Monitoring Tools and Techniques | 08:52 |
123 | Incident Management | 05:46 |
124 | Summary Part 4 | 06:52 |
There are no limitations in accessing the course. You can assess the course through the web (ApnaCourse.com) on any device
Most courses are self paced courses with a typical duration of 6 months (180 days) access period. This means, you get 180 access to the course from the moment you enrol into it. You can extend you access by 180 more days at any point during the subscription or post expiration of subscription. Some courses also support a Live Online Classroom courses that Virtual batches on specific dates.
Yes. If your access to a course expires, you can extend that through an online payment and continue from where you left of.
We engage only experienced and certified faculties for each course. Each faculty has decades of relevant teaching / training experience that they bring onto ApnaCourse. For details on their experience, please visit the Faculty section in the website.
We offer a course completion certificate on most courses. This certificate is jointly given by our partner trainer or training instiute who provided the course.
For any course specific doubts, there is an Online forum on ApnaCourse called Social Circle for every Course. Post your questions there and an expert would be able to respond on it. For general payment or enrolment related information, please email at support@apnacourse.com or connect our helpdesk.
Pl visit our detailed FAQ section at https://www.apnacourse.com/about/faq. If you still have doubts, feel free to contact our helpdesk.