CISA 2022: Auditing Scenarios
IT technicians and managers are responsible for the safety of IT processing systems and sensitive data. Information system audit processes if applied effectively can ensure adequate risk mitigation.
In this course you will explore auditing scenarios beginning with IT key performance indicators (KPIs) audit planning and security control cost-effectiveness. Then you’ll learn how to determine Wi-Fi weakness and secure traveling users. Finally you’ll dig into key usage and compensating control selection.
This course helps prepare learners for the ISACA certification exam Certified Information Systems Auditor (CISA).