This course provides a thorough guide to mastering IT auditing skills, preparing you for the CISA exam. The course covers key areas such as governance, systems development, and asset protection, essential for a successful career in information systems auditing.
通过 Coursera Plus 提高技能,仅需 239 美元/年(原价 399 美元)。立即节省

推荐体验
推荐体验
初级
Ideal for IT auditors, security analysts, and risk managers preparing for the CISA exam. Non-technical backgrounds are welcome.
推荐体验
推荐体验
初级
Ideal for IT auditors, security analysts, and risk managers preparing for the CISA exam. Non-technical backgrounds are welcome.
您将学到什么
Learn to conduct thorough audit planning and execution for information systems.
Understand IT governance, management, and their critical role in auditing.
Gain skills in securing and controlling information systems and networks.
Master the knowledge required for implementing business resilience strategies and addressing emerging technologies.
要了解的详细信息

添加到您的领英档案
April 2026
12 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有12个模块
In this section, we delve into the intricacies of information system (IS) audit planning, emphasizing its role in IT governance and alignment with business objectives. We explore strategies for designing risk-based audit plans to identify IT vulnerabilities, ensuring that audit functions support business goals and enhance IT system security and compliance.
涵盖的内容
2个视频10篇阅读材料1个作业
2个视频•总计2分钟
- Course Overview Video•1分钟
- Audit Planning - Overview Video•1分钟
10篇阅读材料•总计140分钟
- Introduction•15分钟
- Audit Planning•10分钟
- Business Process Applications And Controls•10分钟
- Electronic Data Interchange (EDI)•15分钟
- Electronic Funds Transfer (EFT)•15分钟
- Types of Controls•15分钟
- Control Objectives•15分钟
- Risk-Based Auditing Approach•15分钟
- Types of Audits and Assessments•15分钟
- Managing Third-Party IS Auditors and Other Experts•15分钟
1个作业•总计10分钟
- Foundations of IS Audit Planning•10分钟
In this section, we delve into the execution of audit plans, emphasizing the importance of audit project management, evidence collection, and data analytics. We explore techniques for managing audit projects efficiently, developing robust evidence-gathering methods, and leveraging data analytics to enhance audit processes, all crucial for maintaining audit integrity and protecting organizational assets.
涵盖的内容
1个视频8篇阅读材料1个作业
1个视频•总计1分钟
- Audit Execution - Overview Video•1分钟
8篇阅读材料•总计120分钟
- Introduction•15分钟
- Audit Testing and Sampling Methodology•15分钟
- The Relationship Between Compliance Testing and Substantive Testing•15分钟
- Key Aspects for the CISA Exam•15分钟
- Continuous and Intermittent Simulation•15分钟
- Key Aspects for the CISA Exam•15分钟
- Quality Assurance Of Audit Processes•15分钟
- Accreditation/Certification of the IS Audit Function•15分钟
1个作业•总计10分钟
- Audit Execution and Methodologies•10分钟
In this section, we explore the implementation of Enterprise Governance of IT (EGIT) to align IT with business objectives, focusing on maximizing value and managing risks. We also discuss designing IT governance frameworks for effective risk management and analyzing enterprise architecture to provide strategic support, which are crucial for IS auditors in ensuring organizational success.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- IT Governance - Overview Video•1分钟
5篇阅读材料•总计75分钟
- Introduction•15分钟
- IT-Related Frameworks•15分钟
- Key Aspects for the CISA Exam•15分钟
- Enterprise Architecture•15分钟
- Maturity Model•15分钟
1个作业•总计10分钟
- IT Governance Principles and Practices•10分钟
In this section, we explore IT management strategies to align IT assets with business goals, focusing on resource management, performance metrics, and third-party risk analysis. We aim to optimize IT performance and ensure quality service delivery through effective monitoring and reporting techniques.
涵盖的内容
1个视频2篇阅读材料1个作业
1个视频•总计1分钟
- It Management - Overview Video•1分钟
2篇阅读材料•总计30分钟
- Introduction•15分钟
- IT Service Provider Acquisition and Management•15分钟
1个作业•总计10分钟
- IT Management Practices and Strategies•10分钟
In this section, we delve into the processes of acquiring and developing information systems, emphasizing project management structures, business case design, and feasibility analysis. We also explore various system development methodologies and control mechanisms to ensure effective implementation and risk mitigation.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Information Systems Acquisition and Development - Overview Video•1分钟
4篇阅读材料•总计60分钟
- Introduction•15分钟
- Gantt Chart•15分钟
- Business Case And Feasibility Analysis•15分钟
- Key Aspects for the CISA Exam•15分钟
1个作业•总计10分钟
- Information Systems Acquisition and Development•10分钟
In this section, we delve into the implementation of information systems, emphasizing the importance of testing methodologies and system migration strategies to mitigate risks and ensure successful operations. We also explore post-implementation reviews to evaluate system effectiveness, providing essential insights for information systems auditors.
涵盖的内容
1个视频3篇阅读材料1个作业
1个视频•总计1分钟
- Information Systems Implementation - Overview Video•1分钟
3篇阅读材料•总计45分钟
- Introduction•15分钟
- Black-Box Testing•15分钟
- System Migration•15分钟
1个作业•总计10分钟
- Information Systems Implementation•10分钟
In this section, we delve into the critical aspects of information systems operations, emphasizing the importance of aligning IT processes with business objectives to enhance efficiency and service delivery. We explore key topics such as IT asset management, job scheduling, and system performance management, providing insights into optimizing resource utilization and minimizing downtime for continuous service delivery.
涵盖的内容
1个视频8篇阅读材料1个作业
1个视频•总计1分钟
- Information Systems Operations - Overview Video•1分钟
8篇阅读材料•总计110分钟
- Introduction•15分钟
- IT Asset Management•15分钟
- Job Scheduling•15分钟
- Problem and Incident Management•10分钟
- Change Management, Configuration Management, and Patch Management•10分钟
- IT Service-Level Management•15分钟
- Database Checks and Controls•15分钟
- Operational Log Management•15分钟
1个作业•总计10分钟
- Core Concepts of Information System Operations•10分钟
In this section, we delve into the critical aspects of business resilience, focusing on developing strategies such as Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP) to ensure ongoing operations during disruptions. We also analyze Recovery Time Objective (RTO) and Recovery Point Objective (RPO) to optimize recovery strategies, highlighting the importance of these measures in preventing costly downtimes and ensuring swift recovery from unforeseen events.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频•总计1分钟
- Business Resilience - Overview Video•1分钟
6篇阅读材料•总计90分钟
- Introduction•15分钟
- Data Backup and Restoration•15分钟
- System Resiliency•15分钟
- Disaster Recovery Plan•15分钟
- DRP Test Methods•15分钟
- Alternate Recovery Sites•15分钟
1个作业•总计10分钟
- Business Continuity and Resilience Strategies•10分钟
In this section, we explore the implementation of security frameworks for information assets, focusing on designing physical and environmental access controls and analyzing identity and access management strategies. These practices are crucial for protecting sensitive data, ensuring business continuity, and preventing financial and reputational damage.
涵盖的内容
1个视频6篇阅读材料1个作业
1个视频•总计1分钟
- Information Asset Security and Control - Overview Video•1分钟
6篇阅读材料•总计90分钟
- Introduction•15分钟
- Physical Access Control•15分钟
- Industrial Control Systems•15分钟
- Authentication Factors•15分钟
- Directory Services•15分钟
- Key Aspects for the CISA Exam•15分钟
1个作业•总计10分钟
- Information Asset Security and Control•10分钟
In this section, we explore the critical aspects of network security, focusing on implementing various firewall types and understanding their roles within the OSI layers. We also design secure VPNs, assess their security risks, and analyze VoIP security measures and common attack methods to ensure data integrity and availability.
涵盖的内容
1个视频7篇阅读材料1个作业
1个视频•总计1分钟
- Network Security and Control - Overview Video•1分钟
7篇阅读材料•总计105分钟
- Introduction•15分钟
- Fiber Optic Cables•15分钟
- Network Attached Storage (NAS)•15分钟
- Firewall Types and Implementation•15分钟
- Key Aspects for the CISA Exam•15分钟
- Wireless Networks•15分钟
- Email Security•15分钟
1个作业•总计10分钟
- Network Security and Control•10分钟
In this section, we explore the implementation of public key infrastructure (PKI) to enhance information asset security and analyze cloud computing models for secure deployment. We also evaluate security measures for the Internet of Things (IoT) to ensure effective data protection, providing IS auditors with the necessary knowledge to assess and implement robust security systems.
涵盖的内容
1个视频5篇阅读材料1个作业
1个视频•总计1分钟
- Public Key Cryptography and Other Emerging Technologies - Overview Video•1分钟
5篇阅读材料•总计75分钟
- Introduction•15分钟
- The Hash of the Message•15分钟
- Key Aspects from the CISA Exam Perspective•15分钟
- Cloud Computing•15分钟
- Virtualization•15分钟
1个作业•总计10分钟
- Exploring Cryptographic Technologies•10分钟
In this section, we explore security event management by implementing security awareness training, analyzing attack methods, and designing incident response plans to protect information systems effectively. We focus on identifying risks and applying strategic security measures to safeguard organizational data and operations.
涵盖的内容
1个视频4篇阅读材料1个作业
1个视频•总计1分钟
- Security Event Management - Overview Video•1分钟
4篇阅读材料•总计60分钟
- Introduction•15分钟
- Key Aspects for the CISA Exam•15分钟
- Double-Blind Testing•15分钟
- Incident Response Management•15分钟
1个作业•总计10分钟
- Security Event Management and Intrusion Detection•10分钟
位教师

提供方

提供方

Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
从 Software Development 浏览更多内容
状态:免费试用免费试用
状态:免费试用免费试用
状态:免费试用免费试用专项课程
状态:免费试用免费试用
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is currently available only to learners who have paid or received financial aid, when available.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,

