Outline of CISA STUDY GUIDE by David L. Cannon
1 Chapter 1 - Secrets of a Successful IS Auditor (1103)
1.1 1.1 Understanding the demand for IS Audits (1136)
1.2 1.2 Understanding Policies, Standards, Guidelines, and Procedures (1221)
1.3 1.3 Auditor Role versus Auditee Role (1354)
1.4 1.4 Auditor Is an Executive Position (1534)
1.5 1.5 Understanding the Corporate Organizational Structure (1739)
1.6 1.6 Managing Projects (1810)
2 Chapter 2 - Audit Process (2373)
2.1 2.1 Establishing and Approving an Audit Charter (2406)
2.2 2.2 Preplanning the Audit (2452)
2.3 2.3 Performing an Audit Risk Assessment (2673)
2.4 2.4 Determining Whether an Audit Is Possible (2704)
2.5 2.5 Performing the Audit (2727)
2.6 2.6 The hierarchy of internal controls (2874)
2.7 2.7 Gathering Audit Evidence (2969)
2.8 2.8 Conducting Audit Testing (3268)
2.9 2.9 Reporting Your Audit Findings (3398)
2.10 2.10 Conducting Follow-Up Activities (3450)
3 Chapter 3 - IT Governance (3758)
3.1 3.1 Strategy Planning for Organizational Control (3777)
3.2 3.2 Overview of Tactical Management (4235)
3.3 3.3 Planning and Performance (4247)
3.4 3.4 Overview of Business Process Reengineering (4521)
3.5 3.5 Operations Management (4966)
4 Chapter 4 - Networking Technology (5296)
4.1 4.1 Understanding the Differences in Computer Architecture (5318)
4.2 4.2 Selecting the Best System (5383)
4.3 4.3 Overview of the Open Systems Interconnect (OSI) Model (5659)
4.4 4.4 Physical Network Design (5910)
4.5 4.5 Overview of Network Technologies (5932)
4.6 4.6 Network Cable Types (5995)
4.7 4.7 Network Devices (6052)
4.8 4.8 Network Services (6107)
4.9 4.9 Expanding the Network (6163)
4.10 4.10 Managing Your Network (6355)
5 Chapter 5 - Life Cycle Management (6700)
5.1 5.1 Governance in Software Development (6722)
5.2 5.2 Managing Software Quality (6753)
5.3 5.3 Overview of the Steering Committee (6874)
5.4 5.4 Change Management (6999)
5.5 5.5 Managing the Software Project (7009)
5.6 5.6 Overview of the System Development Life Cycle (7071)
5.7 5.7 Overview of Data Architecture (7809)
5.8 5.8 Decision Support Systems (7903)
5.9 5.9 Program Architecture (7945)
5.10 5.10 Centralization versus Decentralization (7956)
5.11 5.11 Electronic Commerce (7963)
6 Chapter 6 - IT Service Delivery (8282)
6.1 6.1 Nature of IT Services (8300)
6.2 6.2 IT Operations Management (8346)
6.3 6.3 Monitoring the Status of Controls (8678)
6.4 6.4 Capacity Management (9036)
6.5 6.5 Problem Management (9051)
7 Chapter 7 - Information Asset Protection (9434)
7.1 7.1 Understanding the Threat (9456)
7.2 7.2 Using Administrative Protection (9756)
7.3 7.3 Implementing Physical Protection (9937)
8 Chapter 8 - Disaster Recovery and Business Continuity (11216)
8.1 8.1 Defining Disaster Recovery (11237)
8.2 8.2 Defining the Purpose of Business Continuity (11292)
8.3 8.3 Uniting Other Plans with Business Continuity (11360)
Author: Zaurus User
<zaurus@zaurus>
Date: 2015/12/12 13:45:34