مساعد Cyvitrix
×
أهلاً بك! اكتب سؤالك أو اختر اقتراحاً من الأسفل.
أسئلة مقترحة
واتساب
البريد
إرسال
أنا هنا لمساعدتك
جرّبني
×
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Information System Auditor Training - CISA [ARABIC]
CISA Arabic Training - Updated February 2026 - Domain 1
1 - CISA Course Orientation and How to Use This Training as an IS Auditor (11:54)
2 - Domain 1 Overview Planning and Conducting Information Systems Audit (13:29)
3 - Role of the Information Systems Auditor and Audit Mindset (11:05)
4 - Key Stakeholders Auditor Auditee and Audit Client Responsibilities (10:37)
5 - Internal Audit vs External Audit Assurance Objectives and Reporting Lines (12:55)
6 - Internal Audit Fundamentals for Information Systems Assurance (16:02)
7 - Audit Committee Oversight and the Audit Charter for IS Audits (10:19)
8 - Audit and Assurance Engagement Types Used in IS Auditing (14:24)
9 - Engagement Letters Scope Agreements and Reliance on Specialists (11:32)
10 - Professional Ethics and Conduct for Information Systems Auditors (9:03)
11 - IT Assurance Frameworks and Using the Work of Other Assurance Providers (11:42)
12 - Legal Regulatory and Contractual Requirements in IS Audit Planning (12:18)
13 - Using Standards and Frameworks as Audit Criteria for IS Audits (17:13)
14 - Audit Pre-Planning and Risk-Based Audit Planning for IS Engagements (13:46)
15 - Executing the IS Audit Testing Approach Fieldwork and Workpaper Practices (13:32)
16 - Audit Evidence in IS Audits Sufficiency Competence and Reliability (12:24)
17 - Assessing Control Design and Operating Effectiveness and Audit Risk Impact (11:05)
18 - Audit Reporting Findings Recommendations and Audit Documentation Standards (12:05)
19 - Risk-Based Auditing and End-to-End Audit Lifecycle (11:18)
20 - Audit Sampling in IS Audits Statistical and Non-Statistical Methods (12:05)
21 - Control Self-Assessment When and How Auditors Use CSA Results (10:48)
22 - Computer-Assisted Audit Techniques Planning and Performing CAATs (10:25)
23 - Continuous Auditing and Continuous Monitoring Audit Use Cases and Models (13:14)
24 - Information System Auditing in the era of AI (11:44)
25 - Auditing Business Intelligence and Analytics Environments (12:44)
26 - Agile Auditing - Auditing Agile Environments and Iterative Delivery Controls (10:19)
27 - Emerging Technology Audit Risks and Practical Audit Considerations (15:07)
28 - Domain 1 Reflection Audit Judgment Evidence Quality (10:15)
CISA Arabic Training - Updated February 2026 - Domain 2
29 - Domain 2 Overview Governance and Management (13:25)
30 - Enterprise Governance Foundations Relevant to IS Auditors (14:05)
31 - Information Security Governance Oversight Accountability and Assurance Focus (11:38)
32 - IT Governance and IT Management Audit Boundaries and Evaluation Approach (11:08)
33 - Auditing Governance Structures Decision Rights and Performance Oversight (12:18)
34 - Enterprise Architecture Audit Relevance and Governance Controls (12:05)
35 - Policies as Governance Instruments Auditability and Control Intent (11:28)
36 - Standards as Governance Instruments Audit Criteria and Evidence Mapping (11:29)
37 - Procedures and Guidelines Operationalizing Controls for Audit Testing (11:14)
38 - Policy Audit Case Examples Acceptable Use Physical Security and Clear Desk (12:39)
39 - Policy Audit Case Examples Internet Use Email Security and Remote Access (14:58)
40 - Quality Attributes of Policies Standards and Procedures for Audit Readiness (14:03)
41 - IT Risk Management Audit Perspective and Assurance Objectives (13:52)
42 - Risk Types for Audit Planning Inherent Risk Residual Risk and Control Risk (11:15)
43 - Risk Management Frameworks How Auditors Evaluate Implementation Quality (12:32)
44 - Risk Identification Methods Documentation and Audit Evidence (11:08)
45 - Risk Analysis Likelihood Impact and Control Assumptions for Audit Review (12:11)
46 - Risk Evaluation and Treatment Accept Avoid Mitigate Transfer and Audit Tests (13:22)
47 - Risk Reporting and Monitoring KRIs Governance Reporting and Audit Trails (12:38)
48 - Auditor Role in Risk Management Assurance Advisory and Independence (12:18)
49 - Security Controls Control Families Types and Audit Test Strategies (13:52)
50 - Control Objectives and Compensating Controls Evaluating Control Sufficiency (13:27)
51 - Defense in Depth Audit Implications for Layered Security (11:26)
52 - Control Selection and Implementation Governance Evidence and Audit Approach (10:40)
53 - Internal Control Frameworks Using Control Models to Structure Audit Work (12:08)
54 - Control Evaluation Design Effectiveness vs Operating Effectiveness in Practice (11:30)
55 - Personnel Governance and Human Resources Controls Audit Focus Areas (12:13)
56 - Segregation of Duties Conflicting Duties (10:54)
57 - Outsourcing and Third-Party Risk Audit Approach to Vendor Governance (15:39)
58 - Case Study Lessons for Auditors from the CrowdStrike Outage July 2024 (9:41)
59 - SOC Reports Using Service Organization Control Reports in IS Audit Work (12:34)
60 - Auditing IT Management Processes Financial Portfolio Capacity (11:38)
61 - IT Financial Management for Auditors CAPEX OPEX ROI and ROSI (13:09)
62 - Maturity and Capability Assessments Audit (11:09)
63 - IT Performance Management Balanced Scorecard Evidence and Audit Evaluation (13:12)
64 - Quality Management in IT Quality Assurance Quality Control (13:25)
65 - Domain 2 Reflection Governance Assurance and Risk Oversight Outcomes (12:41)
CISA Arabic Training - Updated February 2026 - Domain 3
66 - Domain 3 Overview Information Systems Acquisition Development and Implementation (18:20)
67 - Auditing Technology Acquisition Governance Controls and Risk Considerations (10:57)
68 - Auditing Feasibility Studies and Business Cases for Technology Investments (10:45)
69 - Budget Requests and RFP Processes Procurement Controls for Auditors (12:24)
70 - Projects and Programs Governance Structures and Audit Criteria (12:57)
71 - Project Planning Controls Scope Objectives and Work Breakdown Evidence (12:36)
72 - Schedule and Status Controls Monitoring Reporting and Audit Trail Review (12:11)
73 - Cost Estimation Controls Audit Review of Assumptions Models and Variances (12:00)
74 - Project Closure and Post-Implementation Review Auditor Expectations (13:08)
75 - Programming Fundamentals for Auditors What to Know to Audit Applications (13:19)
76 - Auditing System Development Life Cycle Models and Delivery Methods (13:01)
77 - Requirements Controls SRTM Traceability Use Cases and Abuse Cases (12:01)
78 - Application Types and Architecture Context for Audit Planning (12:50)
79 - Software Licensing Compliance Audit Approach to Legal and Contract Risks (12:10)
80 - Re-Engineering and Reverse Engineering Audit Risks and Control Expectations (10:08)
81 - Application Controls Input Processing Output and Interface Control Testing (13:05)
82 - Auditing Testing Practices Test Strategy Evidence and Defect Governance (14:14)
83 - Certification and Accreditation Audit Use of Assurance Results and Evidence (11:08)
84 - Release and Deployment Management Audit Controls and Evidence (11:47)
85 - Implementation and Changeover Cutover Risks and Audit Verification Steps (13:30)
86 - Maintenance and Support Controls Audit Focus on Stability and Integrity (10:17)
87 - Auditing Software Projects End-to-End Controls and Practical Testing Plan (11:09)
88 - Change Management Audit Criteria Approval Controls and Traceability (12:19)
89 - Configuration Management Baselines CMDB Evidence and Audit Testing (11:22)
90 - Version Control Systems Audit Evidence for Integrity and Segregation (10:36)
91 - Patch and Vulnerability Management Audit Approach to Timeliness and Coverage (13:11)
92 - Auditing Virtualization Environments Control Risks and Assurance Tests (14:30)
93 - Auditing Cloud Services Shared Responsibility and Control Assurance (14:13)
94 - Cloud Deployment Models Audit Considerations for Public Private and Hybrid (11:22)
95 - Domain 3 Reflection Delivery Governance and Control Assurance Quality (10:56)
CISA Arabic Training - Updated February 2026 - Domain 4
96 - Domain 4 Overview Information Systems Operations and Business Resilience (15:05)
97 - Auditing IT Operations Management Governance Processes and Metrics (14:12)
98 - IT Asset Management Audits Lifecycle Controls and Evidence Requirements (10:49)
99 - End-User Computing and Shadow IT Audit Risks and Detection Techniques (8:48)
100 - Job Scheduling and RPA Auditing Automated Operations and Bot Controls (11:02)
101 - Auditing Application Architecture Control Points and Assurance Objectives (13:50)
102 - Auditing Network and Security Architecture Segmentation (11:50)
103 - IT Infrastructure Components for Auditors What to Evaluate and Why (12:43)
104 - Enterprise Computing Operations Audit View of Platforms and Service Delivery (13:31)
105 - Preventive Maintenance and Operational Security Audit Evidence and Testing (11:53)
106 - Incident Management Audits Detection Triage and Closure Controls (12:44)
107 - Incident Response Plans Audit Readiness Testing and Execution Evidence (12:25)
108 - Digital Forensics Evidence Handling Chain of Custody and Audit Considerations (11:20)
109 - Security Operations Centers Auditing Monitoring Capabilities and Coverage (11:28)
110 - Operational Logging Audit Requirements for Log Generation and Retention (13:15)
111 - Audit Trails and SIEM Evaluating Use Cases Integrity and Alert Governance (12:24)
112 - File Integrity Monitoring Audit Use and Control Effectiveness Review (10:56)
113 - EDR NDR XDR and SOAR Auditing Detection and Response Tooling (12:23)
114 - Database Fundamentals for Auditors Data Structures and Control Touchpoints (11:07)
115 - Keys and Integrity Auditing Referential Integrity and Data Quality Controls (11:35)
116 - Database Security Controls Access Hardening and Activity Monitoring Audits (14:48)
117 - Database Resilience Backup Recovery and High Availability Audit Tests (11:01)
118 - Networking Fundamentals for IS Auditors Control Relevance and Risk (17:25)
119 - OSI and TCPIP Models for Auditors Mapping Controls to Network Layers (18:25)
120 - Auditing Physical Layer Controls Facilities Cabling and Environmental Factors (20:22)
121 - Auditing Data Link Controls VLANs Switching and Layer Two Security (13:17)
122 - Auditing Network Layer Controls Routing Segmentation and Layer Three Risks (15:06)
123 - Auditing Layers Four Through Seven Services Applications and Protocol Risks (17:08)
124 - Disaster Recovery Planning Audits Governance Testing and Capability Evidence (11:39)
125 - Business Continuity Audits Business Impact Strategy and Operational Readiness (13:07)
126 - Recovery Metrics RPO RTO AIW SDO and MTO in Audit Evaluations (14:29)
127 - Recovery Strategies Alternate Sites Processing Options and Audit Evidence (12:07)
128 - BCP and DRP Testing Audit Evaluation of Exercising and Remediation Tracking (12:06)
129 - Business Continuity Policy Audits Scope Ownership and Compliance Evidence (13:38)
130 - Backup Controls Auditing Backup Design Execution and Restoration Testing (13:01)
131 - Server and Application Security with Backup Policy Audit Verification Approach (14:47)
132 - Storage Technologies for Auditors Risks Controls and Assurance Tests (14:01)
133 - Auditing Redundant Array of Independent Disks Resilience Design and Monitoring (16:06)
134 - Domain 4 Reflection Operational Reliability and Resilience Assurance (14:22)
CISA Arabic Training - Updated February 2026 - Domain 5
135 - Domain 5 Overview Protection of Information Assets (11:49)
136 - Information Security Objectives Confidentiality Integrity and Availability (12:33)
137 - Core Security Terminology for IS Audits Aligning Language to Audit Criteria (10:53)
138 - Vulnerability Concepts Audit Relevance and Control Assurance Approach (10:26)
139 - Malware Risks Auditing Prevention Detection and Response Controls (13:24)
140 - Denial of Service Risks Auditing Availability Controls and Capacity Measures (13:10)
141 - Man-in-the-Middle Risks Auditing Network Trust and Encryption Controls (12:02)
142 - Attack Lifecycle Models Using Kill Chain Concepts for Control Validation (11:17)
143 - IAM Governance Auditing Identity Lifecycle and Access Control Management (14:26)
144 - Authentication Authorization and Accountability Audit Criteria and Evidence (13:34)
145 - Multi-Factor Authentication and Biometrics Audit Testing and Exception Review (12:49)
146 - Single Sign-On and Reduced Sign-On Auditing Federation and Access Flows (12:55)
147 - Active Directory and LDAP Auditing Directory Services and Privileged Access (15:25)
148 - Account and Password Policies Auditing Access Governance and Compliance (15:03)
149 - Network Segmentation Auditing Trust Boundaries (12:47)
150 - Firewalls Auditing Rule Governance Logging and Change Control (13:46)
151 - DMZ Bastion Hosts and Honeypots Auditing (13:15)
152 - IDS and IPS Auditing Detection Coverage and Tuning Governance (12:12)
153 - Network Security Operations Auditing Configuration Monitoring and Hygiene (13:17)
154 - Network Redundancy Auditing High Availability and Failover Controls (12:51)
155 - Network Access and BYOD Policies Auditing Endpoint Admission and Compliance (14:38)
156 - Physical Security Controls Auditing Access Surveillance and Visitor Management (14:31)
157 - Environmental Controls Auditing Power HVAC Fire and Facility Protections (15:52)
158 - Data Lifecycle Management Auditing Controls from Creation to Disposal (11:29)
159 - Data Classification Auditing Classification Schemes and Handling Requirements (14:10)
160 - Data Destruction Auditing Media Sanitization and Disposal Evidence (11:59)
161 - Data Protection Policies Auditing Handling Rules and Enforcement Controls (14:25)
162 - Asset Ownership and Custodianship Auditing Accountability for Data Protection (11:46)
164 - Symmetric Encryption Auditing Key Handling and Implementation Controls (11:24)
165 - Asymmetric Encryption Auditing Key Management and Trust Models (16:49)
166 - Digital Certificates Auditing Issuance Use and Validity Controls (11:33)
167 - Public Key Infrastructure Auditing Certificate Lifecycle Governance (11:12)
168 - Hashing and Salting Auditing Integrity Controls and Credential Protection (13:09)
169 - Digital Signatures Auditing Nonrepudiation and Integrity Assurance (10:57)
170 - Certificate Pinning Audit Considerations and Operational Risks (11:00)
171 - Transport Security Auditing Secure Sockets Layer TLS and Mutual TLS Usage (12:11)
172 - Cryptography Use Cases Auditing Data in Transit at Rest and in Use Controls (12:38)
173 - Endpoint Security Auditing Baselines Hardening and Monitoring Controls (11:29)
174 - Endpoint Security Tools Auditing Capabilities Coverage and Alert Governance (17:13)
175 - Social Engineering Auditing Human Risk and Control Effectiveness (14:53)
176 - Security Awareness Programs Auditing (11:24)
177 - Operational Technology and ICS Auditing Unique Asset Protection Controls (14:49)
178 - Data Governance Auditing Stewardship Quality and Control Ownership (10:45)
179 - Data Governance Tooling Auditing Classification Cataloging and DLP Enablement (10:20)
180 - Privacy Controls Auditing Data Protection Consent and Regulatory Alignment (14:42)
181 - Domain 5 Reflection Asset Protection Assurance and Control Effectiveness (14:38)
110 - Operational Logging Audit Requirements for Log Generation and Retention
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock