مساعد Cyvitrix
×
أهلاً بك! اكتب سؤالك أو اختر اقتراحاً من الأسفل.
أسئلة مقترحة
واتساب
البريد
إرسال
أنا هنا لمساعدتك
جرّبني
×
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Information System Auditor Training - CISA [ARABIC]
CISA Arabic Training Course Introduction
1 - CISA Course Orientation and How to Use This Training as an IS Auditor (11:48)
CISA Arabic Course - Domain 1 - Full As per CRM v28
2 - Domain 1 Overview Planning and Conducting Information Systems Audit (13:23)
3 - Role of the Information Systems Auditor and Audit Mindset (11:06)
4 - Key Stakeholders Auditor Auditee and Audit Client Responsibilities (10:26)
5 - Internal Audit vs External Audit Assurance Objectives and Reporting Lines (12:49)
6 - Internal Audit Fundamentals for Information Systems Assurance (15:56)
7 - Audit Committee Oversight and the Audit Charter for IS Audits (10:20)
8 - Audit and Assurance Engagement Types Used in IS Auditing (14:06)
9 - Engagement Letters Scope Agreements and Reliance on Specialists (11:38)
11 - IT Assurance Frameworks and Using the Work of Other Assurance Providers (11:43)
10 - Professional Ethics and Conduct for Information Systems Auditors (9:04)
12 - Legal Regulatory and Contractual Requirements in IS Audit Planning (12:20)
13 - Using Standards and Frameworks as Audit Criteria for IS Audits (17:08)
14 - Audit Pre-Planning and Risk-Based Audit Planning for IS Engagements (13:42)
15 - Executing the IS Audit Testing Approach Fieldwork and Workpaper Practices (13:27)
16 - Audit Evidence in IS Audits Sufficiency Competence and Reliability (12:18)
17 - Assessing Control Design and Operating Effectiveness and Audit Risk Impact (10:59)
18 - Audit Reporting Findings Recommendations and Audit Documentation Standards (11:59)
19 - Risk-Based Auditing and End-to-End Audit Lifecycle (11:22)
20 - Audit Sampling in IS Audits Statistical and Non-Statistical Methods (12:13)
21 - Control Self-Assessment When and How Auditors Use CSA Results (10:49)
22 - Computer-Assisted Audit Techniques Planning and Performing CAATs (10:25)
23 - Continuous Auditing and Continuous Monitoring Audit Use Cases and Models (13:08)
24 - Information System Auditing in the era of AI (11:37)
25 - Auditing Business Intelligence and Analytics Environments (12:38)
26 - Agile Auditing - Auditing Agile Environments and Iterative Delivery Controls (10:14)
27 - Emerging Technology Audit Risks and Practical Audit Considerations (15:08)
28 - Domain 1 Reflection Audit Judgment Evidence Quality (10:16)
CISA Arabic Course - Domain 2 - Full As per CRM v28
29 - Domain 2 Overview Governance and Management (13:25)
30 - Enterprise Governance Foundations Relevant to IS Auditors (14:07)
31 - Information Security Governance Oversight Accountability and Assurance Focus (11:22)
32 - IT Governance and IT Management Audit Boundaries and Evaluation Approach (11:02)
33 - Auditing Governance Structures Decision Rights and Performance Oversight (12:12)
34 - Enterprise Architecture Audit Relevance and Governance Controls (12:06)
35 - Policies as Governance Instruments Auditability and Control Intent (11:23)
36 - Standards as Governance Instruments Audit Criteria and Evidence Mapping (11:23)
37 - Procedures and Guidelines Operationalizing Controls for Audit Testing (11:15)
38 - Policy Audit Case Examples Acceptable Use Physical Security and Clear Desk (12:33)
39 - Policy Audit Case Examples Internet Use Email Security and Remote Access (14:52)
40 - Quality Attributes of Policies Standards and Procedures for Audit Readiness (13:58)
41 - IT Risk Management Audit Perspective and Assurance Objectives (13:46)
42 - Risk Types for Audit Planning Inherent Risk Residual Risk and Control Risk (11:10)
43 - Risk Management Frameworks How Auditors Evaluate Implementation Quality (12:33)
44 - Risk Identification Methods Documentation and Audit Evidence (11:03)
45 - Risk Analysis Likelihood Impact and Control Assumptions for Audit Review (12:05)
46 - Risk Evaluation and Treatment Accept Avoid Mitigate Transfer and Audit Tests (13:17)
47 - Risk Reporting and Monitoring KRIs Governance Reporting and Audit Trails (12:33)
48 - Auditor Role in Risk Management Assurance Advisory and Independence (12:19)
49 - Security Controls Control Families Types and Audit Test Strategies (13:39)
50 - Control Objectives and Compensating Controls Evaluating Control Sufficiency (13:22)
51 - Defense in Depth Audit Implications for Layered Security (11:27)
52 - Control Selection and Implementation Governance Evidence and Audit Approach (10:34)
53 - Internal Control Frameworks Using Control Models to Structure Audit Work (12:02)
54 - Control Evaluation Design Effectiveness vs Operating Effectiveness in Practice (11:12)
55 - Personnel Governance and Human Resources Controls Audit Focus Areas (12:14)
56 - Segregation of Duties Conflicting Duties (10:49)
57 - Outsourcing and Third-Party Risk Audit Approach to Vendor Governance (15:31)
58 - Case Study Lessons for Auditors from the CrowdStrike Outage July 2024 (9:42)
59 - SOC Reports Using Service Organization Control Reports in IS Audit Work (12:28)
60 - Auditing IT Management Processes Financial Portfolio Capacity (11:39)
61 - IT Financial Management for Auditors CAPEX OPEX ROI and ROSI (13:10)
62 - Maturity and Capability Assessments Audit (11:03)
63 - IT Performance Management Balanced Scorecard Evidence and Audit Evaluation (13:08)
64 - Quality Management in IT Quality Assurance Quality Control (13:19)
65 - Domain 2 Reflection Governance Assurance and Risk Oversight Outcomes (12:35)
CISA Arabic Course - Domain 3 - Full As per CRM v28
66 - Domain 3 Overview Information Systems Acquisition Development and Implementation (18:16)
67 - Auditing Technology Acquisition Governance Controls and Risk Considerations (10:42)
68 - Auditing Feasibility Studies and Business Cases for Technology Investments (10:39)
69 - Budget Requests and RFP Processes Procurement Controls for Auditors (12:25)
70 - Projects and Programs Governance Structures and Audit Criteria (12:51)
71 - Project Planning Controls Scope Objectives and Work Breakdown Evidence (12:37)
72 - Schedule and Status Controls Monitoring Reporting and Audit Trail Review (12:05)
73 - Cost Estimation Controls Audit Review of Assumptions Models and Variances (11:55)
74 - Project Closure and Post-Implementation Review Auditor Expectations (13:02)
75 - Programming Fundamentals for Auditors What to Know to Audit Applications (13:13)
76 - Auditing System Development Life Cycle Models and Delivery Methods (13:04)
77 - Requirements Controls SRTM Traceability Use Cases and Abuse Cases (12:02)
78 - Application Types and Architecture Context for Audit Planning (12:44)
79 - Software Licensing Compliance Audit Approach to Legal and Contract Risks (12:04)
80 - Re-Engineering and Reverse Engineering Audit Risks and Control Expectations (9:52)
81 - Application Controls Input Processing Output and Interface Control Testing (12:47)
82 - Auditing Testing Practices Test Strategy Evidence and Defect Governance (14:05)
83 - Certification and Accreditation Audit Use of Assurance Results and Evidence (11:02)
84 - Release and Deployment Management Audit Controls and Evidence (11:48)
85 - Implementation and Changeover Cutover Risks and Audit Verification Steps (13:24)
86 - Maintenance and Support Controls Audit Focus on Stability and Integrity (10:18)
87 - Auditing Software Projects End-to-End Controls and Practical Testing Plan (11:04)
88 - Change Management Audit Criteria Approval Controls and Traceability (12:13)
89 - Configuration Management Baselines CMDB Evidence and Audit Testing (11:13)
90 - Version Control Systems Audit Evidence for Integrity and Segregation (10:30)
91 - Patch and Vulnerability Management Audit Approach to Timeliness and Coverage (13:06)
92 - Auditing Virtualization Environments Control Risks and Assurance Tests (14:31)
93 - Auditing Cloud Services Shared Responsibility and Control Assurance (14:07)
94 - Cloud Deployment Models Audit Considerations for Public Private and Hybrid (11:29)
95 - Domain 3 Reflection Delivery Governance and Control Assurance Quality (10:50)
CISA Arabic Course - Domain 4 - Full As per CRM v28
96 - Domain 4 Overview Information Systems Operations and Business Resilience (14:45)
97 - Auditing IT Operations Management Governance Processes and Metrics (14:07)
98 - IT Asset Management Audits Lifecycle Controls and Evidence Requirements (10:43)
99 - End-User Computing and Shadow IT Audit Risks and Detection Techniques (8:49)
100 - Job Scheduling and RPA Auditing Automated Operations and Bot Controls (11:03)
101 - Auditing Application Architecture Control Points and Assurance Objectives (13:45)
102 - Auditing Network and Security Architecture Segmentation (11:44)
103 - IT Infrastructure Components for Auditors What to Evaluate and Why (12:37)
104 - Enterprise Computing Operations Audit View of Platforms and Service Delivery (13:26)
105 - Preventive Maintenance and Operational Security Audit Evidence and Testing (11:48)
106 - Incident Management Audits Detection Triage and Closure Controls (12:38)
107 - Incident Response Plans Audit Readiness Testing and Execution Evidence (12:26)
108 - Digital Forensics Evidence Handling Chain of Custody and Audit Considerations (11:14)
109 - Security Operations Centers Auditing Monitoring Capabilities and Coverage (11:23)
110 - Operational Logging Audit Requirements for Log Generation and Retention (13:09)
111 - Audit Trails and SIEM Evaluating Use Cases Integrity and Alert Governance (12:20)
112 - File Integrity Monitoring Audit Use and Control Effectiveness Review (11:05)
113 - EDR NDR XDR and SOAR Auditing Detection and Response Tooling (12:17)
114 - Database Fundamentals for Auditors Data Structures and Control Touchpoints (10:51)
115 - Keys and Integrity Auditing Referential Integrity and Data Quality Controls (11:30)
116 - Database Security Controls Access Hardening and Activity Monitoring Audits (14:43)
117 - Database Resilience Backup Recovery and High Availability Audit Tests (10:38)
118 - Networking Fundamentals for IS Auditors Control Relevance and Risk (17:19)
119 - OSI and TCPIP Models for Auditors Mapping Controls to Network Layers (18:20)
120 - Auditing Physical Layer Controls Facilities Cabling and Environmental Factors (20:18)
121 - Auditing Data Link Controls VLANs Switching and Layer Two Security (13:04)
122 - Auditing Network Layer Controls Routing Segmentation and Layer Three Risks (14:54)
123 - Auditing Layers Four Through Seven Services Applications and Protocol Risks (17:16)
124 - Disaster Recovery Planning Audits Governance Testing and Capability Evidence (11:34)
125 - Business Continuity Audits Business Impact Strategy and Operational Readiness (13:01)
126 - Recovery Metrics RPO RTO AIW SDO and MTO in Audit Evaluations (14:23)
127 - Recovery Strategies Alternate Sites Processing Options and Audit Evidence (12:08)
128 - BCP and DRP Testing Audit Evaluation of Exercising and Remediation Tracking (12:00)
129 - Business Continuity Policy Audits Scope Ownership and Compliance Evidence (13:33)
130 - Backup Controls Auditing Backup Design Execution and Restoration Testing (12:59)
131 - Server and Application Security with Backup Policy Audit Verification Approach (15:23)
132 - Storage Technologies for Auditors Risks Controls and Assurance Tests (14:03)
133 - Auditing Redundant Array of Independent Disks Resilience Design and Monitoring (16:04)
134 - Domain 4 Reflection Operational Reliability and Resilience Assurance (14:23)
CISA Arabic Course - Domain 5 - Full As per CRM v28
135 - Domain 5 Overview Protection of Information Assets (11:50)
136 - Information Security Objectives Confidentiality Integrity and Availability (12:29)
137 - Core Security Terminology for IS Audits Aligning Language to Audit Criteria (10:49)
138 - Vulnerability Concepts Audit Relevance and Control Assurance Approach (10:20)
139 - Malware Risks Auditing Prevention Detection and Response Controls (13:18)
140 - Denial of Service Risks Auditing Availability Controls and Capacity Measures (13:04)
141 - Man-in-the-Middle Risks Auditing Network Trust and Encryption Controls (12:03)
142 - Attack Lifecycle Models Using Kill Chain Concepts for Control Validation (11:12)
143 - IAM Governance Auditing Identity Lifecycle and Access Control Management (14:22)
144 - Authentication Authorization and Accountability Audit Criteria and Evidence (13:28)
145 - Multi-Factor Authentication and Biometrics Audit Testing and Exception Review (12:44)
146 - Single Sign-On and Reduced Sign-On Auditing Federation and Access Flows (12:49)
147 - Active Directory and LDAP Auditing Directory Services and Privileged Access (15:19)
148 - Account and Password Policies Auditing Access Governance and Compliance (14:57)
149 - Network Segmentation Auditing Trust Boundaries (12:48)
150 - Firewalls Auditing Rule Governance Logging and Change Control (13:47)
151 - DMZ Bastion Hosts and Honeypots Auditing (13:09)
152 - IDS and IPS Auditing Detection Coverage and Tuning Governance (12:13)
153 - Network Security Operations Auditing Configuration Monitoring and Hygiene (13:12)
154 - Network Redundancy Auditing High Availability and Failover Controls (12:52)
155 - Network Access and BYOD Policies Auditing Endpoint Admission and Compliance (14:34)
156 - Physical Security Controls Auditing Access Surveillance and Visitor Management (14:26)
157 - Environmental Controls Auditing Power HVAC Fire and Facility Protections (15:46)
158 - Data Lifecycle Management Auditing Controls from Creation to Disposal (11:24)
159 - Data Classification Auditing Classification Schemes and Handling Requirements (14:05)
160 - Data Destruction Auditing Media Sanitization and Disposal Evidence (11:53)
161 - Data Protection Policies Auditing Handling Rules and Enforcement Controls (14:19)
162 - Asset Ownership and Custodianship Auditing Accountability for Data Protection (11:41)
164 - Symmetric Encryption Auditing Key Handling and Implementation Controls (11:25)
165 - Asymmetric Encryption Auditing Key Management and Trust Models (16:43)
166 - Digital Certificates Auditing Issuance Use and Validity Controls (11:34)
167 - Public Key Infrastructure Auditing Certificate Lifecycle Governance (11:06)
168 - Hashing and Salting Auditing Integrity Controls and Credential Protection (13:03)
169 - Digital Signatures Auditing Nonrepudiation and Integrity Assurance (10:51)
170 - Certificate Pinning Audit Considerations and Operational Risks (10:47)
171 - Transport Security Auditing Secure Sockets Layer TLS and Mutual TLS Usage (12:06)
172 - Cryptography Use Cases Auditing Data in Transit at Rest and in Use Controls (12:33)
173 - Endpoint Security Auditing Baselines Hardening and Monitoring Controls (11:30)
174 - Endpoint Security Tools Auditing Capabilities Coverage and Alert Governance (17:09)
175 - Social Engineering Auditing Human Risk and Control Effectiveness (14:54)
176 - Security Awareness Programs Auditing (11:18)
177 - Operational Technology and ICS Auditing Unique Asset Protection Controls (14:45)
178 - Data Governance Auditing Stewardship Quality and Control Ownership (10:39)
179 - Data Governance Tooling Auditing Classification Cataloging and DLP Enablement (10:15)
180 - Privacy Controls Auditing Data Protection Consent and Regulatory Alignment (14:36)
181 - Domain 5 Reflection Asset Protection Assurance and Control Effectiveness (14:33)
122 - Auditing Network Layer Controls Routing Segmentation and Layer Three Risks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock