Learning Resources 1. 001. Exam Overview 1. 002. Standards, Guidelines, and Professional Ethics 1. 003. IS Audit Functions 1. 004. Business Process Applications and Controls 1. 005. Control Types 1. 006. Risk and Audit Planning 1. 007. Project Management and Auditing 1. 008. Sampling Methodologies 1. 009. Collecting Evidence 1. 010. Data Analytics and CAATs 1. 011. Continuous Auditing 1. 012. How to Communicate the Audit Results 1. 013. Quality Assurance and Improving Audit 2. 001. What is Governance 2. 002. Best Practices for Enterprise Governance in IT 2. 003. Business Intelligence and Strategic Planning 2. 004. IT Standards, Policies and Procedures 2. 005. Organizational Structures 2. 006. Roles and Segregation of Duties 2. 007. Risk Management in the Enterprise 2. 008. Risk Analysis 2. 009. Maturity Models 2. 010. The Role of Industry Standards and Regulations 2. 011. Resource Management in IT 2. 012. Human Resource Management 2. 015. Governance in the Cloud 2. 013. Organizational Change Management and Financial Management 2. 014. IT Service Provider Acquisition and Management 2. 016. Third-party Services 2. 017. Quality Assurance and IT Audits 2. 018. Performance Monitoring and Reporting 3. 001. Project Governance and Management 3. 002. Roles in Project Management 3. 003. The PMO 3. 004. Initiating the Project 3. 005. Planning the Project 3. 006. Executing and Monitoring the Project 3. 007. Closing the Project 3. 008. Business Case and Feasibility Analysis 3. 009. System Development Lifecycles 3. 010. System and Software Development Methods 3. 011. Computer Aided Software Engineering and 4GL 3. 012. Identifying and Designing Controls 3. 013. Decision Support Systems 3. 014. Testing Methodologies 3. 015. Application Systems and Data Integrity Testing 3. 016. Data Migration 3. 017. Changeover Techniques 3. 018. System Change and Post Implementation Procedures 4. 001. Necessary Technology Components 4. 002. USB and RFID 4. 003. IT Asset Management 4. 004. System Interfaces and End User Computing 4. 005. Data Governance 4. 006. Operating Systems 4. 007. Software Licensing and Source Code Management 4. 008. Incident and Problem Management 4. 009. Release and Patch Management 4. 010. Service Level Management and Agreements 4. 011. Database Management 4. 012. Business Impact Analysis 4. 013. System Resiliency 4. 014. Backups, Storage and Restoration 4. 015. Business Continuity Management 4. 016. The Business Continuity Plan 4. 017. Testing the BCP 4. 018. Disaster Recovery Plans 4. 019. Testing the DRP 5. 026. Evidence Collection and Forensics 5. 025. Incident Response Management 5. 024. Monitoring Tools 5. 023. Network Penetration Testing 5. 022. Testing Techniques for Security Controls 5. 021. IS Attack Methods and Techniques 5. 020. Security Awareness Training 5. 019. Virtualization and Cloud Computing 5. 018. IS Audits and Social Media 5. 017. The Public Key Infrastructure 5. 016. Applications of Cryptography 5. 015. Encryption Systems 5. 014. Change Management in Networks 5. 013. Network Infrastructure Security Firewalls 5. 012. Applications in a Networked Environment 5. 011. Network Infrastructure 5. 010. Data Loss Prevention 5. 009. Audit Logging of System Access 5. 008. Logical Access and Authorization Issues 5. 007. Identity and Access Management 5. 006. Environmental Controls 5. 005. Physical Access and Controls 5. 004. Principles of Data Privacy 5. 003. Recommended IT Security Baseline 5. 002. Roles and Responsibilities for Auditing the IS Management Framework 5. 001. Frameworks, Standards and Guidelines