Course Overview:
The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. The technical skills & practices the CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction. This course will help the student prepare to obtain this credential.
Attendees to TN-822: Certified Information Systmes Auditor (CISA) Seminar will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Date/Time |
Event |
12/09/2024 - 12/13/2024
08:00 -16:00
|
TN-822: Certified Information Systems Auditor (CISA) Seminar
TechNow, Inc, San Antonio TX
|
01/06/2025 - 01/10/2025
08:00 -16:00
|
TN-822: Certified Information Systems Auditor (CISA) Seminar
TechNow, Inc, San Antonio TX
|
02/10/2025 - 02/14/2025
08:00 -16:00
|
TN-822: Certified Information Systems Auditor (CISA) Seminar
TechNow, Inc, San Antonio TX
|
05/05/2025 - 05/09/2025
08:00 -16:00
|
TN-822: Certified Information Systems Auditor (CISA) Seminar
TechNow, Inc, San Antonio TX
|
10/06/2025 - 10/10/2025
08:00 -16:00
|
TN-822: Certified Information Systems Auditor (CISA) Seminar
TechNow, Inc, San Antonio TX
|
Duration: 5 Days
Course Objectives:
- The IS Audit Process (10%)
- Provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist the organization in ensuring that its information technology and business systems are protected & controlled.
- IT Governance (15%)
- Provide assurance that the organization has the structure, policies, accountability, mechanisms and monitoring practices in place to achieve the requirements of corporate governance of IT.
- System and Infrastructure Life Cycle Management (16%)
- Provide assurance that the management practices for the development/acquisition, testing, implementation, maintenance and disposal of systems and infrastructure will meet the organization's objectives.
- IT Service Delivery and Support (14%)
- Provide assurance that the IT service management practices will ensure the delivery of the level of services required to meet the organization's objectives.
- Protection of Information Assets (31%)
- Provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.
- Business Continuity and Disaster Recovery (14%)
- Provide assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.
Prerequisites:
A minimum of five years of professional information systems auditing, control & security work experienced is required. Experience must have been gained within the 10-year period preceding the application date for certification, or within five years from the date of initially passing the examination.
Comments
Latest comments from students
User: fsarisen
Instructor comments: Thank you Tim for all the great information! I am confident that I'll do well on the ICND exam.
User: storoy30
Instructor comments: The instructor, Tim Burkard, was very knowledgeable on the course material and skilled at explain more complex ideas.
Liked the class? Then let everyone Know!
Course Overview:
The introduction to SQL Databases training course is designed to train the learners on the fundamentals of database concepts. You will not only learn about the different types of databases, the languages and designs as well as describe important database concepts using SQL Server 2016. Anyone who is moving into a database role will benefit from taking this course.
Attendees to MS-5002: Introduction to SQL Databases will receive TechNow approved course materials and expert instruction.
Date/Locations:
No Events
Course Duration: 2 days
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow has heard many students talk about virtualized/remote training that TechNow Does Not Do. While training our most recent offering of PA-215: Palo Alto Networks Firewall Essentials FastTrack a student told his story of how he endend up in our course. His story we have heard for other technologies like Cisco, VMware, BlueCoat and other products.
A large percentage of training is moving to the virtualized/remote lab environments. Students are asked to use some variant of remote access software and remote into the training company's lab environment. Our student in our Palo Alto Networks Firewall course informed us that he went to a very costly offering of that course from the vendor and was not able to perform any labs. There were either network connectivity issues, or issues with the remote access software, or other problems. The whole training experience was very frustrating and not productive.
We keep our labs open to students if they would like after hours, or before hours access. Repeatedly going through a lab engrains that knowledge for later recall. Touching hardware is so critical in understanding the problems that arise when a cable comes loose, or a cable gets plugged in the wrong port. There are other scenarios such as just pulling the power cable, or turning off a power strip, or accidently overwriting a configuration. These disaster scenarious requires hands-on physical access to hardware. Preventing and recovering from disasters is what it's all about, and that requires hands-on, instructor led, real hardware.
TechNow has 26 years of courseware deveopment with a huge library of course material. If our standard courses are just not quite right for what you require, we can provide customized training to meet your needs! We have serviced many request for training that is aligned to customer business operations. Additionally, our security related courses can provide concise direction on how to build security programs and/or address gaps in your existing security programs. TechNow strives for 100% customer satisfaction, and customized classes is one method that TechNow uses to achieve that goal.
Together, our Classroom in a Box service and the customized class service can provide highly targeted training to your team at your location.
If you are interested in more information regarding our customized training, contact us at 800-324-2294
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.