Information Systems Fundamental Skills you will learn

  • Vulnerability assessment and identification
  • Information Systems audit and assurance guidelines
  • Auditing Information Systems
  • Governance and IT management
  • Information Systems acquisition development and implementation
  • Information Systems operations maintenance and service management
  • Information asset protection

Who should learn Information Systems Fundamentals

  • ISIT Auditors
  • IT Compliance Managers
  • Chief Compliance Officers
  • Chief Risk Officers
  • Security Heads
  • Security Managers

What you will learn in Information Systems Fundamentals

  • Certified Information Systems Auditor(CISA®)

    • Domain 00 - Course Introduction

      06:04
      • 0.1 Course Introduction
        06:04
    • Domain 01 - Process of Auditing Information Systems

      02:37:35
      • 1.1 Introduction
        01:00
      • 1.2 Objectives
        00:43
      • 1.3 Task and Knowledge Statement Introduction
        00:58
      • 1.4 Knowledge Statement 1.1
        08:09
      • 1.5 Knowledge Statement 1.2
        25:55
      • 1.6 Knowledge Statement 1.3
        07:14
      • 1.7 Knowledge Statement 1.4
        11:19
      • 1.8 Knowledge Statement 1.5
        09:47
      • 1.9 Knowledge Statement 1.6
        14:04
      • 1.10 Knowledge Statement 1.7
        10:57
      • 1.11 Knowledge Statement 1.8
        15:47
      • 1.12 Knowledge Statement 1.9
        15:06
      • 1.13 Knowledge Statement 1.10
        19:30
      • 1.14 Knowledge Statement 1.11
        10:08
      • 1.15 Quiz
        00:05
      • 1.16 Quiz Question 1
        00:40
      • 1.17 Quiz Solution 1
        00:45
      • 1.18 Quiz Question 2
        00:40
      • 1.19 Quiz Solution 2
        00:45
      • 1.20 Quiz Question 3
        00:40
      • 1.21 Quiz Solution 3
        00:45
      • 1.22 Quiz Question 4
        00:34
      • 1.23 Quiz Solution 4
        00:36
      • 1.24 Case Study 1 Scenario
        00:35
      • 1.25 Case Study 1 Questions
      • 1.26 Case Study 2 Scenario
        00:10
      • 1.27 Case Study 2 Questions
      • 1.28 Key Takeaways
        00:38
      • 1.29 Conclusion
        00:05
    • Domain 02 - Governance and Management of IT

      03:09:48
      • 2.1 Introduction
        01:10
      • 2.2 Objectives
        00:49
      • 2.3 Knowledge Statement 2.1
        13:52
      • 2.4 Knowledge Statement 2.2
        14:21
      • 2.5 Knowledge Statement 2.3
        08:13
      • 2.6 Knowledge Statement 2.4
        14:00
      • 2.7 Knowledge Statement 2.5
        10:57
      • 2.8 Knowledge Statement 2.6
        12:53
      • 2.9 Knowledge Statement 2.7
        11:37
      • 2.10 Knowledge Statement 2.8
        11:58
      • 2.11 Knowledge Statement 2.9
        13:47
      • 2.12 Knowledge Statement 2.10
        09:10
      • 2.13 Knowledge Statement 2.11
        09:20
      • 2.14 Knowledge Statement 2.12 and 2.13
        09:55
      • 2.15 Knowledge Statement 2.14
        09:22
      • 2.16 Knowledge Statement 2.15
        10:40
      • 2.17 Knowledge Statement 2.16
        15:32
      • 2.18 Knowledge Statement 2.17
        04:04
      • 2.19 Quiz
        00:12
      • 2.20 Quiz Question 1
        00:20
      • 2.21 Quiz Solution 1
        00:38
      • 2.22 Quiz Question 2
        00:20
      • 2.23 Quiz Solution 2
        00:20
      • 2.24 Quiz Question 3
        00:30
      • 2.25 Quiz Solution 3
        01:00
      • 2.26 Quiz Question 4
        00:20
      • 2.27 Quiz Solution 4
        00:37
      • 2.28 Quiz Question 5
        00:15
      • 2.29 Quiz Solution 5
        00:40
      • 2.30 Case Study 1 Scenario
        00:35
      • 2.31 Case Study 1 Questions
      • 2.32 Case Study 2 Scenario
        00:25
      • 2.33 Case Study 2 Questions
      • 2.34 Key Takeaways
        01:51
      • 2.35 Conclusion
        00:05
    • Domain 03 - Information Systems Acquisition, Development and Implementation

      02:31:36
      • 3.1 Introduction
        01:41
      • 3.2 Objectives
        00:43
      • 3.3 Knowledge Statement 3.1
        06:40
      • 3.4 Knowledge Statement 3.2
        17:22
      • 3.5 Knowledge Statement 3.3
        05:13
      • 3.6 Knowledge Statement 3.4
        22:40
      • 3.7 Knowledge Statement 3.5
        07:23
      • 3.8 Knowledge Statement 3.6
        08:01
      • 3.9 Knowledge Statement 3.7
        09:39
      • 3.10 Knowledge Statement 3.8
        09:35
      • 3.11 Knowledge Statement 3.9
        08:30
      • 3.12 Knowledge Statement 3.10
        14:19
      • 3.13 Knowledge Statement 3.11
        07:26
      • 3.14 Knowledge Statement 3.12
        07:10
      • 3.15 Knowledge Statement 3.13
        06:38
      • 3.16 Knowledge Statement 3.14
        11:42
      • 3.17 Quiz
        00:12
      • 3.18 Quiz Question 1
        00:25
      • 3.19 Quiz Solution 1
        00:25
      • 3.20 Quiz Question 2
        00:25
      • 3.21 Quiz Solution 2
        00:30
      • 3.22 Quiz Question 3
        00:25
      • 3.23 Quiz Solution 3
        00:35
      • 3.24 Quiz Question 4
        00:25
      • 3.25 Quiz Solution 4
        00:35
      • 3.26 Case Study 1 Scenario
        00:35
      • 3.27 Case Study 1 Questions
      • 3.28 Case Study 2 Scenario
        00:25
      • 3.29 Case Study 2 Questions
      • 3.30 Key Takeaways
        01:52
      • 3.31 Conclusion
        00:05
    • Domain 04 - Information Systems Operations, Maintenance and Service Management

      02:56:00
      • 4.1 Introduction
        01:19
      • 4.2 Objectives
        00:43
      • 4.3 Knowledge Statement 4.1
        10:57
      • 4.4 Knowledge Statement 4.2
        05:29
      • 4.5 Knowledge Statement 4.3
        04:12
      • 4.6 Knowledge Statement 4.4
        04:51
      • 4.7 Knowledge Statement 4.5
        23:35
      • 4.8 Knowledge Statement 4.6
        08:25
      • 4.9 Knowledge Statement 4.7
        05:52
      • 4.10 Knowledge Statement 4.8
        09:12
      • 4.11 Knowledge Statement 4.9
        07:38
      • 4.12 Knowledge Statement 4.10
        02:57
      • 4.13 Knowledge Statement 4.11
        06:29
      • 4.14 Knowledge Statement 4.12
        10:37
      • 4.15 Knowledge Statement 4.13
        13:10
      • 4.16 Knowledge Statement 4.14
        06:28
      • 4.17 Knowledge Statement 4.15
        04:52
      • 4.18 Knowledge Statement 4.16
        07:06
      • 4.19 Knowledge Statement 4.17
        04:52
      • 4.20 Knowledge Statement 4.18
        05:02
      • 4.21 Knowledge Statement 4.19
        10:23
      • 4.22 Knowledge Statement 4.20
        05:14
      • 4.23 Knowledge Statement 4.21
        02:51
      • 4.24 Knowledge Statement 4.22
        02:42
      • 4.25 Knowledge Statement 4.23
        03:57
      • 4.26 Quiz
        00:12
      • 4.27 Quiz Question 1
        00:25
      • 4.28 Quiz Solution 1
        00:45
      • 4.29 Quiz Question 2
        00:30
      • 4.30 Quiz Solution 2
        00:20
      • 4.31 Quiz Question 3
        00:30
      • 4.32 Quiz Solution 3
        00:45
      • 4.33 Quiz Question 4
        00:30
      • 4.34 Quiz Solution 4
        00:45
      • 4.35 Quiz Question 5
        00:30
      • 4.36 Quiz Solution 5
        00:45
      • 4.37 Case Study 1 Scenario
        00:35
      • 4.38 Case study 1 Questions
      • 4.39 Case Study 2 Scenario
        00:25
      • 4.40 Case study 2 Questions
      • 4.41 Key Takeaways
        00:05
      • 4.42 Conclusion
        00:05
    • Domain 05 - Protection of Information Assets

      03:05:15
      • 5.1 Introduction
        01:48
      • 5.2 Objectives
        00:43
      • 5.3 Knowledge Statement 5.1
        07:22
      • 5.4 Knowledge Statement 5.2
        06:30
      • 5.5 Knowledge Statement 5.3
        07:34
      • 5.6 Knowledge Statement 5.4 and 5.5
        13:55
      • 5.7 Knowledge Statement 5.6
        08:13
      • 5.8 Knowledge Statement 5.7
        07:40
      • 5.9 Knowledge Statement 5.8
        05:30
      • 5.10 Knowledge Statement 5.9
        05:31
      • 5.11 Knowledge Statement 5.10
        04:39
      • 5.12 Knowledge Statement 5.11
        12:35
      • 5.13 Knowledge Statement 5.12
        12:44
      • 5.14 Knowledge Statement 5.13
        08:02
      • 5.15 Knowledge Statement 5.14
        09:12
      • 5.16 Knowledge Statement 5.15
        05:02
      • 5.17 Knowledge Statement 5.16
        08:27
      • 5.18 Knowledge Statement 5.17
        04:49
      • 5.19 Knowledge Statement 5.18
        02:52
      • 5.20 Knowledge Statement 5.19
        04:52
      • 5.21 Knowledge Statement 5.20
        04:51
      • 5.22 Knowledge Statement 5.21
        09:53
      • 5.23 Knowledge Statement 5.22
        04:13
      • 5.24 Knowledge Statement 5.23
        06:05
      • 5.25 Knowledge Statement 5.24
        03:25
      • 5.26 Knowledge Statement 5.25
        07:08
      • 5.27 Knowledge Statement 5.26
        04:59
      • 5.28 Quiz
        00:05
      • 5.29 Quiz Question 1
        00:15
      • 5.30 Quiz Solution 1
        00:25
      • 5.31 Quiz Question 2
        00:30
      • 5.32 Quiz Solution 2
        00:45
      • 5.33 Quiz Question 3
        00:13
      • 5.34 Quiz Solution 3
        00:45
      • 5.35 Quiz Question 4
        00:30
      • 5.36 Quiz Solution 4
        00:45
      • 5.37 Case Study Scenario
        00:35
      • 5.38 Case Study Questions
      • 5.39 Key Takeaways
        01:43
      • 5.40 Conclusion
        00:10
    • Course Summary

      05:00
      • CISA Summary
        05:00
    • Course Case Study

      00:35
      • Course Case Study
        00:35
    • Quiz

      • Quiz

Course Advisors

  • Dean Pompilio

    Dean Pompilio

    Technical Trainer, Owner- Steppingstonesolutions Inc

    Mr.Pompilio has been an IT Professional since 1989. He has worn many hats along the way and holds over 20 IT certifications which include EC-Council CEI, CEH, CHFI, CISSP, CISA, CISM. His passion is to help IT professionals achieve their training goals and career growth.

prevNext

Why you should learn Information Systems Fundamentals

World-renowned certification

dubbed as a gold standard for IT professionals

US$150 Million

expected average cost of data breach by 2021

Career Opportunities

FAQs

  • What are the requirements to learn the information systems auditor basics program?

    Professionals willing to learn information systems basics are recommended to have prior experience in information systems auditing, control, or security.

  • How do beginners learn information systems fundamentals?

    Beginners need to learn everything from scratch and Simplilearn offers tutorials, articles, and YouTube videos related to information systems. Following them helps beginners follow this information systems foundations program with ease.

  • How long does it take to learn information systems?

    The fundamentals of information systems program consists of 17 hours of comprehensive video modules designed by instructors having rich teaching experience. The course material is easy to follow. The actual time to master the material will depend on your individual learning pace. 

  • What should I learn first in the information systems basics program?

    In this fundamentals of information systems program, you’ll first understand what an information systems audit is and how an IS audit should be managed. You’ll also come to know about ISACA IS audit and assurance guidelines and standards.

  • Is the information systems fundamentals program easy to learn?

    The concepts of information systems auditing may be relatively new for many professionals. The instructors have tried to explain all the concepts in an easy understandable way to make it easy for learners to comprehend them. 

  • What are the basics in this Fundamentals of Information Systems program?

    Some of the basics in the information systems basics program include internal controls, control assessment, the IS audit process, applying audit principles, and performing an information system audit. 

  • Can I complete this information systems basics program in 90 days?

    Yes, this information systems fundamentals program can be completed within 90 days.

  • What are my next best learning options after completing this information systems auditor Basics program?

    After completing this Fundamentals of Information Systems training program, you can get ahead with other courses like Cyber Security Expert Master’s Program or Post Graduate Program in Cyber Security.

  • What are the career opportunities in information systems auditing?

    Cyber security is one of the most popular career fields for the professionals in the technology sector. With increasing data breaches, the demand for skilled cyber security professionals is increasing among companies of all sizes. Taking this Fundamentals of Information Systems program will help you progress on a path toward job opportunities like IS/IT auditors, IT compliance managers, chief compliance officers, chief risk and privacy officers, security heads, and security managers.

  • Disclaimer
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, and OPM3 are registered marks of the Project Management Institute, Inc.