Welcome to this comprehensive guide on CISA Domain 4 for the 2025 exam! In this video, we break down the critical components of Information Systems Operations and Business Resilience, essential for acing your CISA exam.
00:00 - 00:57 - Introduction
00:57 - 03:31 - Questions
03:35 - 07:03 - Overview of IT Operations
07:03 - 17:53 - Critical Components of IT Operations
17:53 - 24:11 - Emerging Trends in IT Operations
24:11 - 31:09 - Cybersecurity Threats
31:09 - 32:41 - Key Operational Process
32:41 - 33:11 - Important Pointers
33:11 - 35:23 - Applications & Software in
35:23 - 41:50 - Cloud Computing
41:50 - 46:44 - Virtualization & Containers
46:44 - 52:12 - Network Layers & Communication
52:12 - 54:13 - Operational Controls
54:13 - 55:55 - Compliance & Industry Trends
55:55 - 57:17 - Key Takeaways
57:17 - 01:00:31 - LAN Devices and Components
01:00:31 - 01:04:51 - LAN Security Considerations
01:04:51 - 01:06:04 - Auditor’s Perspective
01:06:04 - 01:08:57 - LAN Topologies and Components
01:08:57 - 01:11:03 - LAN Media Types
01:11:03 - 01:11:47 - Summary Pointers
01:11:47 - 01:12:56 - Network Administration and Control
01:12:56 - 01:17:04 - Network Performance and Monitoring
01:17:04 - 01:20:04 - Network Security and Resilience
01:20:04 - 01:20:44 - Reporting and Metrics
01:20:44 - 01:21:22 - Key Takeaways for CISA Candidates
01:21:22 - 01:23:58 - SNMP
01:23:58 - 01:26:58 - Converged Protocol
01:26:58 - 01:31:27 - MPLS
01:31:27 - 01:31:44 - Key Takeaways
01:31:44 - 01:32:33 - Internet Protocol (IP) Networking
01:32:33 - 01:36:07 -(NAT)
01:36:07 - 01:37:00 - NAT Benefits
01:37:00 - 01:37:36 - Key Takeaways
01:37:36 - 01:42:26 - Enterprise Backend Devices
01:42:26 - 01:44:22 - USB Mass Storage Devices
01:44:22 - 01:44:51 - Auditor’s Perspective
01:44:51 - 01:45:39 - Summary
01:45:39 - 01:48:08 - Hardware Maintenance Program
01:48:08 - 01:49:29 - Key Components
01:49:29 - 01:51:21 - Hardware Monitoring
01:51:21 - 01:54:55 - IT Asset Management
01:54:55 - 01:55:18 - Auditor’s Perspective
01:55:18 - 01:57:05 - Job Scheduling
01:57:05 - 01:57:32 - Summary
01:57:32 - 01:59:40 - Shadow IT
01:59:40 - 02:02:37 - Software licensing Issues
02:02:37 - 02:04:28 - Capacity Management
02:04:28 - 02:06:54 - Problem and Incident Management
02:06:54 - 02:08:00 - Incident Classification
02:08:00 - 02:10:53 - Incident Response Approach
02:10:53 - 02:11:57 - Problem Management
02:11:57 - 02:15:58 - Change Control and Configuration Management
02:15:58 - 02:18:02 - Patch Management
02:18:02 - 02:20:35 - Release Management
02:20:35 - 02:21:10 - Key Pointers
02:21:10 - 02:23:03 - IS Operations
02:23:03 - 02:24:04 - Operational Reviews
02:24:04 - 02:25:41 - Types of Operational Logos
02:25:42 - 02:27:13 - Key Elements of Log Management
02:27:13 - 02:29:52 - Auditor’s Perspective
02:29:52 -02:31:07 - Log Management Cycle
02:31:07 - 02:31:55 - Key Considerations in Log management
02:31:55 - 02:32:16 - Auditor’s Perspective
02:32:16 - 02:33:25 - Log Alert, Storage and Analysis
02:33:25 - 02:34:42 - Storing and Protecting Logs
02:34:42 - 02:35:06 - Key Takeaways
02:35:06 - 02:37:49 - Log Management
02:37:49 - 02:38:35 - IT Governance and Log Management
02:38:35 - 02:40:42 - Key Elements of an SLA
02:40:42 - 02:41:46 - SLA
02:41:46 - 02:42:27 - CISA Auditor’s
02:42:27 - 02:42:53 - Introduction
02:42:53 - 02:43:41 - Business Resilience
02:43:41 - 02:47:27 - BCP VS DRP
02:47:27 - 02:50:07 - Business Continuity
02:50:07 - 02:52:13 - Contingency Processes
02:52:13 - 02:57:58 - BIA
02:57:58 - 02:57:22 - Disaster Recovery
02:57:22 - 02:58:19 - BCP Life Cycle Summary
02:58:19 - 02:59:25 - Recovery Strategies
02:59:25 - 03:00:24 - Application Resiliency
03:00:24 - 03:01:00 - Summary
03:01:00 - 03:02:20 - Telecommunication Networksy
03:02:20 - 03:05:18 - Data Storage Resiliency
03:05:18 - 03:05:44 - Key Takeaways
03:05:44 - 03:08:21 -Common Backup Schemes
03:08:21 - 03:09:05 - Backup Media Types & Rotation
03:09:05 - 03:09:55 - Periodic Testing
03:09:55 - 03:10:44 - Backup Strategy
03:10:44 - 03:13:29 - Recovery Alternatives
03:13:29 - 03:14:10 - Business Continuity Strategies
03:14:10 - 03:15:57 - Test Types and Scheduling
03:15:57 - 03:16:31 - Types of DR Tests
03:16:31 - 03:16:54 - Post -
03:16:54 - 03:17:14 - Plan Maintenance
03:17:14 - 03:18:04 - Summary
03:18:04 - 03:18:32 - Key Action Plan
03:18:32 - 03:19:10 - BCP Incident Managemen
CISA Domain 1:https://www.youtube.com/watch?v=NfYB5_AnlTg&t=1s
CISA Domain 2 : https://www.youtube.com/watch?v=oP5rzeEbn8g
CISA Domain 3 : https://www.youtube.com/watch?v=0MtFtGnDRt4
CISA Domain 4 :https://youtu.be/60yKNUND2MQ
CISA Domain 5 Part 1 : https://youtu.be/0GtLPwY_cUk
CISA Domain 5 Part 2 : https://youtu.be/CO4KhMWJMjg
CISO Master Class
https://www.youtube.com/playlist?list=PL0hT6hgexlYwPTD-wC3oFBe27VGEiizg1
My Spotify
https://open.spotify.com/show/16M7QBKdPDW7CCzBgrrZRE
#CISA #CISAExam #CISA2025 #ISACA #CISACertification #Cybersecurity