The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact review before test day, this series delivers in-depth instruction, clear explanations, and strategic insights tailored for exam success
Domain 5 is all about securing information against unauthorized access, alteration, or loss. This episode provides a strategic overview of confidentiality, integrity, and availability principles and …
Disaster recovery focuses on restoring IT systems after an outage or catastrophic event. In this episode, you will learn how to audit DR plans, assess backup infrastructure, evaluate recovery site re…
Business continuity planning ensures the organization can operate during and after disruptions. This episode explains how auditors evaluate continuity plan development, critical process identificatio…
Backup and restoration processes are critical for protecting data integrity and ensuring continuity. In this episode, you will learn how to evaluate backup frequency, storage media security, offsite …
Operational resilience is about sustaining essential services under stress. This episode explains how auditors evaluate systems for fault tolerance, high availability, and continuous operation. You w…
The business impact analysis is a foundational activity in resilience planning. In this episode, you will learn how to audit BIA processes, assess documentation of critical functions, and evaluate re…
Business resilience ensures that critical operations can continue through disruption. This episode introduces the core concepts of business continuity, disaster recovery, redundancy, and failover. Yo…
Databases are central to most IT operations, and auditors must ensure they are managed securely and efficiently. This episode covers access controls, backup procedures, configuration changes, and per…
Service level agreements define performance expectations between IT and the business. In this episode, you will learn how to audit SLA creation, monitoring, breach handling, and vendor service report…
Logs provide critical evidence for detecting incidents and monitoring system health. This episode explains how to audit log collection, retention, analysis, and alerting mechanisms. You will also lea…
Configuration and patch controls are essential for system stability and security. In this episode, you will learn how to audit configuration baselines, patch deployment processes, exception handling,…
Effective change management minimizes disruption and maintains control over the IT environment. This episode walks you through change request procedures, approval workflows, emergency change handling…
Problem management focuses on eliminating the underlying causes of incidents. In this episode, you will learn how to audit problem detection, investigation, root cause analysis, and resolution tracki…
When things go wrong, incident management ensures that services are restored quickly and effectively. This episode explains how to audit detection procedures, escalation paths, incident logs, and res…
Auditors must verify that IT systems are designed and managed to meet performance demands. This episode explores how to evaluate availability strategies, capacity planning, monitoring tools, and esca…
Shadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and systems created by business uni…
When systems talk to each other, auditors must ensure that the communication is controlled and secure. This episode explores interface types (manual and automated), error checking, data reconciliatio…
This episode covers how auditors evaluate job scheduling systems, batch processing, and automated task workflows. You’ll learn how to assess controls for error handling, reprocessing, and change appr…
IT asset management is more than keeping an inventory—it’s about control, accountability, and lifecycle oversight. In this episode, you’ll learn how to audit asset acquisition, tagging, usage, and di…
Understanding the elements that make up the IT environment is essential for audit readiness. This episode breaks down how to evaluate the hardware, software, network, and data assets that support cri…