1. EachPod
EachPod
Certified: The ISACA CISA Audio Course - Podcast

Certified: The ISACA CISA Audio Course

The Bare Metal Cyber CISA Audio Course is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact review before test day, this series delivers in-depth instruction, clear explanations, and strategic insights tailored for exam success

Education Technology Courses
Update frequency
every day
Average duration
11 minutes
Episodes
105
Years Active
2025
Share to:
Episode 65: Overview of Domain 5 – Protection of Information Assets

Episode 65: Overview of Domain 5 – Protection of Information Assets

Domain 5 is all about securing information against unauthorized access, alteration, or loss. This episode provides a strategic overview of confidentiality, integrity, and availability principles and …

00:12:06  |   Sun 06 Jul 2025
Episode 64: Disaster Recovery Planning Fundamentals

Episode 64: Disaster Recovery Planning Fundamentals

Disaster recovery focuses on restoring IT systems after an outage or catastrophic event. In this episode, you will learn how to audit DR plans, assess backup infrastructure, evaluate recovery site re…

00:11:44  |   Sun 06 Jul 2025
Episode 63: Developing and Maintaining a Business Continuity Plan

Episode 63: Developing and Maintaining a Business Continuity Plan

Business continuity planning ensures the organization can operate during and after disruptions. This episode explains how auditors evaluate continuity plan development, critical process identificatio…

00:11:41  |   Sun 06 Jul 2025
Episode 62: Data Backup, Storage, and Restoration Practices

Episode 62: Data Backup, Storage, and Restoration Practices

Backup and restoration processes are critical for protecting data integrity and ensuring continuity. In this episode, you will learn how to evaluate backup frequency, storage media security, offsite …

00:10:51  |   Sun 06 Jul 2025
Episode 61: System and Operational Resilience

Episode 61: System and Operational Resilience

Operational resilience is about sustaining essential services under stress. This episode explains how auditors evaluate systems for fault tolerance, high availability, and continuous operation. You w…

00:10:15  |   Sun 06 Jul 2025
Episode 60: Conducting a Business Impact Analysis (BIA)

Episode 60: Conducting a Business Impact Analysis (BIA)

The business impact analysis is a foundational activity in resilience planning. In this episode, you will learn how to audit BIA processes, assess documentation of critical functions, and evaluate re…

00:13:56  |   Sun 06 Jul 2025
Episode 59: Overview of Business Resilience

Episode 59: Overview of Business Resilience

Business resilience ensures that critical operations can continue through disruption. This episode introduces the core concepts of business continuity, disaster recovery, redundancy, and failover. Yo…

00:10:51  |   Sun 06 Jul 2025
Episode 58: Database Management Practices

Episode 58: Database Management Practices

Databases are central to most IT operations, and auditors must ensure they are managed securely and efficiently. This episode covers access controls, backup procedures, configuration changes, and per…

00:11:19  |   Sun 06 Jul 2025
Episode 57: IT Service Level Management

Episode 57: IT Service Level Management

Service level agreements define performance expectations between IT and the business. In this episode, you will learn how to audit SLA creation, monitoring, breach handling, and vendor service report…

00:12:24  |   Sun 06 Jul 2025
Episode 56: Operational Log Management

Episode 56: Operational Log Management

Logs provide critical evidence for detecting incidents and monitoring system health. This episode explains how to audit log collection, retention, analysis, and alerting mechanisms. You will also lea…

00:07:41  |   Sun 06 Jul 2025
Episode 55: Configuration and Patch Management Processes

Episode 55: Configuration and Patch Management Processes

Configuration and patch controls are essential for system stability and security. In this episode, you will learn how to audit configuration baselines, patch deployment processes, exception handling,…

00:09:16  |   Sun 06 Jul 2025
Episode 54: Change Management Processes

Episode 54: Change Management Processes

Effective change management minimizes disruption and maintains control over the IT environment. This episode walks you through change request procedures, approval workflows, emergency change handling…

00:08:44  |   Sun 06 Jul 2025
Episode 53: Problem Management and Root Cause Analysis

Episode 53: Problem Management and Root Cause Analysis

Problem management focuses on eliminating the underlying causes of incidents. In this episode, you will learn how to audit problem detection, investigation, root cause analysis, and resolution tracki…

00:09:30  |   Sun 06 Jul 2025
Episode 52: Incident Management Best Practices

Episode 52: Incident Management Best Practices

When things go wrong, incident management ensures that services are restored quickly and effectively. This episode explains how to audit detection procedures, escalation paths, incident logs, and res…

00:09:39  |   Sun 06 Jul 2025
Episode 51: Systems Availability and Capacity Management

Episode 51: Systems Availability and Capacity Management

Auditors must verify that IT systems are designed and managed to meet performance demands. This episode explores how to evaluate availability strategies, capacity planning, monitoring tools, and esca…

00:10:01  |   Sun 06 Jul 2025
Episode 50: Shadow IT and End-User Computing

Episode 50: Shadow IT and End-User Computing

Shadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and systems created by business uni…

00:10:33  |   Sun 06 Jul 2025
Episode 49: System Interfaces

Episode 49: System Interfaces

When systems talk to each other, auditors must ensure that the communication is controlled and secure. This episode explores interface types (manual and automated), error checking, data reconciliatio…

00:10:26  |   Sun 06 Jul 2025
Episode 48: Job Scheduling and Production Process Automation

Episode 48: Job Scheduling and Production Process Automation

This episode covers how auditors evaluate job scheduling systems, batch processing, and automated task workflows. You’ll learn how to assess controls for error handling, reprocessing, and change appr…

00:09:16  |   Sun 06 Jul 2025
Episode 47: IT Asset Management

Episode 47: IT Asset Management

IT asset management is more than keeping an inventory—it’s about control, accountability, and lifecycle oversight. In this episode, you’ll learn how to audit asset acquisition, tagging, usage, and di…

00:09:38  |   Sun 06 Jul 2025
Episode 46: IT Components

Episode 46: IT Components

Understanding the elements that make up the IT environment is essential for audit readiness. This episode breaks down how to evaluate the hardware, software, network, and data assets that support cri…

00:10:12  |   Sun 06 Jul 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.