Features
- Detailed explanation with my comments
- After submitting the quiz – Sort all wrong answers
- Increase your analytical skill.
- You can retake quizzes multiple times.
- Practice Topic-wise quiz after every Chapter lecture.
- Each Module-wise quiz is divided into 2 sections
- basic & advance quiz (MTP)
- Save the quiz in between & continue solving anytime.
- Full mock tests in last week in exam conditions.
- Track your progress with instant evaluation.
- Get a Brief Overview of each topic in colourful charts.
Total Price :
Price range: ₹6,165.00 through ₹8,215.00
Total Duration :
6 months
Total Students Enrolled:
2700
Course By
-
- Introduction to Protection of Information Assets Unlimited
- Risk Response-5 Unlimited
- Cyber Computer Attacks Unlimited
- Need for IS Controls Unlimited
- Types of Controls Unlimited
- Deterrent Control Unlimited
- Preventive Controls Unlimited
- Detective Controls Unlimited
- Corrective Controls Unlimited
- Periodic Review and Monitoring of Risk and Controls Unlimited
- Control Self Assessment Unlimited
- Role of IS Auditor in Information Risk Management Unlimited
-
- Administrative Controls of Information Assets Unlimited
- Information Security Management Unlimited
- Critical Success Factors to Information Security Management Unlimited
- Administrative Controls of Information Assets – Segregation of Duties Unlimited
- Rotation of Duties Unlimited
- Other Common Security Policies Unlimited
- Benefits from Classifications Unlimited
- Classification Schema Unlimited
- Administrative Controls of Information Assets – Training and Education Unlimited
- Issues and Challenges of Information Security Management Unlimited
- Physical and Environmental Controls Unlimited
- Sources of Physical Security Threats Unlimited
- Choosing and Designing a Secure Site Unlimited
- Security Management Unlimited
- Human Resource Controls Unlimited
- Perimeter Security Unlimited
- Smart Cards Unlimited
- Auditing Physical Security Controls Unlimited
- Objectives of Environmental Controls Unlimited
- Environmental Threats and Exposures Unlimited
- Environmental Control Techniques Unlimited
- Choosing and Designing a Safe Site Unlimited
- Facilities Planning Unlimited
- Maintenance Plan Unlimited
- Power Supplies Unlimited
- Fire Detection and Suppression Unlimited
- Network Security Controls Unlimited
- Network Threats and Attacks Unlimited
- Network Threats and Attacks – Botnets Unlimited
- Network Threats and Attacks – Cookies Unlimited
- Network Threats and Attacks – Ddos Unlimited
- Network Threats and Attacks – Denial-Of-Service Unlimited
- Network Threats and Attacks – Eavesdropping Unlimited
- Network Threats and Attacks – Impersonation Unlimited
- Network Threats and Attacks – Malware Unlimited
- Network Threats and Attacks – Ping Of Death Unlimited
- Network Threats and Attacks – Port Scan Unlimited
- Network Threats and Attacks – Reconnaissance Unlimited
- Network Threats and Attacks – Scripts Unlimited
- Network Threats and Attacks – Session Hijacking Unlimited
- Network Threats and Attacks – Spoofing Unlimited
- Network Threats and Attacks – Traffic Analysis Unlimited
- Network Threats and Attacks – Web Defacement Unlimited
- Network Threats and Attacks – Wireless: Unlimited
- Current Trends in Attacks Unlimited
- Network Security Control Mechanisms Unlimited
- Cryptography Unlimited
- Cryptography – Digital Certificate. Unlimited
- Cryptography – Cryptanalysis Unlimited
- Cryptography – Hashing Algorithms Unlimited
- Cryptography – Segmentation Unlimited
- Cryptography – Smime Unlimited
- Cryptography – Transport Layer Security Unlimited
- Cryptography – Transport Mode Unlimited
- Cryptography – Tunnel Mode Unlimited
- Types of Cryptography Unlimited
- Types of Cryptography – Authentication Unlimited
- Types of Cryptography – Symmetric Unlimited
- Public Key Infrastructure (PKI) Unlimited
- Public Key Infrastructure (PKI) – Digital Certificate. Unlimited
- Public Key Infrastructure (PKI) – Digital Signature Unlimited
- Public Key Infrastructure (PKI) – Pki Unlimited
- Public Key Infrastructure (PKI) – Private Key Unlimited
- Public Key Infrastructure (PKI) – Public Key Unlimited
- Public Key Infrastructure (PKI) – Public Key Infrastructure Unlimited
- Application of Cryptographic Systems Unlimited
- Application of Cryptographic Systems – Ipsec Unlimited
- Application of Cryptographic Systems – Secure Shell Unlimited
- Application of Cryptographic Systems – Secure Socket Layer Unlimited
- Application of Cryptographic Systems – Vpn Unlimited
- Remote Access Controls Unlimited
- Malicious Codes Unlimited
- Malicious Codes – Logic Bomb Unlimited
- Malicious Codes – Macro Virus Unlimited
- Malicious Codes – Master Boot Record (Mbr) Viruses: Unlimited
- Malicious Codes – Polymorphic Virus Unlimited
- Malicious Codes – Trojan Horse Unlimited
- Malicious Codes – Virus Unlimited
- Firewall Unlimited
- Intrusion Detection System – IPs Unlimited
- Intrusion Detection System – Ids Unlimited
- Intrusion Detection System – Intrusion Detection Unlimited
- Intrusion Detection System – Mac Address Unlimited
- Wireless Security Control Mechanisms Unlimited
- Wireless Security Control Mechanisms – Honeypot Unlimited
- Wireless Security Control Mechanisms – Mac Address Unlimited
- Wireless Security Control Mechanisms – Man-In-The-Middle Unlimited
- Wireless Security Control Mechanisms – Wireless: Unlimited
- VOIP Security Controls Unlimited
- Vulnerability Assessment and Penetration Testing Unlimited
- Vulnerability Assessment and Penetration Testing – Penetration Testing Unlimited
- Vulnerability Assessment and Penetration Testing – Social Engineering Unlimited
- Vulnerability Assessment and Penetration Testing – War Dialing Unlimited
- Vulnerability Assessment and Penetration Testing – Wireless: Unlimited
- Auditing Network Security Controls Unlimited
About Instructor
Rajat Agrawal
Chartered Accountants who adapt to technology lead the profession. Those who don’t, struggle to stay relevant.
I work at the intersection of Audit, Information Systems, and Professional Excellence — helping Chartered Accountants upgrade their expertise, clear advanced certifications, and position themselves for the future.
With deep specialization in ISA 3.0 (Diploma in Information Systems Audit) and CISA (USA), I have trained:
• 10,000+ CA Members through structured certification programs• 15,000+ CA Students in Advanced IT Training in association with the Raipur Branch of CIRC of ICAI
My programs are known for:
✔ Conceptual clarity with practical application✔ Structured video lectures✔ Exam-focused question banks✔ Strategic preparation frameworks✔ The ISA 3.0 100-page Chartbook covering the complete syllabus
Beyond education, I am a practicing Chartered Accountant in Rajnandgaon, Chhattisgarh, actively engaged in:
• Statutory & Internal Audits• Income Tax & GST Compliance• Accounting & Financial Reporting
This dual exposure — practice + teaching — ensures that every concept is grounded in real professional realities.
Through Prokhata.com, I am building an ecosystem focused on Audit, Technology, and Professional Growth for CAs. I also share insights on certifications, audit strategy, and career positioning through my growing digital community.
My mission is clear:To create a generation of Chartered Accountants who are technically strong, technologically advanced, and professionally confident.
Connect With Me
LinkedIn
YouTube
Facebook
Instagram




