app.cubelet.ai
← cubelet.ai
Cubelet AI
Sign in
Sign up free
Explore
Cubelet Catalog
Atomic knowledge units for GRC, cybersecurity, and compliance professionals.
CMMC Level 2
CISA
CISM
CRISC
CDPSE
CMMC Level 2
🔒 CISA
🔒 CISM
🔒 CRISC
🔒 CDPSE
CISA cubelets are available on the
Practitioner plan ($29/mo)
.
See plans →
Sign in →
All
D1
D2
D3
D4
D5
60 cubelets
⊞ Grid
≡ List
cisa-d1-auditing-process-is-audit-standards-guidelines-functions-and-codes-
IS Audit Standards, Guidelines, Functions, and Codes of Ethics
Gold
cisa-d1-auditing-process-types-of-audits-assessments-and-reviews
Types of Audits, Assessments, and Reviews
Prod.
cisa-d1-auditing-process-risk-based-audit-planning
Risk-based Audit Planning
Gold
cisa-d1-auditing-process-types-of-controls-and-considerations
Types of Controls and Considerations
Gold
cisa-d1-auditing-process-audit-project-management
Audit Project Management
Prod.
cisa-d1-auditing-process-audit-testing-and-sampling-methodology
Audit Testing and Sampling Methodology
Gold
cisa-d1-auditing-process-audit-evidence-collection-techniques
Audit Evidence Collection Techniques
Gold
cisa-d1-auditing-process-audit-data-analytics
Audit Data Analytics
Prod.
cisa-d1-auditing-process-reporting-and-communication-techniques
Reporting and Communication Techniques
Gold
cisa-d1-auditing-process-quality-assurance-and-improvement-of-audit-process
Quality Assurance and Improvement of Audit Process
Gold
cisa-d2-governance-management-laws-regulations-and-industry-standards
Laws, Regulations, and Industry Standards
Gold
cisa-d2-governance-management-organizational-structure-it-governance-and-it-stra
Organizational Structure, IT Governance, and IT Strategy
Gold
cisa-d2-governance-management-it-policies-standards-procedures-and-guidelines
IT Policies, Standards, Procedures, and Guidelines
Prod.
cisa-d2-governance-management-enterprise-architecture-and-considerations
Enterprise Architecture and Considerations
Prod.
cisa-d2-governance-management-enterprise-risk-management-erm
Enterprise Risk Management (ERM)
Gold
cisa-d2-governance-management-privacy-program-and-principles
Privacy Program and Principles
Prod.
cisa-d2-governance-management-data-governance-and-classification
Data Governance and Classification
Gold
cisa-d2-governance-management-it-resource-management
IT Resource Management
Prod.
cisa-d2-governance-management-it-vendor-management
IT Vendor Management
Gold
cisa-d2-governance-management-it-performance-monitoring-and-reporting
IT Performance Monitoring and Reporting
Prod.
cisa-d2-governance-management-quality-assurance-and-quality-management-of-it
Quality Assurance and Quality Management of IT
Gold
cisa-d3-acquisition-development-project-governance-and-management
Project Governance and Management
Gold
cisa-d3-acquisition-development-business-case-and-feasibility-analysis
Business Case and Feasibility Analysis
Gold
cisa-d3-acquisition-development-system-development-methodologies
System Development Methodologies
Gold
cisa-d3-acquisition-development-control-identification-and-design
Control Identification and Design
Prod.
cisa-d3-acquisition-development-system-readiness-and-implementation-testing
System Readiness and Implementation Testing
Gold
cisa-d3-acquisition-development-implementation-configuration-and-release-managemen
Implementation Configuration and Release Management
Prod.
cisa-d3-acquisition-development-system-migration-infrastructure-deployment-and-dat
System Migration, Infrastructure Deployment, and Data Conversion
Gold
cisa-d3-acquisition-development-postimplementation-review
Postimplementation Review
Gold
cisa-d4-operations-resilience-it-components
IT Components
Prod.
cisa-d4-operations-resilience-it-asset-management
IT Asset Management
Gold
cisa-d4-operations-resilience-job-scheduling-and-production-process-automation
Job Scheduling and Production Process Automation
Prod.
cisa-d4-operations-resilience-system-interfaces
System Interfaces
Gold
cisa-d4-operations-resilience-end-user-computing-and-shadow-it
End-user Computing and Shadow IT
Gold
cisa-d4-operations-resilience-systems-availability-and-capacity-management
Systems Availability and Capacity Management
Gold
cisa-d4-operations-resilience-problem-and-incident-management
Problem and Incident Management
Gold
cisa-d4-operations-resilience-it-change-configuration-and-patch-management
IT Change, Configuration, and Patch Management
Gold
cisa-d4-operations-resilience-operational-log-management
Operational Log Management
Gold
cisa-d4-operations-resilience-it-service-level-management
IT Service Level Management
Gold
cisa-d4-operations-resilience-database-management
Database Management
Gold
cisa-d4-operations-resilience-business-impact-analysis
Business Impact Analysis
Prod.
cisa-d4-operations-resilience-system-and-operational-resilience
System and Operational Resilience
Gold
cisa-d4-operations-resilience-data-backup-storage-and-restoration
Data Backup, Storage, and Restoration
Gold
cisa-d4-operations-resilience-business-continuity-plan
Business Continuity Plan
Gold
cisa-d4-operations-resilience-disaster-recovery-plans
Disaster Recovery Plans
Gold
cisa-d5-protection-info-assets-information-asset-security-policies-frameworks-sta
Information Asset Security Policies, Frameworks, Standards, and Guidelines
Prod.
cisa-d5-protection-info-assets-physical-and-environmental-controls
Physical and Environmental Controls
Gold
cisa-d5-protection-info-assets-identity-and-access-management
Identity and Access Management
Prod.
cisa-d5-protection-info-assets-network-and-end-point-security
Network and End-Point Security
Gold
cisa-d5-protection-info-assets-data-loss-prevention
Data Loss Prevention
Gold
cisa-d5-protection-info-assets-data-encryption
Data Encryption
Gold
cisa-d5-protection-info-assets-public-key-infrastructure-pki
Public Key Infrastructure (PKI)
Prod.
cisa-d5-protection-info-assets-cloud-and-virtualized-environments
Cloud and Virtualized Environments
Gold
cisa-d5-protection-info-assets-mobile-wireless-and-internet-of-things-devices
Mobile, Wireless, and Internet-of-Things Devices
Gold
cisa-d5-protection-info-assets-security-awareness-training-and-programs
Security Awareness Training and Programs
Gold
cisa-d5-protection-info-assets-information-system-attack-methods-and-techniques
Information System Attack Methods and Techniques
Prod.
cisa-d5-protection-info-assets-security-testing-tools-and-techniques
Security Testing Tools and Techniques
Gold
cisa-d5-protection-info-assets-security-monitoring-logs-tools-and-techniques
Security Monitoring Logs, Tools, and Techniques
Prod.
cisa-d5-protection-info-assets-security-incident-response-management
Security Incident Response Management
Gold
cisa-d5-protection-info-assets-evidence-collection-and-forensics
Evidence Collection and Forensics
Gold