Course Information
Course Name
CISA: Certified Information System Auditor
Exam code
CISA
Duration
5 Days
Certification
Certified Information System Auditor
Overview
The Certified Information Systems Auditor (CISA) certification, offered by ISACA, is globally recognized as the standard for professionals who audit, control, monitor, and assess an organization’s information technology and business systems.
Achieving the CISA certification demonstrates a commitment to professional excellence and enhances career opportunities in the field of information systems auditing and security.
Audience Profile
CISA is ideal for professionals aiming to demonstrate their expertise in IS/IT auditing, control, and security. Positions that benefit from this certification include:
IT Auditor
IT Consultant
Security Manager
IT Director/Manager
Security Analyst
IT Auditor Manager
IT Audit Director
Prerequisites
The CISA exam is open to anyone who has an interest in information security. You can still take the CISA exam even if you haven’t met the experience requirements yet, although you’ll have to meet those before getting certified. When you take the CISA exam, we’ll send you your results, and if you passed, the details you need to apply for your CISA certification. Candidates have five years from the passing date to apply for certification.
A minimum of 5-years of professional information systems auditing, control or security work experience–as described in the CISA job practice areas–is required for certification. Work experience for the CISA certification must be gained within the 10-year period preceding the application date for certification. Candidates have 5-years from the passing date to apply.
At Course Completion
Information System Auditing Process
Governance and Management of IT
Information Systems Acquisition, Development, and Implementation
Information Systems Operations and Business Resilience
Protection of Information Assets
Course Outline
Module 1: Information Systems Auditing Process
Providing industry-standard audit services to assist organizations in protecting and controlling information systems, Module 1 affirms your credibility to offer conclusions on the state of an organization’s IS/IT security, risk and control solutions.
A–PLANNING
IS Audit Standards, Guidelines, and Codes of Ethics
Types of Audits, Assessments, and Reviews
Risk-Based Audit Planning
Types of Controls and Considerations
B–EXECUTION
Audit Project Management
Audit Testing and Sampling Methodology
Audit Evidence Collection Techniques
Audit Data Analytics
Reporting and Communication Techniques
Quality Assurance and Improvement of Audit Process
Module 2: Governance and Management of IT
This module confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.
A–IT GOVERNANCE
Laws, Regulations, and Industry Standards
Organizational Structure, IT Governance, and IT Strategy
IT Policies, Standards, Procedures and Practices
Enterprise Architecture and Considerations
Enterprise Risk Management
Privacy Program and Principles
Data Governance and Classification
B–IT MANAGEMENT
IT Resource Management
IT Vendor Management
IT Performance Monitoring and Reporting
Quality Assurance and Quality Management of IT
Module 3: Information Systems Acquisition, Development and Implementation
Module 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.
A–INFORMATION SYSTEMS ACQUISITION AND DEVELOPMENT
Project Governance and Management
Business Case and Feasibility Analysis
System Development Methodologies
Control Identification and Design
B–INFORMATION SYSTEMS IMPLEMENTATION
System Readiness and Implementation Testing
Implementation Configuration and Release Management
System Migration, Infrastructure Deployment, and Data Conversion
Post-implementation Review
Module 4: Information Systems Operations and Business Resilience
Module 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.
A–INFORMATION SYSTEMS OPERATIONS
IT Components
IT Asset Management
Job Scheduling and Production Process Automation
System Interfaces
Shadow IT and End-User Computing
Systems Availability and Capacity Management
Problem and Incident Management
IT Change, Configuration, and Patch Management
Operational Log Management
IT Service Level Management
Database Management
B–BUSINESS RESILIENCE
Business Impact Analysis
System and Operational Resilience
Data Backup, Storage, and Restoration
Business Continuity Plan
Disaster Recovery Plans
Module 5: Protection of Information Assets
Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Module 5.
A–INFORMATION ASSET SECURITY AND CONTROL
Information Asset Security Frameworks, Standards, and Guidelines
Physical and Environmental Controls
Identity and Access Management
Network and End-Point Security
Data Loss Prevention
Data Encryption
Public Key Infrastructure
Cloud and Virtualized Environments
Mobile, Wireless, and Internet-of-Things Devices
B–SECURITY EVENT MANAGEMENT
Security Awareness Training and Programs
Information System Attack Methods and Techniques
Security Testing Tools and Techniques
Security Monitoring Tools and Techniques
Security Incident Response Management
Evidence Collection and Forensics
All ISACA certification courses are conducted by certified trainers from Iverson.
Digital Methods acts as the official training partner and assists with program consultation, registration, coordination, scheduling, and administrative arrangements to ensure a smooth and professionally managed training experience.