Certified Information Systems Auditor (CISA)
On Demand $2,495.00
Virtual Live

Course Description
This CISA course helps you gain expertise in the acquisition, development, testing, and implementation of Information systems (IS) and learn the guidelines, standards, and best practices of protecting them. The CISA online training course enhances your understanding of the information system audit process and how to adequately protect it.
Program Objectives
- Develop and implement a risk-based IT audit strategy in compliance with IT audit standards
- Evaluate the effectiveness of an IT governance structure
- Ensure that the IT organizational structure and human resources (personnel) management support the organization’s strategies and objectives
- Review the information security policies, standards, and procedures for completeness and alignment with generally accepted practices
Prerequisites
To obtain your CISA certification, you will need to submit a completed application within five years from the date of initially passing the CISA examination. The experience you’ve listed must be verified by your employers with this experience having been gained within the ten-year period prior to the date of application or within five years of passing the CISA examination.
Course Features
- Lectures 62
- Quizzes 0
- Duration 40 hours
- Skill level Intermediate Level
- Language English
- Students 462
- Certificate No
- Assessments Yes
-
Domain 1: Information System Auditing Process
- IS Audit Standards, Guidelines and Codes of Ethics
- Business Processes
- Types of Controls
- Risk-based Audit Planning
- Types of Audits and Assessments
- Audit Project Management
- Sampling Methodology
- Audit Evidence Collection Techniques
- Data Analytics
- Reporting and Communication Techniques
- Quality Assurance and Improvement of the Audit Process
-
Domain 2: Governance and Management of IT
- IT-related Frameworks
- IT Standards, Policies and Procedures
- Organizational Structure
- Enterprise Architecture
- Enterprise Risk Management
- Maturity Models
- Laws, Regulations and Industry Standards Affecting the Organization
- IT Resource Management
- IT Service Provider Acquisition and Management
- IT Performance Monitoring and Reporting
- Quality Assurance and Quality Management of IT
-
Domain 3: Information Systems Acquisition, Development and Implementation
-
Domain 4: IS Operations and Business Resilience
- Common Technology Components
- IT Asset Management
- Job Scheduling and Production Process Automation
- System Interfaces
- End-user Computing
- Data Governance
- Systems Performance Management
- Problem and Incident Management
- Change, Configuration, Release and Patch Management
- IT Service Level Management
- Database Management
- Business Impact Analysis
- System Resiliency
- Data Backup, Storage and Restoration
- Business Continuity Plan
- Disaster Recovery Plans
-
Domain 5: Information Asset Security and Control
- Privacy Principles
- Physical Access and Environmental Controls
- Identity and Access Management
- Network and End-point Security
- Data Classification
- Data Encryption and Encryption-related Techniques
- Public Key Infrastructure
- Web-based Communication Technologies
- Virtualized Environments
- Mobile, Wireless and Internet-of-things Devices
- Security Awareness Training and Programs
- Information System Attack Methods and Techniques
- Security Testing Tools and Techniques
- Security Monitoring Tools and Techniques
- Incident Response Management
- Evidence Collection and Forensics