Certified Information Systems Auditor Training (CISA)
|Commitment||5 days, 7-8 hours a day.|
|How To Pass||Pass all graded assignments to complete the course.|
|User Ratings||Average User Rating 4.8 See what learners said|
|Delivery Options||Instructor-Led Onsite, Online, and Classroom Live|
Certified Information Systems Auditor Training (CISA) Course – Hands-on
An ISACA Certified Information Systems Auditor is recognized as one of the leading authorities in the areas of IS auditing, control, and information security. This Certified Information Systems Auditor Training (CISA) course provides you with in-depth coverage of the five CISA domains that are covered on the CISA exam. These domains include auditing information systems; IT governance and management; information systems acquisition, development, and implementation; information systems operations, maintenance, and support; and protection of information assets.
All that to be said, this official Certified Information Systems Auditor Training (CISA) seminar is packed with practical information and study tips, making it a great resource for those interested in obtaining the CISA certification. Additionally, this official CISA course is also a tool for those interested in enhancing their IS audit, control, and security skills.
This Certified Information Systems Auditor Training (CISA) course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.
Certified Information Systems Auditor Training (CISA) Course – Customize it
- We can adapt this Certified Information Systems Auditor Training (CISA) course to your group’s background and work requirements at little to no added cost.
- If you are familiar with some aspects of this Certified Information Systems Auditor Training (CISA) course, we can omit or shorten their discussion.
- We can adjust the emphasis placed on the various topics or build the Certified Information Systems Auditor Training (CISA) around the mix of technologies of interest to you (including technologies other than those included in this outline).
- If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.
Certified Information Systems Auditor Training (CISA) Course – Audience/Target Group
The intended audience for the Certified Information Systems Auditor Training (CISA) program is professionals with work experience in information systems auditing, control or security. Sample job titles might include:
- IS/IT Auditors
- IS/IT Consultants
- Security Professionals
- IS/IT Audit Managers
Certified Information Systems Auditor Training (CISA) Course – Objectives:
This official CISA training seminar has a total of seven primary sections. All seven sections will collectively help you prepare for the CISA certification exam while also enhancing your overall competencies in auditing, controlling, monitoring and assessing information technology and business systems. The seven primary sections you will cover are the following:
- General Information Regarding the Exam
- CISA Domain 1: The Process of Auditing Information Systems
- CISA Domain 2: Governance and Management of IT
- CISA Domain 3: Information Systems Acquisition, Development, and Implementation
- CISA Domain 4: Information Systems Operations, Maintenance and Service Management
- CISA Domain 5: Protection of Information Assets
- Exam Practice / Preparation (Sample Exam)
Participants in the CISA training program will be provided instruction designed to provide the following:
- An understanding of the format and structure of the CISA certification exam.
- A knowledge of the various topics and technical areas covered by the exam.
- Practice with specific strategies, tips, and techniques for taking and passing the exam.
- Opportunities to execute practice questions with debriefs of answers.
Certified Information Systems Auditor Training (CISA) – Course Content
The Process of Auditing Information Systems
- Develop and implement a risk-based IT audit strategy
- Plan specific audits
- Conduct audits in accordance with IT audit standards
- Report audit findings and make recommendations to key stakeholders
- Conduct follow-ups or prepare status reports
IT Governance and Management of IT
- Evaluate the effectiveness of the IT governance structure
- Evaluate IT organizational structure and human resources (personnel) management
- Evaluate the organization’s IT policies, standards, and procedures
- Evaluate the adequacy of the quality management system
- Evaluate IT management and monitoring of controls
- Evaluate IT contracting strategies and policies, and contract management practices
- Evaluate risk management practices
- Evaluate the organization’s business continuity plan
Information Systems Acquisition, Development, and Implementation
- Evaluate the business case for proposed investments in information
- Evaluate the project management practices and controls
- Conduct reviews to determine whether a project is progressing in accordance with project plans
- Evaluate controls for information systems
- Evaluate the readiness of information systems for implementation and migration into production
- Conduct post implementation reviews of systems
Information Systems Operations, Maintenance, and Support
- Conduct periodic reviews of information systems
- Evaluate service level management practices
- Evaluate third-party management practices
- Evaluate data administration practices
- Evaluate the use of capacity and performance monitoring tools and techniques
- Evaluate change, configuration, and release management practices
Protection of Information Assets
- Evaluate the information security policies, standards and procedures
- Evaluate the design, implementation, and monitoring of system and logical security
- Evaluate the design, implementation, and monitoring of physical access and environmental controls
- Evaluate the processes and procedures used to store, retrieve, transport, and dispose of information assets