Certified Information Systems Auditor (CISA) Training

Commitment 5 Days, 7-8 hours a day.
Language English
User Ratings Average User Rating 4.8 See what learners said
Price REQUEST
Delivery Options Instructor-Led Onsite, Online, and Classroom Live

COURSE OVERVIEW

Information security is critical in today’s fast-paced world, and that’s led to a growing demand for professionals who understand how to measure the risk of an organization’s data and systems and create and administer programs and policies to combat security breaches.

This Certified Information Systems Auditor (CISA) Training course is designed to help candidates prepare for sitting the ISACA CISA certification examination. By taking this course and obtaining CISA certification, your experience and skills in auditing and securing the organization’s information systems will be validated. Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing audit processes, controls, and other security aspects of the business, you will greatly contribute to the overall security of the organization.

This Certified Information Systems Auditor (CISA) course supports a certification that is a DoD Approved 8570 Baseline Certification and meets DoD 8140/8570 training requirements.

WHAT'S INCLUDED?
  • 4 Days of CISA Training from an Authorized ISACA Instructor
  • ISACA-approved CISA Training Student Guide
  • ISACA-approved CISA Training Labs
  • ISACA-approved CISA Practice Exams
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee
RESOURCES
RELATED COURSES

ADDITIONAL INFORMATION

COURSE OBJECTIVES

This CISA Workshop extensively prepares you for the CISA exam, which consists of 150 multiple-choice questions that cover the five information systems auditing areas. These areas have been created from a CISA job practice analysis and reflect the work performed by information systems auditors:

  • The process of auditing information systems
  • Governance of IT and management
  • Information systems acquisition, development, and implementation
  • Information systems operations, maintenance, and services management
  • Protection of information assets
CUSTOMIZE IT
  • We can adapt this Certified Information Systems Auditor (CISA) Training course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Certified Information Systems Auditor (CISA) course, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Certified Information Systems Auditor (CISA) around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Certified Information Systems Auditor (CISA) course in a manner understandable to lay audiences.
AUDIENCE/TARGET GROUP

The intended audience for the Certified Information Systems Auditor (CISA) Training program is professionals with work experience in information systems auditing, control, or security. Sample job titles might include:

  • IS/IT Auditors
  • IS/IT Consultants
  • Security Analysts and Professionals
  • IS/IT Audit Managers
  • Anyone interested in learning auditing skills and getting certified
CLASS PREREQUISITES

The knowledge and skills that a learner must have before attending this Certified Information Systems Auditor (CISA) course are:

  • A minimum of five years of professional information systems auditing, control, or security work experience is required for certification; however, up to three years can be waived if other requirements are met. You have five years after passing the exam to gain the necessary work experience and apply for certification.

COURSE SYLLABUS

The process of auditing information systems
  • Executing a risk-based audit strategy
  • Plan specific audits
  • Conduct audits in accordance with IT audit standards
  • Certified Information Systems Auditor (CISA) Training
Governance of IT and management
  • Corporate governance
  • Governance of enterprise IT
  • Information systems strategy
  • Maturity and process improvement models
  • IT investment and allocation practices
  • Policies and procedures
  • Risk management
  • Information technology management practices
  • IT organization structure and responsibilities
  • Auditing IT governance structure and implementation
  • Business continuity planning
  • Auditing business continuity
Information systems acquisition, development, and implementation
  • Business realization
  • Project management structure
  • Project management practices
  • Business application development
  • Virtualization and cloud computing environments
  • Business application systems
  • Development methods
  • Infrastructure development acquisition practices
  • Information systems maintenance practices
  • System development tools and productivity aids
  • Process improvement practices
  • Application controls
  • Auditing application controls
  • Certified Information Systems Auditor (CISA) Training
  • Auditing systems development, acquisition, and maintenance
Information systems operations, maintenance, and services management
  • Information systems operations
  • IT asset management
  • Information systems hardware
  • IS architecture and software
  • IS network infrastructure
  • Auditing infrastructure and operations
  • Disaster recovery planning
Protection of information assets
  • Information security management
  • Logical access
  • Network infrastructure security
  • Auditing information security management framework
  • Auditing network infrastructure security
  • Environmental exposures and controls
  • Physical access exposures and controls
  • Mobile computing
  • Peer-to-peer computing
  • Instant messaging
  • Social media
  • Cloud computing
  • Data leakage
  • End-user computing security risk and controls
Certified Information Systems Auditor (CISA) TrainingCertified Information Systems Auditor (CISA) Training Course Recap, Q/A, and Evaluations

REQUEST MORE INFORMATION