-
Course Code
ISAC-005
Certified Information Systems Auditor (CISA)
- The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. Enhance your career by earning CISA—world-renowned as the standard of achievement for those who audit, control, monitor and assess information technology and business systems.
Learning Outcomes
- Use the knowledge gained in a practical manner beneficial to your organization
- Provide audit services in accordance with IT audit standards
- IS Audit Process
- Provide assurance on leadership and organizational structure and processes
- Provide assurance on acquisition/ development, testing and implementation of IT assets
- Provide assurance on IT operations including service operations and third party
- Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets
- IT Governance
This Course has been designed to prepare Delegates for the CISA examination by enabling them to supplement their existing knowledge and understanding to be better prepared to pass the exam, as defined by ISACA:
Course Contents
- Preparation for the CISA Exam
- Submitting Required Paperwork
- Resources and Study Aids
- Passing the Exam, the First Time
- Risk
- Audit
- Standards and Guidelines
- Best Practices
- Management Practices
- Roles and Responsibilities
- Project Management
- Business Application Development
- Information Systems Maintenance Practices
- Auditing Application Controls
- Application System Development
- Business Application Systems
- Information Systems Operations
- Information Systems Hardware
- SDLC
- Databases
- TCP/IP Model
- TCP/UDP/ICMP/IP
- Routers/Switches/Hubs
- Firewalls
- Wireless
- WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cable
- CIA
- Roles and Responsibilities - RACI
- Taxonomy - Information Classification
- Risk Management
- Policies, Procedures, Standards, Guidelines, Baselines
- Knowledge Transfer - Awareness, Training, Education
- Environmental Protection Practices
- Physical Authentication
- Policies and Procedures
- BIA Policy
- BIA Roles and Teams
- Data Backups, Vaulting, Journaling, Shadowing
- Alternate Sites
- Emergency Response
- Required Notifications
Testing-Taking Tips and Study Techniques
The Audit Process
IT Governance
Lifecycle Management
System Infrastructure Control:
Information Systems Hardware and Architecture:
Information Systems Used for IT Delivery and Support:
Protection of Logical Assets:
Physical Security:
Business Continuity and Disaster Recovery:
Our Methodology
- Make coaching and monitoring innovative and using modern
- Media training also using on the go training by using interactive means and focusing on
- The exercises, practical applications and real situations study
- Live delivery method, instructor-led training
- Experienced consultant, trainers, and professional
- Qualified trainer with high-level experience
Attendance Reports
- Send daily attendance reports to training departments
- Send full attendance report to training dep. by the end of the course
- Attend 100 % from the course days also provide daily
- Issue attendance certificate for participant who attend minimum 80% from the course duration
Pre/Post Reports
- Pre- assessment before starting training
- Post assessment after finish training
- Full report for the deferent between Pre-& Post assessment
Who Should Attend
- Internal and External Auditors
- Finance/CPA Professionals
- IT Professionals
- Information Security Professionals
- Information security and risk consulting professionals