This Certified Information Systems Auditor (CISA) Course provides delegates with in-depth knowledge about the Information Systems Audit process. During this training, they will learn about quality assurance, a systematic approach to determining if a product meets quality standards. They will also learn about disaster recovery plans that contain detailed instructions on responding to unplanned incidents.
The Certified Information Systems Auditor CISA Course is a globally recognized certification, suitable for those aiming to build a career in Information Systems control.
The CISA Certification Course can be beneficial for professionals, including:
- IT Consultants
- IT Auditors
- Risk Management Specialists
- Compliance Officers
- Security Professionals
- IT Managers and Executives
- Cybersecurity Professionals
There are no formal prerequisites for this CISA Certified Information Systems Auditor Course.
Certified Information Systems Auditor (CISA) is a globally recognized certification that builds upon the previous experience of IS professionals and produces valuable employees with exceptional knowledge of Information Systems auditing, control, and security. This training assists organizations in performing and analyzing IT governance standards to meet the requirements of IT corporate governance.
This Certified Information Systems Auditor (CISA) training will equip learners with the necessary competence and skills to move on to a high-ranking position within the enterprise.
Course Objectives:
- To attain knowledge of various security testing tools and techniques
- To learn the techniques that are applicable for audit planning
- To become familiar with web-based communication technologies
- To understand the Information System Audit process and how to protect it
- To gain an in-depth knowledge about how to use system development methodologies
- To attain knowledge of Audit and Performance Assessment of Internal Control Systems
At the end of this Certified Information Systems Auditor CISA Training, delegates will be able to audit the Information Security Management framework effectively and efficiently. They will also be able to do data encryption using various encryption-related techniques.
Domain 1: Information Systems Auditing Process
Module 1: Planning
- Introduction
- IS Audit Standards, Guidelines, and Codes of Ethics
- Business Processes
- Types of Controls
- Risk-Based Audit Planning
Module 2: Execution
- Audit Project Management
- Sampling Methodology
- Audit Evidence Collection Techniques
- Data Analytics
- Reporting and Communication Techniques
- Quality Assurance and Improvement of the Audit Process
Domain 2: Governance and Management of IT
Module 3: IT Governance and IT Strategy
- Introduction to IT Governance and IT Strategy
- IT-Related Frameworks
- IT Standards, Policies, and Procedures
- Organizational Structure
- Enterprise Architecture
- Enterprise Risk Management
- Maturity Models
- Laws, Regulations, and Industry Standards Affecting the Organization
Module 4: IT Management
- IT Resource Management
- IT Service Provider Acquisition and Management
- IT Performance Monitoring and Reporting
- Quality Assurance and Quality Management of IT
Domain 3: Information Systems Acquisition and Development
Module 5: Information Systems Acquisition and Development
- Project Governance and Management
- Business Case and Feasibility Analysis
- System Development Methodologies
- Control Identification and Design
Module 6: Information Systems Implementation
- Testing Methodologies
- Configuration and Release Management
- System Migration, Infrastructure Deployment, and Data Conversion
- Post-Implementation Review
Domain 4: Information Systems Operations and Business Resilience
Module 7: Information Systems Operations
- Introduction
- Common Technology Components
- IT Asset Management
- Job Scheduling and Production Process Automation
- System Interfaces
- End User Computing
- Data Governance
- System Performance Management
- Problem and Incident Management
- Change, Configuration, Release, and Patch Management
- IT Service Level Management
- Database Management
Module 8: Business Resilience
- Business Impact Analysis
- System Resiliency
- Data Backup, Storage, and Restoration
- Backup and Restoration
- Backup Schemes
- Business Continuity Plan
- IT Business Continuity Planning
- Disasters and Other Disruptive Events
- Business Continuity Policy
- Business Continuity Planning Incident Management
- Development of Business Continuity Plans
- Other Issues in Plan Development
- Components of a Business Continuity Plan
- Key Decision-Making Personnel
- Backup of Required Supplies
- Insurance
- Plan Testing
- Auditing Business Continuity
- Disaster Recovery Plans
Domain 5: Protection of Information Assets
Module 9: Information Asset Security Frameworks, Standards, and Guidelines
- Introduction to Asset Security Frameworks, Standards, and Guidelines
- Auditing the Information Security Management Framework
- Privacy Principles
- Physical Access and Environmental Controls
- Identity and Access Management
- Network and End-Point Security
- Shadow IT
- Data Classification
- Data Encryption and Encryption Related Techniques
- Symmetric Key Cryptographic Systems
- Public (Asymmetric) Key Cryptographic Systems
- Applications of Cryptographic Systems
- Public Key Infrastructure
- Web-Based Communication Technologies
- Virtualized Environments
- Mobile, Wireless, and Internet of Things
Module 10: Security Event Management
- Security Awareness Training and Programmes
- Information System Attack Methods and Techniques
- Security Testing Tools and Techniques
- Incident Response Management
- Evidence Collection and Forensics
Do you have any questions about e-learning?
It was really useful and Mihály Kávási trainer was great. Thank you!
Markó Ágnes