Certified Information System Auditor

by Infosavvy Training Institute Claim Listing

CISA by ISACA is a globally recognized certification for IS audit control, assurance and security professionals offered by Infosavvy. It is the gold standard for IS/IT certifications and are also renowned as a prestigious, lifelong symbol of knowledge and expertise.

₹25000

Contact the Institutes

Fill this form

Advertisement

Infosavvy Training Institute Logo

img Duration

Please Enquire

Course Details

CISA by ISACA is a globally recognized certification for IS audit control, assurance and security professionals offered by Infosavvy. It is the gold standard for IS/IT certifications and are also renowned as a prestigious, lifelong symbol of knowledge and expertise.

Having a CISA, your credentials, knowledge and capabilities are clearly understood by potential employee and fellow professionals alike.

 

Professionals with work experience in information systems auditing, control or security that include:

  • IS/IT Auditors
  • IS/IT Consultants
  • Security Professionals
  • IS/IT Audit Managers

 

CISA stands for Certified Information Systems Auditor . This is an independent information systems auditing certification governed by the Information Systems Audit and Control Association (ISACA).

The CISA certification is for those in the IT industry who audit, control, monitor and assess IT and business systems. This is a comprehensive course that covers auditing process in-depth and ensure individuals develop proper working knowledge of five domains of CISA.

CISA is even a prerequisite for information systems and information technology roles. CISA has become world-renowned as the standard of achievement for those who assess an organization’s information technology and business systems and provide assurance on their availability and sustainability.

IS Audit refers to audit of systems (especially computer based) which provide information (like Accounts, Payroll, MIS etc.) to assure management that the information generated from these systems are reliable.

 

Outline:

  • The Process Of Auditing Information Systems
  • ISACA IT Audit and Assurance Standards,
  • Guidelines and Tools and Techniques
  • Risk assessment in an audit context
  • Control Objectives related to information
  • systems
  • Audit planning and management techniques
  • Gathering information and preserving
  • evidence
  • Reporting and communication techniques
  • Control Objectives and IS-Related Controls
  • Risk Assessment in an Audit Context
  • Audit Planning and Management Techniques
  • Reporting and Communication Techniques
  • Control Self-Assessment 
  • Communication And Stakeholder Management
  • IT Governance Frameworks
  • IT strategy, policies, standards and procedures
  • Organizational structure roles and responsibilities related to IT
  • Quality Management systems
  • Maturity and business process re-engineering models
  • IT contracting strategies
  • Enterprise risk management
  • Process Improvement Models
  • IT Contracting Strategies
  • Monitoring and Reporting IT Performance
  • IT Human Resource Management
  • Business impact analysis
  • Business continuity planning 
  • Information Security Program Development And Management:
  • Benefits realization practices
  • Project governance mechanisms
  • Project management control frameworks,
  • practices and tools
  • Risk management practices
  • Requirements analysis and management practices
  • System development methodologies and tools
  • Configuration and release management
  • System migration and infrastructure deployment practices
  • Post-implementation review objectives and practices
  • Security Issues with Programming Languages
  • IT Service Delivery And Support:
  • Service level management practices
  • Operations management
  • Technology concepts related to networks,
  • system software and database management systems
  • System resiliency tools and techniques
  • Database administration practices
  • Capacity planning and monitoring techniques
  • Problem and incident management practices
  • Disaster recovery plans and testing methods
  • Protection Of Information Assets:
  • Security controls
  • Security incidents
  • Logical access controls
  • Network security controls
  • Network and Internet security
  • Attack methods and techniques
  • Security testing techniques
  • Encryption related technologies
  • PKI components and digital signature techniques
  • Security of mobile and wireless devices
  • Voice communications security
  • Data classification schemes
  • Physical access controls
  • Environmental protection devices
  • Process and procedures for information assets
  • Mumbai Branch

    2nd Floor Sai Niketan Opp Borivali Railway Station, Mumbai

Check out more CISA courses in India

OMCS Logo

ISO 27001

ISO 27001 course is offered by OMCS. We are an India based company providing Management & Product Certification services across the world. We are offering the Management Certification, Product Certification & Compliance services with best quality results at a reasonable pricing model.

by OMCS [Claim Listing ]
IEMLabs Logo

ISO/IEC 27001 Lead Auditor Training

ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organisation.

by IEMLabs [Claim Listing ]
Empowering Assurance Systems Logo

ISO 27001 Lead Auditor Training Course

ISO 27001 Lead Auditor Training Course is offered by Empowering Assurance Systems.Designed for both internal implementation and third-party client assessment, this ISO 27001 lead auditor course is meticulously tailored to foster a profound comprehension of ISMS within organizations.

by Empowering Assurance Systems [Claim Listing ]
QCS Management Pvt Ltd Logo

ISO 27001 :2013 Information Security Management System

ISO 27001 :2013 Information Security Management System training is offered by QCS Management Pvt Ltd. All of our training courses are accredited by the “CPD Accreditation Office UK” as conforming to universally accepted Continuing Professional Development (CPD) guidelines.

by QCS Management Pvt Ltd [Claim Listing ]
Craw Academy Logo

CISA Certification Course

The world is currently dealing with a number of issues caused by hackers who are disguising their activities as cyberattacks. These attacks are designed to cause significant harm, alter, modify, capture, or seize datasets that contain sensitive and important digital assets.

by Craw Academy [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy