Certified Information System Auditor

by Infosavvy Training Institute Claim Listing

CISA by ISACA is a globally recognized certification for IS audit control, assurance and security professionals offered by Infosavvy. It is the gold standard for IS/IT certifications and are also renowned as a prestigious, lifelong symbol of knowledge and expertise.

₹25000

Contact the Institutes

Fill this form

Advertisement

Infosavvy Training Institute Logo

img Duration

Please Enquire

Course Details

CISA by ISACA is a globally recognized certification for IS audit control, assurance and security professionals offered by Infosavvy. It is the gold standard for IS/IT certifications and are also renowned as a prestigious, lifelong symbol of knowledge and expertise.

Having a CISA, your credentials, knowledge and capabilities are clearly understood by potential employee and fellow professionals alike.

 

Professionals with work experience in information systems auditing, control or security that include:

  • IS/IT Auditors
  • IS/IT Consultants
  • Security Professionals
  • IS/IT Audit Managers

 

CISA stands for Certified Information Systems Auditor . This is an independent information systems auditing certification governed by the Information Systems Audit and Control Association (ISACA).

The CISA certification is for those in the IT industry who audit, control, monitor and assess IT and business systems. This is a comprehensive course that covers auditing process in-depth and ensure individuals develop proper working knowledge of five domains of CISA.

CISA is even a prerequisite for information systems and information technology roles. CISA has become world-renowned as the standard of achievement for those who assess an organization’s information technology and business systems and provide assurance on their availability and sustainability.

IS Audit refers to audit of systems (especially computer based) which provide information (like Accounts, Payroll, MIS etc.) to assure management that the information generated from these systems are reliable.

 

Outline:

  • The Process Of Auditing Information Systems
  • ISACA IT Audit and Assurance Standards,
  • Guidelines and Tools and Techniques
  • Risk assessment in an audit context
  • Control Objectives related to information
  • systems
  • Audit planning and management techniques
  • Gathering information and preserving
  • evidence
  • Reporting and communication techniques
  • Control Objectives and IS-Related Controls
  • Risk Assessment in an Audit Context
  • Audit Planning and Management Techniques
  • Reporting and Communication Techniques
  • Control Self-Assessment 
  • Communication And Stakeholder Management
  • IT Governance Frameworks
  • IT strategy, policies, standards and procedures
  • Organizational structure roles and responsibilities related to IT
  • Quality Management systems
  • Maturity and business process re-engineering models
  • IT contracting strategies
  • Enterprise risk management
  • Process Improvement Models
  • IT Contracting Strategies
  • Monitoring and Reporting IT Performance
  • IT Human Resource Management
  • Business impact analysis
  • Business continuity planning 
  • Information Security Program Development And Management:
  • Benefits realization practices
  • Project governance mechanisms
  • Project management control frameworks,
  • practices and tools
  • Risk management practices
  • Requirements analysis and management practices
  • System development methodologies and tools
  • Configuration and release management
  • System migration and infrastructure deployment practices
  • Post-implementation review objectives and practices
  • Security Issues with Programming Languages
  • IT Service Delivery And Support:
  • Service level management practices
  • Operations management
  • Technology concepts related to networks,
  • system software and database management systems
  • System resiliency tools and techniques
  • Database administration practices
  • Capacity planning and monitoring techniques
  • Problem and incident management practices
  • Disaster recovery plans and testing methods
  • Protection Of Information Assets:
  • Security controls
  • Security incidents
  • Logical access controls
  • Network security controls
  • Network and Internet security
  • Attack methods and techniques
  • Security testing techniques
  • Encryption related technologies
  • PKI components and digital signature techniques
  • Security of mobile and wireless devices
  • Voice communications security
  • Data classification schemes
  • Physical access controls
  • Environmental protection devices
  • Process and procedures for information assets
  • Mumbai Branch

    2nd Floor Sai Niketan Opp Borivali Railway Station, Mumbai

Check out more CISA courses in India

BSI Group Logo

ISO/IEC 27001:2022 Lead Auditor Training Course

Learn best practice auditing techniques and lead audits with confidence. This intensive five-day course is suited to anyone who has a detailed understanding of ISO/IEC 27001 requirements and wants to build on our ISO/IEC 27001 internal auditor training course.

by BSI Group [Claim Listing ]
InfoCratus Logo

CRISC – Training Workshop

CRISC certification is one of the most widely recognized credentials for a professional in the areas of enterprise risk management for IT professionals across the globe. Being a CRISC certified professional not only showcases your prowess in managing enterprise risk.

by InfoCratus [Claim Listing ]
IntelleSecure Logo

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) is an audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA). Candidates for the certification must meet requirements set by ISACA.

by IntelleSecure [Claim Listing ]
Sigma Tech Zone Logo

ISO 27001 Training (Advance)

ISO 27001 is an international standard information security management system on how to manage the organization’s information. It helps us to ensure the integrity of information and data leaks into hand of unintended recipients.

by Sigma Tech Zone [Claim Listing ]
Codevirus Security Logo

CISA

The world is currently dealing with a number of issues caused by hackers who are disguising their activities as cyberattacks. These attacks are designed to cause significant harm, alter, modify, capture, or seize datasets.

by Codevirus Security [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy