Certified Information Systems Auditor (CISA®)

by Lumify Group Claim Listing

CISA® is the globally recognised gold standard for IS audit, control, and assurance, in-demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor.

$4015

Contact the Institutes

Fill this form

Advertisement

Lumify Group Logo

img Duration

4 Days

Course Details

CISA® is the globally recognised gold standard for IS audit, control, and assurance, in-demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor.

CISA professionals offer the credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to organisations. The CISA certification is designed for those who audit, control, monitor and assess an enterprise’s information technology and business systems.

CISAs are recognised internationally as professionals with the assurance knowledge, skills, experience and credibility necessary to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, validate controls, and deliver value to the enterprise.

The increased dependence on technology and information ensures that CISA certification-holders will continue to be in demand for assurance and security functions. This course is an intensive, four-day review program designed to prepare professionals for the Certified Information Systems Auditor exam.

This course includes a digital courseware manual and access to the CISA Questions, Answers and Explanations (QAE) database for 12 months.

 

What You’ll Learn

After completing this course, participants should be able to:

  • Demonstrate in-depth knowledge of the five domains required to prepare for the CISA certification

  • Provide audit services in accordance with standards to assist organisations in protecting and controlling information systems

  • Identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies

 

Who Is The Course For?

This course is designed for mid-career IS audit, control and assurance professionals looking to leverage career growth, including:

  • IT Audit Directors, Managers, and Consultants

  • IT Auditors

  • Compliance/Risk/Privacy Directors

  • IT Directors, Managers, and Consultants

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources.

 

Course Subjects

Domain 1: Information Systems Auditing Process
Providing audit services in accordance with standards to assist organisations in protecting and controlling information systems. Domain 1 affirms your credibility to offer conclusions on the state of an organisation's IS/IT security, risk and control solutions.

A. Planning

  • IS Audit Standards, Guidelines, and Codes of Ethics

  • Business Processes

  • Types of Controls

  • Risk-Based Audit Planning

  • Types of Audits and Assessments

B. Execution

  • Audit Project Management

  • Sampling Methodology

  • Audit Evidence Collection Techniques

  • Data Analytics

  • Reporting and Communication Techniques

  • Quality Assurance and Improvement of the Audit Process

Domain 2: Governance and Management of IT
Domain 2 confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.

A. IT Governance

  • IT Governance and IT Strategy

  • IT-Related Frameworks

  • IT Standards, Policies, and Procedures

  • Organisational Structure

  • Enterprise Architecture

  • Enterprise Risk Management

  • Maturity Models

  • Laws, Regulations, and Industry Standards affecting the Organisation

B. IT Management

  • IT Resource Management

  • IT Service Provider Acquisition and Management

  • IT Performance Monitoring and Reporting

  • Quality Assurance and Quality Management of IT

Domain 3: Information Systems Acquisition, Development and Implementation
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

A. Information Systems Acquisition and Development

  • Project Governance and Management

  • Business Case and Feasibility Analysis

  • System Development Methodologies

  • Control Identification and Design

B. Information Systems Implementation

  • Testing Methodologies

  • Configuration and Release Management

  • System Migration, Infrastructure Deployment, and Data Conversion

  • Post-implementation Review

Domain 4: Information Systems Operations and Business Resilience
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

A. Information Systems Operations

  • Common Technology Components

  • IT Asset Management

  • Job Scheduling and Production Process Automation

  • System Interfaces

  • End-User Computing

  • Data Governance

  • Systems Performance Management

  • Problem and Incident Management

  • Change, Configuration, Release, and Patch Management

  • IT Service Level Management

  • Database Management

B. Business Resilience

  • Business Impact Analysis (BIA)

  • System Resiliency

  • Data Backup, Storage, and Restoration

  • Business Continuity Plan (BCP)

  • Disaster Recovery Plans (DRP)

Domain 5: Protection of Information Assets
Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.

A. Information Asset Security and Control

  • Information Asset Security Frameworks, Standards, and Guidelines

  • Privacy Principles

  • Physical Access and Environmental Controls

  • Identity and Access Management

  • Network and End-Point Security

  • Data Classification

  • Data Encryption and Encryption-Related Techniques

  • Public Key Infrastructure (PKI)

  • Web-Based Communication Techniques

  • Virtualised Environments

  • Mobile, Wireless, and Internet-of-Things (IoT) Devices

B. Security Event Management

  • Security Awareness Training and Programs

  • Information System Attack Methods and Techniques

  • Security Testing Tools and Techniques

  • Security Monitoring Tools and Techniques

  • Incident Response Management

  • Evidence Collection and Forensics

 

Prerequisites

  • It is recommended that you have familiarity with and experience in information systems auditing, control or security.
  • To earn the CISA certification, a candidate must pass the CISA Exam and also meet the additional criteria as determined by ISACA.
  • Canberra Branch

    Level 2, 221 London Circuit, Canberra
  • Sydney Branch

    Level 24, 477 Pitt Street, Sydney
  • Melbourne Branch

    Level 12A, 45 William Street, Melbourne
  • Brisbane Branch

    Level 8, 201 Charlotte Street, Brisbane
  • Perth Branch

    Level 7, 553 Hay Street, Perth
  • Adelaide Branch

    Level 15, 33 King William Street, Adelaide

Check out more CISA courses in Australia

Lumify Group Logo

COBIT® 2019 Foundation

COBIT® is a framework for the enterprise governance and management of information and technology (I&T) that supports enterprise goal achievement. This foundation course is intended for those new to COBIT who are interested in achieving the latest foundation certificate as well as current COBIT 5

by Lumify Group [Claim Listing ]
CM Training Logo

Certified ISO 27001 Practitioner

This Certified ISO27001 Practitioners training course will provide delegates with the requirements and principles of ISO/IEC 27001, with an awareness of the issues and challenges involved in implementing an information security management system.

by CM Training [Claim Listing ]
Institute Of Internal Auditors - Australia (IIA-A) Logo

Fundamentals of IT Auditing

This course will provide attendees with an introduction to IT auditing, emphasising the concepts through exercises and case studies. Internal audit professionals will develop knowledge of basic IT audit concepts that can be used to facilitate integrated audit efforts within their organisation.

by Institute Of Internal Auditors - Australia (IIA-A) [Claim Listing ]
IEVISION IT Services Logo

CISSP Certification Training

Certified Information Systems Security Professional (CISSP) is an independent information security certification governed by the International Information System Security Certification Consortium, also known as (ISC)².

by IEVISION IT Services [Claim Listing ]
ALC Training Logo

ISO 27001 Foundation

ISO/IEC 27001:2022 Foundation training allows you to learn the basic elements to implement and manage an Information Security Management System as specified in ISO/IEC 27001:2022.

by ALC Training [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy