Certified Information Systems Auditor (CISA®)

by Lumify Group Claim Listing

CISA® is the globally recognised gold standard for IS audit, control, and assurance, in-demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor.

$4015

Contact the Institutes

Fill this form

Advertisement

Lumify Group Logo

img Duration

4 Days

Course Details

CISA® is the globally recognised gold standard for IS audit, control, and assurance, in-demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor.

CISA professionals offer the credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to organisations. The CISA certification is designed for those who audit, control, monitor and assess an enterprise’s information technology and business systems.

CISAs are recognised internationally as professionals with the assurance knowledge, skills, experience and credibility necessary to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, validate controls, and deliver value to the enterprise.

The increased dependence on technology and information ensures that CISA certification-holders will continue to be in demand for assurance and security functions. This course is an intensive, four-day review program designed to prepare professionals for the Certified Information Systems Auditor exam.

This course includes a digital courseware manual and access to the CISA Questions, Answers and Explanations (QAE) database for 12 months.

 

What You’ll Learn

After completing this course, participants should be able to:

  • Demonstrate in-depth knowledge of the five domains required to prepare for the CISA certification

  • Provide audit services in accordance with standards to assist organisations in protecting and controlling information systems

  • Identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies

 

Who Is The Course For?

This course is designed for mid-career IS audit, control and assurance professionals looking to leverage career growth, including:

  • IT Audit Directors, Managers, and Consultants

  • IT Auditors

  • Compliance/Risk/Privacy Directors

  • IT Directors, Managers, and Consultants

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources.

 

Course Subjects

Domain 1: Information Systems Auditing Process
Providing audit services in accordance with standards to assist organisations in protecting and controlling information systems. Domain 1 affirms your credibility to offer conclusions on the state of an organisation's IS/IT security, risk and control solutions.

A. Planning

  • IS Audit Standards, Guidelines, and Codes of Ethics

  • Business Processes

  • Types of Controls

  • Risk-Based Audit Planning

  • Types of Audits and Assessments

B. Execution

  • Audit Project Management

  • Sampling Methodology

  • Audit Evidence Collection Techniques

  • Data Analytics

  • Reporting and Communication Techniques

  • Quality Assurance and Improvement of the Audit Process

Domain 2: Governance and Management of IT
Domain 2 confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.

A. IT Governance

  • IT Governance and IT Strategy

  • IT-Related Frameworks

  • IT Standards, Policies, and Procedures

  • Organisational Structure

  • Enterprise Architecture

  • Enterprise Risk Management

  • Maturity Models

  • Laws, Regulations, and Industry Standards affecting the Organisation

B. IT Management

  • IT Resource Management

  • IT Service Provider Acquisition and Management

  • IT Performance Monitoring and Reporting

  • Quality Assurance and Quality Management of IT

Domain 3: Information Systems Acquisition, Development and Implementation
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

A. Information Systems Acquisition and Development

  • Project Governance and Management

  • Business Case and Feasibility Analysis

  • System Development Methodologies

  • Control Identification and Design

B. Information Systems Implementation

  • Testing Methodologies

  • Configuration and Release Management

  • System Migration, Infrastructure Deployment, and Data Conversion

  • Post-implementation Review

Domain 4: Information Systems Operations and Business Resilience
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

A. Information Systems Operations

  • Common Technology Components

  • IT Asset Management

  • Job Scheduling and Production Process Automation

  • System Interfaces

  • End-User Computing

  • Data Governance

  • Systems Performance Management

  • Problem and Incident Management

  • Change, Configuration, Release, and Patch Management

  • IT Service Level Management

  • Database Management

B. Business Resilience

  • Business Impact Analysis (BIA)

  • System Resiliency

  • Data Backup, Storage, and Restoration

  • Business Continuity Plan (BCP)

  • Disaster Recovery Plans (DRP)

Domain 5: Protection of Information Assets
Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.

A. Information Asset Security and Control

  • Information Asset Security Frameworks, Standards, and Guidelines

  • Privacy Principles

  • Physical Access and Environmental Controls

  • Identity and Access Management

  • Network and End-Point Security

  • Data Classification

  • Data Encryption and Encryption-Related Techniques

  • Public Key Infrastructure (PKI)

  • Web-Based Communication Techniques

  • Virtualised Environments

  • Mobile, Wireless, and Internet-of-Things (IoT) Devices

B. Security Event Management

  • Security Awareness Training and Programs

  • Information System Attack Methods and Techniques

  • Security Testing Tools and Techniques

  • Security Monitoring Tools and Techniques

  • Incident Response Management

  • Evidence Collection and Forensics

 

Prerequisites

  • It is recommended that you have familiarity with and experience in information systems auditing, control or security.
  • To earn the CISA certification, a candidate must pass the CISA Exam and also meet the additional criteria as determined by ISACA.
  • Canberra Branch

    Level 2, 221 London Circuit, Canberra
  • Sydney Branch

    Level 24, 477 Pitt Street, Sydney
  • Melbourne Branch

    Level 12A, 45 William Street, Melbourne
  • Brisbane Branch

    Level 8, 201 Charlotte Street, Brisbane
  • Perth Branch

    Level 7, 553 Hay Street, Perth
  • Adelaide Branch

    Level 15, 33 King William Street, Adelaide

Check out more CISA courses in Australia

Koenig Solutions Logo

ISO 27001 (ISMS) Lead Implementer Course

ISO 27001 Lead Implementer course is a training program that enables people to develop the necessary expertise to support an organization in establishing, implementing, managing, and maintaining an Information Security Management System (ISMS).

by Koenig Solutions [Claim Listing ]
  • Price
  • Start Date
  • Duration
Pwc Auditor Training Logo

Information Security Management Systems Lead Auditor

ISO/IEC 27001:2022 provides the framework to ensure your organisation has robust security processes and controls so you can meet supplier, customer, and regulatory expectations in data protection.

by Pwc Auditor Training [Claim Listing ]
JLB Logo

ISO 27001 Lead Auditor Cours

Our ISO 27001 Lead Auditor Course is delivered across 5 days, providing a comprehensive overview of ISO 27001:2022, before delving into the practical auditing skills required to perform audits against information security management systems.

by JLB [Claim Listing ]
ALC Training Logo

Cisa® Certified Information Systems Auditor

The CISA preparation course provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information systems audit, control and security professional. In the process the course provides outstanding preparation for the

by ALC Training [Claim Listing ]
Melbourne International Graduate College Logo

ISO 27001 (Foundation)

ISO 27001 is the international standard that provides the basis for effective management of confidential and sensitive information and the application of information security controls. It enables organizations to demonstrate excellence and prove best practice in information security management.

by Melbourne International Graduate College [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy