CISA® is the globally recognised gold standard for IS audit, control, and assurance, in-demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor.
CISA® is the globally recognised gold standard for IS audit, control, and assurance, in-demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor.
CISA professionals offer the credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to organisations. The CISA certification is designed for those who audit, control, monitor and assess an enterprise’s information technology and business systems.
CISAs are recognised internationally as professionals with the assurance knowledge, skills, experience and credibility necessary to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, validate controls, and deliver value to the enterprise.
The increased dependence on technology and information ensures that CISA certification-holders will continue to be in demand for assurance and security functions. This course is an intensive, four-day review program designed to prepare professionals for the Certified Information Systems Auditor exam.
This course includes a digital courseware manual and access to the CISA Questions, Answers and Explanations (QAE) database for 12 months.
What You’ll Learn
After completing this course, participants should be able to:
Demonstrate in-depth knowledge of the five domains required to prepare for the CISA certification
Provide audit services in accordance with standards to assist organisations in protecting and controlling information systems
Identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies
Who Is The Course For?
This course is designed for mid-career IS audit, control and assurance professionals looking to leverage career growth, including:
IT Audit Directors, Managers, and Consultants
IT Auditors
Compliance/Risk/Privacy Directors
IT Directors, Managers, and Consultants
We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources.
Course Subjects
Domain 1: Information Systems Auditing Process
Providing audit services in accordance with standards to assist organisations in protecting and controlling information systems. Domain 1 affirms your credibility to offer conclusions on the state of an organisation's IS/IT security, risk and control solutions.
A. Planning
IS Audit Standards, Guidelines, and Codes of Ethics
Business Processes
Types of Controls
Risk-Based Audit Planning
Types of Audits and Assessments
B. Execution
Audit Project Management
Sampling Methodology
Audit Evidence Collection Techniques
Data Analytics
Reporting and Communication Techniques
Quality Assurance and Improvement of the Audit Process
Domain 2: Governance and Management of IT
Domain 2 confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.
A. IT Governance
IT Governance and IT Strategy
IT-Related Frameworks
IT Standards, Policies, and Procedures
Organisational Structure
Enterprise Architecture
Enterprise Risk Management
Maturity Models
Laws, Regulations, and Industry Standards affecting the Organisation
B. IT Management
IT Resource Management
IT Service Provider Acquisition and Management
IT Performance Monitoring and Reporting
Quality Assurance and Quality Management of IT
Domain 3: Information Systems Acquisition, Development and Implementation
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.
A. Information Systems Acquisition and Development
Project Governance and Management
Business Case and Feasibility Analysis
System Development Methodologies
Control Identification and Design
B. Information Systems Implementation
Testing Methodologies
Configuration and Release Management
System Migration, Infrastructure Deployment, and Data Conversion
Post-implementation Review
Domain 4: Information Systems Operations and Business Resilience
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.
A. Information Systems Operations
Common Technology Components
IT Asset Management
Job Scheduling and Production Process Automation
System Interfaces
End-User Computing
Data Governance
Systems Performance Management
Problem and Incident Management
Change, Configuration, Release, and Patch Management
IT Service Level Management
Database Management
B. Business Resilience
Business Impact Analysis (BIA)
System Resiliency
Data Backup, Storage, and Restoration
Business Continuity Plan (BCP)
Disaster Recovery Plans (DRP)
Domain 5: Protection of Information Assets
Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.
A. Information Asset Security and Control
Information Asset Security Frameworks, Standards, and Guidelines
Privacy Principles
Physical Access and Environmental Controls
Identity and Access Management
Network and End-Point Security
Data Classification
Data Encryption and Encryption-Related Techniques
Public Key Infrastructure (PKI)
Web-Based Communication Techniques
Virtualised Environments
Mobile, Wireless, and Internet-of-Things (IoT) Devices
B. Security Event Management
Security Awareness Training and Programs
Information System Attack Methods and Techniques
Security Testing Tools and Techniques
Security Monitoring Tools and Techniques
Incident Response Management
Evidence Collection and Forensics
Prerequisites
Lumify Group was previously known as DDLS Group. We help business and enterprise customers turn change into opportunity through instructor-led, vendor-certified, IT and process training.
Developed in partnership with the world’s leading tech vendors and delivered by industry-accredited experts, our courses are pragmatic, future-focused and real-world ready.
From cybersecurity to cloud computing, AI to agile, our award-winning trainers deliver cutting-edge content to over 20,000 students online, in classrooms and in workplaces, every year.
Learn From The Experts
Leaders in their respective fields and with an average student rating of 4.8/5, our industry-accredited trainers will inspire your team to learn, thrive and grow.
Train Your Way
From face-to-face sessions with our expert trainers to self-directed courses delivered entirely online, our training methods can be easily adapted to suit you and your team.
The COBIT framework addresses both business and IT functional areas across an enterprise and considers the IT-related interests of internal and external stakeholders. Enterprises of all sizes can benefit from COBIT, whether commercial, not-for-profit or in the public sector.
This is an Accredited course enables participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques.
ISO 27001 Lead Implementer course is a training program that enables people to develop the necessary expertise to support an organization in establishing, implementing, managing, and maintaining an Information Security Management System (ISMS).
ISO/IEC 27001:2022 provides the framework to ensure your organisation has robust security processes and controls so you can meet supplier, customer, and regulatory expectations in data protection.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy