Certified Information Systems Auditor (CISA®)

by Lumify Group Claim Listing

CISA® is the globally recognised gold standard for IS audit, control, and assurance, in-demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor.

$4015

Contact the Institutes

Fill this form

Advertisement

Lumify Group Logo

img Duration

4 Days

Course Details

CISA® is the globally recognised gold standard for IS audit, control, and assurance, in-demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor.

CISA professionals offer the credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to organisations. The CISA certification is designed for those who audit, control, monitor and assess an enterprise’s information technology and business systems.

CISAs are recognised internationally as professionals with the assurance knowledge, skills, experience and credibility necessary to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, validate controls, and deliver value to the enterprise.

The increased dependence on technology and information ensures that CISA certification-holders will continue to be in demand for assurance and security functions. This course is an intensive, four-day review program designed to prepare professionals for the Certified Information Systems Auditor exam.

This course includes a digital courseware manual and access to the CISA Questions, Answers and Explanations (QAE) database for 12 months.

 

What You’ll Learn

After completing this course, participants should be able to:

  • Demonstrate in-depth knowledge of the five domains required to prepare for the CISA certification

  • Provide audit services in accordance with standards to assist organisations in protecting and controlling information systems

  • Identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies

 

Who Is The Course For?

This course is designed for mid-career IS audit, control and assurance professionals looking to leverage career growth, including:

  • IT Audit Directors, Managers, and Consultants

  • IT Auditors

  • Compliance/Risk/Privacy Directors

  • IT Directors, Managers, and Consultants

We can also deliver and customise this training course for larger groups – saving your organisation time, money and resources.

 

Course Subjects

Domain 1: Information Systems Auditing Process
Providing audit services in accordance with standards to assist organisations in protecting and controlling information systems. Domain 1 affirms your credibility to offer conclusions on the state of an organisation's IS/IT security, risk and control solutions.

A. Planning

  • IS Audit Standards, Guidelines, and Codes of Ethics

  • Business Processes

  • Types of Controls

  • Risk-Based Audit Planning

  • Types of Audits and Assessments

B. Execution

  • Audit Project Management

  • Sampling Methodology

  • Audit Evidence Collection Techniques

  • Data Analytics

  • Reporting and Communication Techniques

  • Quality Assurance and Improvement of the Audit Process

Domain 2: Governance and Management of IT
Domain 2 confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.

A. IT Governance

  • IT Governance and IT Strategy

  • IT-Related Frameworks

  • IT Standards, Policies, and Procedures

  • Organisational Structure

  • Enterprise Architecture

  • Enterprise Risk Management

  • Maturity Models

  • Laws, Regulations, and Industry Standards affecting the Organisation

B. IT Management

  • IT Resource Management

  • IT Service Provider Acquisition and Management

  • IT Performance Monitoring and Reporting

  • Quality Assurance and Quality Management of IT

Domain 3: Information Systems Acquisition, Development and Implementation
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

A. Information Systems Acquisition and Development

  • Project Governance and Management

  • Business Case and Feasibility Analysis

  • System Development Methodologies

  • Control Identification and Design

B. Information Systems Implementation

  • Testing Methodologies

  • Configuration and Release Management

  • System Migration, Infrastructure Deployment, and Data Conversion

  • Post-implementation Review

Domain 4: Information Systems Operations and Business Resilience
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

A. Information Systems Operations

  • Common Technology Components

  • IT Asset Management

  • Job Scheduling and Production Process Automation

  • System Interfaces

  • End-User Computing

  • Data Governance

  • Systems Performance Management

  • Problem and Incident Management

  • Change, Configuration, Release, and Patch Management

  • IT Service Level Management

  • Database Management

B. Business Resilience

  • Business Impact Analysis (BIA)

  • System Resiliency

  • Data Backup, Storage, and Restoration

  • Business Continuity Plan (BCP)

  • Disaster Recovery Plans (DRP)

Domain 5: Protection of Information Assets
Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.

A. Information Asset Security and Control

  • Information Asset Security Frameworks, Standards, and Guidelines

  • Privacy Principles

  • Physical Access and Environmental Controls

  • Identity and Access Management

  • Network and End-Point Security

  • Data Classification

  • Data Encryption and Encryption-Related Techniques

  • Public Key Infrastructure (PKI)

  • Web-Based Communication Techniques

  • Virtualised Environments

  • Mobile, Wireless, and Internet-of-Things (IoT) Devices

B. Security Event Management

  • Security Awareness Training and Programs

  • Information System Attack Methods and Techniques

  • Security Testing Tools and Techniques

  • Security Monitoring Tools and Techniques

  • Incident Response Management

  • Evidence Collection and Forensics

 

Prerequisites

  • It is recommended that you have familiarity with and experience in information systems auditing, control or security.
  • To earn the CISA certification, a candidate must pass the CISA Exam and also meet the additional criteria as determined by ISACA.
  • Canberra Branch

    Level 2, 221 London Circuit, Canberra
  • Sydney Branch

    Level 24, 477 Pitt Street, Sydney
  • Melbourne Branch

    Level 12A, 45 William Street, Melbourne
  • Brisbane Branch

    Level 8, 201 Charlotte Street, Brisbane
  • Perth Branch

    Level 7, 553 Hay Street, Perth
  • Adelaide Branch

    Level 15, 33 King William Street, Adelaide

Check out more CISA courses in Australia

ALC Training Logo

COBIT® 2019 Foundation

The COBIT framework addresses both business and IT functional areas across an enterprise and considers the IT-related interests of internal and external stakeholders. Enterprises of all sizes can benefit from COBIT, whether commercial, not-for-profit or in the public sector.

by ALC Training [Claim Listing ]
IEVISION IT Services Logo

ISO 27001 Lead Auditor

This is an Accredited course enables participants to develop the expertise needed to audit an Information Security Management System (ISMS) and to manage a team of auditors by applying widely recognized audit principles, procedures and techniques.

by IEVISION IT Services [Claim Listing ]
Koenig Solutions Logo

ISO 27001 (ISMS) Lead Implementer Course

ISO 27001 Lead Implementer course is a training program that enables people to develop the necessary expertise to support an organization in establishing, implementing, managing, and maintaining an Information Security Management System (ISMS).

by Koenig Solutions [Claim Listing ]
  • Price
  • Start Date
  • Duration
Pwc Auditor Training Logo

Information Security Management Systems Lead Auditor

ISO/IEC 27001:2022 provides the framework to ensure your organisation has robust security processes and controls so you can meet supplier, customer, and regulatory expectations in data protection.

by Pwc Auditor Training [Claim Listing ]
Prog360 Logo

CRISC

Certified in Risk and Information Systems Control (CRISC®) certification indicates expertise in identifying and managing enterprise IT risk and implementing and maintaining information systems controls.

by Prog360

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy