CISA Certified Information Systems Auditor

by Pearce Mayfield Claim Listing

The CISA Certified Information Systems Auditor course is delivered by expert CISA trainers. After completing this course, the delegates will able to get higher salaries in the IT industry. Pearce Mayfield’s CISA course is accredited by ISACA.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Pearce Mayfield Logo

img Duration

4 Days

Course Details

The CISA Certified Information Systems Auditor course is delivered by expert CISA trainers. After completing this course, the delegates will able to get higher salaries in the IT industry. Pearce Mayfield’s CISA course is accredited by ISACA. 

The CISA Certified Information Systems Auditor course provides knowledge about governance and management of IT. The delegates will learn about acquisition, implementation and development of information systems. The delegates will also get knowledge about the implementation of information systems.

 

Course Outline:

  • An Overview of Information Systems Audit Process
  • Emerging risk-based IT audit policy
  • Operating risk management and control practices
  • Directing audits to IS audit values
  • Preparation of specific reviews
  • Summary of IT Governance and Management
  • Define effectiveness of IT Governance assembly
  • IT organisational structure and human resources (personnel) management
  • An Overview of Organisation business continuity plan
  • Organisation’s IT policies, standards, and procedures
  • Competence of the Quality Management System
  • IT management and observing controls
  • IT contracting plans and strategies
  • Administration of organisations IT related risks
  • Observing and guarantee practices
  • IT resource investment
  • An Overview of Information Systems Attainment, Growth, and Execution
  • An Overview of Business case development for IS attainment, growth, maintenance, and retirement
  • Project management practices and controls
  • Conducting assessments of project management practices
  • Controls for necessities, attainment, growth, and challenging phases
  • Willingness for Information Systems
  • Project Plan Studying
  • Post-Employment System Reviews
  • An Introduction to Information Systems Operations, Maintenance, and Support
  • Conduct periodic reviews of organisations objectives
  • Summary of Service level management
  • What are third-party management practices?
  • Process of information systems maintenance
  • Data administration practices control the integrity and optimization of databases
  • Use of capacity and performance monitoring apparatuses and methods
  • Problem and incident management performs
  • Change, configuration, and release management practices
  • What are operations and end-user procedures?
  • Backup Adequacy and restore provisions
  • Organisation’s disaster recovery plan in the occasion of a disaster
  • Protection of Information Assets
  • Information security rules, values and events
  • Design, executing, monitoring of physical access and environmental controls
  • Design, executing, checking of system and logical security controls
  • Design, executing, checking of data organization processes and procedures
  • Processes and events to store, recover, transport and dispose of information assets
  • Reading Branch

    Reflex, Cain Road, Reading

Check out more CISA courses in UK

Datrix Training Logo

CISSP Certified Information Systems Security Professional

The CISSP Training Certification is an intense, worthwhile course that covers everything to do with information security including practices, methodologies, technologies and concepts. Our CISSP Certifications cover a broad spectrum of technical information security areas.

by Datrix Training [Claim Listing ]
One compliance Logo

Information Security Awareness training

This training can help employees understand their responsibilities towards information security and the importance of protecting data.

by One compliance [Claim Listing ]
Pentagon Training Logo

CISSP Certified Information Systems Security Professional

Over 5 days, our expert instructors will go through each of the 8 CISSP CBK domains using a theory-based approach teaching all the concepts, tools and knowledge required for the modern cybersecurity professional to do their job effectively, all with the aim of passing the exam and achieving this hi...

by Pentagon Training [Claim Listing ]
Learning Tree Logo

CISSP® Training and Certification Prep Course

The CISSP Training and Certification Prep Course is a comprehensive training course aimed at preparing individuals for the CISSP Certified Information Systems Security Professional exam.

by Learning Tree [Claim Listing ]
Net Security Training Logo

Certified in Risk & Information Systems Control (CRISC)

CRISC course is offered by Net Security Training for all skill level. Net Security Training is an independent specialist Cyber Security training company whose total focus is the provision of specialised courses and appreticeships catering for Cyber Security and Information Assurance professionals...

by Net Security Training [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy