CISA Training

by IEVISION IT Services Claim Listing

IEVISION’s Certified Information Systems Auditor (CISA) Boot Camp is specifically designed to provide CISA candidates with the effective skills necessary to develop, manage and supervise programs to defend against unauthorized admittance to information.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IEVISION IT Services Logo

img Duration

Please Enquire

Course Details

IEVISION’s Certified Information Systems Auditor (CISA) Boot Camp is specifically designed to provide CISA candidates with the effective skills necessary to develop, manage and supervise programs to defend against unauthorized admittance to information. In addition our boot camp is focused on preparing students for the CISA examination through testing knowledge and the ability to apply it to real world scenarios. 

The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. Since 1978, the CISA program, sponsored by ISACA, has been globally accepted standard of achievement among information system audit, control and security professionals. 

The technical skills and practices that CISA® promotes and evaluates are the building blocks of success in the field. Possessing the CISA® designation demonstrates proficiency and is the basis for measurement in the profession. 

With a growing demand for professionals possessing IS audit, control and security skills, CISA® has become a preferred certification program by individuals and organizations around the world. CISA® certification signifies commitment to serving an organization and the chosen profession with distinction.

 

Benefits:

  • Confirms your knowledge and experience
  • Quantifies and markets your expertise
  • Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise
  • Is globally recognized as the mark of excellence for the IS audit professional
  • Combines the achievement of passing a comprehensive exam with recognition of work and educational experience, providing you with credibility in the marketplace.
  • Increases your value to your organization
  • Gives you a competitive advantage over peers when seeking job growth
  • Helps you achieve a high professional standard through ISACA’s requirements for continuing education and ethical conduct
 
Objectives:
  • Gives a better understanding of information security audit process
  • Gives better awareness of how to protect information systems
  • Confirms commitment to profession
  • Offers a career differentiator, with enhanced credibility and marketability
  • Provides access to valuable resources, such as peer networking and idea exchange
 
 
Program Outline:
  • Domain 1— The Process of Auditing Information Systems (18%)
    • ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques
    • Risk assessment in an audit context
    • Control Objectives related to information systems
    • Audit planning and management techniques
    • Gathering information and preserving evidence
    • Reporting and communication techniques
    • Control Objectives and IS-Related Controls
    • Risk Assessment in an Audit Context
    • Audit Planning and Management Techniques
    • Reporting and Communication Techniques
    • Control Self-Assessment
  • Domain 2— Governance and Management of IT (18%)
    • IT Governance Frameworks
    • IT strategy, policies, standards and procedures
    • Organizational structure roles and responsibilities related to IT
    • Quality Management systems
    • Maturity and business process re-engineering models
    • IT contracting strategies
    • Enterprise risk management
    • Process Improvement Models
    • IT Contracting Strategies
    • Monitoring and Reporting IT Performance
    • IT Human Resource Management
    • Business impact analysis
    • Business continuity planning
  • Domain 3— Information Systems Acquisition, Development and Implementation (12%)
    • Benefits realization practices
    • Project governance mechanisms
    • Project management control frameworks, practices and tools
    • Risk management practices
    • Requirements analysis and management practices
    • System development methodologies and tools
    • Configuration and release management
    • System migration and infrastructure deployment practices
    • Post-implementation review objectives and practices
    • Security Issues with Programming Languages
  • Domain 4— Information Systems Operations, Maintenance and Service Management (26%)
    • Service level management practices
    • Operations management
    • Technology concepts related to networks, system software and database System resiliency tools and techniques
    • Database administration practices
    • Capacity planning and monitoring techniques
    • Problem and incident management practices
    • Disaster recovery plans and testing methods
  • Domain 5— Protection of Information Assets (26%)
    • Security controls
    • Security incidents
    • Logical access controls
    • Network security controls
    • Network and Internet security
    • Attack methods and techniques
    • Security testing techniques
    • Encryption related technologies
    • PKI components and digital signature techniques
    • Security of mobile and wireless devices
    • Voice communications security
    • Data classification schemes
    • Physical access controls
    • Environmental protection devices
    • Process and procedures for information assets
 
 
Who Should Attend:
  • Information Security audit, control, assurance, and security professionals,
  • IT consultants,
  • IT Managers,
  • IT security policy writers, privacy officers,    
  • Information security officers,
  • Network administrators,
  • Security device administrators, and security engineers
  • Pune Branch

    Office no.7, Bilvakunj Apartment, Above idea showroom, Pune

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy