CISA Training

by IEVISION IT Services Claim Listing

IEVISION’s Certified Information Systems Auditor (CISA) Boot Camp is specifically designed to provide CISA candidates with the effective skills necessary to develop, manage and supervise programs to defend against unauthorized admittance to information.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IEVISION IT Services Logo

img Duration

Please Enquire

Course Details

IEVISION’s Certified Information Systems Auditor (CISA) Boot Camp is specifically designed to provide CISA candidates with the effective skills necessary to develop, manage and supervise programs to defend against unauthorized admittance to information. In addition our boot camp is focused on preparing students for the CISA examination through testing knowledge and the ability to apply it to real world scenarios. 

The mark of excellence for a professional certification program is the value and recognition it bestows on the individual who achieves it. Since 1978, the CISA program, sponsored by ISACA, has been globally accepted standard of achievement among information system audit, control and security professionals. 

The technical skills and practices that CISA® promotes and evaluates are the building blocks of success in the field. Possessing the CISA® designation demonstrates proficiency and is the basis for measurement in the profession. 

With a growing demand for professionals possessing IS audit, control and security skills, CISA® has become a preferred certification program by individuals and organizations around the world. CISA® certification signifies commitment to serving an organization and the chosen profession with distinction.

 

Benefits:

  • Confirms your knowledge and experience
  • Quantifies and markets your expertise
  • Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise
  • Is globally recognized as the mark of excellence for the IS audit professional
  • Combines the achievement of passing a comprehensive exam with recognition of work and educational experience, providing you with credibility in the marketplace.
  • Increases your value to your organization
  • Gives you a competitive advantage over peers when seeking job growth
  • Helps you achieve a high professional standard through ISACA’s requirements for continuing education and ethical conduct
 
Objectives:
  • Gives a better understanding of information security audit process
  • Gives better awareness of how to protect information systems
  • Confirms commitment to profession
  • Offers a career differentiator, with enhanced credibility and marketability
  • Provides access to valuable resources, such as peer networking and idea exchange
 
 
Program Outline:
  • Domain 1— The Process of Auditing Information Systems (18%)
    • ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques
    • Risk assessment in an audit context
    • Control Objectives related to information systems
    • Audit planning and management techniques
    • Gathering information and preserving evidence
    • Reporting and communication techniques
    • Control Objectives and IS-Related Controls
    • Risk Assessment in an Audit Context
    • Audit Planning and Management Techniques
    • Reporting and Communication Techniques
    • Control Self-Assessment
  • Domain 2— Governance and Management of IT (18%)
    • IT Governance Frameworks
    • IT strategy, policies, standards and procedures
    • Organizational structure roles and responsibilities related to IT
    • Quality Management systems
    • Maturity and business process re-engineering models
    • IT contracting strategies
    • Enterprise risk management
    • Process Improvement Models
    • IT Contracting Strategies
    • Monitoring and Reporting IT Performance
    • IT Human Resource Management
    • Business impact analysis
    • Business continuity planning
  • Domain 3— Information Systems Acquisition, Development and Implementation (12%)
    • Benefits realization practices
    • Project governance mechanisms
    • Project management control frameworks, practices and tools
    • Risk management practices
    • Requirements analysis and management practices
    • System development methodologies and tools
    • Configuration and release management
    • System migration and infrastructure deployment practices
    • Post-implementation review objectives and practices
    • Security Issues with Programming Languages
  • Domain 4— Information Systems Operations, Maintenance and Service Management (26%)
    • Service level management practices
    • Operations management
    • Technology concepts related to networks, system software and database System resiliency tools and techniques
    • Database administration practices
    • Capacity planning and monitoring techniques
    • Problem and incident management practices
    • Disaster recovery plans and testing methods
  • Domain 5— Protection of Information Assets (26%)
    • Security controls
    • Security incidents
    • Logical access controls
    • Network security controls
    • Network and Internet security
    • Attack methods and techniques
    • Security testing techniques
    • Encryption related technologies
    • PKI components and digital signature techniques
    • Security of mobile and wireless devices
    • Voice communications security
    • Data classification schemes
    • Physical access controls
    • Environmental protection devices
    • Process and procedures for information assets
 
 
Who Should Attend:
  • Information Security audit, control, assurance, and security professionals,
  • IT consultants,
  • IT Managers,
  • IT security policy writers, privacy officers,    
  • Information security officers,
  • Network administrators,
  • Security device administrators, and security engineers
  • Pune Branch

    Office no.7, Bilvakunj Apartment, Above idea showroom, Pune

Check out more CISA courses in India

Prospect Certification Logo

Get ISO 27001 (Information Security Management Systems) Certification

ISO/IEC 27001 is the formal standard against which organizations may seek independent certification of their Information Security Management Systems (meaning their frameworks to design, implement, manage, maintain and enforce information security processes.

by Prospect Certification [Claim Listing ]
APAX Assessment Private Limited Logo

ISO 27001:2022 (Information Security Management System)

ISO 27001:2022 (Information Security Management System) training is offered by APAX Assessment Private Limited. Training of Employees and Managers are absolutely essential in this changing environment & Industrial Era.

by APAX Assessment Private Limited [Claim Listing ]
ITPACTS Logo

ISO 27001

Information is an asset which like another important business asset, has a value to the organization and consequently needs to be suitably protected. Forms of information such as Paper, Disks, Verbal, Video, Audio, Optical Drives, People, etc.

by ITPACTS [Claim Listing ]
InfosecTrain Logo

ISO/IEC 27001 Foundation

ISO 27001 Foundation training course enables participants to learn about the best practices for implementing and managing an Information Security Management System (ISMS) as specified in ISO/IEC 27001:2013.

by InfosecTrain [Claim Listing ]
Sigma Tech Zone Logo

ISO 27001 Training (Advance)

ISO 27001 is an international standard information security management system on how to manage the organization’s information. It helps us to ensure the integrity of information and data leaks into hand of unintended recipients.

by Sigma Tech Zone [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy