ISACA CISA

by BIT Training Claim Listing

Certified Information Systems Auditor is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organisation’s information technology and business systems.

ÂŁ2400

Contact the Institutes

Fill this form

Advertisement

BIT Training Logo

img Duration

4 Days

Course Details

Certified Information Systems Auditor is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organisation’s information technology and business systems.

CISA certification is foundational to a successful IT career. If you are an entry-level to mid-career professional, CISA can showcase your expertise and assert your ability to apply a risk-based approach to planning, executing and reporting on audit engagements. 

Gain instant credibility in your interactions with internal stakeholders, regulators, external auditors, and customers.

 

What Delegates Will Learn:

  • The course utilises the official ISACA CISA preparation course material, going through each of the 5 CISA Domains:
  • •Information System Auditing Process
  • •Governance and Management of IT
  • •Information Systems, Acquisition, Development and Implementation
  • •Information Systems Operations and Business Resilience
  • •Protection of Information Assets

 

Module Outline:

  • Domain 1 — Information System Auditing Process
  • •Plan an audit to determine whether information systems are protected, controlled, and provide value to the organisation.
  • •Conduct an audit in accordance with IS audit standards and a risk-based IS audit strategy.
  • •Communicate audit progress, findings, results and recommendations to stakeholders.
  • •Conduct audit follow-up to evaluate whether the risk has been sufficiently addressed.
  • •Evaluate IT management and monitoring of controls.
  • •Utilise data analytics tools to streamline audit processes.
  • •Provide consulting services and guidance to the organisation in order to improve the quality and control of information systems.
  • •Identify opportunities for process improvement in the organisation’s IT policies and practices.
  •  
  • Domain 2 – Governance & Management of IT
  •  
  • •Evaluate the IT strategy for alignment with the organisation’s strategies and objectives.
  • •Evaluate the effectiveness of IT governance structure and IT organizational structure.
  • •Evaluate the organisation’s management of IT policies and practices.
  • •Evaluate the organisation’s IT policies and practices for compliance with regulatory and legal requirements.
  • •Evaluate IT resource and portfolio management for alignment with the organisation’s strategies and objectives.
  • •Evaluate the organisation’s risk management policies and practices.
  • •Evaluate IT management and monitoring of controls.
  • •Evaluate the monitoring and reporting of IT key performance indicators (KPIs).
  • •Evaluate whether IT supplier selection and contract management processes align with business requirements.
  • •Evaluate whether IT service management practices align with business requirements.
  • •Conduct periodic reviews of information systems and enterprise architecture.
  • •Evaluate data governance policies and practices.
  • •Evaluate the information security program to determine its effectiveness and alignment with the organisation’s strategies and objectives.
  • •Evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices
  •  
  •  
  • Domain 3 – Information Systems Acquisition, Development, & Implementation
  • •Evaluate whether the business case for proposed changes to information systems meets business objectives.
  • •Evaluate the organisation’s project management policies and practices.
  • •Evaluate controls at all stages of the information systems development life cycle.
  • •Evaluate the readiness of information systems for implementation and migration into production.
  • •Conduct post-implementation review of systems to determine whether project deliverables, controls and requirements are met.
  • •Evaluate change, configuration, release, and patch management policies and practices.
  •  
  • Domain 4 – Information Systems Operations and Business Resilience
  • •Evaluate the organisation’s ability to continue business operations.
  • •Evaluate whether IT service management practices align with business requirements.
  • •Conduct periodic reviews of information systems and enterprise architecture.
  • •Evaluate IT operations to determine whether they are controlled effectively and continue to support the organisation’s objectives.
  • •Evaluate IT maintenance practices to determine whether they are controlled effectively and continue to support the organisation’s objectives.
  • •Evaluate database management practices.
  • •Evaluate data governance policies and practices.
  • •Evaluate problem and incident management policies and practices.
  • •Evaluate change, configuration, release, and patch management policies and practices.
  • •Evaluate end-user computing to determine whether the processes are effectively controlled.
  •  
  • Domain 5 – Protection of Information Assets
  • •Conduct audits in accordance with IS audit standards, and a risk-based IS audit strategy.
  • •Evaluate problem and incident management policies and practices.
  • •Evaluate the organisation’s information security and privacy policies and practices.
  • •Evaluate physical and environmental controls to determine whether information assets are adequately safeguarded.
  • •Evaluate logical security controls to verify the confidentiality, integrity, and availability of information.
  • •Evaluate data classification practices for alignment with the organisation’s policies and applicable external requirements.
  • Birmingham Branch

    BMet CyberHub, Matthew Boulton, Jennens Road, Birmingham
  • Liverpool Branch

    Hugh Baird CyberHub, Hugh Baird College, Balliol Rd, Liverpool

Check out more CISA courses in UK

London IT Training (LIT) Logo

Certified In Risk & Information System Control (CRISC) Training

Certified in Risk and Information System Control (CRISC) is another globally recognized certification from ISACA (Information System Audit and Control Association).

by London IT Training (LIT)
GRC Audit Logo

COBIT Foundation Training

COBIT® (Control Objectives for Information and Related Technology) is the most globally recognised framework for enterprise IT control and governance. The Foundation level qualification is an entry level certification which demonstrates fundamental knowledge of the components of COBIT.

by GRC Audit [Claim Listing ]
TSG Training Logo

Certified Information Systems Security Professional Training (CISSP)

The Official (ISC)²® Certified Information Systems Security Professional (CISSP®) training provides a comprehensive review of the knowledge required to effectively design, engineer and manage the overall security posture of an organisation.

by TSG Training [Claim Listing ]
  • Price
  • Start Date
  • Duration
Synergie Training Logo

Certified ISO 27001:2022 ISMS Internal Auditor Training Course

ISO/IEC 27001:2022 is the newest version of ISO 27001 and was published in October 2022. While not significantly different from the previous standard, ISO 27001:2022 has notable changes that include scoping, planning, operation and performance evaluation, and a revised Annex A.

by Synergie Training [Claim Listing ]
  • Price
  • Start Date
  • Duration
AMP Information Systems Ltd Logo

Specialist IT Training

At AMP, we can give you the skills and confidence to use every part of your IT infrastructure properly and efficiently. We know just how important it is that you and your staff can get the most from your systems, so we offer courses that are developed with your needs in mind.

by AMP Information Systems Ltd [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy