Home ISACA CISA-Certified Information Systems Auditor

QUICK

INFORMATION

icon

4 Day(s) Course

icon

Official Courseware

icon

Exam Voucher

icon

Certified Trainer

icon

1:1 Training Available on Demand

icon

Customize Your Batch

ABOUT

THE COURSE

CISA (Certified Information Systems Auditor) is ranked among the top paying IT certifications in 2016. A product by ISACA, which carries an international standard of performance, it is the most in-demand certification opted by Cyber Security Professionals in order to advance their career in this domain.

The CISA credential validates a professional with proven ability to identify, assess, evaluate, monitor and control the enterprise systems. Considering the increasing risks and vulnerabilities in the digital era, it has become necessary to employ professionals with proven knowledge and skill set to audit and control business systems.

  • It enhances employment opportunities for the professionals.
  • This certification helps information systems auditors keep their skills current.
  • CISA certification demonstrates expertise on the ISACA products and technologies.
  • The CISA certification is helpful for professionals who require upgrading their credentials.
  • It enhances professional recognition and earning potential, as ISACA designations are globally accepted and recognized.

Domain 1: The process of auditing information systems

This domain gives an overview of the best audit practices to professionals to control and protect their enterprise information systems.

  • Management of the Audit Function
  • Risk Analysis
  • Performing an IS Audit
  • Control Self-Assessment
  • The Evolving IS Audit Process
  • ISACA IT Audit and Assurance Standards and Guidelines

Domain 2: Governance and management of IT

This module gives an overview of the IT Governance structure, organization structures and how auditors can deliver assurance of these structures to be in the right place.

  • Corporate Governance
  • IT Governance
  • Risk Management
  • Information Systems Strategy
  • Maturity and Process Improvement Models
  • IT Investment and Allocation Practices
  • Policies and Procedures
  • IS Management Practices
  • IS Organizational Structure and Responsibilities
  • IT Monitoring and Assurance Practices for Board and Senior Management
  • Auditing IT Governance Structure and Implementation
  • Business Continuity Planning

Domain 3: Information systems acquisition, development, and implementation

This domain gives an overview of the various methodologies applied by IT auditors in acquiring, developing and implementing their information systems to meet their organizational goals and strategies.

  • Business Realization
  • Project Management Structure
  • Business Application Systems
  • Project Management Practices
  • Business Application Development
  • Alternative Forms of Software Project Organization
  • Alternative Development Methods
  • Infrastructure Development/Acquisition Practices
  • System Development Tools and Productivity Aids
  • Information Systems Maintenance Practices
  • Business Process Reengineering and Process Change Projects
  • Application Controls
  • Auditing Systems Development, Acquisition, and Maintenance
  • Auditing Application Controls

Domain 4: Information systems operations, maintenance, and support

This module gives an overview of the best practices deployed by IT auditors during disruptive times, and various methodologies useful in operation, maintenance and support.

  • Information Systems Operations
  • Information Systems Hardware
  • IS Architecture and Software
  • Network Infrastructure
  • Disaster Recovery Planning

Domain 5: Protection of information assets

This module gives an overview of the access controls and security measures, policies, and standards deployed by IT auditors in order to ensure the confidentiality and availability of the information assets.

  • Importance of Information Security
  • Logical Access
  • Network Infrastructure Security
  • Auditing Network Infrastructure Security
  • Auditing Information Security Management Framework
  • Environmental Exposures and Controls
  • Physical Access Exposures and Controls
  • Mobile Computing

The CISA Certified Information Systems Auditor training course is ideal for those working with the profiles of:

  • IS/IT Auditors
  • IS/IT Consultants
  • IS/IT Audit Managers
  • Security Professionals
  • Non-IT Auditors

Required prerequisites include completion of one of the following:

  • Submission of an application for CISA Certification
  • Compliance with the Information Systems Auditing Standards
  • Adherence to the Code of Professional Ethics
  • Adherence to the Continuing Professional Education Program
  • Meeting job requirements (minimum of five years of professional IS audit, control, assurance or security work experience is required for certification with some substitution and waivers)

Name Code Fee

gorm icon

ENQUIRY FORM

What Our Trainees Say

Mercury Solutions Ltd. is rated 4.6 stars by www.facebook.com/mercurysol based on 19 reviews.