(CISA) CISA Certified Information Systems Auditor
3495 €

Started on 1 January 1970 5 days
3495 €

The Certified Information Systems Auditor (CISA) course is a globally recognized certification for professionals in IS audit, control, and security. It equips learners to assess and manage information systems effectively, enhancing governance, risk management, and data protection. The program covers five key domains: audit processes, IT governance, system acquisition and development, operations and resilience, and information asset protection. Completing CISA…

The Certified Information Systems Auditor (CISA) course is a globally recognized certification for professionals in IS audit, control, and security. It equips learners to assess and manage information systems effectively, enhancing governance, risk management, and data protection. The program covers five key domains: audit processes, IT governance, system acquisition and development, operations and resilience, and information asset protection. Completing CISA significantly boosts credibility and career prospects in information systems auditing.

Audience 

The CISA course equips IT professionals with skills to manage and protect information systems in organizations.

 PROGRAMME

PART 1 Information Systems Auditing Process

Planning

IS Audit Standards, Guidelines, and Codes of Ethics

Business Processes

Types of Controls

Risk-Based Audit Planning

Types of Audits and Assessments

Execution

Audit Project Management

Sampling Methodology

Audit Evidence Collection Techniques

Data Analytics

Reporting and Communication Techniques

PART 2 Governance and Management of IT

Part 2 confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.

 IT Governance

IT Governance and IT Strategy

IT-Related Frameworks

IT Standards, Policies, and Procedures

Organizational Structure

Enterprise Architecture

Enterprise Risk Management

Maturity Models

Laws, Regulations, and Industry Standards affecting the Organization

IT Management

IT Resource Management

IT Service Provider Acquisition and Management

IT Performance Monitoring and Reporting

Quality Assurance and Quality Management of IT

 PART 3 Information Systems Acquisition, Development and Implementation

 Information Systems Acquisition and Development

Project Governance and Management

Business Case and Feasibility Analysis

System Development Methodologies

Control Identification and Design

Information Systems Implementation

Testing Methodologies

Configuration and Release Management

System Migration, Infrastructure Deployment, and Data Conversion

Post-implementation Review

 4 Information Systems Operations and Business Resilience

 Part 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

Information Systems Operations

Common Technology Components

IT Asset Management

Job Scheduling and Production Process Automation

System Interfaces

End-User Computing

Data Governance

Systems Performance Management

Problem and Incident Management

Change, Configuration, Release, and Patch Management

IT Service Level Management

Database Management

Business Resilience

Business Impact Analysis (BIA)

System Resiliency

Data Backup, Storage, and Restoration

Business Continuity Plan (BCP)

Disaster Recovery Plans (DRP)

PART 5 Protection of Information Assets

Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within part 5.

Information Asset Security and Control

Information Asset Security Frameworks, Standards, and Guidelines

Privacy Principles

Physical Access and Environmental Controls

Identity and Access Management

Network and End-Point Security Data Classification

Data Encryption and Encryption-Related Techniques

Public Key Infrastructure (PKI)

Web-Based Communication Techniques

Virtualized Environments

Mobile, Wireless, and Internet-of-Things (IoT) Devices

Security Event Management

Security Awareness Training and Programs

Information System Attack Methods and Techniques

Security Testing Tools and Techniques

Security Monitoring Tools and Techniques

Incident Response Management

Evidence Collection and Forensics