ISACA Certified Information Systems Auditor – CISA

Demonstrate excellence in IT systems auditing by completing the ISACA Certified Information Systems Auditor course. Designed according to the rigorous requirements of the ISACA, students can be sure of learning the theories and practical skills required to become a fully-qualified systems auditor.
Since 1978 the CISA qualification has been regarded as an industry-leading qualification for IT auditors, with holders demonstrating a proven level of competence. The ISACA Certified Systems Auditor course is best suited to:
- IT professionals responsible for audit, control and security of corporate computer and networking resources.
- Consultants tasked with documenting current business system provisions and making recommendations on how to improve monitoring, control and protection provisions.
- Junior IT security team members who would like to take their knowledge to expert level.
- Individuals who need to achieve an industry-recognised qualification to prove their competence.
Key Learning Points
Over the course of thirty modules students are introduced to core concepts of IT systems auditing, learning practical skills that can be used to document enterprise class systems and identify areas that require improvement. Learners are taken through each concept and before being given the opportunity to test their knowledge using a series of practical examples. Core concepts covered by the course include:- The information systems audit process and how it is applied in a real-world environment.
- The importance of applying information technology governance principles to maintain levels of security and availability.
- Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements.
- Codifying IT service delivery and support mechanisms and levels to ensure that systems and users remain fully productive and issues are properly prioritised.
- Identifying critical information assets and designing systems to protect each from loss, theft or unauthorised access.
- Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure.
Advantages of this course
Upon completion of the course students will not have an in-depth appreciation of IT systems auditing principles and procedures, but they will also be fully prepared to sit the associated Certified Information Systems Auditor (CISA) certification exam. The benefits the benefits of this particular course are plentiful:- A greater understanding of IT systems auditing procedures and how they are applied.
- Improved practical auditing skills that will help employees raise standards and security within their organisations.
- The skills and experience required to sit and pass the well-respected CISA certification.
- The acquisition of extremely valuable skills that will help learners secure internal promotions or new roles within the IT system auditing sector, widening employment prospects.
Units of Study
- Introduction
- Audit Process
- Auditing Standards
- Auditing Guidelines
- Cobit Model
- Audit Management
- Internal Control Classifications
- Planning
- Program
- Evidence
- Audit Control Evaluation
- CSA Control Self- Assessment
- IT Governance
- Outsourcing And Governance
- IT Strategy
- Governance And Security Policies
- Organizational Compliance
- Outsourcing And Globalization
- Outsourcing
- IT Performance
- System And Infrastructure
- Requirements
- Project Management Tools- Part1
- Project Management Tools- Part2
- Applications
- Agile Development
- Monitoring And Controlling
- Acquisition Process
- Testing Process
- Information Systems Maintenance Practices
- Data Conversion Tools
- Media Disposal Process
- Post Implementation Review
- Periodic Review
- System Maintenance
- IT Service Delivery And Support
- How To Evalutate Service Level Management Practices
- Operations Management
- Databases
- Structured Query Language
- Monitoring Performance
- Source Code And Performance Monitoring
- Patch Management
- Incident Management
- Hardware Component Types
- Network Component Types
- IS Auditor Technical Overview
- Security Design
- Types Of Attacks
- Cryptography
- Encryption
- Asymmetric Encryption
- Digital Certificate
- Different Kinds Of Attacks
- Access Controls
- Identification And Authenication
- Physical Access Exposure
- Environmental Security
- Network Security Devices And Network Components
- Network Address Translation
- Virtual Private Networks
- Voice System Risks
- Intrusion Detection
- Firewalls
- Firewall Implementation
- Network Access Protection
- Honey Pot
- Risks To Portable And Wireless Devices
- Bluetooth
- OSI Networking
- Managing Data
- Business Continuity And Disaster Recovery
- Fault Tolerance
- Business Continuity And Disaster Recovery Regulations
Curriculum
Curriculum is empty