CISA-Certified Information Systems Auditor Course



CISA (Certified Information Systems Auditor) is a highly sought-after certification by ISACA, which carries an international standard of performance, it is the most in-demand certification opted by Cyber Security and Security Audit professionals to advance their career in this domain.

Overview

CISA Training course assists in attaining information systems and audit professionals to keep their skills updated and relevant. In addition, CISA Certification adds value to your profile and increases earning potential as ISACA is an industry recognized and globally renowned credential which increases your earning potential.

February-March 2023

Course Name Batch Date Location Time
AWS Certified Solutions Architect - Associate Feb 11, Feb 12, Feb 18, Feb 19, Feb 25, Feb 26, Mar 04, Mar 05, 2023 Online 7:00 pm-11:00 pm [EST] Enroll Now

About CISA Course

The CISA is a globally recognized certification for IS audit control, assurance and security professionals. A CISA certification is a highly respected certification in the field of IT and to secure a certificate one must pass the CISA examination.

CISA Course Content

Domain 1: The process of auditing information systems

  • This domain gives an overview of the best audit practices to professionals to control and protect their enterprise information systems.
  • Management of the Audit Function
  • Risk Analysis
  • Performing an IS Audit
  • Control Self-Assessment
  • The Evolving IS Audit Process
  • ISACA IT Audit and Assurance Standards and Guidelines

Domain 2: Governance and management of IT

  • This module gives an overview of the IT Governance structure, organization structures and how auditors can deliver assurance of these structures to be in the right place.
  • Corporate Governance
  • IT Governance
  • Risk Management
  • Information Systems Strategy
  • Maturity and Process Improvement Models
  • IT Investment and Allocation Practices
  • Policies and Procedures
  • IS Management Practices
  • IS Organizational Structure and Responsibilities
  • IT Monitoring and Assurance Practices for Board and Senior Management
  • Auditing IT Governance Structure and Implementation
  • Business Continuity Planning
  • Domain 3: Information systems acquisition, development, and implementation

    This domain gives an overview of the various methodologies applied by IT auditors in acquiring, developing and implementing their information systems to meet their organizational goals and strategies.

    • Business Realization
    • Project Management Structure
    • Business Application Systems
    • Project Management Practices
    • Business Application Development
    • Alternative Forms of Software Project Organization
    • Alternative Development Methods
    • Infrastructure Development/Acquisition Practices
    • System Development Tools and Productivity Aids
    • Information Systems Maintenance Practices
    • Business Process Reengineering and Process Change Projects
    • Application Controls
    • Auditing Systems Development, Acquisition, and Maintenance
    • Auditing Application Controls

    Domain 4: Information systems operations, maintenance, and support

    This module gives an overview of the best practices deployed by IT auditors during disruptive times, and various methodologies useful in operation, maintenance and support.

    • Information Systems Operations
    • Information Systems Hardware
    • IS Architecture and Software
    • Network Infrastructure
    • Disaster Recovery Planning

    Domain 5: Protection of information assets

    This module gives an overview of the access controls and security measures, policies, and standards deployed by IT auditors in order to ensure the confidentiality and availability of the information assets.

    • Importance of Information Security
    • Logical Access
    • Network Infrastructure Security
    • Auditing Network Infrastructure Security
    • Auditing Information Security Management Framework
    • Environmental Exposures and Controls
    • Physical Access Exposures and Controls
    • Mobile Computing