Certified Information Systems Auditor

Home  /  No Categories

Certified Information Systems Auditor

Introduction 

Certified Information Systems Auditor (CISA) is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security.

During this CISA training course, delegates will be exposed to the Five Domains of Information Security Auditing. These domains comprise the foundations of CISA and it is imperative that delegates grasp a complete understanding of these aspects in order to pass the CISA exam and use their certification within the workplace. Within each of these domains exists multiple topics, which when combined, provide a comprehensive overview of the domain of focus. Due to the breadth of information imparted with each topic over a period of just four days, this course is considered intensive and candidates must study hard to obtain the certification.

Benefit

  • It’s a Niche Market Looking for Experts.
  • Be at the Forefront of an Evolving Business World.
  • Command a High Salary.
  • Varied Growth Opportunities.
  • The Certification is Globally Recognized.

Who this course applies to: 

  • IT consultants
  • Auditors
  • IT Managers
  • Security policy writers
  • Privacy officers
  • Information security officers
  • Network administrators
  • Security device administrators
  • Security engineers who have five years of experience with audit, IT systems, and security of information systems

Learning Objectives

  • Prepare for and pass the Certified Information Systems Auditor (CISA) Exam
  • Develop and implement a risk-based IT audit strategy in compliance with IT audit standards
  • Evaluate the effectiveness of an IT governance structure
  • Ensure that the IT organisational structure and human resources (personnel) management support the organization’s strategies and objectives
  • Review the information security policies, standards, and procedures for completeness and alignment with generally accepted practises

Structure of training

Domain 1: Information Systems Audit Process:

  • Developing a risk-based IT audit strategy
  • Planning specific audits
  • Conducting audits to IS audit standards
  • Implementation of risk management and control practices

Domain 2: IT Governance and Management:

  • Effectiveness of IT Governance structure
  • IT organisational structure and human resources (personnel) management
  • Organisation’s IT policies, standards, and procedures
  • Adequacy of the Quality Management System
  • IT management and monitoring controls
  • IT resource investment
  • IT contracting strategies and policies
  • Management of organisations IT-related risks
  • Monitoring and assurance practices
  • Organisation business continuity plan

Domain 3: Information Systems Acquisition, Development, and Implementation:

  • Business case development for IS acquisition, development, maintenance, and retirement
  • Project management practices and controls
  • Conducting reviews of project management practices
  • Controls for requirements, acquisition, development, and testing phases
  • Readiness for Information Systems
  • Project Plan Reviewing
  • Post Implementation System Reviews

Domain 4: Information Systems Operations, Maintenance, and Support:

  • Conduct periodic reviews of organisations objectives
  • Service level management
  • Third party management practices
  • Operations and end-user procedures
  • Process of information systems maintenance
  • Data administration practices determine the integrity and optimisation of databases
  • Use of capacity and performance monitoring tools and techniques
  • Problem and incident management practices
  • Change, configuration, and release management practices
  • Adequacy of backup and restore provisions
  • Organisation’s disaster recovery plan in the event of a disaster

Domain 5: Protection of Information Assets:

  • Information security policies, standards and procedures
  • Design, implementing, monitoring of system and logical security controls
  • Design, implementing, monitoring of data classification processes and procedures
  • Design, implementing, monitoring of physical access and environmental controls
  • Processes and procedures to store, retrieve, transport and dispose of information assets

Additional Information 

For more information and pricing please reach out to us here or at https://www.cryptv-uk.com/contacts/ through our contacts page.

Date

Apr 27 - 29 2022
Expired!

More Info

Buy & Enrol Now
Buy & Enrol Now

Leave a Reply

Your email address will not be published. Required fields are marked *