top of page

CISA Course  Training

The CISA certification is a globally recognized credential aimed at demonstrating expertise in
auditing, controlling, and assuring information systems. This certification is valuable for various
professionals.

REASONS TO CHOOSE

✔ Expert-led Training Sessions from Experienced Instructors
CISA Certified Information Systems Auditor Certificate
 Digital Delegate Pack

Certified Information Systems Auditor (CISA) Course Details

Untitled design (65).png

Certified Information Systems Auditor (CISA) Course Outline

Domain 1: Information Systems Auditing Process
Module 1: Planning

  • Introduction to IS Auditing

  • IS Audit Standards, Guidelines, and Ethical Codes

  • Business Process Overview

  • Types of Controls

  • Risk-Based Audit Planning

  • Different Types of Audits and Assessments

 

Module 2: Execution

  • Managing Audit Projects

  • Sampling Techniques in Audits

  • Methods for Collecting Audit Evidence

  • Data Analytics in Auditing

  • Reporting and Communication Strategies

  • Ensuring Quality Assurance in Audits

 

Domain 2: Governance and Management of IT
Module 3: IT Governance and IT Strategy

  • Overview of IT Governance and Strategy

  • IT-Related Frameworks

  • IT Standards, Policies, and Procedures

  • Organizational Structures

  • Enterprise Architecture and Risk Management

  • Maturity Models and Industry Regulations

 

Module 4: IT Management

  • Managing IT Resources

  • Acquiring and Managing IT Service Providers

  • Monitoring IT Performance and Reporting

  • IT Quality Assurance and Management

 

Domain 3: Information Systems Acquisition and Development
Module 5: Information Systems Acquisition and Development

  • Governance in IT Projects

  • Feasibility Analysis and Business Cases

  • System Development Methodologies

  • Control Identification and Design

 

Module 6: Information Systems Implementation

  • Testing Methodologies

  • Configuration and Release Management

  • System Migration and Infrastructure Deployment

  • Post-Implementation Review

 

Domain 4: Information Systems Operations and Business Resilience
Module 7: Information Systems Operations

  • Introduction to IS Operations

  • Common Technology Components

  • IT Asset Management

  • Job Scheduling and Automation

  • System Interfaces and End-User Computing

  • Data Governance and Performance Management

  • Change, Configuration, Release, and Patch Management

  • IT Service Level Management

  • Database Management

 

Module 8: Business Resilience

  • Business Impact Analysis

  • System Resiliency Strategies

  • Data Backup, Storage, and Recovery

  • Business Continuity and Disaster Recovery Plans

  • Developing and Auditing Business Continuity Plans

  • Incident Management in Business Continuity

 

Domain 5: Protection of Information Assets
Module 9: Information Asset Security Frameworks, Standards, and Guidelines

  • Introduction to Security Frameworks and Standards

  • Privacy Principles

  • Physical and Environmental Security Controls

  • Identity and Access Management Techniques

  • Network, Endpoint Security, and Shadow IT

  • Data Classification, Encryption, and PKI

  • Security in Virtual, Mobile, and IoT Environments

 

Module 10: Security Event Management

  • Security Awareness Programs

  • Information System Attack Techniques

  • Security Testing Tools

  • Incident Response Management

  • Evidence Collection and Forensics

Show more

bottom of page