CISA
Confirmed Information Systems Auditor (CISA) is an accreditation given by ISACA for the individuals accountable for guaranteeing that an association's IT and business frameworks are checked, overseen and ensured.
DURATION- 6 DAYS
PRE-REQUISITE
CISA confirmation requires at least 5 years of expert work involvement with data frameworks reviewing, control or security. Substitutes to work experience might be applied for a limit of 3 of the 5 required years. ISACA permits the accompanying as qualifying substitutes.
- A limit of 1 year of data frameworks experience or 1 year of non-IS reviewing experience can be substituted for 1 year of experience.
- Sixty (60) to 120 finished college semester credit hours (the likeness a 2 or 4-year degree) not constrained by the 10-year going before confinement, can be substituted for 1 or 2 years, separately, of experience.
- A single guy's or graduate degree from a college that implements the ISACA-supported Model Curricula can be substituted for 1 year of experience.
- A graduate degree in data security or data innovation from an authorize college can be substituted for 1 year of experience.
- Two years as a full-time college teacher in a related field (e.g., software engineering, bookkeeping, data frameworks inspecting) can be substituted for 1 year of experience
TARGET AUDIENCE
- Professionals working in an Audit environment.
- Auditors
- Students
- Professionals who wants to expand their knowledge in Information Systems Auditing
CERTIFICATION BODY
- ISACA
WORKSHOP OUTLINE
THE PROCESS OF AUDITING INFORMATION SYSTEMS
- Quick Reference
- Management of the IS Audit Function
- ISACA IS Audit and Assurance Standards and Guidelines
- IS Controls
- Performing An IS Audit
- Communicating Audit Results
- Control Self-assessment
- The Evolving IS Audit Process
- Case Studies
- Answers to Case Study Questions
GOVERNANCE AND MANAGEMENT OF IT
- Quick Reference
- Corporate Governance
- Governance of Enterprise IT
- Information Systems Strategy
- Maturity and Process Improvement Models
- IT Investment and Allocation Practices
- Policies and Procedures
- Risk Management
- Information Technology Management Practices
- IT Organizational Structure and Responsibilities
- Auditing IT Governance Structure and Implementation
- Business Continuity Planning
- Auditing Business Continuity
- Case Studies
- Answers to Case Study Questions
INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT AND IMPLEMENTATION
- Quick Reference
- Benefits Realization
- Project Management Structure
- Project Management Practices
- Business Application Development
- Virtualization and Cloud Computing Environments
- Business Application Systems
- Development Methods
- Infrastructure Development/Acquisition Practices
- Information Systems Maintenance Practices
- System Development Tools and Productivity Aids
- Process Improvement Practices
- Application Controls
- Auditing Application Controls
- Auditing Systems Development, Acquisition and Maintenance
- Case Studies
- Answers to Case Study Questions
INFORMATION SYSTEMS OPERATIONS, MAINTENANCE AND SERVICE MANAGEMENT
- Quick Reference
- Information Systems Operations
- IT Asset Management
- Information Systems Hardware
- IS Architecture and Software
- IS Network Infrastructure
- Auditing Infrastructure and Operations
- Disaster Recovery Planning
- Case Studies
- Answers to Case Study Questions
PROTECTION OF INFORMATION ASSETS
- Quick Reference
- Information Security Management
- Logical Access
- Network Infrastructure Security
- Auditing Information Security Management Framework
- Auditing Network Infrastructure Security
- Environmental Exposures and Controls
- Physical Access Exposures and Controls
- Mobile Computing
- Peer-to-peer Computing
- Instant Messaging
- Social Media
- Cloud Computing
- Data Leakage
- End-user Computing Security Risk and Controls
- Case Studies
- Answers to Case Study Questions