Certified Information Systems Auditor (CISA)

Sale!

 11,844.41  15,714.63

Add to wishlist
Share

    CISA is to Audit what CPA and CA are to Accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the CISA exam administration in June 2011. For purposes of these statements, the terms “enterprise” and “organization” or “organizational” are considered synonymous.

    Course Syllabus

    Lesson 1

    1. Introduction
    2. Audit Process
    3. Auditing Standards
    4. Auditing Guidelines
    5. Cobit Model
    6. Audit Management
    7. Internal Control Classifications
    8. Planning
    9. Program
    10. Evidence
    11. Audit Control Evaluation
    12. CSA Control Self-Assessment

    Lesson 2

    1. IT Governance
    2. Governance & Security Policies
    3. Outsourcing & Governance
    4. Outsourcing & Globalization
    5. Organizational Compliance
    6. IT Strategy
    7. IT Performance

    Lesson 3

    1. System & Infrastructure
    2. Requirements
    3. Project Management Tools – Part 1
    4. Project Management Tools – Part 2
    5. Applications
    6. Agile Development
    7. Monitoring & Controlling
    8. Acquisition Process
    9. Testing Process
    10. Information Systems Maintenance Practices
    11. Data Conversion Tools

    Lesson 4

    1. Media Disposal Process
    2. Post Implementation Review
    3. Periodic Review
    4. System Maintenance

    Lesson 5

    1. IT Service Delivery and Support
    2. How to Evalutate Service Level Management Practices
    3. Operations Management
    4. Databases
    5. Structured Query Language (SQL)
    6. Monitoring Performance
    7. Source Code and Perfomance Monitoring
    8. Patch Management
    9. Incident Management
    10. Hardware Component Types
    11. Network Component Types

    Lesson 6

    1. IS Auditor Technical Overview
    2. Security Design
    3. Monitoring Systems
    4. Types of Attacks
    5. Cryptography
    6. Encryption
    7. Asymmetric Encryption
    8. Digital Certificate
    9. Different Kinds of Attacks
    10. Access Controls
    11. Identification and Authenication
    12. Physical Access Exposure
    13. Environmental Security
    14. Network Security Devices and Network Components
    15. Network Address Translation
    16. Virtual Private Networks (VPNs)
    17. Voice System Risks
    18. Intrusion Detection
    19. Firewalls
    20. Firewall Implementation
    21. Network Access Protection
    22. HoneyPot
    23. Risks to Portable and Wireless Devices
    24. Bluetooth
    25. OSI Networking
    26. Managing Data

    Lesson 7

    1. Business Continuity and Disaster Recovery
    2. Fault Tolerance
    3. Business Continuity and Disaster Recovery Regulations

    CISA is a globally recognized certification meticulously designed for the professionals responsible for monitoring, managing, and protecting an organization’s IT and business environment. The CISA certification training course validates the certification holder’s skills and expertise to assess vulnerabilities, report compliance issues, and successfully implement IT security controls for an organization.CISA is a globally recognized certification meticulously designed for the professionals responsible for monitoring, managing, and protecting an organization’s IT and business environment. The CISA certification training course validates the certification holder’s skills and expertise to assess vulnerabilities, report compliance issues, and successfully implement IT security controls for an organization.

    Reviews

    There are no reviews yet.

    Be the first to review “Certified Information Systems Auditor (CISA)”

    Your email address will not be published. Required fields are marked *