ISACA Certified Information Systems Auditor – CISA
Course
Online
Description
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Class hours
20h
-
Duration
1 Year
-
Start date
Different dates available
-
Online campus
Yes
-
Support service
Yes
-
Virtual classes
Yes
Demonstrate excellence in IT systems auditing by completing the ISACA Certified Information Systems Auditor course. Designed according to the rigorous requirements of the ISACA, students can be sure of learning the theories and practical skills required to become a fully-qualified systems auditor. Since 1978 the CISA qualification has been regarded as an industry-leading qualification for IT auditors, with holders demonstrating a proven level of competence.
With 30 modules of study, the ISACA Certified Information Systems Auditor course relies on a series of instructor led videos and self-study manuals to help students get to grips with the concepts being taught. The course is delivered online using the learning platform allowing learners to access material anyplace anytime, whenever and wherever is most convenient for them. Knowledge and understanding of each module is tested routinely throughout the course using flash cards and educational games; there are also numerous scenarios in each module that students can replicate to improve their understanding. End of unit tests and quizzes ensure learners have fully understood the concepts behind information systems auditing before moving on to the next module. Students can also discuss what they are learning using the social networking facilities, adding another valuable learning tool by which to add additional, practical knowledge.
Facilities
Location
Start date
Start date
About this course
The information systems audit process and how it is applied in a real-world environment.
The importance of applying information technology governance principles to maintain levels of security and availability.
Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements.
Codifying IT service delivery and support mechanisms and levels to ensure that systems and users remain fully productive and issues are properly prioritised.
Identifying critical information assets and designing systems to protect each from loss, theft or unauthorised access.
Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure.
IT professionals responsible for audit, control and security of corporate computer and networking resources.
Consultants tasked with documenting current business system provisions and making recommendations on how to improve monitoring, control and protection provisions.
Junior IT security team members who would like to take their knowledge to expert level.
Individuals who need to achieve an industry-recognised qualification to prove their competence.
A greater understanding of IT systems auditing procedures and how they are applied.
Improved practical auditing skills that will help employees raise standards and security within their organisations.
The skills and experience required to sit and pass the well-respected CISA certification.
The acquisition of extremely valuable skills that will help learners secure internal promotions or new roles within the IT system auditing sector, widening employment prospects.
Reviews
Subjects
- Monitoring
- Access
- Networking
- Governance
- Audit
- Systems
- IT Auditing
- Network
- Information Systems
- Auditing
- Network Training
Course programme
Lesson 1
- Introduction
- Audit Process
- Auditing Standards
- Auditing Guidelines
- Cobit Model
- Audit Management
- Internal Control Classifications
- Planning
- Program
- Evidence
- Audit Control Evaluation
- CSA Control Self- Assessment
- IT Governance
- Outsourcing And Governance
- IT Strategy
- Governance And Security Policies
- Organizational Compliance
- Outsourcing And Globalization
- Outsourcing
- IT Performance
- System And Infrastructure
- Requirements
- Project Management Tools- Part1
- Project Management Tools- Part2
- Applications
- Agile Development
- Monitoring And Controlling
- Acquisition Process
- Testing Process
- Information Systems Maintenance Practices
- Data Conversion Tools
- Media Disposal Process
- Post Implementation Review
- Periodic Review
- System Maintenance
- IT Service Delivery And Support
- How To Evalutate Service Level Management Practices
- Operations Management
- Databases
- Structured Query Language
- Monitoring Performance
- Source Code And Performance Monitoring
- Patch Management
- Incident Management
- Hardware Component Types
- Network Component Types
- IS Auditor Technical Overview
- Security Design
- Types Of Attacks
- Cryptography
- Encryption
- Asymmetric Encryption
- Digital Certificate
- Different Kinds Of Attacks
- Access Controls
- Identification And Authenication
- Physical Access Exposure
- Environmental Security
- Network Security Devices And Network Components
- Network Address Translation
- Virtual Private Networks
- Voice System Risks
- Intrusion Detection
- Firewalls
- Firewall Implementation
- Network Access Protection
- Honey Pot
- Risks To Portable And Wireless Devices
- Bluetooth
- OSI Networking
- Managing Data
- Business Continuity And Disaster Recovery
- Fault Tolerance
- Business Continuity And Disaster Recovery Regulations
ISACA Certified Information Systems Auditor – CISA