Thumb

Management with adaptable practices

We denounce with righteous indige nation and dislike men who are so beguiled and demo realized by the charms of pleasure of the moment, so blinded by desire, that they cannot foresee the pain and trouble that are bound to ensue cannot foresee. These cases are perfectly simple and easy to distinguish. In a free hour, when our power of choice is untrammelled data structures manages data in technology.

Certified Information Systems Auditor Course Outline

The course content surrounds the pivotal Five Domains. The information imparted within each domain is as follows:

Domain 1: Information Systems Auditing Process

Module 1: Planning

  • Introduction
  • IS Audit Standards, Guidelines, and Codes of Ethics
  • Business Processes
  • Types of Controls
  • Risk-Based Audit Planning

Module 2: Execution

  • Audit Project Management
  • Sampling Methodology
  • Audit Evidence Collection Techniques
  • Data Analytics
  • Reporting and Communication Techniques
  • Quality Assurance and Improvement of the Audit Process

Domain 2: Governance and Management of IT

Module 3: IT Governance and IT Strategy

  • Introduction to IT Governance and IT Strategy
  • IT-Related Frameworks
  • IT Standards, Policies, and Procedures
  • Organisational Structure
  • Enterprise Architecture
  • Enterprise Risk Management
  • Maturity Models
  • Laws, Regulations, and Industry Standards Affecting the Organisation

Module 4: IT Management

  • IT Resource Management
  • IT Service Provider Acquisition and Management
  • IT Performance Monitoring and Reporting
  • Quality Assurance and Quality Management of IT

Domain 3: Information Systems Acquisition and Development

Module 5: Information Systems Acquisition and Development

  • Project Governance and Management
  • Business Case and Feasibility Analysis
  • System Development Methodologies
  • Control Identification and Design

Module 6: Information Systems Implementation

  • Testing Methodologies
  • Configuration and Release Management
  • System Migration, Infrastructure Deployment, and Data Conversion
  • Post-Implementation Review

Domain 4: Information Systems Operations and Business Resilience

Module 7: Information Systems Operations

  • Introduction
  • Common Technology Components
  • IT Asset Management
  • Job Scheduling and Production Process Automation
  • System Interfaces
  • End User Computing
  • Data Governance
  • System Performance Management
  • Problem and Incident Management
  • Change, Configuration, Release, and Patch Management
  • IT Service Level Management
  • Database Management

Module 8: Business Resilience

  • Business Impact Analysis
  • System Resiliency
  • Data Backup, Storage, and Restoration
  • Backup and Restoration
  • Backup Schemes
    1. Business Continuity Plan
  • IT Business Continuity Planning
  • Disasters and Other Disruptive Events
  • Business Continuity Policy
  • Business Continuity Planning Incident Management
  • Development of Business Continuity Plans
  • Other Issues in Plan Development
  • Components of a Business Continuity Plan
  • Key Decision-Making Personnel
  • Backup of Required Supplies
  • Insurance
  • Plan Testing
  • Auditing Business Continuity
    1. Disaster Recovery Plans

Domain 5: Protection of Information Assets

Module 9: Information Asset Security Frameworks, Standards, and Guidelines

  • Introduction to Asset Security Frameworks, Standards, and Guidelines
  • Auditing the Information Security Management Framework
  • Privacy Principles
  • Physical Access and Environmental Controls
  • Identity and Access Management
  • Network and End-Point Security
  • Shadow IT
  • Data Classification
  • Data Encryption and Encryption Related Techniques
  • Symmetric Key Cryptographic Systems
  • Public (Asymmetric) Key Cryptographic Systems
  • Applications of Cryptographic Systems
  • Public Key Infrastructure
  • Web-Based Communication Technologies
  • Virtualised Environments
  • Mobile, Wireless, and Internet of Things

Module 10: Security Event Management

  • Security Awareness Training and Programs
  • Information System Attack Methods and Techniques
  • Security Testing Tools and Techniques
  • Incident Response Management
  • Evidence Collection and Forensics

Who Should Attend and Prerequisites

Prerequisites

There are no formal prerequisites for attending this Certified Information System Auditor Training course.

Audience

This course is intended for anyone who wants to gain in-depth knowledge about information systems auditing, control, and security and improve their career opportunities

Certified Information Systems Auditor Course Overview

IT system auditors are the ones who ensure that IT systems are fully protected and capable of functioning accurately. The main duties of a CISA auditor are to perform an audit strategy for IS (Information Systems) that is based on risk management. Certified Information Security Auditor (CISA) is a globally recognised certification that builds upon the previous experience of IS professionals and produces valuable employees who possess exceptional knowledge of information systems auditing, control, and security. This training assists organisations in performing and analysing IT governance standards in order to meet the requirements of IT corporate governance. Pursuing this training will equip learners with the necessary competence and skills to open many doors and propel certified individuals into a high-ranking position within the enterprise.

The Knowledge Academy’s 4-day CISA Certified Information System Auditor Training course provides delegates with in-depth knowledge about the information systems audit process. During this training, they will learn about quality assurance, which is a systematic process used to determine if a product meets quality standards. They will also learn about disaster recovery plans that contain detailed instructions on how to respond to unplanned incidents. This course will be led by our highly skilled and knowledgeable trainer, who has years of experience in teaching and will help delegates get a complete understanding of this training.

Course Objectives

  • To attain knowledge of various security testing tools and techniques
  • To learn the techniques that are applicable for audit planning
  • To become familiar with web-based communication technologies
  • To understand the information system audit process and how to protect it
  • To gain an in-depth knowledge about how to use system development methodologies
  • To attain knowledge of audit and performance assessment of internal control systems

At the end of this training, delegates will be able to audit the information security management framework effectively and efficiently. They will also be able to do data encryption using various encryption-related techniques.

What’s Included in this CISA Training Course?

  • The Knowledge Academy’s Certified Information Systems Auditor Manual
  • Experienced CISA Instructor
  • Certificate on Completion
  • Refreshments

EU GDPR Practitioner Exam Information

The GDPR Practitioner exam assesses a candidate’s knowledge of compliance mechanisms, cloud and third-party processing, the stipulations of the GDPR, Data Protection Impact Assessments, security breaches, and the expectations of GDPR-mandated roles. The exam consists of:

  • Type: Multiple choice questions
  • Duration: 1 hour 30 minutes
  • Pass mark: 55%
  • Open Book: Yes
4