Course Name
Certified Information Systems Auditor (CISA)

Contact Hours: 40

Course Description
CISA is to Audit what CPA and CA are to Accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the CISA exam administration in June 2011. For purposes of these statements, the terms "enterprise" and "organization" or "organizational" are considered synonymous.

Enterprises demand IS audit professionals that possess the knowledge and expertise to help them identify critical issues and customize practices to support trust in and value from information systems. The skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA demonstrates proficiency and is the basis for measurement in the profession.

Please note: Course of study may be completed earlier than indicated and students retain access for one year from date of enrollment.

CISA training Objectives:
  • Goals and objectives of IT audit, its role in internal control system
  • Techniques of audit planning and audit performance, gathering of audit related information and audit evidence
  • Audit and evaluation of effectiveness of the IT internal controls system (IT function management, operation and support)
  • Fundamentals of information risk management and audit of information security

Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.

Required Book(s)
All training is delivered online; no additional purchase required.

Lesson 1

        1.1 Introduction
        1.2 Audit Process
        1.3 Auditing Standards
        1.4 Auditing Guidelines
        1.5 Cobit Model
        1.6 Audit Management
        1.7 Internal Control Classifications
        1.8 Planning
        1.9 Program
        1.10 Evidence
        1.11 Audit Control Evaluation
        1.12 C S A Control Self- Assessment

Lesson 2

        2.1 IT Governance
        2.2 Outsourcing and Governance
        2.3 IT Strategy
        2.4 Governance and Security Policies
        2.5 Organizational Compliance
        2.6 Outsourcing and Globalization
        2.7 Outsourcing
        2.8 IT Performance

Lesson 3

        3.1 System and Infrastructure
        3.2 Requirements
        3.3 Project Management Tools- Part 1
        3.4 Project Management Tools- Part 2
        3.5 Applications
        3.6 Agile Development
        3.7 Monitoring and Controlling
        3.8 Acquisition Process
        3.9 Testing Process
        3.10 Information Systems Maintenance Practices
        3.11 Data Conversion Tools

Lesson 4

        4.1 Media Disposal Process
        4.2 Post Implementation Review
        4.3 Periodic Review
        4.4 System Maintenance

Lesson 5

        5.1 IT Service Delivery and Support
        5.2 How to Evaluate Service Level Management Practices
        5.3 Operations Management
        5.4 Databases
        5.5 Structured Query Language
        5.6 Monitoring Performance
        5.7 Source Code and Performance Monitoring
        5.8 Patch Management
        5.9 Incident Management
        5.10 Hardware Component Types
        5.11 Network Component Types

Lesson 6

        6.1 I S Auditor Technical Overview
        6.2 Security Design
        6.3 Monitoring Systems
        6.4 Types of Attacks
        6.5 Cryptography
        6.6 Encryption
        6.7 Asymmetric Encryption
        6.8 Digital Certificate
        6.9 Different Kinds of Attacks
        6.10 Access Controls
        6.11 Identification and Authentication
        6.12 Physical Access Exposure
        6.13 Environmental Security
        6.14 Network Security Devices and Network Components
        6.15 Network Address Translation
        6.16 Virtual Private Networks
        6.17 Voice System Risks
        6.18 Intrusion Detection
        6.19 Firewalls
        6.20 Firewall Implementation
        6.21 Network Access Protection
        6.22 Honey Pot
        6.23 Risks to Portable and Wireless Devices
        6.24 Bluetooth
        6.25 OSI Networking
        6.26 Managing Data

Lesson 7       

        7.1 Business Continuity and Disaster Recovery
        7.2 Fault Tolerance
        7.3 Business Continuity and Disaster Recovery Regulations