Certified Information Systems Auditor (CISA)

Price range: $499.00 through $2,300.00

Certified Information Systems Auditor (CISA) is one of the world’s most popular information security/information technology auditing certifications for professionals worldwide. CISA certification course is developed by ISACA and ideal for anybody looking to forge their career in the IT Security/Cybersecurity domain. This 5-day Certified Information Systems Auditor (CISA) certification course validates your auditing, control, and security skills among the best in the industry. Check out the dates below and enroll for the CISA training today!

Key Features :

  • Official ISACA CISA KIT included which gives you access to Exam Voucher, Review Manual, and QAE
  • Simulation test at the end of training to get you exam-ready
  • Learn Up-to-date CISA curriculum with interactive exercises
  • Accredited Elite training partner of ISACA
  • Cover 5 essential domains to master CISA
  • 8x higher interaction in live online classes conducted by industry experts

Skills Covered :

  • Information Systems Auditing
  • Information Systems Acquisition Development and Implementation
  • Protection of Information Assets
  • Compliance and Regulatory Knowledge
  • IT Governance and Management
  • Information Systems Operations and Business Resilience
  • Risk Management
  • Communication and Reporting
Category:

Description

Certified Information Systems Auditor (CISA)® is one of the world’s most popular information security/information technology auditing certifications for professionals worldwide.

Created Educoresolution.com

Last updated 2025-05-15

Curriculum

  • INFORMATION SYSTEMS AUDITING PROCESS – (21%)
  • Planning
  • IS Audit Standards, Guidelines, and Codes of Ethics
  • Business Processes
  • Types of Controls
  • Risk-Based Audit Planning
  • Types of Audits and Assessments

    Execution

    Audit Project Management
    Sampling Methodology
    Audit Evidence Collection Techniques
    Data Analytics

    Reporting and Communication Techniques

    Governance and Management of IT – (17%)
    IT Governance
    IT Governance and IT Strategy
    IT-Related Frameworks
    IT Standards, Policies, and Procedures
    Organizational Structure
    Enterprise Architecture
    Maturity Models
    Laws, Regulations, and Industry Standards affecting the Organization
    IT Management
    IT Resource Management
    IT Service Provider Acquisition and Management
    IT Performance Monitoring and Reporting
    Quality Assurance and Quality Management of IT
    Information Systems Acquisition, Development and Implementation – (12%)
    Information Systems Acquisition and Development
    Project Governance and Management
    Business Case and Feasibility Analysis
    System Development Methodologies
    Control Identification and Design
    Information Systems Implementation
    Testing Methodologies

    Configuration and Release Management

    System Migration, Infrastructure Deployment, and Data Conversion
    Post-implementation Review
    INFORMATION SYSTEMS OPERATIONS AND BUSINESS RESILIENCE – (23%)
    Information Systems Operations
    Common Technology Components

    IT Asset Management

    Job Scheduling and Production Process Automation
    System Interfaces

    End-User Computing

    Data Governance
    Systems Performance Management
    Problem and Incident Management
    Change, Configuration, Release, and Patch Management
    IT Service Level Management
    Database Management
    Business Resilience
    Business Impact Analysis (BIA)
    System Resiliency
    Business Impact Analysis (BIA)
    System Resiliency
    Data Backup, Storage, and Restoration
    Business Continuity Plan (BCP)
    Disaster Recovery Plans (DRP)
    Protection of Information Assets – (27%)
    Information Asset Security and Control

    Information Asset Security Frameworks, Standards, and Guidelines

    Privacy Principles

    Physical Access and Environmental Controls

    Identity and Access Management
    Network and End-Point Security

    Data Classification

    Data Encryption and Encryption-Related Techniques

    Public Key Infrastructure (PKI)

    Web-Based Communication Techniques

    Virtualized Environments

    Mobile, Wireless, and Internet-of-Things (IoT) Devices

    Security Event Management

    Security Awareness Training and Programs

    Information System Attack Methods and Techniques
    Security Testing Tools and Techniques
    Security Monitoring Tools and Techniques

    Incident Response Management

    Evidence Collection and Forensics
    Supporting Task

 

Additional information

Pricing Options

Complete Assured Package, Training, Training + Examination

Reviews

There are no reviews yet.

Be the first to review “Certified Information Systems Auditor (CISA)”

Your email address will not be published. Required fields are marked *

Related Products