Description
Certified Information Systems Auditor (CISA)® is one of the world’s most popular information security/information technology auditing certifications for professionals worldwide.
Created Educoresolution.com
Last updated 2025-05-15
Curriculum
- INFORMATION SYSTEMS AUDITING PROCESS – (21%)
- Planning
- IS Audit Standards, Guidelines, and Codes of Ethics
- Business Processes
- Types of Controls
- Risk-Based Audit Planning
-
Types of Audits and Assessments
Execution
Audit Project ManagementSampling MethodologyAudit Evidence Collection TechniquesData AnalyticsReporting and Communication Techniques
Governance and Management of IT – (17%)IT GovernanceIT Governance and IT StrategyIT-Related FrameworksIT Standards, Policies, and ProceduresOrganizational StructureEnterprise ArchitectureMaturity ModelsLaws, Regulations, and Industry Standards affecting the OrganizationIT ManagementIT Resource ManagementIT Service Provider Acquisition and ManagementIT Performance Monitoring and ReportingQuality Assurance and Quality Management of ITInformation Systems Acquisition, Development and Implementation – (12%)Information Systems Acquisition and DevelopmentProject Governance and ManagementBusiness Case and Feasibility AnalysisSystem Development MethodologiesControl Identification and DesignInformation Systems ImplementationTesting MethodologiesConfiguration and Release Management
System Migration, Infrastructure Deployment, and Data ConversionPost-implementation ReviewINFORMATION SYSTEMS OPERATIONS AND BUSINESS RESILIENCE – (23%)Information Systems OperationsCommon Technology ComponentsIT Asset Management
Job Scheduling and Production Process AutomationSystem InterfacesEnd-User Computing
Data GovernanceSystems Performance ManagementProblem and Incident ManagementChange, Configuration, Release, and Patch ManagementIT Service Level ManagementDatabase ManagementBusiness ResilienceBusiness Impact Analysis (BIA)System ResiliencyBusiness Impact Analysis (BIA)System ResiliencyData Backup, Storage, and RestorationBusiness Continuity Plan (BCP)Disaster Recovery Plans (DRP)Protection of Information Assets – (27%)Information Asset Security and ControlInformation Asset Security Frameworks, Standards, and Guidelines
Privacy Principles
Physical Access and Environmental Controls
Identity and Access ManagementNetwork and End-Point SecurityData Classification
Data Encryption and Encryption-Related Techniques
Public Key Infrastructure (PKI)
Web-Based Communication Techniques
Virtualized Environments
Mobile, Wireless, and Internet-of-Things (IoT) Devices
Security Event Management
Security Awareness Training and Programs
Information System Attack Methods and TechniquesSecurity Testing Tools and TechniquesSecurity Monitoring Tools and TechniquesIncident Response Management
Evidence Collection and ForensicsSupporting Task






Reviews
There are no reviews yet.