Certified Information Systems Auditor (CISA) Certification Prep Boot Camp

[vc_row][vc_column][vc_single_image image=”1334″ img_size=”full”][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=””][/vc_column][/vc_row][vc_row][vc_column][vc_tta_tabs color=”black” active_section=”1″][vc_tta_section title=”Objectives” tab_id=”1483223128372-63d65681-7b0f”][vc_column_text]

OVERVIEW

In this online course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization’s information systems align with overall business goals and objectives. You will evaluate the security and controls of business structure and governance methods; the policies, procedures, and guidelines used; and the overall security of the business environment. Also, this course will help you prepare for the ISACA® CISA® certification exam.

LEARNING OUTCOMES:

  • The Process of Auditing Information Systems
  • Governance and Management of IT
  • Information Systems Acquisition, Development, and Implementation
  • Information Systems Operations, Maintenance, and Support
  • Protection of Information Assets

 

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Requirements” tab_id=”1483223128406-2aeccd17-cf06″][vc_column_text]In-depth coverage of the five domains required to pass the CISA exam:

  1. The Process of Auditing Information Systems
  2. Governance and Management of IT
  3. Information Systems Acquisition, Development, and Implementation
  4. Information Systems Operations, Maintenance, and Support
  5. Protection of Information Assets

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Curriculum” tab_id=”1483223133011-d59f902f-2db8″][vc_column_text]1. The Information Systems Audit Process • ISACA Information Systems Auditing Standards and Guidelines • Develop and Implement an Information Systems Audit Strategy • Plan an Audit • Conduct an Audit • The Evidence Lifecycle • Communicate Issues, Risks, and Audit Results • Support the Implementation of Risk Management and Control Practices 2. IT Governance • Evaluate the Effectiveness of IT Governance • Evaluate the IT Organizational Structure • Evaluate the IT Strategy • Evaluate IT Policies, Standards, and Procedures for Compliance • Ensure Organizational Compliance • IT Resource Investment, Use, and Allocation Practices • Evaluate IT Contracting Strategies and Policies • Evaluate Risk Management Practices • Performance Monitoring and Assurance Practices 3. Systems and Infrastructure Lifecycle Management • Determine the Business Case for Change • Evaluate Project Management Frameworks and Governance Practices • Perform Periodic Project Reviews • Evaluate Control Mechanisms for Systems • Evaluate Development and Testing Processes • Evaluate Implementation Readiness • Evaluate a System Migration 4. Systems and Infrastructure Lifecycle Maintenance • Perform a Post-Implementation System Review • Perform Periodic System Reviews • Evaluate the Maintenance Process • Evaluate the Disposal Process 5. IT Service Delivery and Support • Evaluate Service Level Management Practices • Evaluate Operations Management • Evaluate Data Administration Practices • Evaluate the Use of Capacity and Performance Monitoring Methods • Evaluate Change, Configuration, and Release Management Practices • Evaluate Problem and Incident Management Practices • Evaluate the Functionality of the IT Infrastructure 6. Protection of Information Assets • Information Security Design • Encryption Basics • Evaluate the Design, Implementation, and Monitoring of Logical Access Controls • Evaluate the Design, Implementation, and Monitoring of Physical Access Controls • Evaluate the Design, Implementation, and Monitoring of Environmental Controls • Evaluate Network Infrastructure Security • Evaluate the Confidential Information Processes and Procedures 7. Business Continuity and Disaster Recovery • Evaluate the Adequacy of Backup and Restore • Evaluate the BCP and DRP 8. Appendix A: ISACA CISA Certification Process[/vc_column_text][/vc_tta_section][vc_tta_section title=”Who Should Apply” tab_id=”1483223134636-e36fb4c2-2d9f”][vc_column_text]IS audit, control, assurance, and security professionals, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers, who have five years of experience with audit, IT systems, and security of information systems.[/vc_column_text][/vc_tta_section][vc_tta_section title=”Participant Mix” tab_id=”1483223135860-ddc30ec1-56e8″][vc_column_text]Participants hold job functions such as IS audit, control, assurance, and security professionals, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers, who have five years of experience with audit, IT systems, and security of information systems.[/vc_column_text][/vc_tta_section][vc_tta_section title=”PDUs” tab_id=”1483223137300-c038f413-be13″][vc_column_text]Professional Development Units (PDUs) awarded for completion of this course is 40 PDUs[/vc_column_text][/vc_tta_section][vc_tta_section title=”Schedule Of Classes” tab_id=”1483223138192-da2d4daa-2825″][vc_column_text]See Schedule of All Classes For All Months in 2017:

CALENDAR/SCHEDULE OF CLASSES[/vc_column_text][/vc_tta_section][vc_tta_section title=”Apply + Purchase” tab_id=”1483223139251-6acf9480-7337″][vc_column_text]TBA[/vc_column_text][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row]