Course name:
Certified Information Systems Auditor (CISA)
Description:
ISA is to Audit what CPA and CA are to Accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.
Duration:
40 Hours
Audience:
Information Security Professionals, Auditors
Prerequisites:
Information Security
Course outline:
<p>Our CISA Certified Information Systems Auditor course provides the student with the knowledge and proficiency to prepare for the globally recognized CISA certification exam.</p> <p>With a growing demand for professionals possessing IS audit, control and security skills, CISA has become the preferred certification program by individuals and organizations around the world. Many enterprises and government agencies increasingly recognize, require, and expect their IS and IT professionals to hold this certification. This course helps professionals gain the knowledge and skills to effectively leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls, and deliver value to their business.</p> <p>CISA is to Audit what CPA and CA are to accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the CISA exam administration in June 2011. For purposes of these statements, the terms "enterprise" and "organization" or "organizational" are considered synonymous.</p> <p>Learning Objective</p> <p>Students will learn to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. It will prepare the students to pass the exam.</p> <p>Outline</p> <p>Lesson 1</p> <p>1.1 Introduction</p> <p>1.2 Audit Process</p> <p>1.3 Auditing Standards</p> <p>1.4 Auditing Guidelines</p> <p>1.5 Cobit Model</p> <p>1.6 Audit Management</p> <p>1.7 Internal Control Classifications</p> <p>1.8 Planning</p> <p>1.9 Program</p> <p>1.10 Evidence</p> <p>1.11 Audit Control Evaluation</p> <p>1.12 C S A Control Self- Assessment</p> <p>&nbsp;</p> <p>Lesson 2</p> <p>2.1 IT Governance</p> <p>2.2 Outsourcing And Governance</p> <p>2.3 IT Strategy</p> <p>2.4 Governance And Security Policies</p> <p>2.5 Organizational Compliance</p> <p>2.6 Outsourcing And Globalization</p> <p>2.7 Outsourcing</p> <p>2.8 IT Performance</p> <p>&nbsp;</p> <p>Lesson 3</p> <p>3.1 System And Infrastructure</p> <p>3.2 Requirements</p> <p>3.3 Project Management Tools- Part 1</p> <p>3.4 Project Management Tools- Part 2</p> <p>3.5 Applications</p> <p>3.6 Agile Development</p> <p>3.7 Monitoring And Controlling</p> <p>3.8 Acquisition Process</p> <p>3.9 Testing Process</p> <p>3.10 Information Systems Maintenance Practices</p> <p>3.11 Data Conversion Tools</p> <p>&nbsp;</p> <p>Lesson 4</p> <p>4.1 Media Disposal Process</p> <p>4.2 Post Implementation Review</p> <p>4.3 Periodic Review</p> <p>4.4 System Maintenance</p> <p>Lesson 5</p> <p>5.1 IT Service Delivery And Support</p> <p>5.2 How To Evalutate Service Level Management Practices</p> <p>5.3 Operations Management</p> <p>5.4 Databases</p> <p>5.5 Structured Query Language</p> <p>5.6 Monitoring Performance</p> <p>5.7 Source Code And Performance Monitoring</p> <p>5.8 Patch Management</p> <p>5.9 Incident Management</p> <p>5.10 Hardware Component Types</p> <p>5.11 Network Component Types</p> <p>&nbsp;</p> <p>Lesson 6</p> <p>6.1 I S Auditor Technical Overview</p> <p>6.2 Security Design</p> <p>6.3 Monitoring Systems</p> <p>6.4 Types Of Attacks</p> <p>6.5 Cryptography</p> <p>6.6 Encryption</p> <p>6.7 Asymmetric Encryption</p> <p>6.8 Digital Certificate</p> <p>6.9 Different Kinds Of Attacks</p> <p>6.10 Access Controls</p> <p>6.11 Identification And Authenication</p> <p>6.12 Physical Access Exposure</p> <p>6.13 Environmental Security</p> <p>6.14 Network Security Devices And Network Components</p> <p>6.15 Network Address Translation</p> <p>6.16 Virtual Private Networks</p> <p>6.17 Voice System Risks</p> <p>6.18 Intrusion Detection</p> <p>6.19 Firewalls</p> <p>6.20 Firewall Implementation</p> <p>6.21 Network Access Protection</p> <p>6.22 Honey Pot</p> <p>6.23 Risks To Portable And Wireless Devices</p> <p>6.24 Bluetooth</p> <p>6.25 OSI Networking</p> <p>6.26 Managing Data</p> <p>&nbsp;</p> <p>Lesson 7</p> <p>7.1 Business Continuity And Disaster Recovery</p> <p>7.2 Fault Tolerance</p> <p>7.3 Business Continuity And Disaster Recovery Regulations</p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.