0% found this document useful (0 votes)
76 views13 pages

CISA Certified Information Systems Auditor

This document provides information about the Certified Information Systems Auditor (CISA) certification course offered by The Knowledge Academy. It includes a high-level overview of the CISA certification, a breakdown of the course syllabus across 5 domains of information systems auditing, and contact information for the course provider.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views13 pages

CISA Certified Information Systems Auditor

This document provides information about the Certified Information Systems Auditor (CISA) certification course offered by The Knowledge Academy. It includes a high-level overview of the CISA certification, a breakdown of the course syllabus across 5 domains of information systems auditing, and contact information for the course provider.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

CISA

Certified Information
Systems Auditor
Contents
Contents 2

CISA Certified Information Systems Auditor 3

Syllabus 4

Domain 1: Information System Auditing Process 5

Domain 2: Governance and Management of IT 6

Domain 3: Information Systems Acquisition, Development


7
and Implementation

Domain 4: Information Systems Operations and Business Resilience 8

Domain 5: Protection of Information Assets 9

Our Delivery Methods 11

Our Packages 12

Contact us 13
CISA
Certified Information
Systems Auditor
 Certified Information Security Auditor (CISA) is a globally acknowledged
certification, which builds upon the previous experience of IS professionals, to
produce valuable employees who possess exceptional knowledge of
Information Systems Auditing, Control, and Security.

 The Knowledge Academy CISA instructors deliver engaging sessions, allowing


candidates to interact and discuss the content. The information provided, if
studied meticulously and efficiently, will allow candidates to pass their CISA
exam.

 During this CISA training course, you will be exposed to the Five modules of
Information Security Auditing. These modules comprise the foundations of
CISA, and you must grasp a complete understanding of these aspects to
pass the CISA exam and use their certification within the workplace.
Syllabus
The Course is Spilt into 5 easy-to-understand domains – which will improve
your skills and make you an expert of Information Systems Auditing, Control,
and Security.

Domain 1: Information System Auditing Process

Domain 2: Governance and Management of IT

Domain 3: Information Systems Acquisition, Development and Implementation

Domain 4: Information Systems Operations and Business Resilience

Domain 5: Protection of Information Assets


Domain 1

Information System Auditing Process


IS Audit Standards, Guidelines, and Codes of Ethics

Business Processes

Types of Controls

Risk-Based Audit Planning

Types of Audits and Assessments

Audit Project Management

Sampling Methodology

Audit Evidence Collection Techniques

Data Analytics

Reporting and Communication Techniques

Quality Assurance and Improvement of the Audit Process


Domain 2

Governance and Management of IT


IT Governance and IT Strategy

IT-Related Frameworks

IT Standards, Policies, and Procedures

Organisational Structure

Enterprise Architecture

Enterprise Risk Management

Maturity Models

Laws, Regulations, and Industry Standards Affecting the Organisation

IT Resource Management

IT Service Provider Acquisition and Management

IT Performance Monitoring and Reporting

Quality Assurance and Quality Management of IT


Domain 3

Information Systems Acquisition,


Development and Implementation
Project Governance and Management

Business Case and Feasibility Analysis

System Development Methodologies

Control Identification and Design

Testing Methodologies

Configuration and Release Management

System Migration, Infrastructure Deployment, and Data Conversion

Post-Implementation Review
Domain 4

Information Systems Operations and


Business Resilience
Common Technology Components Data Backup, Storage, and Restoration

IT Asset Management Business Continuity Plan

Job Scheduling and Production Process Automation Disaster Recovery Plans

System Interfaces

End User Computing

Data Governance

System Performance Management

Problem and Incident Management

Change, Configuration, Release, and Patch Management

IT Service Level Management

Database Management

Business Impact Analysis

System Resiliency
Domain 5

Protection of Information Assets


Information Asset Security Frameworks, Standards, and Guidelines

Auditing the Information Security Management Framework

Privacy Principles

Physical Access and Environmental Controls

Identity and Access Management

Network and End-Point Security

Shadow IT

Data Classification

Data Encryption and Encryption Related Techniques

Symmetric Key Cryptographic Systems

Public (Asymmetric) Key Cryptographic Systems

Applications of Cryptographic Systems

Public Key Infrastructure

Web-Based Communication Technologies


Domain 5

Protection of Information Assets


Virtualised Environments

Mobile, Wireless, and Internet of Things

Security Awareness Training and Programs

Information System Attack Methods and Techniques

Security Testing Tools and Techniques

Incident Response Management

Evidence Collection and Forensics


Our Delivery Methods

POPULAR POPULAR

Online Instructor-led Online Self-paced In-house Classroom

Join a scheduled class with a live Learn at your own pace. Our Our courses can be adapted to Some of our courses are
instructor and other delegates. expert trainers are on hand to meet your individual project or available in our classrooms. All of
Ask questions, share documents, help you with anything. business requirements. In-house our trainers are highly qualified,
interact with whiteboards, ask All of our courses come with a training gives your team a great having 10+ years of experience.
live questions and communicate standard 90 days access which opportunity to come together, We use the highest quality
with your trainer and peers. can be upgraded if need be.. bond and discuss, which may be learning facilities to make sure
Access the best pool of trainers, Our e-learning platform is limited in a standard classroom your experience is as
wherever you are. available on all devices. setting. comfortable as possible.
Our Packages
Below is the package containing multiple courses delivered as Online Instructor-led and Online self-paced

Security Certification
4 courses
Included courses

ISO 27001 Lead Auditor

CISA Certified Information


Systems Auditor

CISM Certified Information


Security Manager

CISSP Certified Information


Systems Security Professional
Contact Us

Europe North America Asia


+1 646 687 6780 +91 181 5047001
+44 1344 203 999
+1 613 800 4703 +971 800 0444 3286
+49 8005 895337
+44 1344 203 999 +966 8008110368
Oceania
+31 80000 227317 +65 800 1206314
+61 1 800 150644 +852 800 908601
+41 800 312616
+64 800 446148
+32 80077519

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy