Certified Information Systems Auditor (CISA® ) Certification Training
Available Live In-Person or Live Online
"He provided good examples relative to the questions being studied and facilitated well by incorporating the input/experience of the class members."
ISACA®'s CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. In this course attendees will evaluate organizational policies, procedures, and processes to ensure that an organization's information systems align with its overall business goals and objectives.
To be eligible for the CISA credential, you must have five (5) or more years of experience in IS audit, control, assurance, or security. Waivers are available for a maximum of three (3) years. Check the ISACA CISA page for more information.
OVERVIEW and OBjectives
- Implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices.
- Evaluate an organization's structure, policies, accountability, mechanisms, and monitoring practices.
- Evaluate information systems acquisition, development, and implementation.
- Evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained.
- Define the protection policies used to promote the confidentiality, integrity, and availability of information assets.
Lesson 1: The Process of Auditing Information Systems
- Topic 1A: ISACA Information Systems Auditing Standards and Guidelines
- Topic 1B: Fundamental Business Processes
- Topic 1C: Develop and Implement an Information Systems Audit Strategy
- Topic 1D: Plan an Audit
- Topic 1E: Conduct an Audit
- Topic 1F: The Evidence Life Cycle
- Topic 1G: Communicate Issues, Risks, and Audit Results
- Topic 1H: Support the Implementation of Risk Management and Control Practices
Lesson 2: IT Governance and Management
- Topic 2A: Evaluate the Effectiveness of IT Governance
- Topic 2B: Evaluate the IT Organizational Structure and HR Management
- Topic 2C: Evaluate the IT Strategy and Direction
- Topic 2D: Evaluate IT Policies, Standards, and Procedures
- Topic 2E: Evaluate the Effectiveness of Quality Management Systems
- Topic 2F: Evaluate IT Management and Monitoring of Controls
- Topic 2G: IT Resource Investment, Use, and Allocation Practices
- Topic 2H: Evaluate IT Contracting Strategies and Policies
- Topic 2I: Evaluate Risk Management Practices
- Topic 2J: Performance Monitoring and Assurance Practices
- Topic 2K: Evaluate the Organization's Business Continuity Plan
Lesson 3: Information Systems Acquisition, Development, and Implementation
- Topic 3A: Evaluate the Business Case for Change
- Topic 3B: Evaluate Project Management Frameworks and Governance Practices
- Topic 3C: Development Life Cycle Management
- Topic 3D: Perform Periodic Project Reviews
- Topic 3E: Evaluate Control Mechanisms for Systems
- Topic 3F: Evaluate Development and Testing Processes
- Topic 3G: Evaluate Implementation Readiness
- Topic 3H: Evaluate a System Migration
- Topic 3I: Perform a Post-Implementation System Review
Lesson 4: Information Systems Operations, Maintenance, and Support
- Topic 4A: Perform Periodic System Reviews
- Topic 4B: Evaluate Service Level Management Practices
- Topic 4C: Evaluate Third-Party Management Practices
- Topic 4D: Evaluate Operations and End User Management Practices
- Topic 4E: Evaluate the Maintenance Process
- Topic 4F: Evaluate Data Administration Practices
- Topic 4G: Evaluate the Use of Capacity and Performance Monitoring Methods
- Topic 4H: Evaluate Change, Configuration, and Release Management Practices
- Topic 4I: Evaluate Problem and Incident Management Practices
- Topic 4J: Evaluate the Adequacy of Backup and Restore Provisions
Lesson 5: Protection of Information Assets
- Topic 5A: Information Security Design
- Topic 5B: Encryption Basics
- Topic 5C: Evaluate the Functionality of the IT Infrastructure
- Topic 5D: Evaluate Network Infrastructure Security
- Topic 5E: Evaluate the Design, Implementation, and Monitoring of Logical Access Controls
- Topic 5F: Risks and Controls of Virtualization
- Topic 5G: Evaluate the Design, Implementation, and Monitoring of Data Classification Process
- Topic 5H: Evaluate the Design, Implementation, and Monitoring of Physical Access Controls
- Topic 5I: Evaluate the Design, Implementation, and Monitoring of Environmental Controls
- The CISA Exam is now (finally!) a computer-based exam, offered 3 "testing windows" a year.
- The Exam is 150 questions. You have 4 hours to complete the exam.
- ISACA 2017 Exam Testing Windows:
Our public courses are offered less than 20 minutes from downtown St. Louis at our partner, TechGuard Security's office, located outside of Scott Air Force Base.
703 Seibert Rd, Suite 2
Scott Air Force Base, Illinois 62225
We also offer private onsite courses, at your location. We love to travel and will gladly send a trainer to your location. Please Contact Us for more information.
Live, Instructor-Led Training with a dynamic CISA certified trainer that is a cyber security professional. Instructors have real-world audit experience with the material covered in the CISA course.
This course is delivered in a "hybrid" format, where we have both In-Person and Live Online attendees. This provides a fun, interactive environment where In-Person and Live Online students can easily interact both with each other and the instructor. When you register for the course, you can choose which delivery option works best for you:
- Live In-Person
- Live Online
Check out our Training Voucher Program.