Call Now

+92 312 0490601

Certified Information Systems Auditor (CISA)

Course Outline

Module 01: Information Systems Auditing Process

Planning
  • IS Audit Standards, Guidelines, and Codes of Ethics
  • Business Processes
  • Types of Controls
  • Risk-Based Audit Planning
  • Types of Audits and Assessments

 

Execution
  • Audit Project Management
  • Sampling Methodology
  • Audit Evidence Collection Techniques
  • Data Analytics
  • Reporting and Communication Techniques
  • Quality Assurance and Improvement of the Audit Process

 

Module 02: Governance & Management Of IT

IT Governance
  • IT Governance and IT Strategy
  • IT-Related Frameworks
  • IT Standards, Policies, and Procedures
  • Organizational Structure
  • Enterprise Architecture
  • Enterprise Risk Management
  • Maturity Models
  • Laws, Regulations, and Industry Standards affecting the Organization

 

IT Management
  • IT Resource Management
  • IT Service Provider Acquisition and Management
  • IT Performance Monitoring and Reporting
  • Quality Assurance and Quality Management of IT

 

Module 03: Information Systems Acquisition, Development & Implementation

Information Systems Acquisition and Development
  • Project Governance and Management
  • Business Case and Feasibility Analysis
  • System Development Methodologies
  • Control Identification and Design

 

Information Systems Implementation
  • Testing Methodologies
  • Configuration and Release Management
  • System Migration, Infrastructure Deployment and Data Conversion
  • Post-implementation Review

 

Module 04: Information Systems Operations & Business Resilience

Information Systems Operations
  • Common Technology Components
  • IT Asset Management
  • Job Scheduling and Production Process Automation
  • System Interfaces
  • End-User Computing
  • Data Governance
  • Systems Performance Management
  • Problem and Incident Management
  • Change, Configuration, Release, and Patch Management
  • IT Service Level Management
  • Database Management

 

Business Resilience
  • Business Impact Analysis (BIA)
  • System Resiliency
  • Data Backup, Storage, and Restoration
  • Business Continuity Plan (BCP)
  • Disaster Recovery Plans (DRP)

 

Module 05: Protection of Information Assets

Information Asset Security and Control
  • Information Asset Security Frameworks, Standards, and Guidelines
  • Privacy Principles
  • Physical Access and Environmental Controls
  • Identity and Access Management
  • Network and End-Point Security
  • Data Classification
  • Data Encryption and Encryption-Related Techniques
  • Public Key Infrastructure (PKI)
  • Web-Based Communication Techniques
  • Virtualized Environments
  • Mobile, Wireless, and Internet-of-Things (IoT) Devices

 

Security Event Management
  • Security Awareness Training and Programs
  • Information System Attack Methods and Techniques
  • Security Testing Tools and Techniques
  • Security Monitoring Tools and Techniques
  • Incident Response Management

Evidence Collection and Forensics  

About this course

$ 150

}

Duration

40hrs

Module

5

Need Help?
Get instant support from our team

Chat on WhatsApp

$ 150

}

8

Module

6