Certified Information Systems Auditor (CISA)
![](https://hourviews.com/wp-content/uploads/2021/11/cybersecurity-auditor.jpg)
![](https://hourviews.com/wp-content/uploads/2021/11/cybersecurity-auditor.jpg)
About this Course
CISA is to Audit what CPA and CA are to Accounting CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the June 2011 CISA exam administration. For purposes of these statements, the terms “enterprise” and “organization” or “organizational” are considered synonymous.
Course Outline
Lesson 1
- Introduction
- Audit Process
- Auditing Standards
- Auditing Guidelines
- Cobit Model
- Audit Management
- Internal Control Classification
- Planning
- Program
- Evidence
- Audit Control Evaluation
C S A Control Self- Assessment
Lesson 2
- IT Governance
- Outsourcing And Governance
- IT Strategy
- Governance And Security Policies
- Organizational Compliance
- Outsourcing And Globalization
- IT Performance
Lesson 3
- System And Infrastructure
- Requirements
- Project Management Tools- Part1
- Project Management Tools- Part2
- Applications
- Agile Development
- Monitoring And Controlling
- Acquisition Process
- Testing Process
- Information Systems Maintenance Practices
- Data Conversion Tools
Lesson 4
- Media Disposal Process
- Post Implementation Review
- Periodic Review
- System Maintenance
Lesson 5
- IT Service Delivery And Support
- How To Evaluate Service Level Management Practices
- Operations Management
- Databases
- Structured Query Language
- Monitoring Performance
- Source Code And Performance Monitoring
- Patch Management
- Incident Management
- Hardware Component Types
- Network Component Types
Lesson 6
- I S Auditor Technical Overview
- Security Design
- Monitoring Systems
- Types Of Attacks
- Cryptography
- Encryption
- Asymmetric Encryption
- Digital Certificate
- Different Kinds Of Attacks
- Access Controls
- Identification and Authentication
- Physical Access Exposure
- Environmental Security
- Network Security Devices And Network Components