Certified Information Systems Auditor (CISA) Certification
Buffalo Dates: Please call for availability
Rochester Dates: Please call for availability
Length: 5 days
* Discounting may be available for multiple students attending from the same organization and for private training classes; contact us for more information.
Course Description: You will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business goals and objectives.
Target Student: The intended audience for this course is information systems security professionals and internal review auditors and other individuals who have an interest in aspects of information systems audit, controls, and security.
Students taking this course should have a minimum of five years of professional information systems auditing, control, or security work experience as described in the CISA job practice domain areas:
- IS Audit Process
- IT Governance
- Systems and Infrastructure Lifecycle Management
- IT Service Delivery and Support
- Protection of Information Assets
- Business Continuity and Disaster Recovery
While this course will help prepare candidates for the CISA exam, it is not the only preparation that should be used. ISACA requires that the successful CISA candidate have at least five years of professional experience; because of this, the CISA exam will draw on material and experience that is beyond the scope of any single training course, most notably covering database administration, network components and theory, software and operating systems, and hardware devices. Candidates who wish to solidify their understanding of this material might choose to take additional training in these areas if they don’t feel their professional experience is sufficient.
Upon successful completion of this course, students will be able to:
- implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices.
- evaluate an organization's structure, policies, accountability, mechanisms, and monitoring practices.
- evaluate an organization's systems and infrastructure lifecycle management practices.
- perform the post-implementation tasks needed to determine if the changes made were done correctly, meet their objectives, and are being properly maintained.
- evaluate the IT service delivery and support of an organization.
- define the protection policies used to promote the confidentiality, integrity, and availability of information assets.
- evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained.
Full Course Outline
Lesson 1: The Information Systems Audit Process
Lesson 2: IT Governance
Lesson 3: Systems and Infrastructure Lifecycle Management
Lesson 4: Systems and Infrastructure Lifecycle Maintenance
Lesson 5: IT Service Delivery and Support
Lesson 6: Protection of Information Assets
Lesson 7: Business Continuity and Disaster Recovery