Certified Information Systems Auditor (CISA)

In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.

Description

Course Objectives
Upon successful completion of this course, students will be able to:

  • implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices.
  •  evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices.
  • evaluate information systems acquisition, development, and implementation.
  • evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained.
  • define the protection policies used to promote the confidentiality, integrity, and availability of information assets.

Target audience

The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.

Detailed Syllabus

Agenda

1 - The Process of Auditing Information Systems

  • ISACA Information Systems Auditing Standards and Guidelines
  • Fundamental Business Processes
  • Develop and Implement an Information Systems Audit Strategy
  • Plan an Audit
  • Conduct an Audit
  • The Evidence Life Cycle
  • Communicate Issues, Risks, and Audit Results
  • Support the Implementation of Risk Management and Control Practices

2 - IT Governance and Management

  • Evaluate the Effectiveness of IT Governance
  • Evaluate the IT Organizational Structure and HR Management
  • Evaluate the IT Strategy and Direction
  • Evaluate IT Policies, Standards, and Procedures
  • Evaluate the Effectiveness of Quality Management Systems
  • Evaluate IT Management and Monitoring of Controls
  • IT Resource Investment, Use, and Allocation Practices
  • Evaluate IT Contracting Strategies and Policies
  • Evaluate Risk Management Practices
  • Performance Monitoring and Assurance Practices
  • Evaluate the Organizations Business Continuity Plan

3 - Information Systems Acquisition, Development, and Implementation

  • Evaluate the Business Case for Change
  • Evaluate Project Management Frameworks and Governance Practices
  • Development Life Cycle Management
  • Perform Periodic Project Reviews
  • Evaluate Control Mechanisms for Systems
  • Evaluate Development and Testing Processes
  • Evaluate Implementation Readiness
  • Evaluate a System Migration
  • Perform a Post-Implementation System Review

4 - Information Systems Operations, Maintenance, and Support

  • Perform Periodic System Reviews
  • Evaluate Service Level Management Practices
  • Evaluate Third-Party Management Practices
  • Evaluate Operations and End User Management Practices
  • Evaluate the Maintenance Process
  • Evaluate Data Administration Practices
  • Evaluate the Use of Capacity and Performance Monitoring Methods
  • Evaluate Change, Configuration, and Release Management Practices
  • Evaluate Problem and Incident Management Practices
  • Evaluate the Adequacy of Backup and Restore Provisions

5 - Protection of Information Assets

  • Information Security Design
  • Encryption Basics
  • Evaluate the Functionality of the IT Infrastructure
  • Evaluate Network Infrastructure Security
  • Evaluate the Design, Implementation, and Monitoring of Logical Access Controls
  • Risks and Controls of Virtualization
  • Evaluate the Design, Implementation, and Monitoring of Data Classification Process
  • Evaluate the Design, Implementation, and Monitoring of Physical Access Controls
  • Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Prerequisites

There are no prerequisites for this course.

Similar courses

With your completion of the prerequisites and necessary years of experience, you are firmly grounded in the knowledge requirements of today’s security professional. This course will expand upon your knowledge by addressing the essential elements of the 10 domains that comprise a Common Body of Knowledge (CBK)® for information systems security professionals. The course offers a job-related approach to the security process, while providing the basic skills required to prepare for CISSP certification.

More Information

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management - making it an important stepping stone of an IT security career.

More Information

The Certified Professional Ethical Hacker course is the introductory training to mile2's line of penetration testing courses and certifications.

More Information

When a business is hit by a natural disaster, cyber crime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in the vendor neutral Certified Disaster Recovery Engineer certification course.

More Information

The Certified Information Systems Security Manager certification course is designed to teach towards and certify a information systems professional high standard of excellence in following areas:

More Information

The Certified Information Systems Security Officer course is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on information security

More Information

The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting.

More Information

The mile2 Certified Security Sentinel training is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

The Certified Vulnerability Assessor course trains students to be proficient in conducting vulnerability assessments The vendor-neutral Certified Vulnerability Assessor certification course helps students understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena.

More Information

Get Certified at your own pace with these Mile 2 Cyber Security Ultimate Self-Study and Certification Bundles.Everything you need to pass 1 mile2 certification on your own time and at your own pace!

More Information

This course is designed to help candidates prepare for sitting the ISACA CISM certification examination. By taking this course and obtaining CISM certification, your experience and skills in supporting the information security needs of your organization will be validated. Securing the organization’s information is a critical business objective in today’s business environment. The information that an organization depends on to be successful can be at risk from numerous sources. By effectively managing inform

More Information