Certified Information
Systems Auditor

Overview

You will evaluate organizational policies, procedures, and processes to ensure that an organization’s information systems align with its overall business goals and objectives.

Course Objective

Upon successful completion of this course, students will be able to:
• Establish and maintain a framework to provide assurance that information security
strategies are aligned with business objectives and consistent with applicable laws and
regulations.
• Identify and manage information security risks to achieve business objectives. create a program to implement the information security strategy.
• Implement an information security program.
• Oversee and direct information security activities to execute the information security
program.
• Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents

Who Should Attend

The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.

Prerequisites

Students taking this course should have a minimum of five years of professional information systems auditing, control, or security work experience as described in the CISA job practice domain areas:
• The Process of Auditing Information Systems
• Governance and Management of IT
• Information Systems Acquisition, Development, and Implementation
• Information Systems Operations, Maintenance and Support
• Protection of Information Assets

Analyzing Data with MS Excel

Training Calendar

Intake

Duration

Program Fees

Inquire further

4 Day

Contact us to find out more

Module


• ISACA Information Systems Auditing Standards and Guidelines
• Fundamental Business Processes
• Develop and Implement an Information Systems Audit Strategy
• Plan an Audit
• Conduct an Audit
• The Evidence Life Cycle
• Communicate Issues, Risks, and Audit Results
• Support the Implementation of Risk Management and Control
Practices


• Evaluate the Effectiveness of IT Governance
• Evaluate the IT Organizational Structure and HR Management
• Evaluate the IT Strategy and Direction
• Evaluate IT Policies, Standards, and Procedures
• Evaluate the Effectiveness of Quality Management Systems
• Evaluate IT Management and Monitoring of Controls
• IT Resource Investment, Use, and Allocation Practices
• Evaluate IT Contracting Strategies and Policies
• Evaluate Risk Management Practices
• Performance Monitoring and Assurance Practices
• Evaluate the Organization’s Business Continuity Plan


• Evaluate the Business Case for Change
• Evaluate Project Management Frameworks and Governance
Practices
• Development Life Cycle Management
• Perform Periodic Project Reviews
• Evaluate Control Mechanisms for Systems
• Evaluate Development and Testing Processes
• Evaluate Implementation Readiness
• Evaluate a System Migration
• Perform a Post-Implementation System Review


• Perform Periodic System Reviews
• Evaluate Service Level Management Practices
• Evaluate Third-Party Management Practices
• Evaluate Operations and End User Management Practices
• Evaluate the Maintenance Process
• Evaluate Data Administration Practices
• Evaluate the Use of Capacity and Performance Monitoring
Methods
• Evaluate Change, Configuration, and Release Management
Practices
• Evaluate Problem and Incident Management Practices
• Evaluate the Adequacy of Backup and Restore Provisions


• Information Security Design
• Encryption Basics
• Evaluate the Functionality of the IT Infrastructure
• Evaluate Network Infrastructure Security
• Evaluate the Design, Implementation, and Monitoring of Logical
Access Controls
• Risks and Controls of Virtualization
• Evaluate the Design, Implementation, and Monitoring of Data
Classification Process
• Evaluate the Design, Implementation, and Monitoring of Physical
Access Controls
• Evaluate the Design, Implementation, and Monitoring of
Environmental Controls

FAQs

Q: What is the Certified Information Systems Auditor (CISA®) course about?
The CISA® course, awarded by ISACA, equips professionals to evaluate and ensure that an organization’s information systems align with its business objectives. It focuses on auditing, control, and assurance of IT systems, covering best practices, governance, security, risk management, and compliance.

Q: Who should attend this course?
This course is designed for information systems security professionals, internal auditors, and individuals involved in auditing, controlling, monitoring, and assessing IT and business systems.

Q: What are the prerequisites for this course?
Candidates should have a minimum of five years of professional experience in information systems auditing, control, or security across CISA’s five domain areas. While the course supports exam preparation, it is not sufficient alone due to the breadth of knowledge required by ISACA.

Q: How long is the course?
The course duration is 5 days.

Q: What key topics are covered in this course?
The course is structured into five modules:
Module 1: The Process of Auditing Information Systems – Covers audit strategy, standards, planning, execution, risk communication, and risk management practices.
Module 2: IT Governance and Management – Focuses on IT governance frameworks, organizational structure, strategy, policy evaluation, risk, and performance monitoring.
Module 3: Information Systems Acquisition, Development, and Implementation – Explores project governance, system development life cycle, testing, readiness, migration, and post-implementation reviews.
Module 4: Information Systems Operations, Maintenance, and Support – Includes system reviews, third-party management, service levels, change and incident management, backup processes, and data administration.
Module 5: Protection of Information Assets – Covers security design, encryption, access controls, physical and environmental controls, and infrastructure evaluation.

Q: Will I receive a certification after completing the course?
This course helps prepare for the CISA® exam. After passing the official exam and meeting ISACA’s work experience requirements, participants can earn the globally recognized CISA® certification.

Q: What foundational IT auditing concepts will I learn in this course?
You will learn how to define, plan, and execute information systems audits in accordance with ISACA standards and best practices. This includes developing audit strategies, conducting audits, evaluating evidence, communicating findings, and supporting risk management and control practices.

Q: How does the course prepare me to align information systems with business strategy?
The course emphasizes evaluating IT governance frameworks and ensuring that information security strategies and IT initiatives support overall business objectives. You’ll explore IT organizational structures, strategic direction, policy development, and resource allocation aligned with business goals.

Q: What skills will I develop in managing IT-enabled systems and projects?
You’ll gain expertise in evaluating system acquisition and development processes, project governance, system implementation readiness, and post-implementation reviews. Skills include analyzing business cases, overseeing development life cycles, and assessing control mechanisms and system migrations.

Q: Will I learn how to manage and mitigate information security risks?
Yes, the course provides tools to identify, manage, and mitigate information security risks. You’ll learn to evaluate security designs, implement logical and physical access controls, assess network infrastructure, and manage risk through monitoring and incident response strategies.

Q: How does the course address compliance and business continuity?
You will learn to assess compliance with laws, regulations, and internal policies, and to evaluate an organization’s business continuity and disaster recovery strategies. The course emphasizes governance structures, risk assurance practices, and the ability to maintain IT services during disruptions.

Submit your interest today !

Contact us