ISACA Certified Information Systems Auditor – CISA




    The CISA Certified Information Systems Auditor Training Package includes expert instructor-led training modules with customized presentations and learning supplements for an all-inclusive training program that provides the benefits of classroom training at your own pace.

    The Certified Information Systems Auditor (CISA) Certification training course provides students with knowledge and skills IT Security professionals and auditors need to prepare for the CISA certification exam, including: the Information Systems Audit Process, Information Technology Governance, Systems and Infrastructure Life Cycle Management, IT Service Delivery and Support, Protection of Information Assets and Business Continuity and Disaster Recovery.

    The Certified Information Systems Auditor (CISA) program, sponsored by ISACA, has been the globally accepted standard of achievement among information systems (IS) audit, control and security professionals since 1978. As a Certified Information Systems Auditor (CISA), you’ll perform a business-critical function: assessing your organization’s IT and business systems to ensure they are monitored, controlled, and protected.


    • Overview
    • The IS Audit Process
    • Risk Analysis and Risk Management
    • ISACA Code of Conduct
    • Performing an Audit
    • IT Governance
    • ISS and The Role of Policies and Procedures
    • Risk Management
    • Information Systems Management Practices
    • Organizational Structure and Responsibility
    • Project Management
    • Systems and Infrastructure
    • Business Application Development
    • Application Controls
    • Business Tools
    • SLOC SDLC Demo
    • IT Service Delivery and Support
    • Information Systems Operations, Hardware and Software
    • Enterprise Network Architectures
    • Network Infrastructure
    • IP Addressing
    • Protection of Information Assets
    • Access, Exposures, and Security
    • Auditing the Physical Framework
    • Crypt MD5 Demo
    • Password Restrictions
    • Business Continuity and Disaster Recovery
    • Recovery Strategies
    • MinuteMan
    • IP Subnet Calculator
    • MD5sum

    Course Delivery:    Online