Course Syllabus
Certified Information Systems Auditor (CISA)
Instructor Name: Kelly Handerhan Course Creation Date: 4/16/2024
Course Description and Goals
Course Description: This course will prepare you to take the ISACA CISA exam. It covers
each of the 5 CISA exam domains in-depth:
● Information Systems Auditing Process
● Governance and Management of Information Technology
● Information Systems Acquisition, Development & Implementation
● Information Systems Operations and Business Resilience
● Protection of Information Assets
It will also provide guidance on what you need to do to take the ISACA exam and tips for getting
the best result on exam day.
Target Audience: The ISACA CISA certification is for those who audit, monitor, control and
assess an organization’s information systems. Geared towards audit professionals , CISA will
validate your experience and verify your ability to apply a risk-based approach to the entire audit
process.
Course Level: Intermediate
Prerequisites: CISM, CRISC, or similar experience and exposure to information assurance
processes
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Course Goals: By the end of this course, learners should be able to:
❏ Understand the systems auditing process
❏ Gain the knowledge to provide assurance thoughtout the systems acquisition and
development process
❏ Ensure the organizational governance structures are in place in order to ensure
compliance with laws and regulations, as well as effectively manage risk
❏ Improve your competency in IT controls, and the understanding of how IT relates to
business.
❏ Utilize audit services to assist organizations in protecting and controlling information
systems
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Course Outline
Module 1 | Domain 1 Information Systems Auditing Process
Lesson 1.1: CISA Welcome and Intro
Lesson 1.2: Introduction to IS Audit
Lesson 1.3: Information Technology Assurance Framework (ITAF)
Lesson 1.4: Audit Strategy
Lesson 1.5: Laws and Regulations
Lesson 1.6: Business Processes
Lesson 1.7: Types of Controls
Lesson 1.8: Risk-based Audit Part 1
Lesson 1.9: Risk-based Audit Part 2
Lesson 1.10: Audit Execution
Lesson 1.11: Audit Evidence Collection
Lesson 1.12: Sampling
Lesson 1.13: Communication of Results
Lesson 1.14: Additional Types of Audit
Module 2 | Governance and Management of IT
Lesson 2.1: Enterprise Risk Management
Lesson 2.2: Introduction to IT Governance
Lesson 2.3: IT Frameworks
Lesson 2.4: Frameworks Continued
Lesson 2.5: Enterprise Architecture
Lesson 2.6: Evaluation of Controls
Lesson 2.7: Evaluation Criteria
Lesson 2.8: Information Security Strategy
Lesson 2.9: Information Security Program
Lesson 2.10: Quality Control and Security Management
Lesson 2.11: Roles and Responsibilities
Module 3 | Information Systems Acquisition, Development and Implementations
Lesson 3.1: Introduction To Project Management
Lesson 3.2: Project Management Lifecycle
Lesson 3.3: Project Management Documents Throughout the Lifecycle
Lesson 3.4: Software Development Methodologies
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Lesson 3.5 Hardware and Software Acquisitions
Lesson 3.6 Control Identification and Design
Lesson 3.7 Testing
Lesson 3.8 System Migration and Changeover
Module 4 | Information Systems Operations and Business Resilience
Lesson 4.1: Introduction
Lesson 4.2: Data Governance
Lesson 4.3: The Data Lifecycle
Lesson 4.4: Software and Systems and APIs
Lesson 4.5: Cloud Deployment
Lesson 4.6: Problem and Incident Management
Lesson 4.7: IS Operations
Lesson 4.8: Database Management
Lesson 4.9: Redundancy
Lesson 4.10: Business Continuity Part 1
Lesson 4.11: Components of the Plan
Lesson 4.12: Business Continuity Part 2
Module 5 | Information Asset Security and Control
Lesson 5.1: Introduction and Privacy Principles
Lesson 5.2: Physical and Environmental Controls
Lesson 5.3: Identity and Access Management
Lesson 5.4: SOCs and SLAs
Lesson 5.5: Networking Basics
Lesson 5.6: The OSI and TCP Reference Models
Lesson 5.7: OSI Layers 1 and 2
Lesson 5.8: OSI Layers 3-7 and TCP Model
Lesson 5.9: Network Devices
Lesson 5.10: NAT and PAT
Lesson 5.11: Firewalls
Lesson 5.12: Additional Security Devices Part 1
Lesson 5.13: Additional Security Devices Part 2
Lesson 5.14: Cryptography Basics
Lesson 5.15: Symmetric Cryptography
Lesson 5.16: Asymmetric Cryptography
Lesson 5.17: Hybrid Cryptography
Lesson 5.18: Integrity
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
Lesson 5.19: PKI and Wrap-up
Lesson 5.20: Wireless Security
Lesson 5.21: Indicators of Attacks Part 1
Lesson 5.22: Indicators of Attacks Part 2
Lesson 5.23: Indicators for Application Attacks
Lesson 5.24: Cross-Site Attacks
Lesson 5.25: Timing Attacks
Lesson 5.26: Memory Issues
Lesson 5.27: Network-Based Attacks
Lesson 5.28: Threat Actors and Vectors
Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5