100% found this document useful (1 vote)
2K views5 pages

CISA 2024 Syllabus

Syllabus of CISA 2024

Uploaded by

rohitbanerjee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views5 pages

CISA 2024 Syllabus

Syllabus of CISA 2024

Uploaded by

rohitbanerjee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Course Syllabus

Certified Information Systems Auditor (CISA)


Instructor Name: Kelly Handerhan Course Creation Date: 4/16/2024

Course Description and Goals

Course Description: This course will prepare you to take the ISACA CISA exam. It covers
each of the 5 CISA exam domains in-depth:
● Information Systems Auditing Process
● Governance and Management of Information Technology
● Information Systems Acquisition, Development & Implementation
● Information Systems Operations and Business Resilience
● Protection of Information Assets
It will also provide guidance on what you need to do to take the ISACA exam and tips for getting
the best result on exam day.

Target Audience: The ISACA CISA certification is for those who audit, monitor, control and
assess an organization’s information systems. Geared towards audit professionals , CISA will
validate your experience and verify your ability to apply a risk-based approach to the entire audit
process.

Course Level: Intermediate

Prerequisites: CISM, CRISC, or similar experience and exposure to information assurance


processes

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
1
Course Goals: By the end of this course, learners should be able to:

❏ Understand the systems auditing process


❏ Gain the knowledge to provide assurance thoughtout the systems acquisition and
development process
❏ Ensure the organizational governance structures are in place in order to ensure
compliance with laws and regulations, as well as effectively manage risk
❏ Improve your competency in IT controls, and the understanding of how IT relates to
business.
❏ Utilize audit services to assist organizations in protecting and controlling information
systems

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
2
Course Outline

Module 1 | Domain 1 Information Systems Auditing Process


Lesson 1.1: CISA Welcome and Intro
Lesson 1.2: Introduction to IS Audit
Lesson 1.3: Information Technology Assurance Framework (ITAF)
Lesson 1.4: Audit Strategy
Lesson 1.5: Laws and Regulations
Lesson 1.6: Business Processes
Lesson 1.7: Types of Controls
Lesson 1.8: Risk-based Audit Part 1
Lesson 1.9: Risk-based Audit Part 2
Lesson 1.10: Audit Execution
Lesson 1.11: Audit Evidence Collection
Lesson 1.12: Sampling
Lesson 1.13: Communication of Results
Lesson 1.14: Additional Types of Audit

Module 2 | Governance and Management of IT


Lesson 2.1: Enterprise Risk Management
Lesson 2.2: Introduction to IT Governance
Lesson 2.3: IT Frameworks
Lesson 2.4: Frameworks Continued
Lesson 2.5: Enterprise Architecture
Lesson 2.6: Evaluation of Controls
Lesson 2.7: Evaluation Criteria
Lesson 2.8: Information Security Strategy
Lesson 2.9: Information Security Program
Lesson 2.10: Quality Control and Security Management
Lesson 2.11: Roles and Responsibilities

Module 3 | Information Systems Acquisition, Development and Implementations


Lesson 3.1: Introduction To Project Management
Lesson 3.2: Project Management Lifecycle
Lesson 3.3: Project Management Documents Throughout the Lifecycle
Lesson 3.4: Software Development Methodologies

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
3
Lesson 3.5 Hardware and Software Acquisitions
Lesson 3.6 Control Identification and Design
Lesson 3.7 Testing
Lesson 3.8 System Migration and Changeover

Module 4 | Information Systems Operations and Business Resilience


Lesson 4.1: Introduction
Lesson 4.2: Data Governance
Lesson 4.3: The Data Lifecycle
Lesson 4.4: Software and Systems and APIs
Lesson 4.5: Cloud Deployment
Lesson 4.6: Problem and Incident Management
Lesson 4.7: IS Operations
Lesson 4.8: Database Management
Lesson 4.9: Redundancy
Lesson 4.10: Business Continuity Part 1
Lesson 4.11: Components of the Plan
Lesson 4.12: Business Continuity Part 2

Module 5 | Information Asset Security and Control


Lesson 5.1: Introduction and Privacy Principles
Lesson 5.2: Physical and Environmental Controls
Lesson 5.3: Identity and Access Management
Lesson 5.4: SOCs and SLAs
Lesson 5.5: Networking Basics
Lesson 5.6: The OSI and TCP Reference Models
Lesson 5.7: OSI Layers 1 and 2
Lesson 5.8: OSI Layers 3-7 and TCP Model
Lesson 5.9: Network Devices
Lesson 5.10: NAT and PAT
Lesson 5.11: Firewalls
Lesson 5.12: Additional Security Devices Part 1
Lesson 5.13: Additional Security Devices Part 2
Lesson 5.14: Cryptography Basics
Lesson 5.15: Symmetric Cryptography
Lesson 5.16: Asymmetric Cryptography
Lesson 5.17: Hybrid Cryptography
Lesson 5.18: Integrity

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
4
Lesson 5.19: PKI and Wrap-up
Lesson 5.20: Wireless Security
Lesson 5.21: Indicators of Attacks Part 1
Lesson 5.22: Indicators of Attacks Part 2
Lesson 5.23: Indicators for Application Attacks
Lesson 5.24: Cross-Site Attacks
Lesson 5.25: Timing Attacks
Lesson 5.26: Memory Issues
Lesson 5.27: Network-Based Attacks
Lesson 5.28: Threat Actors and Vectors

Brought to you by: Develop your team with the fastest growing catalog in the
cybersecurity industry. Enterprise-grade workforce development
management, advanced training features and detailed skill gap and
competency analytics.
5

You might also like