0% found this document useful (0 votes)
50 views12 pages

CISA_Course_Content_v2

Uploaded by

Saket Khatavkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views12 pages

CISA_Course_Content_v2

Uploaded by

Saket Khatavkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

CISA

Certified Information Systems Auditor

Training & Certification

www.infosectrain.com
www.infosectrain.com I [email protected]
Introduction

The CISA is a globally reputed certification for security professionals who audit, monitor, and assess
organizations’ information systems and business operations. The certification showcases the candidate’s
auditing experience, knowledge, and skills to evaluate vulnerabilities, report on compliance, and institute
controls within the enterprise.

Organizations require audit professionals who possess the knowledge and expertise to identify critical issues
and security challenges. The skills and practices that CISA promotes and evaluates are the building blocks of
success in the field. Possessing the CISA demonstrates proficiency and is the basis for measurement in the
profession.

Why CISA at InfosecTrain

ISACA Premium Accredited


Training Partner Instructors

Telegram
Discussion Group

www.infosectrain.com I [email protected]
CISA Course Highlights

40-Hrs
Instructor-led Training

Accredited ISACA
Instructors Premium Training Partner

100% Satisfaction Guarantee


Not satisfied with your training on Day 1?
You can get a refund or enroll in a different course.

Extended Post Training


Get extended support even after you finish your training.
We’re here for you until you reach your certification goals.

www.infosectrain.com I [email protected]
Who Should Attend

IT Managers Security Managers System Analysts

Individuals willing to Professionals Auditors


learn Information working in an
Systems Auditing Audit team

CISM Exam Information

Duration 4 Hours

Number of questions 150

Question format Multiple Choice

Passing marks 450 out of 800

Exam language English, French, German, Hebrew, Italian, Japanese, Korean,


Spanish, Turkish, Chinese

www.infosectrain.com I [email protected]
Happy Learners Across the World

Saurabh Jindal Binoy Mathews Pandipurath


India Qatar
I completed my CISA course from InfosecTrain. This The CISA training that I recently completed was
training is good for building up the basics. Thanks a lot excellent. Thank you for your support throughout the
for the informative sessions. enrollment and course!

Girish Shastri Yamna Taouss


India Morocco
The training program was excellent which helped me It was an interesting training that could help me
to prepare for CISA exams in a better way and provided succeed in obtaining certificates. I am truly thankful to
clarity overall. Special kudos to our instructor for the InfosecTrain for an amazing training. Looking forward to
great course delivery. attending more sessions with InfosecTrain.

www.infosectrain.com I [email protected]
CISA Domains

• Domain 1: Information System Auditing Process


• Domain 2: Governance and Management of IT
• Domain 3: Information Systems Acquisition, Development and Implementation
• Domain 4: IS Operations and Business Resilience
• Domain 5: Information Asset Security and Control

www.infosectrain.com I [email protected]
Domain 1
Information System Auditing Process

1.1 Planning
• IS Audit Standards, Guidelines and Codes of Ethics
• Business Processes
• Types of Controls
• Risk-based Audit Planning
• Types of Audits and Assessments

1.2 Execution
• Audit Project Management
• Sampling Methodology
• Audit Evidence Collection Techniques
• Data Analytics
• Reporting and Communication Techniques
• Quality Assurance and Improvement of the Audit Process

www.infosectrain.com I [email protected]
Domain 2
Governance and Management of IT

2.1 IT Governance and IT Strategy


• IT-related Frameworks
• IT Standards, Policies and Procedures
• Organizational Structure
• Enterprise Architecture
• Enterprise Risk Management
• Maturity Models
• Laws, Regulations and Industry Standards Affecting the Organization

2.2 IT Management
• IT Resource Management
• IT Service Provider Acquisition and Management
• IT Performance Monitoring and Reporting
• Quality Assurance and Quality Management of IT

www.infosectrain.com I [email protected]
Domain 3
Information Systems Acquisition,
Development and Implementation

3.1 Information Systems Acquisition and Development

• Project Governance and Management


• Business Case and Feasibility Analysis
• System Development Methodologies
• Control Identification and Design

3.2 Information Systems Implementation


• Testing Methodologies
• Configuration and Release Management
• System Migration, Infrastructure Deployment and Data Conversion
• Post-implementation Review

www.infosectrain.com I [email protected]
Domain 4
IS Operations and Business Resilience

4.1 Information Systems Operations


Common Technology Components
• IT Asset Management
• Job Scheduling and Production Process Automation
• System Interfaces
• End-user Computing
• Data Governance
• Systems Performance Management
• Problem and Incident Management
• Change, Configuration, Release and Patch Management
• IT Service Level Manageme

4.2 Business Resilience


• Business Impact Analysis
• System Resiliency
• Data Backup, Storage and Restoration
• Business Continuity Plan
• Disaster Recovery Plans

www.infosectrain.com I [email protected]
Domain 5
Information Asset Security and
Controland Implementation
5.1 Information Asset Security Frameworks, Standards and Guidelines
Privacy Principles
• Physical Access and Environmental Controls
• Identity and Access Management
• Network and End-point Security
• Data Classification
• Data Encryption and Encryption-related Techniques
• Public Key Infrastructure
• Web-based Communication Technologies
• Virtualized Environments
• Mobile, Wireless and Internet-of-things Devices

5.2 Security Event Management


• Security Awareness Training and Programs
• Information System Attack Methods and Techniques
• Security Testing Tools and Techniques
• Security Monitoring Tools and Techniques
• Incident Response Management
• Evidence Collection and Forensics

www.infosectrain.com I [email protected]
www.infosectrain.com I [email protected]

www.infosectrain.com I [email protected]

You might also like