Certified Information Systems Auditor
- Offered byISACA
Certified Information Systems Auditor at ISACA Overview
Mode of learning | Online |
Credential | Certificate |
Certified Information Systems Auditor at ISACA Highlights
- Earn a certificate after completion
Certified Information Systems Auditor at ISACA Course details
- Information Systems Acquisition, Development & Implementation
- Information Systems Auditing Process
- Protection of Information Assets
- Governance and Management of Information Technology
- Information Systems Operations and Business Resilience
- Certified Information Systems Auditor® (CISA®) is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s IT and business systems
- If you are a mid-career professional, CISA can showcase your expertise and assert your ability to apply a risk-based approach to planning, executing and reporting on audit engagements
Certified Information Systems Auditor at ISACA Curriculum
INFORMATION SYSTEMS AUDITING PROCESS
IS Audit Standards, Guidelines, and Codes of Ethics
Business Processes
Types of Controls
Audit Project Management
Sampling Methodology
Audit Evidence Collection Techniques
Data Analytics
GOVERNANCE & MANAGEMENT OF IT
IT Governance and IT Strategy
IT-Related Frameworks
IT Standards, Policies, and Procedures
Organizational Structure
IT Resource Management
IT Service Provider Acquisition and Management
INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT & IMPLEMENTATION
Project Governance and Management
Business Case and Feasibility Analysis
System Development Methodologies
Testing Methodologies
Configuration and Release Management
System Migration, Infrastructure Deployment and Data Conversion
INFORMATION SYSTEMS OPERATIONS & BUSINESS RESILIENCE
Common Technology Components
IT Asset Management
Job Scheduling and Production Process Automation
System Interfaces
End-User Computing
Business Impact Analysis (BIA)
System Resiliency
Data Backup, Storage, and Restoration
PROTECTION OF INFORMATION ASSETS
Information Asset Security Frameworks, Standards, and Guidelines
Privacy Principles
Physical Access and Environmental Controls
Identity and Access Management
Security Awareness Training and Programs
Information System Attack Methods and Techniques
Security Testing Tools and Techniques
Security Monitoring Tools and Techniques