Certified Information Systems Auditor (CISA)

Price
$3,250.00 USD

Duration
5 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.

Course Objectives

  • implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices.
  • evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices.
  • evaluate information systems acquisition, development, and implementation.
  • evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained.
  • define the protection policies used to promote the confidentiality, integrity, and availability of information assets.

Who Should Attend?

The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.
  • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
  • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
  • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
  • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
  • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
  • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with New Horizons, you may use a portion of your agreement to pay for this class.

If you have questions about Learning Credits, please contact your Account Manager.

Course Prerequisites

IT professionals must have 5 years or more of IS audit, control, assurance, and security experience.

Agenda

Domain 1 - Information System Auditing Process

Learning Objectives:
  • Plan an audit to determine whether information systems are protected, controlled, and provide value to the enterprise.
  • Conduct an audit following IS audit standards and a risk-based IS audit strategy.
  • Communicate audit progress, findings, results, and recommendations to stakeholders.
  • Conduct audit follow-up to evaluate whether risks have been sufficiently addressed.
  • Evaluate IT management and monitoring of controls.
  • Utilize data analytics tools to streamline audit processes.
  • Provide consulting services and guidance to the enterprise to improve the quality and control of information systems.
  • Identify opportunities for process improvement in the enterprise's IT policies and practices.
Topics:
  • IS Audit Standards, Guidelines, Functions, and Codes of Ethics
  • Types of Audits, Assessments, and Reviews
  • Risk-based Audit Planning
  • Types of Controls and Considerations
  • Audit Project Management
  • Audit Testing and Sampling Methodology
  • Audit Evidence Collection Techniques
  • Audit Data Analytics
  • Reporting and Communication Techniques
  • Quality Assurance and Improvement of Audit Process

Domain 2 – Governance and Management of IT

Learning Objectives:
  • Evaluate the IT strategy for alignment with the enterprise’s strategies and objectives.
  • Evaluate the effectiveness of IT governance structure and IT organizational structure.
  • Evaluate the enterprise’s management of IT policies and practices.
  • Evaluate the enterprise’s IT policies and practices for compliance with regulatory and legal requirements.
  • Evaluate IT resource and portfolio management for alignment with the enterprise’s strategies and objectives.
  • Evaluate the enterprise’s risk management policies and practices.
  • Evaluate IT management and monitoring of controls.
  • Evaluate the monitoring and reporting of IT key performance indicators (KPIs).
  • Evaluate whether IT supplier selection and contract management processes align with business requirements.
  • Evaluate whether IT service management practices align with business requirements.
  • Conduct periodic review of information systems and enterprise architecture. Evaluate data governance policies and practices.
  • Evaluate the information security program to determine its effectiveness and alignment with the enterprise’s strategies and objectives.
  • Evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices.
Topics
  • Laws, Regulations, and Industry Standards
  • Organizational Structure, IT Governance, and IT Strategy
  • IT Policies, Standards, Procedures, and Guidelines
  • Enterprise Architecture and Considerations
  • Enterprise Risk Management (ERM)
  • Privacy Program and Principles
  • Data Governance and Classification
  • IT Resource Management
  • IT Vendor Management
  • IT Performance Monitoring and Reporting
  • Quality Assurance and Quality Management of IT

Domain 3 – Information Systems Acquisition, Development, and Implementation

Learning Objectives:
  • Evaluate whether the business case for proposed changes to information systems meet business objectives.
  • Evaluate the enterprise's project management policies and practices.
  • Evaluate controls at all stages of the information systems development lifecycle.
  • Evaluate the readiness of information systems for implementation and migration into production.
  • Conduct post-implementation review of systems to determine whether project deliverables, controls, and requirements are met.
  • Evaluate change, configuration, release, and patch management policies and practices.
Topics:
  • Project Governance and Management
  • Business Case and Feasibility Analysis
  • System Development Methodologies
  • Control Identification and Design
  • System Readiness and Implementation Testing
  • Implementation Configuration and Release Management
  • System Migration, Infrastructure Deployment, and Data Conversion
  • Postimplementation Review

Domain 4 – Information Systems Operations and Business Resilience

Learning Objectives:
  • Evaluate the enterprise’s ability to continue business operations.
  • Evaluate whether IT service management practices align with business requirements.
  • Conduct periodic review of information systems and enterprise architecture.
  • Evaluate IT operations to determine whether they are controlled effectively and continue to support the enterprise’s objectives.
  • Evaluate IT maintenance practices to determine whether they are controlled effectively and continue to support the enterprise’s objectives.
  • Evaluate database management practices.
  • Evaluate data governance policies and practices.
  • Evaluate problem and incident management policies and practices.
  • Evaluate change, configuration, release, and patch management policies and practices.
  • Evaluate end-user computing to determine whether the processes are effectively controlled.
  • Evaluate policies and practices related to asset lifecycle management.
Topics:
  • IT Components
  • IT Asset Management
  • Job Scheduling and Production Process Automation
  • System Interfaces
  • End-user Computing and Shadow IT
  • Systems Availability and Capacity Management
  • Problem and Incident Management
  • IT Change, Configuration, and Patch Management
  • Operational Log Management
  • IT Service Level Management
  • Database Management
  • Business Impact Analysis
  • System and Operational Resilience
  • Data Backup, Storage, and Restoration
  • Business Continuity Plan
  • Disaster Recovery Plans

Domain 5 – Protection of Information Assets

Learning Objectives:
  • Conduct audit in accordance with IS audit standards and a risk-based IS audit strategy.
  • Evaluate problem and incident management policies and practices.
  • Evaluate the enterprise's information security and privacy policies and practices.
  • Evaluate physical and environmental controls to determine whether information assets are adequately safeguarded.
  • Evaluate logical security controls to verify the confidentiality, integrity, and availability of information.
  • Evaluate data classification practices for alignment with the enterprise’s policies and applicable external requirements.
  • Evaluate policies and practices related to asset lifecycle management.
  • Evaluate the information security program to determine its effectiveness and alignment with the enterprise’s strategies and objectives.
  • Perform technical security testing to identify potential threats and vulnerabilities.
  • Evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices.
Topics:
  • Information Asset Security Policies, Frameworks, Standards, and Guidelines
  • Physical and Environmental Controls
  • Identity and Access Management
  • Network and End-Point Security
  • Data Loss Prevention
  • Data Encryption
  • Public Key Infrastructure (PKI)
  • Cloud and Virtualized Environments
  • Mobile, Wireless, and Internet-of-Things Devices
  • Security Awareness Training and Programs
  • Information System Attack Methods and Techniques
  • Security Testing Tools and Techniques
  • Security Monitoring Logs, Tools, and Techniques
  • Security Incident Response Management
  • Evidence Collection and Forensics
 

Upcoming Class Dates and Times

Feb 17, 18, 19, 20, 21
8:00 AM - 4:00 PM
ENROLL $3,250.00 USD
May 19, 20, 21, 22, 23
8:00 AM - 4:00 PM
ENROLL $3,250.00 USD
 



Do You Have Additional Questions? Please Contact Us Below.

contact us contact us 
 
Contact Us about Starting Your Business Training Strategy with New Horizons