CISA by ISACA is a globally recognized certification for IS audit control, assurance and security professionals offered by Infosavvy. It is the gold standard for IS/IT certifications and are also renowned as a prestigious, lifelong symbol of knowledge and expertise.
Having a CISA, your credentials, knowledge and capabilities are clearly understood by potential employee and fellow professionals alike. Professionals with work experience in information systems auditing, control or security that include:
CISA stands for Certified Information Systems Auditor . This is an independent information systems auditing certification governed by the Information Systems Audit and Control Association (ISACA). The CISA certification is for those in the IT industry who audit, control, monitor and assess IT and business systems. This is a comprehensive course that covers auditing process in-depth and ensure individuals develop proper working knowledge of five domains of CISA. CISA is even a prerequisite for information systems and information technology roles. CISA has become world-renowned as the standard of achievement for those who assess an organization’s information technology and business systems and provide assurance on their availability and sustainability. IS Audit refers to audit of systems (especially computer based) which provide information (like Accounts, Payroll, MIS etc.) to assure management that the information generated from these systems are reliable.
It includes:
Test of application controls
Drafting/implementing of information security policy
Drafting/implementing of Business Continuity Policies
Audit of physical and environmental controls etc.
1. THE PROCESS OF AUDITING INFORMATION SYSTEMS
ISACA IT Audit and Assurance Standards,
Guidelines and Tools and Techniques
Risk assessment in an audit context
Control Objectives related to information
systems
Audit planning and management techniques
Gathering information and preserving
evidence
Reporting and communication techniques
Control Objectives and IS-Related Controls
Risk Assessment in an Audit Context
Audit Planning and Management Techniques
Reporting and Communication Techniques
Control Self-Assessment
2. Communication And Stakeholder Management
IT Governance Frameworks
IT strategy, policies, standards and procedures
Organizational structure roles and responsibilities related to IT
Quality Management systems
Maturity and business process re-engineering models
IT contracting strategies
Enterprise risk management
Process Improvement Models
IT Contracting Strategies
Monitoring and Reporting IT Performance
IT Human Resource Management
Business impact analysis
Business continuity planning
3. INFORMATION SECURITY PROGRAM DEVELOPMENTAND MANAGEMENT
Benefits realization practices
Project governance mechanisms
Project management control frameworks,
practices and tools
Risk management practices
Requirements analysis and management practices
System development methodologies and tools
Configuration and release management
System migration and infrastructure deployment practices
Post-implementation review objectives and practices
Security Issues with Programming Languages
4. IT SERVICE DELIVERY AND SUPPORT
Service level management practices
Operations management
Technology concepts related to networks,
system software and database management systems
System resiliency tools and techniques
Database administration practices
Capacity planning and monitoring techniques
Problem and incident management practices
Disaster recovery plans and testing methods
5. PROTECTION OF INFORMATION ASSETS
Security controls
Security incidents
Logical access controls
Network security controls
Network and Internet security
Attack methods and techniques
Security testing techniques
Encryption related technologies
PKI components and digital signature techniques
Security of mobile and wireless devices
Voice communications security
Data classification schemes
Physical access controls
Environmental protection devices
Process and procedures for information assets
A proven ability to perform reviews in accordance with globally accepted standards
An assurance to meet the education and experience criteria necessary for job success
A mark of distinction as a qualified IS audit, control, assurance and security professional
Gain a globally recognised certification that meets the requirements of the industries
Demonstrates your knowledge and experience required to meet the complex challenges of an enterprise
CISA conforms that you are a knowledgeable individual in latest best practices in IS Audit
Improves your credibility in the job market and gives you competitive advantage over your peers
CISA holders are consistently recognized among the most-qualified professionals in the fields of IS auditing, control and security.
Any candidate can attend training who want to learn about CISA
Aspirants in the field of information security and assurance
Bankers in the Computer Service Department (CSD)
Five (5) or more years of experience in IS audit, control,assurance, or security. Waivers are available for a maximum of three (3) years.
Exam details:
Exam Duration : 4 Hours
Exam Format : Multiple Choices
Number of Questions : 200 Questions
Exam Pass Mark : 450 with the scale of 200-800 points.
Exam Body : ISACA
Check out what our students have to say
Certified Information System Auditor CISA
Certified Information Systems Auditor | CISA independent information systems auditing certification governed by the Information Systems Audit and Control Association (ISACA). The CISA certification is for those in the IT industry who audit, control, monitor and assess IT and business systems. This is a comprehensive course that covers auditing process in-depth and ensure individuals develop proper working knowledge of five domains of CISA. CISA is even a prerequisite for information systems and information technology roles. CISA has become world-renowned as the standard of achievement for those who assess an organization’s information technology and business systems and provide assurance on their availability and sustainability. IS Audit refers to audit of systems (especially computer based) which provide information (like Accounts, Payroll, MIS etc.) to assure management that the information generated from these systems are reliable.
It includes:
Test of application controls
Drafting/implementing of information security policy
Drafting/implementing of Business Continuity Policies
Audit of physical and environmental controls etc.
Certified Information Systems Auditor | CISA
Benefit
A proven ability to perform reviews in accordance with globally accepted standards
An assurance to meet the education and experience criteria necessary for job success
A mark of distinction as a qualified IS audit, control, assurance and security professional
Gain a globally recognised certification that meets the requirements of the industries
Demonstrates your knowledge and experience required to meet the complex challenges of an enterprise
CISA conforms that you are a knowledgeable individual in latest best practices in IS Audit
Improves your credibility in the job market and gives you competitive advantage over your peers
CISA holders are consistently recognized among the most-qualified professionals in the fields of IS auditing, control and security.
Certified Information System Auditor (CISA)
Course Coverage
THE PROCESS OF AUDITING INFORMATION SYSTEMS
Communication And Stakeholder Management
INFORMATION SECURITY PROGRAM DEVELOPMENTAND MANAGEMENT
Certified Information Security Manager | CISM by ISACA is a certification course offered by Infosavvy, that involves information security, assurance, risk management and governance. CISM is one of the highest paying sought after IT certifications.
This course is developed for experienced information security managers and those with information security management responsibilities which includes:
1) Information Security Managers
2) Aspiring Information Security Managers
3) IS/IT Consultants
4) Chief Information Officers
COBIT is a framework for the enterprise governance and management of information and technology (I&T) that supports enterprise goal achievement.
The COBIT 2019 Foundation course is intended for current COBIT 5 certificate holders as well as those new to COBIT who are interested in achieving the latest foundation certificate.
In this course, delegates will be taught about the concepts, models and key definitions of COBIT framework and helps prepare learners to take the COBIT 2019 Foundation exam.
CCISO Certification is an up skill to be succeeded at the highest levels of information security. It’s first of its kind training certification program aimed at producing top-level information security executives. It not only concentrates on technical knowledge but also on the application security management principles from an executive management point of view.
The program consists of three committees: Training, Body of Knowledge and the C|CISO Exam. Every element of this program was developed with the aspiring CISO keeping in minds and looks to spread the knowledge of seasoned professionals to the next generation in the arena that are most critical in the growth sector and maintenance of a successful information security program.
CISSP stands for Certified Information System Security Professional. It is an information security certification granted by the International Information System Security Certification Consortium also known as (ISC)². CISSP is considered as gold standard in the field of information security.
ECSA training from Infosavvy provides an absolute learning progress continuing where the CEH program left off. This new ECSAv10 program has updated syllabus and an industry recognized comprehensive penetration testing methodology.
Inclusive of all the above mentioned topics certifies the learner to elevate their abilities by applying these skills learned through intensive practical labs and challenges.
Various methods are covered by ECSA in this course which has different requirements across all the verticals. ECSA is an amalgamation of both manual and automated penetration testing.
The Diploma in Cyber Security program is supposed to show students all about the way to protect computers and digital systems from unwanted intrusion and malicious hackers. Cyber security may be a field that involves defending against crime, espionage, sabotage, and vandalism for a spread of various reasons. Students will often study subjects like network design, security measures, potential threats, and firewalls and antiviral software. This diploma could be an independent program, or it’d be combined with other technological degrees, like IT management.
In this diploma in cyber security we cover all these courses like in Networking CCNA Routing, Switching, Security, Ethical Hacking, Incident Handling, Penetration Testing, AWS Solution Architect Associate, AWS Security, Core and Advance Case Java, Case .Net, ISTQB.
[ninja_form id=7]
The CASE certified training program is developed concurrently to prepare software professionals with the necessary capabilities that are expected by employers and academia globally.It is designed to be a hands-on, comprehensive application security course that will help software professionals create secure applications.
The training program encompasses security activities involved in all phases of the Software Development Lifecycle (SDLC): planning, creating, testing, and deploying an application.
Reviews
There are no reviews yet.