CISA by ISACA is a globally recognized certification for IS audit control, assurance and security professionals offered by Infosavvy. It is the gold standard for IS/IT certifications and are also renowned as a prestigious, lifelong symbol of knowledge and expertise.
Having a CISA, your credentials, knowledge and capabilities are clearly understood by potential employee and fellow professionals alike. Professionals with work experience in information systems auditing, control or security that include:
CISA stands for Certified Information Systems Auditor . This is an independent information systems auditing certification governed by the Information Systems Audit and Control Association (ISACA). The CISA certification is for those in the IT industry who audit, control, monitor and assess IT and business systems. This is a comprehensive course that covers auditing process in-depth and ensure individuals develop proper working knowledge of five domains of CISA. CISA is even a prerequisite for information systems and information technology roles. CISA has become world-renowned as the standard of achievement for those who assess an organization’s information technology and business systems and provide assurance on their availability and sustainability. IS Audit refers to audit of systems (especially computer based) which provide information (like Accounts, Payroll, MIS etc.) to assure management that the information generated from these systems are reliable.
It includes:
Test of application controls
Drafting/implementing of information security policy
Drafting/implementing of Business Continuity Policies
Audit of physical and environmental controls etc.
1.THE PROCESS OF AUDITING INFORMATION SYSTEMS
ISACA IT Audit and Assurance Standards,
Guidelines and Tools and Techniques
Risk assessment in an audit context
Control Objectives related to information
systems
Audit planning and management techniques
Gathering information and preserving
evidence
Reporting and communication techniques
Control Objectives and IS-Related Controls
Risk Assessment in an Audit Context
Audit Planning and Management Techniques
Reporting and Communication Techniques
Control Self-Assessment
2. Communication And Stakeholder Management
IT Governance Frameworks
IT strategy, policies, standards and procedures
Organizational structure roles and responsibilities related to IT
Quality Management systems
Maturity and business process re-engineering models
IT contracting strategies
Enterprise risk management
Process Improvement Models
IT Contracting Strategies
Monitoring and Reporting IT Performance
IT Human Resource Management
Business impact analysis
Business continuity planning
3.INFORMATION SECURITY PROGRAM DEVELOPMENTAND MANAGEMENT
Benefits realization practices
Project governance mechanisms
Project management control frameworks,
practices and tools
Risk management practices
Requirements analysis and management practices
System development methodologies and tools
Configuration and release management
System migration and infrastructure deployment practices
Post-implementation review objectives and practices
Security Issues with Programming Languages
4.IT SERVICE DELIVERY AND SUPPORT
Service level management practices
Operations management
Technology concepts related to networks,
system software and database management systems
System resiliency tools and techniques
Database administration practices
Capacity planning and monitoring techniques
Problem and incident management practices
Disaster recovery plans and testing methods
5.PROTECTION OF INFORMATION ASSETS
Security controls
Security incidents
Logical access controls
Network security controls
Network and Internet security
Attack methods and techniques
Security testing techniques
Encryption related technologies
PKI components and digital signature techniques
Security of mobile and wireless devices
Voice communications security
Data classification schemes
Physical access controls
Environmental protection devices
Process and procedures for information assets
A proven ability to perform reviews in accordance with globally accepted standards
An assurance to meet the education and experience criteria necessary for job success
A mark of distinction as a qualified IS audit, control, assurance and security professional
Gain a globally recognised certification that meets the requirements of the industries
Demonstrates your knowledge and experience required to meet the complex challenges of an enterprise
CISA conforms that you are a knowledgeable individual in latest best practices in IS Audit
Improves your credibility in the job market and gives you competitive advantage over your peers
CISA holders are consistently recognized among the most-qualified professionals in the fields of IS auditing, control and security.
Any candidate can attend training who want to learn about CISA
Aspirants in the field of information security and assurance
Bankers in the Computer Service Department (CSD)
Five (5) or more years of experience in IS audit, control,assurance, or security. Waivers are available for a maximum of three (3) years.
Exam details:
Exam Duration : 4 Hours
Exam Format : Multiple Choices
Number of Questions : 200 Questions
Exam Pass Mark : 450 with the scale of 200-800 points.
Exam Body : ISACA
Check out what our students have to say
Certified Information System Auditor CISA
Certified Information Systems Auditor | CISA independent information systems auditing certification governed by the Information Systems Audit and Control Association (ISACA). The CISA certification is for those in the IT industry who audit, control, monitor and assess IT and business systems. This is a comprehensive course that covers auditing process in-depth and ensure individuals develop proper working knowledge of five domains of CISA. CISA is even a prerequisite for information systems and information technology roles. CISA has become world-renowned as the standard of achievement for those who assess an organization’s information technology and business systems and provide assurance on their availability and sustainability. IS Audit refers to audit of systems (especially computer based) which provide information (like Accounts, Payroll, MIS etc.) to assure management that the information generated from these systems are reliable.
It includes:
Test of application controls
Drafting/implementing of information security policy
Drafting/implementing of Business Continuity Policies
Audit of physical and environmental controls etc.
Certified Information Systems Auditor | CISA
Benefit
A proven ability to perform reviews in accordance with globally accepted standards
An assurance to meet the education and experience criteria necessary for job success
A mark of distinction as a qualified IS audit, control, assurance and security professional
Gain a globally recognised certification that meets the requirements of the industries
Demonstrates your knowledge and experience required to meet the complex challenges of an enterprise
CISA conforms that you are a knowledgeable individual in latest best practices in IS Audit
Improves your credibility in the job market and gives you competitive advantage over your peers
CISA holders are consistently recognized among the most-qualified professionals in the fields of IS auditing, control and security.
Course Coverage
THE PROCESS OF AUDITING INFORMATION SYSTEMS
Communication And Stakeholder Management
INFORMATION SECURITY PROGRAM DEVELOPMENT AND MANAGEMENT
3 reviews for Certified Information Systems Auditor | CISA
zortilo nrel –
I have read some just right stuff here. Definitely worth bookmarking for revisiting. I wonder how so much effort you place to create such a great informative site.
Certified Information Security Manager | CISM by ISACA is a certification course offered by Infosavvy, that involves information security, assurance, risk management and governance. CISM is one of the highest paying sought after IT certifications.
This course is developed for experienced information security managers and those with information security management responsibilities which includes:
1) Information Security Managers
2) Aspiring Information Security Managers
3) IS/IT Consultants
4) Chief Information Officers
CCISO Certification is an up skill to be succeeded at the highest levels of information security. It’s first of its kind training certification program aimed at producing top-level information security executives. It not only concentrates on technical knowledge but also on the application security management principles from an executive management point of view.
The program consists of three committees: Training, Body of Knowledge and the C|CISO Exam. Every element of this program was developed with the aspiring CISO keeping in minds and looks to spread the knowledge of seasoned professionals to the next generation in the arena that are most critical in the growth sector and maintenance of a successful information security program.
COBIT is a framework for the enterprise governance and management of information and technology (I&T) that supports enterprise goal achievement.
The COBIT 2019 Foundation course is intended for current COBIT 5 certificate holders as well as those new to COBIT who are interested in achieving the latest foundation certificate.
In this course, delegates will be taught about the concepts, models and key definitions of COBIT framework and helps prepare learners to take the COBIT 2019 Foundation exam.
CISSP stands for Certified Information System Security Professional. It is an information security certification granted by the International Information System Security Certification Consortium also known as (ISC)². CISSP is considered as gold standard in the field of information security.
Get In Touch Privacy Information being a valuable asset and key information needs to be suitably protected like any other important business asset by any organization. In the modern world security of this asset becomes crucial for maintaining credibility. If this asset is compromised then the organization may have to face various risks like brand image erosion, and legal penalties etc. Privacy Information security is the protection of information from a wide range of threats in order to ensure regulatory and compliance requirements and minimize risk.
The comprehensive three-day course should be comprised of case studies, training, role-plays to ensure that the participant thoroughly understands the role of an auditor and acquires the expertise needed to perform effective audits.
[ninja_form id=7]
CHFI v9 covers detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillets for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals, bankers, computer and network security professionals, and anyone who is concerned about the integrity of the network and digital investigations.
ISO 31000 Risk Management is a Certified Risk Management course by Infosavvy. Identifying risks in a business is a crucial step which shouldn’t be avoided. Further mitigating these risks is directly linked to success of the business. By improving the bottom line you can avoid the negative financial and legal impact on a business.
A certified Risk Manger will be able to identify, evaluate, and react to opportunities and threats. Programs objective is to make risk manager understand the approaches, methods and techniques allowing an effective risk management according to ISO31000.
zortilo nrel –
I have read some just right stuff here. Definitely worth bookmarking for revisiting. I wonder how so much effort you place to create such a great informative site.