Certified Information Systems Auditor (CISA)

Price
$3,250.00 USD

Duration
5 Days

 

Delivery Methods
Virtual Instructor Led
Private Group

Course Overview

In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives.

Course Objectives

Upon successful completion of this course, students will be able to:
  • implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices.
  • evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices.
  • evaluate information systems acquisition, development, and implementation.
  • evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained.
  • define the protection policies used to promote the confidentiality, integrity, and availability of information assets.
  • Who Should Attend?

    The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security.
    • Top-rated instructors: Our crew of subject matter experts have an average instructor rating of 4.8 out of 5 across thousands of reviews.
    • Authorized content: We maintain more than 35 Authorized Training Partnerships with the top players in tech, ensuring your course materials contain the most relevant and up-to date information.
    • Interactive classroom participation: Our virtual training includes live lectures, demonstrations and virtual labs that allow you to participate in discussions with your instructor and fellow classmates to get real-time feedback.
    • Post Class Resources: Review your class content, catch up on any material you may have missed or perfect your new skills with access to resources after your course is complete.
    • Private Group Training: Let our world-class instructors deliver exclusive training courses just for your employees. Our private group training is designed to promote your team’s shared growth and skill development.
    • Tailored Training Solutions: Our subject matter experts can customize the class to specifically address the unique goals of your team.

    Learning Credits: Learning Credits can be purchased well in advance of your training date to avoid having to commit to specific courses or dates. Learning Credits allow you to secure your training budget for an entire year while eliminating the administrative headache of paying for individual classes. They can also be redeemed for a full year from the date of purchase. If you have previously purchased a Learning Credit agreement with New Horizons, you may use a portion of your agreement to pay for this class.

    Corporate Tech Pass: Our Corporate Tech Pass includes unlimited attendance for a single person, in the following Virtual Instructor Led course types: Microsoft Office, Microsoft Technical, CompTIA, Project Management, SharePoint, ITIL, Certified Ethical Hacker, Certified Hacking Forensics Investigator, Java, Professional Development Courses and more. The full list of eligible course titles can be found at https://www.newhorizons.com/eligible.

    If you have questions about Learning Credits or our Corporate Tech Pass, please contact your Account Manager.

    Course Prerequisites

    There are no prerequisites for this course.

    Agenda

    1 - The Process of Auditing Information Systems

    • ISACA Information Systems Auditing Standards and Guidelines
    • Fundamental Business Processes
    • Develop and Implement an Information Systems Audit Strategy
    • Plan an Audit
    • Conduct an Audit
    • The Evidence Life Cycle
    • Communicate Issues, Risks, and Audit Results
    • Support the Implementation of Risk Management and Control Practices

    2 - IT Governance and Management

    • Evaluate the Effectiveness of IT Governance
    • Evaluate the IT Organizational Structure and HR Management
    • Evaluate the IT Strategy and Direction
    • Evaluate IT Policies, Standards, and Procedures
    • Evaluate the Effectiveness of Quality Management Systems
    • Evaluate IT Management and Monitoring of Controls
    • IT Resource Investment, Use, and Allocation Practices
    • Evaluate IT Contracting Strategies and Policies
    • Evaluate Risk Management Practices
    • Performance Monitoring and Assurance Practices
    • Evaluate the Organizations Business Continuity Plan

    3 - Information Systems Acquisition, Development, and Implementation

    • Evaluate the Business Case for Change
    • Evaluate Project Management Frameworks and Governance Practices
    • Development Life Cycle Management
    • Perform Periodic Project Reviews
    • Evaluate Control Mechanisms for Systems
    • Evaluate Development and Testing Processes
    • Evaluate Implementation Readiness
    • Evaluate a System Migration
    • Perform a Post-Implementation System Review

    4 - Information Systems Operations, Maintenance, and Support

    • Perform Periodic System Reviews
    • Evaluate Service Level Management Practices
    • Evaluate Third-Party Management Practices
    • Evaluate Operations and End User Management Practices
    • Evaluate the Maintenance Process
    • Evaluate Data Administration Practices
    • Evaluate the Use of Capacity and Performance Monitoring Methods
    • Evaluate Change, Configuration, and Release Management Practices
    • Evaluate Problem and Incident Management Practices
    • Evaluate the Adequacy of Backup and Restore Provisions

    5 - Protection of Information Assets

    • Information Security Design
    • Encryption Basics
    • Evaluate the Functionality of the IT Infrastructure
    • Evaluate Network Infrastructure Security
    • Evaluate the Design, Implementation, and Monitoring of Logical Access Controls
    • Risks and Controls of Virtualization
    • Evaluate the Design, Implementation, and Monitoring of Data Classification Process
    • Evaluate the Design, Implementation, and Monitoring of Physical Access Controls
    • Evaluate the Design, Implementation, and Monitoring of Environmental Controls
     

    Upcoming Class Dates and Times

    May 13, 14, 15, 16, 17
    8:00 AM - 4:00 PM
    ENROLL $3,250.00 USD
     



    Do You Have Additional Questions? Please Contact Us Below.

    contact us contact us 
     
    Contact Us about Starting Your Business Training Strategy with New Horizons