Outsmart the most sophisticated threats. Stay safe without compromising performance.
Certified Information Systems Auditor (CISA)® is one of the world’s most popular information security/information technology auditing certifications for professionals worldwide. CISA certification course is developed by ISACA and ideal for anybody looking to forge their career in the IT Security/Cyber security domain. This 5-day Certified Information Systems Auditor (CISA) certification course validates your auditing, control, and security skills among the best in the industry. Check out the dates below and enroll for the CISA training today!
Planning
IS Audit Standards, Guidelines, and Codes of Ethics
Business Processes
Types of Controls
Risk-Based Audit Planning
Types of Audits and Assessments
Execution
Audit Project Management
Sampling Methodology
Audit Evidence Collection Techniques
Data Analytics
Reporting and Communication Techniques
IT Governance
IT Governance and IT Strategy
IT-Related Frameworks
IT Standards, Policies, and Procedures
Organizational Structure
Enterprise Architecture
Enterprise Risk Management
Maturity Models
Laws, Regulations, and Industry Standards affecting the Organization
IT Management
IT Resource Management
IT Service Provider Acquisition and Management
IT Performance Monitoring and Reporting
Quality Assurance and Quality Management of IT
Information Systems Acquisition and Development
Project Governance and Management
Business Case and Feasibility Analysis
System Development Methodologies
Control Identification and Design
Information Systems Implementation
Testing Methodologies
Configuration and Release Management
System Migration, Infrastructure Deployment, and Data Conversion
Post-implementation Review
Information Systems Operations
Common Technology Components
IT Asset Management
Job Scheduling and Production Process Automation
System Interfaces
End-User Computing
Data Governance
Systems Performance Management
Problem and Incident Management
Change, Configuration, Release, and Patch Management
IT Service Level Management
Database Management
Business Resilience
Business Impact Analysis (BIA)
System Resiliency
Data Backup, Storage, and Restoration
Business Continuity Plan (BCP)
Disaster Recovery Plans (DRP)
Information Asset Security and Control
Information Asset Security Frameworks, Standards, and Guidelines
Privacy Principles
Physical Access and Environmental Controls
Identity and Access Management
Network and End-Point Security
Data Classification
Data Encryption and Encryption-Related Techniques
Public Key Infrastructure (PKI)
Web-Based Communication Techniques
Virtualized Environments
Mobile, Wireless, and Internet-of-Things (IoT) Devices
Security Event Management
Security Awareness Training and Programs
Information System Attack Methods and Techniques
Security Testing Tools and Techniques
Security Monitoring Tools and Techniques
Incident Response Management
Evidence Collection and Forensics
Supporting Tasks
Copyright © 2023. All rights reserved