IT Training

Want To Get Started?

Outsmart the most sophisticated threats. Stay safe without compromising performance.

Certified Information Systems Auditor-CISA Course Overview

Certified Information Systems Auditor (CISA)® is one of the world’s most popular information security/information technology auditing certifications for professionals worldwide. CISA certification course is developed by ISACA and ideal for anybody looking to forge their career in the IT Security/Cyber security domain. This 5-day Certified Information Systems Auditor (CISA) certification course validates your auditing, control, and security skills among the best in the industry. Check out the dates below and enroll for the CISA training today!

Planning

IS Audit Standards, Guidelines, and Codes of Ethics

Business Processes

Types of Controls

Risk-Based Audit Planning

Types of Audits and Assessments

Execution

Audit Project Management

Sampling Methodology

Audit Evidence Collection Techniques

Data Analytics

Reporting and Communication Techniques

IT Governance

IT Governance and IT Strategy

IT-Related Frameworks

IT Standards, Policies, and Procedures

Organizational Structure

Enterprise Architecture

Enterprise Risk Management

Maturity Models

Laws, Regulations, and Industry Standards affecting the Organization

IT Management

IT Resource Management

IT Service Provider Acquisition and Management

IT Performance Monitoring and Reporting

Quality Assurance and Quality Management of IT

Information Systems Acquisition and Development

Project Governance and Management

Business Case and Feasibility Analysis

System Development Methodologies

Control Identification and Design

Information Systems Implementation

Testing Methodologies

Configuration and Release Management

System Migration, Infrastructure Deployment, and Data Conversion

Post-implementation Review

Information Systems Operations

Common Technology Components

IT Asset Management

Job Scheduling and Production Process Automation

System Interfaces

End-User Computing

Data Governance

Systems Performance Management

Problem and Incident Management

Change, Configuration, Release, and Patch Management

IT Service Level Management

Database Management

Business Resilience

Business Impact Analysis (BIA)

System Resiliency

Data Backup, Storage, and Restoration

Business Continuity Plan (BCP)

Disaster Recovery Plans (DRP)  

Information Asset Security and Control

Information Asset Security Frameworks, Standards, and Guidelines

Privacy Principles

Physical Access and Environmental Controls

Identity and Access Management

Network and End-Point Security

Data Classification

Data Encryption and Encryption-Related Techniques

Public Key Infrastructure (PKI)

Web-Based Communication Techniques

Virtualized Environments

Mobile, Wireless, and Internet-of-Things (IoT) Devices

Security Event Management

Security Awareness Training and Programs

Information System Attack Methods and Techniques

Security Testing Tools and Techniques

Security Monitoring Tools and Techniques

Incident Response Management

Evidence Collection and Forensics

Supporting Tasks

Subscribe Our Newsletter