ISACA Certified Information Systems Auditor - CISA

ISACA Certified Information Systems Auditor - CISA
Enquire Now

Demonstrate excellence in IT systems auditing by completing the ISACA Certified Information Systems Auditor course. Designed according to the rigorous requirements of the ISACA, students can be sure of learning the theories and practical skills required to become a fully-qualified systems auditor.

Since 1978 the CISA qualification has been regarded as an industry-leading qualification for IT auditors, with holders demonstrating a proven level of competence. The ISACA Certified Systems Auditor course is best suited to:

  • IT professionals responsible for audit, control and security of corporate computer and networking resources.
  • Consultants tasked with documenting current business system provisions and making recommendations on how to improve monitoring, control and protection provisions.
  • Junior IT security team members who would like to take their knowledge to expert level.
  • Individuals who need to achieve an industry-recognised qualification to prove their competence.

With 30 modules of study, the ISACA Certified Information Systems Auditor course relies on a series of instructor led videos and self-study manuals to help students get to grips with the concepts being taught. The course is delivered online using the learning platform allowing learners to access material anyplace anytime, whenever and wherever is most convenient for them.

Knowledge and understanding of each module is tested routinely throughout the course using flash cards and educational games; there are also numerous scenarios in each module that students can replicate to improve their understanding. End of unit tests and quizzes ensure learners have fully understood the concepts behind information systems auditing before moving on to the next module. Students can also discuss what they are learning using the social networking facilities, adding another valuable learning tool by which to add additional, practical knowledge.

Key Learning Points

Over the course of thirty modules students are introduced to core concepts of IT systems auditing, learning practical skills that can be used to document enterprise class systems and identify areas that require improvement. Learners are taken through each concept and before being given the opportunity to test their knowledge using a series of practical examples.

Core concepts covered by the course include:

  • The information systems audit process and how it is applied in a real-world environment.
  • The importance of applying information technology governance principles to maintain levels of security and availability.
  • Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements.
  • Codifying IT service delivery and support mechanisms and levels to ensure that systems and users remain fully productive and issues are properly prioritised.
  • Identifying critical information assets and designing systems to protect each from loss, theft or unauthorised access.
  • Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure.

Advantages of this course

Upon completion of the course students will not only have an in-depth appreciation of IT systems, auditing principles and procedures, but they will also be fully prepared to sit the associated Certified Information Systems Auditor (CISA) certification exam.

The benefits the benefits of this particular course are plentiful:

  • A greater understanding of IT systems auditing procedures and how they are applied.
  • Improved practical auditing skills that will help employees raise standards and security within their organisations.
  • The skills and experience required to sit and pass the well-respected CISA certification.
  • The acquisition of extremely valuable skills that will help learners secure internal promotions or new roles within the IT system auditing sector, widening employment prospects.

The SACA Certified Information Systems Audit course is an essential pre-requisite for IT systems auditors who want to achieve the CISA qualification. It is also important to note that the CISA accreditation is an essential component of the DOD 8570.1 security clearance, required to work on projects for government agencies.

Lesson 1
  • Introduction
  • Audit Process
  • Auditing Standards
  • Auditing Guidelines
  • Cobit Model
  • Audit Management
  • Internal Control Classifications
  • Planning
  • Program
  • Evidence
  • Audit Control Evaluation
  • CSA Control Self- Assessment
Lesson 2
  • IT Governance
  • Outsourcing And Governance
  • IT Strategy
  • Governance And Security Policies
  • Organizational Compliance
  • Outsourcing And Globalization
  • Outsourcing
  • IT Performance
Lesson 3
  • System And Infrastructure
  • Requirements
  • Project Management Tools- Part1
  • Project Management Tools- Part2
  • Applications
  • Agile Development
  • Monitoring And Controlling
  • Acquisition Process
  • Testing Process
  • Information Systems Maintenance Practices
  • Data Conversion Tools
Lesson 4
  • Media Disposal Process
  • Post Implementation Review
  • Periodic Review
  • System Maintenance
Lesson 5
  • IT Service Delivery And Support
  • How To Evalutate Service Level Management Practices
  • Operations Management
  • Databases
  • Structured Query Language
  • Monitoring Performance
  • Source Code And Performance Monitoring
  • Patch Management
  • Incident Management
  • Hardware Component Types
  • Network Component Types
Lesson 6
  • IS Auditor Technical Overview
  • Security Design
  • Types Of Attacks
  • Cryptography
  • Encryption
  • Asymmetric Encryption
  • Digital Certificate
  • Different Kinds Of Attacks
  • Access Controls
  • Identification And Authenication
  • Physical Access Exposure
  • Environmental Security
  • Network Security Devices And Network Components
  • Network Address Translation
  • Virtual Private Networks
  • Voice System Risks
  • Intrusion Detection
  • Firewalls
  • Firewall Implementation
  • Network Access Protection
  • Honey Pot
  • Risks To Portable And Wireless Devices
  • Bluetooth
  • OSI Networking
  • Managing Data
Lesson 7
  • Business Continuity And Disaster Recovery
  • Fault Tolerance
  • Business Continuity And Disaster Recovery Regulations
Course Code
Online Course
Course Access
1 Year
Exams Included
1 gigahertz (GHz)
1 GB
Operating Systems
Windows 7
Windows 8
Windows 10
Internet Explorer 8 or above
Google Chrome
Safari 6 or above
Mozilla Firefox
Windows, Mac, iPhone, iPad, Android