Certified Information Systems Auditor (CISA) is for the IS audit, control, assurance and/or security professional who wishes to set themselves apart from their peers. This course will cover the following six modules: 1) The IS Audit Process, 2) CISA’s Role in IT Governance, 3) CISA’s Role in Systems and Infrastructure Life Cycle Management, 4) CISA’s Role in IT Service Delivery and Support, 5) CISA’s Role in Protection of Information Assets, 6) CISA’s Role in Business Continuity and Disaster Recovery. Prerequisites: A minimum of five years of professional information systems auditing, control or security work experience is required for this certification.

The program covers all six modules of the CISA content:

  • Module 1-The IS Audit Process

  • Module 2-CISA's Role in IT Governance

  • Module 3-CISA's Role in Systems and Infrastructure Life Cycle Management

  • Module 4-CISA's Role in IT Service Delivery and Support

  • Module 5-CISA's Role in Protection of Information Assets

  • Module 6-CISA's Role in Business Continuity and Disaster Recovery

Week 1

  • ISACA IS Auditing Standards, Guidelines and Procedures and Code of Professional Ethics

  • Control objectives and controls related to IS

  • CoBit controls

  • Procedures used to store, retrieve, transport, and dispose of confidential information assets

  • Control Self-Assessment (CSA)

  • IS auditing practices and techniques


Week2

  • IT governance frameworks

  • Quality management strategies and policies

  • Risk management methodologies and tools

  • Use of control frameworks (e.g., CobiT, COSO, ISO 17799)

  • Practices for monitoring and reporting of IT performance


Week3

  • Benefits management practices for CISA Certification

  • Processes for managing emergency changes to the production systems

  • Use of maturity and process improvement models (e.g., CMM, CobiT)


Week4

  • Contracting strategies, processes and contract management practices

  • Control objectives and techniques that ensure the completeness, accuracy, validity, and authorization of transactions and data within IT systems applications


Week5

  • Enterprise architecture design related to data, applications, and technology

  • Acquisition and contract management processes

  • System development methodologies and tools and an understanding of their strengths and weaknesses


Week6

  • Data conversion tools, techniques, and procedures

  • Business Impact Analysis (BIA)

  • CISA question and answer review

  • CISA Training

  • Capacity planning and monitoring techniques for CISA Certification Training