CISA Certified Informations Systems Auditor

What are the course objectives?
 

CISA course is aligned to ISACA and ensures that you ace the exam in your first attempt. Most jobs in this field either require or prefer that candidates have a CISA certification. The CISA training course will enhance your understanding of IS audit processes and also help you understand how to protect information systems.

What skills will you learn from this CISA course?
 

Upon completion of this CISA course, you will:

  • Be able to identify and assess vulnerabilities and report on compliance and institutional controls.
  • Gain a better understanding of IS audit and assurance guidelines, standards, and best practices.
  • Learn how to govern and control enterprise IT environments.
  • Understand the acquisition, development, testing, and implementation of information systems.
  • Develop working knowledge of the five domains of CISA, as prescribed by ISACA.
  • Acquire the relevant knowledge and skills required to pass the CISA certification exam by ISACA
Who should take this CISA course?
 

CISA  training course is essential for professionals dealing with controlling, monitoring, and assessing an organization’s information technology and business systems. This includes:

  • IS/IT auditors/consultants
  • IT compliance managers
  • Chief Compliance Officers
  • Chief risk & privacy officers
  • Security heads/directors
  • Security managers/architects
What types of jobs are ideal for CISA trained professionals?
 

Jobs that are ideal for CISA trained professionals include:

  • Information security manager/consultant
  • Technical consultant
  • Operational risk manager
  • Analysts
  • Compliance managers
  • Project manager
  • Cloud security
  • IT auditor
Why should I enroll in this CISA training course?
 

CISA has become one of the most sought-after certification programs in the world due to a growing demand for professionals possessing information systems audit, control, and security skills. CISA certification will give you these critical skills and provide with a competitive edge over your peers in the field of information security. This course will also help you prepare for the CISA certification exam.

 
Introduction
 

0.1 Course Introduction

Process of Auditing Information Systems
 

1.1 Introduction

1.2 Objectives

1.3 Task and Knowledge Statement Introduction

1.4 Knowledge Statement 1.1

1.5 Knowledge Statement 1.2

1.6 Knowledge Statement 1.3

1.7 Knowledge Statement 1.4

1.8 Knowledge Statement 1.5

1.9 Knowledge Statement 1.6

1.10 Knowledge Statement 1.7

1.11 Knowledge Statement 1.8

1.12 Knowledge Statement 1.9

1.13 Knowledge Statement 1.10

1.14 Knowledge Statement 1.11

1.15 Quiz

1.16 Quiz Question 1

1.17 Quiz Solution 1

1.18 Quiz Question 2

1.19 Quiz Solution 2

1.20 Quiz Question 3

1.21 Quiz Solution 3

1.22 Quiz Question 4

1.23 Quiz Solution 4

1.24 Case Study 1 Scenario

1.25 Case Study 1 Questions

1.26 Case Study 2 Scenario

1.27 Case Study 2 Questions

1.28 Key Takeaways

1.29 Conclusion

 Governance and Management of IT
 

2.1 Introduction

2.2 Objectives

2.3 Knowledge Statement 2.1

2.4 Knowledge Statement 2.2

2.5 Knowledge Statement 2.3

2.6 Knowledge Statement 2.4

2.7 Knowledge Statement 2.5

2.8 Knowledge Statement 2.6

2.9 Knowledge Statement 2.7

2.10 Knowledge Statement 2.8

2.11 Knowledge Statement 2.9

2.12 Knowledge Statement 2.10

2.13 Knowledge Statement 2.11

2.14 Knowledge Statement 2.12 and 2.13

2.15 Knowledge Statement 2.14

2.16 Knowledge Statement 2.15

2.17 Knowledge Statement 2.16

2.18 Knowledge Statement 2.17

2.19 Quiz

2.20 Quiz Question 1

2.21 Quiz Solution 1

2.22 Quiz Question 2

2.23 Quiz Solution 2

2.24 Quiz Question 3

2.25 Quiz Solution 3

2.26 Quiz Question 4

2.27 Quiz Solution 4

2.28 Quiz Question 5

2.29 Quiz Solution 5

2.30 Case Study 1 Scenario

2.31 Case Study 1 Questions

2.32 Case Study 2 Scenario

2.33 Case Study 2 Questions

2.34 Key Takeaways

2.35 Conclusion

 Information Systems Acquisition, Development and Implementation
 

3.1 Introduction

3.2 Objectives

3.3 Knowledge Statement 3.1

3.4 Knowledge Statement 3.2

3.5 Knowledge Statement 3.3

3.6 Knowledge Statement 3.4

3.7 Knowledge Statement 3.5

3.8 Knowledge Statement 3.6

3.9 Knowledge Statement 3.7

3.10 Knowledge Statement 3.8

3.11 Knowledge Statement 3.9

3.12 Knowledge Statement 3.10

3.13 Knowledge Statement 3.11

3.14 Knowledge Statement 3.12

3.15 Knowledge Statement 3.13

3.16 Knowledge Statement 3.14

3.17 Quiz

3.18 Quiz Question 1

3.19 Quiz Solution 1

3.20 Quiz Question 2

3.21 Quiz Solution 2

3.22 Quiz Question 3

3.23 Quiz Solution 3

3.24 Quiz Question 4

3.25 Quiz Solution 4

3.26 Case Study 1 Scenario

3.27 Case Study 1 Questions

3.28 Case Study 2 Scenario

3.29 Case Study 2 Questions

3.30 Key Takeaways

3.31 Conclusion

 Information Systems Operations, Maintenance and Service Management
 

4.1 Introduction

4.2 Objectives

4.3 Knowledge Statement 4.1

4.4 Knowledge Statement 4.2

4.5 Knowledge Statement 4.3

4.6 Knowledge Statement 4.4

4.7 Knowledge Statement 4.5

4.8 Knowledge Statement 4.6

4.9 Knowledge Statement 4.7

4.10 Knowledge Statement 4.8

4.11 Knowledge Statement 4.9

4.12 Knowledge Statement 4.10

4.13 Knowledge Statement 4.11

4.14 Knowledge Statement 4.12

4.15 Knowledge Statement 4.13

4.16 Knowledge Statement 4.14

4.17 Knowledge Statement 4.15

4.18 Knowledge Statement 4.16

4.19 Knowledge Statement 4.17

4.20 Knowledge Statement 4.18

4.21 Knowledge Statement 4.19

4.22 Knowledge Statement 4.20

4.23 Knowledge Statement 4.21

4.24 Knowledge Statement 4.22

4.25 Knowledge Statement 4.23

4.26 Quiz

4.27 Quiz Question 1

4.28 Quiz Solution 1

4.29 Quiz Question 2

4.30 Quiz Solution 2

4.31 Quiz Question 3

4.32 Quiz Solution 3

4.33 Quiz Question 4

4.34 Quiz Solution 4

4.35 Quiz Question 5

4.36 Quiz Solution 5

4.37 Case Study 1 Scenario

4.38 Case study 1 Questions

4.39 Case Study 2 Scenario

4.40 Case study 2 Questions

4.41 Key Takeaways

4.42 Conclusion

 Protection of Information Assets
 

5.1 Introduction

5.2 Objectives

5.3 Knowledge Statement 5.1

5.4 Knowledge Statement 5.2

5.5 Knowledge Statement 5.3

5.6 Knowledge Statement 5.4 and 5.5

5.7 Knowledge Statement 5.6

5.8 Knowledge Statement 5.7

5.9 Knowledge Statement 5.8

5.10 Knowledge Statement 5.9

5.11 Knowledge Statement 5.10

5.12 Knowledge Statement 5.11

5.13 Knowledge Statement 5.12

5.14 Knowledge Statement 5.13

5.15 Knowledge Statement 5.14

5.16 Knowledge Statement 5.15

5.17 Knowledge Statement 5.16

5.18 Knowledge Statement 5.17

5.19 Knowledge Statement 5.18

5.20 Knowledge Statement 5.19

5.21 Knowledge Statement 5.20

5.22 Knowledge Statement 5.21

5.23 Knowledge Statement 5.22

5.24 Knowledge Statement 5.23

5.25 Knowledge Statement 5.24

5.26 Knowledge Statement 5.25

5.27 Knowledge Statement 5.26

5.28 Quiz

5.29 Quiz Question 1

5.30 Quiz Solution 1

5.31 Quiz Question 2

5.32 Quiz Solution 2

5.33 Quiz Question 3

5.34 Quiz Solution 3

5.35 Quiz Question 4

5.36 Quiz Solution 4

5.37 Case Study Scenario

5.38 Case Study Questions

5.39 Key Takeaways

5.40 Conclusion

Course Summary
 

CISA Summary

Course Case Study

 
Scroll to Top