Certified Information Systems Auditor (CISA)

0( 0 REVIEWS )
Overview Become a CISA with Study365! This course will give your career a serious boost, and is a qualification which …


Become a CISA with Study365! This course will give your career a serious boost, and is a qualification which is recognised internationally. A CISA is a complete professional with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. Become a valued professional with Study365.

Learning with Study 365 has many advantages. The course material is delivered straight to you and can be adapted to fit in with your lifestyle. It is created by experts within the industry, meaning you are receiving accurate information, which is up-to-date and easy to understand.

This course is comprised of professionally narrated e-Learning modules, interactive quizzes, tests, and exams. All delivered through a system that you will have access to 24 hours a day, 7 days a week for 365 days (12 months).

  • What will I learn?
  • Course Description:
  • Course Duration:
  • Method of Assessment:
  • Certification:
  • Entry Requirement:
  • Career Path:
  • The auditing process
  • The fundamentals of auditing
  • Auditing standards
  • IT governance
  • Governance and security policies
  • Managing data
  • Cryptography and encryption
  • And much more!

This online training course is comprehensive and designed to cover the key topics listed under the curriculum.

You will have 12 Months access to your online study platform from the date you purchased the course. The course is self-paced so you decide how fast or slow the training goes. You can complete the course in stages revisiting the training at any time.

This course is assessed by an official CISA exam, which you will need to take at the end of the course (please be aware, this is not the official exam). We do not provide the official exam, so you will need to purchase it separately. You can purchase the exam here:

Successful candidates will be awarded a certificate for Certified Information Systems Auditor (CISA).

(This course is not included the official certificate)

Learners must be age 16 or over and should have a basic understanding of the English Language, numeracy, literacy, and ICT.

PLEASE NOTE: To become CISA certified there are several requirements, please visit the following page to make sure you meet the requirements:

PLEASE NOTE: We do not provide the official exam, which will need to be purchased separately.

This training course could help you to fulfil any of the following job roles:

  • IT Consultant
  • IT Auditor
  • IT Manager

Course Curriculum

Free Introduction
Certified Information Systems Auditor (CISA) FREE 00:00:00
Course brochure – Certified Information Systems Auditor (CISA) FREE
Module 1:
1. Introduction
2. Audit Process
3. Auditing Standards
4. Auditing Guidelines
5. Cobit Model
6. Audit Management
7. Internal Control Classifications
8. Planning
9. Program
10. Evidence
11. Audit Control Evaluation
12. CSA Control Self-Assessment
Module 2:
1. IT Governance
2. Governance & Security Policies
3. Outsourcing & Governance
4. Outsourcing & Globalization
5. Organizational Compliance
6. IT Strategy
7. IT Performance
Module 3:
1. System & Infrastructure
2. Requirements
3. Project Management Tools – Part 1-2
4. Applications
5. Agile Development
6. Monitoring & Controlling
7. Acquisition Process
8. Testing Process
9. Information Systems Maintenance Practices
10. Data Conversion Tools
Module 4:
1. Media Disposal Process
2. Post Implementation Review
3. Periodic Review
4. System Maintenance
Module 5:
1. IT Service Delivery and Support
2. How to Evalutate Service Level Management Practices
3. Operations Management
4. Databases
5. Structured Query Language (SQL)
6. Monitoring Performance
7. Source Code and Perfomance Monitoring
8. Patch Management
9. Incident Management
10. Hardware Component Types
11. Network Component Types
Module 6:
1. IS Auditor Technical Overview
2. Security Design
3. Monitoring Systems
4. Types of Attacks
5. Cryptography
6. Encryption
7. Asymmetric Encryption
8. Digital Certificate
9. Different Kinds of Attacks
10. Access Controls
11. Identification and Authenication
12. Physical Access Exposure
13. Environmental Security
14. Network Security Devices and Network Components
15. Network Address Translation
16. Virtual Private Networks (VPNs)
17. Voice System Risks
18. Intrusion Detection
19. Firewalls
20. Firewall Implementation
21. Network Access Protection
22. HoneyPot
23. Risks to Portable and Wireless Devices
24. Bluetooth
25. OSI Networking
26. Managing Data
Module 7:
1. Business Continuity and Disaster Recovery
2. Fault Tolerance
3. Business Continuity and Disaster Recovery Regulations

Students feedback


Average rating ()
5 Star
4 Star
3 Star
2 Star
1 Star

No Reviews found for this course.

WhatsApp chat