Become a CISA with Study365! This course will give your career a serious boost, and is a qualification which is recognised internationally. A CISA is a complete professional with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. Become a valued professional with Study365.
Learning with Study 365 has many advantages. The course material is delivered straight to you and can be adapted to fit in with your lifestyle. It is created by experts within the industry, meaning you are receiving accurate information, which is up-to-date and easy to understand.
This course is comprised of professionally narrated e-Learning modules, interactive quizzes, tests, and exams. All delivered through a system that you will have access to 24 hours a day, 7 days a week for 365 days (12 months).
This online training course is comprehensive and designed to cover the key topics listed under the curriculum.
You will have 12 Months access to your online study platform from the date you purchased the course. The course is self-paced so you decide how fast or slow the training goes. You can complete the course in stages revisiting the training at any time.
This course is assessed by an official CISA exam, which you will need to take at the end of the course (please be aware, this is not the official exam). We do not provide the official exam, so you will need to purchase it separately. You can purchase the exam here: http://www.isaca.org/Certification/CISA-Certified-Information-Systems-Auditor/Pages/default.aspx.
Successful candidates will be awarded a certificate for Certified Information Systems Auditor (CISA).
(This course is not included the official certificate)
Learners must be age 16 or over and should have a basic understanding of the English Language, numeracy, literacy, and ICT.
PLEASE NOTE: To become CISA certified there are several requirements, please visit the following page to make sure you meet the requirements:
PLEASE NOTE: We do not provide the official exam, which will need to be purchased separately.
This training course could help you to fulfil any of the following job roles:
Free Introduction | |||
Certified Information Systems Auditor (CISA) | FREE | 00:00:00 | |
Course brochure – Certified Information Systems Auditor (CISA) | FREE | ||
Module 1: | |||
1. Introduction | |||
2. Audit Process | |||
3. Auditing Standards | |||
4. Auditing Guidelines | |||
5. Cobit Model | |||
6. Audit Management | |||
7. Internal Control Classifications | |||
8. Planning | |||
9. Program | |||
10. Evidence | |||
11. Audit Control Evaluation | |||
12. CSA Control Self-Assessment | |||
Module 2: | |||
1. IT Governance | |||
2. Governance & Security Policies | |||
3. Outsourcing & Governance | |||
4. Outsourcing & Globalization | |||
5. Organizational Compliance | |||
6. IT Strategy | |||
7. IT Performance | |||
Module 3: | |||
1. System & Infrastructure | |||
2. Requirements | |||
3. Project Management Tools – Part 1-2 | |||
4. Applications | |||
5. Agile Development | |||
6. Monitoring & Controlling | |||
7. Acquisition Process | |||
8. Testing Process | |||
9. Information Systems Maintenance Practices | |||
10. Data Conversion Tools | |||
Module 4: | |||
1. Media Disposal Process | |||
2. Post Implementation Review | |||
3. Periodic Review | |||
4. System Maintenance | |||
Module 5: | |||
1. IT Service Delivery and Support | |||
2. How to Evalutate Service Level Management Practices | |||
3. Operations Management | |||
4. Databases | |||
5. Structured Query Language (SQL) | |||
6. Monitoring Performance | |||
7. Source Code and Perfomance Monitoring | |||
8. Patch Management | |||
9. Incident Management | |||
10. Hardware Component Types | |||
11. Network Component Types | |||
Module 6: | |||
1. IS Auditor Technical Overview | |||
2. Security Design | |||
3. Monitoring Systems | |||
4. Types of Attacks | |||
5. Cryptography | |||
6. Encryption | |||
7. Asymmetric Encryption | |||
8. Digital Certificate | |||
9. Different Kinds of Attacks | |||
10. Access Controls | |||
11. Identification and Authenication | |||
12. Physical Access Exposure | |||
13. Environmental Security | |||
14. Network Security Devices and Network Components | |||
15. Network Address Translation | |||
16. Virtual Private Networks (VPNs) | |||
17. Voice System Risks | |||
18. Intrusion Detection | |||
19. Firewalls | |||
20. Firewall Implementation | |||
21. Network Access Protection | |||
22. HoneyPot | |||
23. Risks to Portable and Wireless Devices | |||
24. Bluetooth | |||
25. OSI Networking | |||
26. Managing Data | |||
Module 7: | |||
1. Business Continuity and Disaster Recovery | |||
2. Fault Tolerance | |||
3. Business Continuity and Disaster Recovery Regulations |
No Reviews found for this course.