Certified Information Systems Auditor (CISA)
The Certified Information Systems Auditor (CISA) Training from IBCS aims to make working professionals adept at evaluating, securing and controlling complex business and IT systems in an enterprise. This course will also highlight government regulations and helps devise policies with stronger internal control measures and disclosures.
CISA Certification acts as a career differentiator for security professionals or IT managers who wish to enhance their marketability and credibility. This is an ideal path for those looking at a long term career in Information Systems Auditing.
CISA Course Objectives:
Participants enrolled for this course will learn the following set of skills:
- Entire Process of Auditing Information Systems
- Management and Governance of IT
- Acquisition, Implementation and Development of Business Information Systems
- Managing Operations, Support and Maintenance of IS
- Securing Information Assets
These core skills provide extensive understanding of managerial and technological factors that must be coordinated effectively in order to protect business information and systems.
Who should attend?
This course is highly recommended for IS/IT auditors, IT managers, Audit Managers, Security Managers, System Analysts, Consultants, and even CIOs and CTOs.
A minimum of 5 years of professional information systems auditing, control or security work experience (as described in the CISA job practice areas) is required for certification.
Training Benefits @ IBCS-PRIMAX Software (BD) Ltd.
1. CISA Certified Instructor
2. CISA Review Manual 27th Edition published by ISACA
3. Practicing Questions & Answers Manual 27th Edition by ISACA
CISA Course Content:
Domain 1—The Process of Auditing Information Systems: Provide audit services in accordance with IT audit standards to assist the organization in protecting and controlling information systems.
Domain 2—Governance and Management of IT: Provide assurance that the necessary leadership and organization structure and processes are in place to achieve objectives and to support the organization's strategy.
Domain 3—Information Systems Acquisition, Development, and Implementation: Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization’s strategies and objectives.
Domain 4—Information Systems Operations, Maintenance and Support: Provide assurance that the processes for information systems operations, maintenance and support meet the organization’s strategies and objectives.
Domain 5-Protection of Information Assets: Provide assurance that the organizations security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.