CISA Certification Preparation "Cetified Information Systems Auditor" (5 days)

CISA logo

Sessions :

  • 30th january to 27th February 2020
  • 5 Days Training (including preparation matrerial, 2 coffee-breaks + Breakfast per day) : 2800 TND HT (TVA 19%) per participant  
  • CISA Exam registration fees: $760 USD HT  (TVA 19%) per participant

The target audience for this course are:

  • Internal Auditors
  • IT/IS Auditors
  • IT Practitionners : IT Managers, IS Consultants, Team leaders and coordinators
  • Information Security Managers
  • IT project managers and project coordinators
  • Professionnals and Team members seeking the CISA
    certification

The learner should possess skills and knowledge in the
following topics before attending this course:

– Auditing principles

– Good experience related to Information Systems audit and verification

  • At the end of the CISA training, each participant will know and understand:
  • The five major areas covered by CISA certification
  • Knowledge and technical concepts needed for the exam
  • The vocabulary and guiding ideas of the exam.

Introduction

Domaine 1 : The Process of Auditing Information Systems

Task Statements:

1.1Execute a risk-based IS audit strategy in compliance with IS audit standards to ensure that key risk areas are audited.
1.2Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization.
1.3Conduct audits in accordance with IS audit standards to achieve planned audit objectives.
1.4Communicate audit results and make recommendations to key stakeholders through meetings and audit reports to promote change when necessary.
1.5Conduct audit follow-ups to determine whether appropriate actions have been taken by management in a timely manner.

Domaine 2 : Governance and Management of IT

Task Statements:

2.1Evaluate the IT strategy, including IT direction, and the processes for the strategy’s development, approval, implementation and maintenance for alignment with the organization’s strategies and objectives.
2.2Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization’s strategies and objectives.
2.3Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organization’s strategies and objectives.
2.4Evaluate the organization’s IT policies, standards and procedures, and the processes for their development, approval, release/publishing, implementation and maintenance to determine whether they support the IT strategy and comply with regulatory and legal requirements.
2.5Evaluate IT resource management, including investment, prioritization, allocation and use, for alignment with the organization’s strategies and objectives.
2.6Evaluate IT portfolio management, including investment, prioritization and allocation, for alignment with the organization’s strategies and objectives.
2.7Evaluate risk management practices to determine whether the organization’s IT-related risk is identified, assessed, monitored, reported and managed.
2.8Evaluate IT management and monitoring of controls (e.g., continuous monitoring, quality assurance [QA]) for compliance with the organization’s policies, standards and procedures.
2.9Evaluate monitoring and reporting of IT key performance indicators (KPIs) to determine whether management receives sufficient and timely information.
2.10Evaluate the organization’s business continuity plan (BCP), including alignment of the IT disaster recovery plan (DRP) with the BCP, to determine the organization’s ability to continue essential business operations during the period of an IT disruption.

Domaine 3 : Information Systems Acquisition, Development and Implementation

Task Statements:

3.1Evaluate the business case for the proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether the business case meets business objectives.
3.2Evaluate IT supplier selection and contract management processes to ensure that the organization’s service levels and requisite controls are met.
3.3Evaluate the project management framework and controls to determine whether business requirements are achieved in a cost-effective manner while managing risk to the organization.
3.4Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation, and has timely and accurate status reporting.
3.5Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organization’s policies, standards, procedures and applicable external requirements.
3.6Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and the organization’s requirements are met.
3.7Conduct post-implementation reviews of systems to determine whether project deliverables, controls and the organization’s requirements are met.

Domaine 4: Information Systems Operations, Maintenance and Service Management

Task Statements:

4.1

Evaluate the IT service management framework and practices (internal or third party) to determine whether the controls and service levels expected by the organization are being adhered to and whether strategic objectives are met.

4.2

Conduct periodic reviews of information systems to determine whether they continue to meet the organization’s objectives within the enterprise architecture (EA).

4.3

Evaluate IT operations (e.g., job scheduling, configuration management, capacity and performance management) to determine whether they are controlled effectively and continue to support the organization’s objectives.

4.4

Evaluate IT maintenance (patches, upgrades) to determine whether they are controlled effectively and continue to support the organization’s objectives.

4.5

Evaluate database management practices to determine the integrity and optimization of databases.

4.6

Evaluate data quality and life cycle management to determine whether they continue to meet strategic objectives.

4.7

Evaluate problem and incident management practices to determine whether problems and incidents are prevented, detected, analyzed, reported and resolved in a timely manner to support the organization´s objectives.

4.8

Evaluate change and release management practices to determine whether changes made to systems and applications are adequately controlled and documented.

4.9

Evaluate end-user computing to determine whether the processes are effectively controlled and support the organization’s objectives.

4.10

Evaluate IT continuity and resilience (backups/restores, disaster recovery plan [DRP]) to determine whether they are controlled effectively and continue to support the organization’s objectives.

Domaine 5 : Protection of Information Assets

Task Statements:

5.1 Evaluate the information security and privacy policies, standards and procedures for completeness, alignment with generally accepted practices and compliance with applicable external requirements.
5.2Evaluate the design, implementation, maintenance, monitoring and reporting of physical and environmental controls to determine whether information assets are adequately safeguarded.
5.3Evaluate the design, implementation, maintenance, monitoring and reporting of system and logical security controls to verify the confidentiality, integrity and availability of information.
5.4Evaluate the design, implementation and monitoring of the data classification processes and procedures for alignment with the organization’s policies, standards, procedures and applicable external requirements.
5.5Evaluate the processes and procedures used to store, retrieve, transport and dispose of assets to determine whether information assets are adequately safeguarded.
5.6Evaluate the information security program to determine its effectiveness and alignment with the organization’s strategies and objectives.

CISA Preparation will be animated by an accredited Trainer with wide experience in CISA domains.

Ready to bring a customized training to your workplace? Contact-us for any enterprise-specific needs