CISA Certification Training Course
CISA - Certified Information Systems Auditor
Course Number: |
#CED-1270 |
Course Length: |
5 days |
Certifications: |
Certified Information Systems Auditor (CISA)
DoD Approved 8570: IAT Level III, CSSP Auditor |
Grants (discounts) are available for multiple students for the same or different courses. |
Guaranteed to Run 
Upcoming Dates |
Class Times |
Class Format |
Quote |
CISA is to Audit what CPA and CA are to Accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise.
Course Outline
Module 1
- Introduction
- Audit Process
- Auditing Standards
- Auditing Guidelines
- Cobit Model
- Audit Management
- Internal Control Classifications
- Planning
- Program
- Evidence
- Audit Control Evaluation
- CSA Control Self-Assessment
Module 2
- IT Governance
- Governance & Security Policies
- Outsourcing & Governance
- Outsourcing & Globalization
- Organizational Compliance
- IT Strategy
- IT Performance
Module 3
- System & Infrastructure
- Requirements
- Project Management Tools - Part 1
- Project Management Tools - Part 2
- Applications
- Agile Development
- Monitoring & Controlling
- Acquisition Process
- Testing Process
- Information Systems Maintenance Practices
- Data Conversion Tools
Module 4
- Media Disposal Process
- Post Implementation Review
- Periodic Review
- System Maintenance
Module 5
- IT Service Delivery and Support
- How to Evalutate Service Level Management Practices
- Operations Management
- Databases
- Structured Query Language (SQL)
- Monitoring Performance
- Source Code and Perfomance Monitoring
- Patch Management
- Incident Management
- Hardware Component Types
- Network Component Types
Module 6
- IS Auditor Technical Overview
- Security Design
- Monitoring Systems
- Types of Attacks
- Cryptography
- Encryption
- Asymmetric Encryption
- Digital Certificate
- Different Kinds of Attacks
- Access Controls
- Identification and Authenication
- Physical Access Exposure
- Environmental Security
- Network Security Devices and Network Components
- Network Address Translation
- Virtual Private Networks (VPNs)
- Voice System Risks
- Intrusion Detection
- Firewalls
- Firewall Implementation
- Network Access Protection
- HoneyPot
- Risks to Portable and Wireless Devices
- Bluetooth
- OSI Networking
- Managing Data
Module 7
- Business Continuity and Disaster Recovery
- Fault Tolerance
- Business Continuity and Disaster Recovery Regulations
CED Solutions is your best choice for CISA Training Course,
CISA Training Course training,
CISA Training Course certification,
CISA Training Course boot camp,
CISA Training Course certification training,
CISA Training Course certification course,
CISA Training Course course,
CISA Training Course class.
|
Follow CED