Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
CISA Domain: The Process of Auditing Information Systems - Part 1 $74.95
CISA Domain: The Process of Auditing Information Systems - Part 2 $74.95
CISA Domain: Governance and Management of IT - Part 1 $74.95
CISA Domain: Governance and Management of IT - Part 2 $74.95
CISA Domain: IS Acquisition, Development, and Implementation - Part 1 $74.95
CISA Domain: IS Acquisition, Development and Implementation - Part 2 $74.95

Bundle Price: $219.00
Total Savings: $230.70


CISA Domain: The Process of Auditing Information Systems - Part 1

Auditing Information Systems has become an integral part of business management in both big and small corporate environments. This course examines the starting points for performing and IS audit and some of the standards, guidelines, tools and, techniques that can be used to setup, manage, and monitor the audit function. The Certified Information Systems Auditor (CISA) certification is known worldwide as a standard of achievement for those who audit, control, monitor and assess an organization's information technology and business systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • describe the role of the audit charter in the organization of the IS audit function
  • sequence the steps to perform audit planning
  • recognize the effect of laws and regulations on audit planning
  • recognize how to manage an IS audit function
  • describe the points of the code of professional ethics
  • recognize IS Audit and Assurance standards
  • identify the IT audit and assurance tools and techniques
  • match examples of ISACA auditing guidelines with the correct guideline
  • define the three categories of standards in the Information Technology Assurance Framework
  • define the guidelines and tools and techniques in the Information Technology Assurance Framework
  • recognize risk analysis concepts within an auditing context
  • recognize internal controls within an auditing context
  • describe IT audit and assurance standards
  • describe IT audit and assurance guidelines and tools and techniques
  • recognize standards, guidelines, and tools and techniques from the Information Technology Assurance Framework (ITAF)
  • work with concepts of risk analysis and internal controls within an auditing context

CISA Domain: The Process of Auditing Information Systems - Part 2

While performing audits, it is extremely important to classify audit information and to evaluate and document both the controls used and the outcomes of all parts of the audit process. This course examines the audit classification process, how risk-based auditing is performed, how compliance testing is used, and the processes and procedures used to evaluate and document the audit process. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • classify the various types of audits based on the procedures associated with them
  • recognize the different phases of an audit
  • recognize the concepts of risk-based auditing and audit risk and materiality
  • recognize risk assessment concepts within an auditing context
  • compare compliance testing and substantive testing
  • classify audits and recognize risk-based auditing concepts
  • recognize risk assessment concepts and compare testing techniques
  • describe the different type of audit aids used by an IS auditor
  • specify how to evaluate an audit and recognize how to communicate results to management
  • describe the types of audit documentation required during an IS audit
  • specify the concept of control self-assessment (CSA) and its objectives
  • describe some of the benefits of CSA
  • recognize the role of the auditor and technology in CSA
  • recognize how the IS audit process must continue to evolve to keep up with innovation in technology
  • recognize how to apply audit aids, evaluate and document an audit, and communicate results
  • describe the concept of control self-assessment (CSA) and recognize the evolving IS audit process

CISA Domain: Governance and Management of IT - Part 1

IS Governance is an incredibly important part of IS security. Management and monitoring of resources are built into the audit process and the CISA must be aware of the role they will play in the process. This course examines the role of Governance, IT Management and IT Monitoring, and the strategies and models used to evaluate and create policies and procedures within the environment. This course also examines the Risk Management strategies that can be used, and how the CISA plays a role in choosing the correct strategy for the environment. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • match the example of governance to either corporate or IT
  • recognize best practices for IT governance
  • match examples of other IT monitoring and assurance practices with their correct descriptions
  • recognize the role of governance, IT management and IT monitoring in the IS audit process
  • recognize information systems strategies
  • match maturity and process improvement models with their correct descriptions
  • describe IT investment and allocation practices
  • recognize the role of policies and procedures in IS auditing
  • implement a risk management process
  • define risk management techniques and recognize how to develop a risk management program
  • match the different risk analysis methods with their correct description
  • calculate Annual Loss Expectancy (ALE)
  • implement IS strategies, maturity models, and allocation practices
  • implement policies, procedures, and risk management

CISA Domain: Governance and Management of IT - Part 2

Information Security Management Practices should adhere to the business goals of an organization, aligning to the objectives that management set down for company improvement. This course examines different types of management practices such as human resource management, sourcing management, change management, financial management, and quality management. This course also looks at how segregation of duties is used to better control information security. Finally, this course examines business continuity and impact analysis and how it can be used as part of information security management practices. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • recognize human resource management practices and how they relate to the IS function
  • match IS management approaches with their related features
  • recognize how to optimize IT performance
  • recognize various outsourcing practices and strategies
  • specify how governance relates to outsourcing
  • describe how to manage third-party service delivery
  • describe IS roles and responsibilities
  • recognize how segregation of duties in IS can prevent fraudulent or malicious acts
  • match segregation of duties controls and compensating controls to their correct descriptions
  • recognize IS management practices
  • recognize IS sourcing practices
  • recognize IS organizational structure and responsibilities
  • interpret IT governance documentation and contractual agreements before auditing the IS function
  • compare business continuity planning and IS business continuity planning
  • recognize the business continuity planning process and policy
  • recognize how to implement business continuity planning incident management
  • identify what happens in the business impact analysis phase
  • identify the factors to consider while developing the business continuity plan
  • recognize the key components of a business continuity plan
  • match the plan testing phases with their correct description
  • recognize how to review the business continuity plan as part of the IS audit
  • describe other tasks related to auditing business continuity
  • review IT governance documentation and describe business continuity planning
  • recognize how business impact analysis contributes to the development of a business continuity plan
  • recognize how to test and audit business continuity

CISA Domain: IS Acquisition, Development, and Implementation - Part 1

The acquisition, development, and management of business projects are important in all information systems builds. The CISA must make sure that all these aspects are brought together, and that the business model of the organization is adhered to at all times during this process. This course examines how business realization is applied, how project management structures are built, and how project management practices are used to correctly implement the project management structures. This course also examines the business applications that are used, and the processes that play a part in these implementations, such as SDLC. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • recognize the concept of business realization
  • describe the project management structure
  • describe characteristics of project management
  • recognize techniques to estimate software size and project budgets
  • recognize scheduling and general project management techniques
  • recognize how to control and close a project
  • recognize the concept of business realization and describe project management structure
  • recognize project management techniques and practices
  • recognize the phases of the traditional SDLC approach
  • implement integrated resource management systems
  • describe the feasibility phase of SDLC
  • describe the requirements phase of SDLC
  • describe the software acquisition process
  • describe the design phase of SDLC
  • recognize programming methodologies in the development phase of SDLC
  • recognize testing schemes in the development phase of SDLC
  • describe how to plan for the implementation phase of SDLC
  • recognize post-implementation practices and techniques
  • recognize software development risks and techniques
  • recognize the SDLC approach and how to implement integrated resource management systems
  • describe the feasibility, requirements, and design phases of SDLC
  • describe the development and implementation phases of SDLC
  • recognize postimplementation and software development techniques

CISA Domain: IS Acquisition, Development and Implementation - Part 2

Business Application Systems play a substantial role in many corporate infrastructures today. This course examines the role of the auditor in environments where business application systems and agile development systems are being used. The Certified Information Systems Auditor (CISA) certification is known world-wide as the standard of achievement for those who assess, audit, control, and monitor an organization’s information systems. CISA has been given ISO/IEC 17024:2003 certification by The American National Standards Institute (ANSI). This course will help to prepare learners for the CISA examination and follows the 2014 ISACA Candidate Information Guide.
  • recognize e-commerce risks, requirements, and best practices
  • compare traditional EDI and web-based EDI
  • recognize controls in the EDI environment
  • recognize what's involved in auditing EDI
  • describe the electronic mail process
  • recognize the different types of electronic finance systems
  • describe EFT and integrated systems
  • describe IVR and other electronic systems
  • describe image processing and its benefits and risks
  • recognize the concepts of artificial intelligence, expert systems, and business intelligence
  • recognize support management systems
  • recognize alternative forms of software project organization
  • recognize alternative software development methods
  • recognize the concept of e-commerce and EDI
  • recognize electronic systems and Interactive Voice Response (IVR)
  • describe image processing, AI, BI, and support management
  • recognize alternative forms of software project organization and development
Register Now
Certified Internet Security Auditor (CISA) Part 1 e-learning bundle
  • Course ID:
    252705
  • Duration:
    15 hours
  • Price:
    $219