With cyberattacks on the rise, more organizations are investing in data protection and building out their cybersecurity teams. As an IT professional, earning your Certified Information Systems Auditor (CISA) certification could be the first step to leading IT security at your organization.
This online CISA training course will teach you how to identify and evaluate the five Certified Information Systems Auditor domains: auditing, governance, implementation, management, and protection. Throughout this CISA certification course, you will learn the process of auditing information systems, governance and the management of IT, information systems acquisition, development, and implementation, information systems operation, maintenance, and support fundamentals, and protection and information of assets.
This CISA certification course offers enrollment with a voucher. The voucher is prepaid access to sit for the CISA certification exam and is included with this course upon eligibility.
Instructor(s):Derrick Coston
Derrick Coston is a blue-team cybersecurity professional. Derrick has run a team of cybersecurity professionals for a major financial institution. Outside of teaching classes such as CISA and CISSP, Derrick serves as a cybersecurity consultant and auditor for organizations and performs security assessments for large organizations.
Requirements:
Hardware Requirements:
- This course can be taken on either a PC, Mac, or Chromebook.
Software Requirements:
- PC: Windows 10 or later.
- Mac: macOS 12 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox is preferred. Microsoft Edge and Safari are also compatible.
- Virtual Labs included with course
- Microsoft Word Online
- Adobe Acrobat Reader
- Software must be installed and fully operational before the course begins.
Other:
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment.
- Study guide
- Practice exams
Hide Syllabus
Lesson 1
- The Process of Auditing Information Systems
- Task statements
- Knowledge statements
- Executive misconduct and relevant regulations
- Regulatory objectives and assessing threats and vulnerabilities
- Leadership through governance
- Understanding policies, standards, guidelines and procedures
- Understanding professional ethics
- Understanding the purpose of an audit
- Implementing audit standards
- The executive position of auditor
- Understanding the corporate organizational structure
- Governance and Management of IT
- Task statements and knowledge statements
- Managing IT governance
- Tactical management
- Business process re-engineering
- Operations management
- Information Systems Acquisition, Development, and Implementation
- Task statements and knowledge statements
- Audit process
- Performing the audit
- Gathering audit evidence
- Conducting audit evidence testing
- Information Systems Operation, Maintenance, and Support
- Task statements and knowledge statements
- System implementation and operations
- Understanding IT services
- IT operations management
- Administrative protection
- Problem management
- Monitoring controls status
- Implementing physical protection
- Protection and Information Assets
- Protection of information assets
- Technical protection
Hide Syllabus