Sale!

ISACA CISA: Certified Information Systems Auditor by ACI Learning

Original price was: $49.00.Current price is: $15.00.

Sale Price: $15.00
Regular Price: N/A
Size: 7.15 GB
Duration: 26.39 hours
Lessons: 95
Categories: IT Certification, Technology & IT
Brand: ACI Learning

Language: English
Delivery: Instant Download
Rating: ⭐️⭐️⭐️⭐️⭐️ 4.9

Description

ISACA CISA: Certified Information Systems Auditor by ACI Learning

ACI Learning CISA Course Certified Information Systems Auditor. This course is designed to help professionals prepare for the globally recognized CISA certification exam by mastering auditing, control, and security of information systems.

What You’ll Learn

  • Understand the five CISA domains, including Information System Auditing, IT Governance, and Risk Management.
  • Develop skills to assess IT systems, detect vulnerabilities, and implement security controls.
  • Learn best practices in IT governance, compliance, and regulatory frameworks.
  • Master audit planning, execution, and reporting techniques used by top IT auditors.
  • Prepare for the CISA certification exam with real-world case studies and practice questions.

Requirements

Before taking this course, it is recommended that you have:

  • Basic knowledge of IT systems, cybersecurity, and risk management.
  • Understanding of information security principles and compliance frameworks.
  • Experience in IT auditing or a strong interest in pursuing a career in information systems auditing.

ACI Learning CISA Course Description

The ISACA CISA: Certified Information Systems Auditor certification is a globally recognized credential for professionals specializing in IT audit, risk management, and security. This course, offered by ACI Learning, provides a structured approach to mastering the CISA exam objectives and gaining hands-on skills in auditing, compliance, and governance.

With a focus on real-world scenarios, this course helps you understand the key concepts required to pass the CISA exam and apply them effectively in an enterprise IT environment. You will learn how to conduct audits, assess IT risks, implement security measures, and ensure compliance with industry regulations. The course includes practice tests, case studies, and expert guidance to help you confidently pass the CISA exam.

Explore These Valuable Resources

Explore Related Courses

About the Author or Brand

This course is developed by ACI Learning, a trusted provider of IT training and professional development. ACI Learning specializes in cybersecurity, auditing, and IT certifications, offering high-quality training programs designed by industry experts. Their CISA training course prepares professionals to achieve certification success and advance their careers in IT auditing and governance.

95 EPISODES

Here are the topics we’ll cover

  • Course Overview
  • Information System Auditing Process
  • Governance and Management of IT
  • Information Systems Acquisition, Development and Implementation
  • Information Systems Operations and Business Resiliency
  • Protection of Information Assets

Chapter 1 Course Overview
001. Course Overview

Chapter 2 Information System Auditing Process
001. Exam Overview
002. Standards, Guidelines, and Professional Ethics
003. IS Audit Functions
004. Business Process Applications and Controls
005. Control Types
006. Risk and Audit Planning
007. Project Management and Auditing
008. Sampling Methodologies
009. Collecting Evidence
010. Data Analytics and CAATs
011. Continuous Auditing
012. How to Communicate the Audit Results
013. Quality Assurance and Improving Audit

Chapter 3 Governance and Management of IT
001. What is Governance
002. Best Practices for Enterprise Governance in IT
003. Business Intelligence and Strategic Planning
004. IT Standards, Policies and Procedures
005. Organizational Structures
006. Roles and Segregation of Duties
007. Risk Management in the Enterprise
008. Risk Analysis
009. Maturity Models
010. The Role of Industry Standards and Regulations
011. Resource Management in IT
012. Human Resource Management
013. Organizational Change Management and Financial Management
014. IT Service Provider Acquisition and Management
015. Governance in the Cloud
016. Third-party Services
017. Quality Assurance and IT Audits
018. Performance Monitoring and Reporting

Chapter 4 Information Systems Acquisition, Development and Implementation
001. Project Governance and Management
002. Roles in Project Management
003. The PMO
004. Initiating the Project
005. Planning the Project
006. Executing and Monitoring the Project
007. Closing the Project
008. Business Case and Feasibility Analysis
009. System Development Lifecycles
010. System and Software Development Methods
011. Computer Aided Software Engineering and 4GL
012. Identifying and Designing Controls
013. Decision Support Systems
014. Testing Methodologies
015. Application Systems and Data Integrity Testing
016. Data Migration
017. Changeover Techniques
018. System Change and Post Implementation Procedures

Chapter 5 Information Systems Operations and Business Resiliency
001. Necessary Technology Components
002. USB and RFID
003. IT Asset Management
004. System Interfaces and End User Computing
005. Data Governance
006. Operating Systems
007. Software Licensing and Source Code Management
008. Incident and Problem Management
009. Release and Patch Management
010. Service Level Management and Agreements
011. Database Management
012. Business Impact Analysis
013. System Resiliency
014. Backups, Storage and Restoration
015. Business Continuity Management
016. The Business Continuity Plan
017. Testing the BCP
018. Disaster Recovery Plans
019. Testing the DRP

Chapter 6 Protection of Information Assets
001. Frameworks, Standards and Guidelines
002. Roles and Responsibilities for Auditing the IS Management Framework
003. Recommended IT Security Baseline
004. Principles of Data Privacy
005. Physical Access and Controls
006. Environmental Controls
007. Identity and Access Management
008. Logical Access and Authorization Issues
009. Audit Logging of System Access
010. Data Loss Prevention
011. Network Infrastructure
012. Applications in a Networked Environment
013. Network Infrastructure Security Firewalls
014. Change Management in Networks
015. Encryption Systems
016. Applications of Cryptography
017. The Public Key Infrastructure
018. IS Audits and Social Media
019. Virtualization and Cloud Computing
020. Security Awareness Training
021. IS Attack Methods and Techniques
022. Testing Techniques for Security Controls
023. Network Penetration Testing
024. Monitoring Tools
025. Incident Response Management
026. Evidence Collection and Forensics

 


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

You may also like…