Sale!

 14,999.00

  • Online Live Classroom for 20 hours
  • Class Video Recording (Downloadable)
  • Self paced Video Training
  • CISA e-book (2022 collection)
  • Project Codes
  • Learner Community
  • 24×7 support
  • Job assistance
  • Newsletters and updates
Compare
Category:

Description

Certified Information Systems Auditor (CISA) refers to a designation issued by the Information Systems Audit and Control Association (ISACA). The designation is the global standard for professionals who have a career in information systems, in particular, auditing, control, and security.

This credential helps demonstrate your expertise in assessing security vulnerabilities, designing and implementing controls, and reporting on compliance. It’s among the most recognized certifications for careers in cybersecurity auditing.

Our Course is designed specifically for candidates from non-technical background. This course is designed on the basis of official resources of ISACA. It covers all the 5 domains of CISA Review Manual. Topics are arranged segment wise and aligned with latest CISA Review Manual.

The classes will be live instructor led and extremely engaging.Topics are arranged segment wise and aligned with latest CISA Review Manual. Please note this course is not an replacement of CISA Review Manual and Question but to  supplement the content of the ISACA’s official resources – Where our expert trainer will decipher the technicalities used in CISA Review Manual (CRM) in an effective manner so that you can clear this exam with ease.

 

Course content

  • Practice Questions – Audit Planning
  • 1.1.2 Audit Charter
  • Practice Questions – Audit Charter
  • Practice Questions – EDI
  • 1.3 Types of Controls
  • Practice Questions – Types of Controls
  • 1.4.1 What is Risk?
  • 1.4.3 Types of Risks
  • 1.4.4 Risk response methodology
  • 1.4.5 Key Aspects – Risk based Audit Planning
  • 1.4.6 QAE – Risk based Audit Planning
  • Practice Questions – Risk based Audit Planning
  • 1.6.1 Key Aspects – Audit Project Management
  • 1.6.2 QAE – Audit Project Management
  • Practice Questions – Audit Project Management
  • 1.7.1 Sampling Methodology
  • 1.7.2 Compliance and Substantive Testing
  • Practice Questions – Sampling Methodology
  • 1.8 Audit Evidence Collection Techniques
  • Practice Questions – Audit Evidence Collection Techniques
  • 1.9.1 Continuous Auditing Techniques
  • 1.9.2 Data Analytics
  • Practice Questions – Data Analytics
  • Practice Questions – Reporting and Communication Techniques
  • 1.11 Control Self Assessment
  • Practice Questions – Control Self Assessment

     

  • 2.1.2 QAE Enterprise Governance of Information and Technology
  • Practice Questions – EGIT
  • 2.3.1 IT Standards, Policies and Procedures
  • Practice Questions – IT Standards, Policies and Procedures
  • 2.3.2 Approaches for Policy Development (Top down & Bottom up)
  • 2.4.1 Organizational Structure – Roles and Responsibility of Various Functions
  • 2.4.2 IT Strategy & Steering Committee
  • Practice Questions – Roles and Responsibilities
  • 2.5 Enterprise Architecture
  • Practice Questions – Enterprise Architecture
  • 2.6.2 Risk Treatment
  • 2.6.1 Risk Analysis Methods
  • 2.6.3 Enterprise Risk Management
  • Practice Questions – Enterprise Risk Management
  • 2.7 Maturity Models
  • 2.8 Laws, Regulations and Industry Standards Affecting the Organization
  • Practice Questions – Laws & Regulations
  • 2.9 IT Resource Management Training Scheduling and Time Reporting Terms and Cond
  • Practice Questions – IT Resource Management
  • 2.10 IT Service Provider Acquisition and Management
  • Practice Questions – IT Service Providers
  • 2.11.1 IT Performance Monitoring and Reporting
  • 2.11.2 Balanced Score Card
  • Practice Questions – IT Performance Monitoring and Reporting
  • 2.12 Quality Assurance and Quality Management of IT
  • Practice Questions – Quality Assurance and Quality Management

     

  • 3.1.1 Project Evaluation Methods
  • 3.1.2 Project Management Structure
  • Practice Questions – Project Management Structure
  • Practice Questions – Business Case and Feasibility Analysis
  • 3.3.1 Agile System Development Methodology
  • 3.3.2 Object Oriented system development methodology
  • 3.3.3 Prototype & Rapid Application Development (RAD)
  • 3.3.4.1 Key Aspects – System Development Methodologies
  • 3.3.4.2 QAE – System Development Methodologies
  • Practice Questions – System Development Methodologies
  • 3.4.1 Check Digit
  • 3.4.2 Parity Bit, Checksum and CRC
  • 3.4.3.1 Key Aspects – Control Identification and Design and Balancing
  • 3.4.3.2 QAE – Control Identification and Design and Balancing
  • Practice Questions – Control Identification and Design
  • 3.5 Testing Methodologies
  • Practice Questions – Testing Methodology
  • 3.7 System Migration, Infrastructure Deployment and Data Conversion
  • Practice Questions – System Migration
  • 3.8 Post-implementation Review
  • Practice Questions – Post Implementation Review

     

  • 4.1.1 RFID
  • Practice Questions – RFID
  • 4.2 IT Asset Management
  • Practice Questions – IT Asset Management
  • 4.3 Job Scheduling and Production Process Automation
  • Practice Questions – Job Scheduling and Production Process
  • Practice Questions – End User Computing
  • 4.7 Systems Performance Management
  • Practice Questions – Systems Performance Management
  • 4.8.1 Problem and Incident Management
  • Practice Questions – Problem and Incident Management
  • 4.8.2 Network Management Tools
  • 4.9 Change, Configuration, Release and Patch Management
  • Practice Questions – Change, configuration, release and patch management
  • 4.10 IT Service Level Management
  • Practice Questions – IT Service Level Management
  • 4.11.3 Database checks and controls
  • 4.11.4 DBA Roles and Responsibilites & SoD
  • 4.11.5 Database Management
  • Practice Questions – Database Management
  • 4.12 Business Impact Analysis
  • Practice Questions – Business Impact Analysis
  • 4.13 System Resiliency
  • Practice Questions – System Resiliency
  • 4.15.2 Business Continuity Plan
  • Practice Questions – Business Continuity Plan
  • 4.16.1 Types of Backup
  • Practice Questions – Types of Backup
  • 4.16.2 RTO & RPO
  • Practice Questions – RTO & RPO
  • 4.16.3 Alternate Recovery Site
  • Practice Questions – Alternate Recovery Site
  • 4.16.4 Disaster Recovery Plans
  • Practice Questions – Disaster Recovery Plans
  • 4.16.5 DRP – Test Methods
  • Practice Questions – DRP Test Methods

     

  • 5.1 Information Security Management Framework
  • Practice Questions – Information Security Management Framework
  • Practice Questions – Privacy Principles
  • 5.3.1 Physical Access and Environmental Controls
  • 5.3.2 Fire Supression Systems
  • Practice Questions – Physical Access and Environmental Control
  • 5.4.1 Single Sign On
  • 5.4.3.1 Key Aspects – Identity and Access Management
  • 5.4.3.2 QAE 1 – Identity and Access Management
  • 5.4.3.3 QAE 2 – Identity and Access Management
  • Practice Questions – Identity and Access Management
  • 5.5.1 Biometrics
  • Practice Questions – Biometric
  • 5.5.2 OSI Layers
  • 5.5.3 Firewall Types
  • 5.5.4 Firewall Implementation
  • Practice Questions – Firewall Types and Implementation
  • Practice Questions – Virtual Private Network (VPN)
  • 5.5.6 Network LAN Components
  • 5.5.7 Network Physical Devices
  • Practice Questions – Network and End Point Devices
  • Practice Questions – Voice over Internet Protocols (VoIP)
  • 5.5.9 Wireless Network
  • Practice Questions – Wireless Network
  • Practice Questions – Email Security
  • 5.6 Classification of Information Assets
  • 5.7 Data Encryption and Encryption-related Techniques
  • Practice Questions – Public Key Cryptography
  • 5.8 Public Key Infrastructure
  • Practice Questions – Elements of Public Key Infrastructure
  • Cloud Computing
  • Practices Questions – Cloud Computing
  • 5.12 Security Awareness Training and Programs
  • Practice Questions – Security Awareness Training and Program
  • 5.13.1 Information System Attack Methods and Techniques
  • 5.13.2 Key Aspects – Information System Attack Methods and Techniques
  • 5.13.3 QAE – Information System Attack Methods and Techniques
  • Practice Questions – Information system attack methods and techniques
  • Security Testing Tools and Techniques
  • Practice Questions – Security Testing Tools and Techniques
  • 5.15 IDS & IPS
  • Practice Questions – Security monitoring tools and techniques
  • 5.16 Incident Response Management
  • Practice Questions – Incident Response Management
  • 5.17 Evidence Collection and Forensics
  • Practice Questions – Evidence Collection and Forensics

     

  • Practice Questions – Set 1
  • Practice Questions – Set 2
  • Practice Questions – Set 3
  • Practice Questions – Set 4
  • Practice Questions – Set 5
  • Practice Questions – Set 6
  • Practice Questions – Set 7
  • Practice Questions – Set 8
  • Practice Questions – Set 9
  • Practice Questions – Set 10
  • Practice Questions – Set 11
  • Practice Questions – Set 12
  • Practice Questions – Set 13
  • Practice Questions – Set 14
  • Practice Questions – Set 15
  • Practice Questions – Set 16
  • Practice Questions – Set 17
  • Practice Questions – Set 18
  • Practice Questions – Set 19
  • Practice Questions – Set 20

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Leave a Reply

Your email address will not be published.

X

Cart

Cart

Your Cart is Empty

Back To Shop

Add to cart