Certified Information Systems Auditor (CISA)

available upon request
Book Your Seat Today!

Kindly advise me your company detail and our consultant will contact you soonest!

Course Objectives

In this course, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification.

  • The Process of Auditing Information Systems
  • Governance and Management of IT
  • Information Systems Acquisition, Development, and Implementation
  • Information Systems Operations, Maintenance, and Support
  • Protection of Information Assets


Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams.

Target Audience

The CISA Certification was specifically created for professionals with work experience in information systems auditing, control or security that include:

  • IS/IT Auditors
  • Security Professionals
  • IS/IT Consultants
  • IS/IT Audit Managers

Training Outline

Testing-Taking Tips and Study Techniques
  • Preparation for the CISA Exam
  • Submitting Required Paperwork
  • Resources and Study Aids
  • Passing the Exam, the First Time
The Audit Process
  • Risk
  • Audit
  • Standards and Guidelines
IT Governance
  • Best Practices
  • Management Practices
  • Roles and Responsibilities
Lifecycle Management
  • Project Management
  • Business Application Development
  • Information Systems Maintenance Practices
System Infrastructure Control
  • Auditing Application Controls
  • Application System Development
  • Business Application Systems
Information Systems Hardware and Architecture
  • Information Systems Operations
  • Information Systems Hardware
  • SDLC
  • Databases
Information Systems Used for IT Delivery and Support
  • OSI
  • TCP/IP Model
  • Routers/Switches/Hubs
  • Firewalls
  • Wireless
  • WAN Technologies – X.25/Frame Relay/PPP/ISDN/DSL/Cable
Protection of Logical Assets
  • CIA
  • Roles and Responsibilities – RACI
  • Asset Management
  • Taxonomy – Information Classification
  • Risk Management
  • Policies, Procedures, Standards, Guidelines, Baselines
  • Knowledge Transfer – Awareness, Training, Education
Physical Security
  • Environmental Protection Practices
  • Physical Authentication
  • Policies and Procedures
Business Continuity and Disaster Recovery
  • BIA Policy
  • BIA Roles and Teams
  • Data Backups, Vaulting, Journaling, Shadowing
  • Alternate Sites
  • Emergency Response
  • Required Notifications
  • BIA Tests
Review and Q&A Session
  • Final Review and Test Prep


Systems administration experience, familiarity with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course.