Get in Touch

award icon svg Certificate

Course Outline

Objective:

The primary objective is to help you pass your CISA examination on the first attempt.

Information System Auditing Process (21%)

Deliver audit services in accordance with IT audit standards to assist organizations in protecting and controlling their information systems.

  • 1.1 Develop and implement a risk-based IT audit strategy compliant with IT audit standards to ensure key areas are covered.
  • 1.2 Plan specific audits to determine whether information systems are protected, controlled, and provide value to the organization.
  • 1.3 Conduct audits in line with IT audit standards to achieve planned audit objectives.
  • 1.4 Report audit findings and provide recommendations to key stakeholders to communicate results and drive necessary changes.
  • 1.5 Perform follow-ups or prepare status reports to ensure management has taken appropriate actions in a timely manner.

Governance and Management of IT (17%)

Provide assurance that the necessary leadership, organizational structure, and processes are in place to achieve objectives and support the organization's strategy.

  • 2.1 Evaluate the effectiveness of the IT governance structure to determine if IT decisions, directions, and performance support the organization’s strategies and objectives.
  • 2.2 Assess IT organizational structure and human resources management to determine alignment with the organization’s strategies and objectives.
  • 2.3 Evaluate the IT strategy, including direction, and the processes for its development, approval, implementation, and maintenance to ensure alignment with organizational strategies and objectives.
  • 2.4 Assess the organization’s IT policies, standards, and procedures, including their development, approval, implementation, maintenance, and monitoring, to ensure they support the IT strategy and comply with regulatory and legal requirements.
  • 2.5 Evaluate the quality management system to determine if it supports the organization’s strategies and objectives in a cost-effective manner.
  • 2.6 Assess IT management and control monitoring (e.g., continuous monitoring, QA) for compliance with the organization’s policies, standards, and procedures.
  • 2.7 Evaluate IT resource investment, usage, and allocation practices, including prioritization criteria, for alignment with organizational strategies and objectives.
  • 2.8 Assess IT contracting strategies, policies, and contract management practices to determine alignment with the organization’s strategies and objectives.
  • 2.9 Evaluate risk management practices to determine if the organization’s IT-related risks are appropriately managed.
  • 2.10 Assess monitoring and assurance practices to ensure the board and executive management receive sufficient and timely information regarding IT performance.
  • 2.11 Evaluate the organization’s business continuity plan to determine its ability to sustain essential business operations during an IT disruption.

Information Systems Acquisition, Development and Implementation (12%)

Provide assurance that practices for acquiring, developing, testing, and implementing information systems align with the organization’s strategies and objectives.

  • 3.1 Evaluate the business case for proposed investments in information systems acquisition, development, maintenance, and retirement to ensure alignment with business objectives.
  • 3.2 Assess project management practices and controls to determine if business requirements are met cost-effectively while managing organizational risks.
  • 3.3 Conduct reviews to determine if a project is progressing according to plan, is adequately documented, and has accurate status reporting.
  • 3.4 Evaluate controls for information systems during requirements, acquisition, development, and testing phases for compliance with organizational policies, standards, procedures, and external requirements.
  • 3.5 Assess the readiness of information systems for implementation and migration to production to determine if project deliverables, controls, and organizational requirements are met.
  • 3.6 Conduct post-implementation reviews of systems to determine if project deliverables, controls, and organizational requirements have been met.

Information Systems Operation and Business Resilience (23%)

Provide assurance that processes for information systems operations, maintenance, and support align with the organization’s strategies and objectives.

  • 4.1 Conduct periodic reviews of information systems to ensure they continue to meet organizational objectives.
  • 4.2 Assess service level management practices to determine if service levels from internal and external providers are defined and managed.
  • 4.3 Evaluate third-party management practices to ensure providers adhere to the control levels expected by the organization.
  • 4.4 Assess operations and end-user procedures to ensure scheduled and unscheduled processes are managed to completion.
  • 4.5 Evaluate information systems maintenance processes to ensure they are effectively controlled and continue to support organizational objectives.
  • 4.6 Assess data administration practices to determine database integrity and optimization.
  • 4.7 Evaluate the use of capacity and performance monitoring tools and techniques to ensure IT services meet organizational objectives.
  • 4.8 Assess problem and incident management practices to ensure incidents, problems, or errors are recorded, analyzed, and resolved timely.
  • 4.9 Evaluate change, configuration, and release management practices to ensure scheduled and unscheduled changes to the production environment are adequately controlled and documented.
  • 4.10 Assess backup and restore provisions to determine the availability of information required to resume processing.
  • 4.11 Evaluate the organization’s disaster recovery plan to ensure it enables the recovery of IT processing capabilities in the event of a disaster.

Protection of Information Assets (27%)

Provide assurance that the organization’s security policies, standards, procedures, and controls ensure the confidentiality, integrity, and availability of information assets.

  • 5.1 Evaluate information security policies, standards, and procedures for completeness and alignment with generally accepted practices.
  • 5.2 Assess the design, implementation, and monitoring of system and logical security controls to verify the confidentiality, integrity, and availability of information.
  • 5.3 Evaluate the design, implementation, and monitoring of data classification processes and procedures for alignment with organizational policies, standards, procedures, and applicable external requirements.
  • 5.4 Assess the design, implementation, and monitoring of physical access and environmental controls to determine if information assets are adequately safeguarded.
  • 5.5 Evaluate processes and procedures for storing, retrieving, transporting, and disposing of information assets (e.g., backup media, offsite storage, hard copy/print data, and softcopy media) to determine if information assets are adequately safeguarded.

Requirements

  • 5 years of professional experience in IT auditing or security.
  • Foundational knowledge in information technology operations, business support via IT, and internal controls.

Work experience requirements may be reduced to 4 years if the candidate holds a bachelor’s degree, or to 3 years with a master’s degree.

Candidates are permitted to sit for the exam before meeting the work experience requirement. However, the required experience must be obtained within 5 years of the exam date. Failure to do so will render your exam results invalid.

Target Audience

  • Auditors
  • IT system auditors
  • IT infrastructure managers,
  • Risk management or business continuity managers,
  • Professionals responsible for all aspects of IT management
 28 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories