Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt

Certified Information Systems Auditor (CISA)

Prepare for the globally recognized CISA certification with the comprehensive course Certified Information Systems Auditor. Designed to help you succeed in the exam, it offers interactive lessons, quizzes, test preps, and hands-on labs. With this course, you will gain the expertise to effectively audit, control, and assess IT systems, elevating your career and contributing to the security and integrity of information systems.

Submit form to obtain discount

Test Prep
85+ Pre Assessment Questions | 3+ Full Length Tests | 85+ Post Assessment Questions | 190+ Practice Test Questions
Features
10+ LiveLab | 10+ Video tutorials | 16+ Minutes
32+ Videos | 05:42+ Hours

Why choose TOPTALENT?

Outline

Lessons 1:
Introduction

  • CISA Exam Objectives
  • Objective Map

Lessons 2:
The Audit Process

  • Audit Process
  • Auditing Standards and Guidelines
  • Audit Management
  • Evidence
  • Audit Control Evaluation
  • Control Self-Assessment
  • Summary

Lessons 3:
Audit Governance and Compliance

  • IT Governance and Strategy
  • Governance Policies
  • Security Policies
  • IT Performance
  • Summary

Lessons 4:
System Infrastructure, Project Management, and Testing

  • System Availability and Reliability
  • Project Management Tools
  • Agile Development
  • Monitoring and Controlling
  • Testing Process Methodologies
  • Information Systems Maintenance Practices
  • Data Conversion Tools
  • Project Review
  • Summary

Lessons 5:
IT Service Level Management

  • System Communication and Data Exchange 
  • Service Level Management Practices
  • Operations Management
  • Database Management
  • Patch Management
  • Incident Management
  • Hardware Component Types
  • Summary

Lessons 6:
Auditor Technical Overview

  • IS Auditor Technical Overview
  • Privacy Protection
  • Physical Access Exposure and Environmental Security
  • Risks to Portable and Wireless Devices
  • Information System Attacks, Security Testing, and Monitoring Tools
  • Summary