Our course aims to provide current and future information system auditors with the knowledge and skills required to deliver high-quality auditing in a range of industries. It is intended for:
Current and future systems auditors interested in advancing their career
IT professionals in other domains wishing to expand their skills portfolio
Individuals aiming to pass a CISA accreditation exam
Professionals looking to improve their workplace value by acquiring in-demand auditing skills
Those looking to consolidate their information systems auditing knowledge
It is recommended that individuals taking this course have a minimum of 5 years’ experience in professional systems auditing, control or security.
courses are provided by Good e-Learning, an APMG-International Accredited
Training Organisation.
This high-quality training course teaches students everything they need to know to become a Certified Information Systems Auditor (CISA).
CISA is the world-class certification framework for information systems auditing, control, monitoring and assessment. Our comprehensive training modules will take you through fundamental auditing and evaluation skills while preparing you to pass the CISA certification exam and develop your career.
This module introduces you to the course’s main features, learning plan, aims and objectives, and structure. It includes a syllabus, diagram pack, glossary, further reading and links document, and links to download essential copies of the framework publications.
It also contains some of the most frequently asked questions about CISA.
Our CISA training is divided into five domains, each of which draws on current workplace practices. The five domains are:
Information Systems Audit Process: Students will learn how to plan, conduct and report on IS audits
IT Governance and Management: Students will learn how to evaluate an organization’s structures, policies and processes
Information Systems, Acquisition, Development and Implementation: Students will learn the core skills involved in managing IS projects
Information Systems Operations and Business Resilience: Students will learn best practices in the maintenance and service management of information systems
Protection of Information Assets: Students will learn to identify and recommend practices that actively address cyber risks
This module introduces you to the course’s main features, learning plan, aims and objectives, and structure. It includes a syllabus, diagram pack, glossary, further reading and links document, and links to download essential copies of the framework publications. It also contains some of the most frequently asked questions about CISA.
Module 1 introduces the information systems auditing process. In chapter 1, learners explore the audit planning process. This includes: Standards and guidelines Business process and controls Types of audits In chapter 2, learners look at how IS audits are executed, including: Audit project management Sampling and evidence collection Reporting and quality assurance
explores the governance and management of IT. Chapter 1 explores IT governance and strategy, including: Enterprise governance Information security governance Organizational structure Risk management Legislation Chapter 2 explores IT management, including: IT resource and service provider management Outsourcing Performance management
explores the acquisition, development and implementation of information systems. Chapter 1 presents IS acquisition and development, including: Project management Feasibility analysis System, software and infrastructure development Chapter 2 presents information systems implementation, including: Testing, configuration and release management System migration
is concerned with IS operations and business resilience. Chapter 1 explores information systems operations, including: Technology and IT asset management Performance, problem and incident management Managing IT service levels Chapter 2 explores business resilience, including: Impact analysis Resiliency and recovery Business continuity Disaster recovery planning
discusses the protection of information assets. Chapter 1 explores: Information asset security and privacy controls Access control, network security and managing security on different devices Chapter 2 explores: Security event management, including monitoring and testing Incident response and evidence collection
provides an opportunity to consolidate and practice key terms and concepts from all 5 domains. It also includes a short practice exam.
We're excited to announce a new partnership with Good e-Learning, a leading provider of high-quality online courses, that expands your learning opportunities on Lewa! Through this collaboration, we're bringing you an even wider range of expertly crafted courses, along with exclusive benefits to accelerate your knowledge journey.
What does this partnership mean for you?
This partnership is a win-win, providing you with:
Ready to embark on your learning journey with Lewa and Good e-Learning?
Browse our expanded course library today and discover the perfect program to take your career or personal development to the next level. With all rights of the courses credited to Good e-Learning and the additional benefits you receive on Lewa, you're guaranteed a high-quality, enriching learning experience that leads to valuable outcomes.
Start your journey today, invest in your future, and achieve your goals with Lewa and Good e-Learning!
CYBER SECURITY - Certified Information Systems Auditor (CISA)
No Review found