CISA Certification Training

CISA Certification Training October Class

CISA certification training is aligned to ISACA and ensures that you ace the exam in your first attempt. Most jobs in this field either require or prefer that candidates have a CISA certification.

START:
October 7, 2020
PRICE
150,000.00

Address

PLOT 14,Odeniran close,Off Opebi,Oregun Link Bridge,Opebi Ikeja,Lagos   View map

CISA Certification Training

Course description

  • What are the course objectives?

     CISA certification training is aligned to ISACA and ensures that you ace the exam in your first attempt. Most jobs in this field either require or prefer that candidates have a CISA certification. The CISA training will enhance your understanding of IS audit processes and also help you understand how to protect information systems.

    What skills will you learn?

    By the end of this training, you will:

    • Be able to identify and assess vulnerabilities and report on compliance and institutional controls.
    • Gain a better understanding of IS audit and assurance guidelines, standards, and best practices.
    • Learn how to govern and control enterprise IT environments.
    • Understand the acquisition, development, testing, and implementation of information systems.
    • Develop working knowledge of the five domains of CISA, as prescribed by ISACA.
    • Acquire the relevant knowledge and skills required to pass the CISA certification exam by ISACA.

    CISA Certification Training

    Jobs that are ideal for CISA trained professionals include:

    • Information security manager/consultant
    • Technical consultant
    • Operational risk manager
    • Analysts
    • Compliance managers
    • Project manager
    • Cloud security
    • IT auditor

    Why should I enroll for JK Michaels CISA training course?

    CISA has become one of the most sought-after certification programs in the world due to a growing demand for professionals possessing information systems audit, control, and security skills. CISA certification will give you these critical skills and provide with a competitive edge over your peers in the field of information security. This course will also help you prepare for the CISA certification exam.

    Exam & certification

    • How will I become a CISA certified professional?

      To become a CISA certified professional, you must meet the following requirements:

      1. Pass the CISA examination
      2. Submit an application for CISA certification
      3. Adherence to the Code of Professional Ethics
      4. Adherence to the Continuing Professional Education Program
      5. Compliance with the Information Systems Auditing Standards

     

    • Domain 00 – Course Introduction
      • 0.1 Course Introduction
    • Domain 01 – Process of Auditing Information Systems
      • 1.1 Introduction
      • 1.2 Objectives
      • 1.3 Task and Knowledge Statement Introduction
      • 1.4 Knowledge Statement 1.1
      • 1.5 Knowledge Statement 1.2
      • 1.6 Knowledge Statement 1.3
      • 1.7 Knowledge Statement 1.4
      • 1.8 Knowledge Statement 1.5
      • 1.9 Knowledge Statement 1.6
      • 1.10 Knowledge Statement 1.7
      • 1.11 Knowledge Statement 1.8
      • 1.12 Knowledge Statement 1.9
      • 1.13 Knowledge Statement 1.10
      • 1.14 Knowledge Statement 1.11
      • 1.15 Quiz
      • 1.16 Quiz Question 1
      • 1.17 Quiz Solution 1
      • 1.18 Quiz Question 2 
      • 1.19 Quiz Solution 2
      • 1.20 Quiz Question 3
      • 1.21 Quiz Solution 3
      • 1.22 Quiz Question 4
      • 1.23 Quiz Solution 4
      • 1.24 Case Study 1 Scenario
      • 1.25 Case Study 1 Questions
      • 1.26 Case Study 2 Scenario
      • 1.27 Case Study 2 Questions
      • 1.28 Key Takeaways
      • 1.29 Conclusion
    • Domain 02 – Governance and Management of IT
      • 2.1 Introduction
      • 2.2 Objectives
      • 2.3 Knowledge Statement 2.1
      • 2.4 Knowledge Statement 2.2
      • 2.5 Knowledge Statement 2.3
      • 2.6 Knowledge Statement 2.4
      • 2.7 Knowledge Statement 2.5
      • 2.8 Knowledge Statement 2.6
      • 2.9 Knowledge Statement 2.7
      • 2.10 Knowledge Statement 2.8
      • 2.11 Knowledge Statement 2.9
      • 2.12 Knowledge Statement 2.10
      • 2.13 Knowledge Statement 2.11
      • 2.14 Knowledge Statement 2.12 and 2.13
      • 2.15 Knowledge Statement 2.14
      • 2.16 Knowledge Statement 2.15
      • 2.17 Knowledge Statement 2.16
      • 2.18 Knowledge Statement 2.17
      • 2.19 Quiz
      • 2.20 Quiz Question 1
      • 2.21 Quiz Solution 1
      • 2.22 Quiz Question 2
      • 2.23 Quiz Solution 2
      • 2.24 Quiz Question 3
      • 2.25 Quiz Solution 3
      • 2.26 Quiz Question 4
      • 2.27 Quiz Solution 4
      • 2.28 Quiz Question 5
      • 2.29 Quiz Solution 5
      • 2.30 Case Study 1 Scenario
      • 2.31 Case Study 1 Questions
      • 2.32 Case Study 2 Scenario
      • 2.33 Case Study 2 Questions
      • 2.34 Key Takeaways
      • 2.35 Conclusion
    • Domain 03 – Information Systems Acquisition, Development and Implementation
      • 3.1 Introduction
      • 3.2 Objectives
      • 3.3 Knowledge Statement 3.1
      • 3.4 Knowledge Statement 3.2
      • 3.5 Knowledge Statement 3.3
      • 3.6 Knowledge Statement 3.4
      • 3.7 Knowledge Statement 3.5
      • 3.8 Knowledge Statement 3.6
      • 3.9 Knowledge Statement 3.7
      • 3.10 Knowledge Statement 3.8
      • 3.11 Knowledge Statement 3.9
      • 3.12 Knowledge Statement 3.10
      • 3.13 Knowledge Statement 3.11
      • 3.14 Knowledge Statement 3.12
      • 3.15 Knowledge Statement 3.13
      • 3.16 Knowledge Statement 3.14
      • 3.17 Quiz
      • 3.18 Quiz Question 1
      • 3.19 Quiz Solution 1
      • 3.20 Quiz Question 2
      • 3.21 Quiz Solution 2
      • 3.22 Quiz Question 3
      • 3.23 Quiz Solution 3
      • 3.24 Quiz Question 4
      • 3.25 Quiz Solution 4
      • 3.26 Case Study 1 Scenario
      • 3.27 Case Study 1 Questions
      • 3.28 Case Study 2 Scenario
      • 3.29 Case Study 2 Questions
      • 3.30 Key Takeaways
      • 3.31 Conclusion
    • Domain 04 – Information Systems Operations, Maintenance and Service Management
      • 4.1 Introduction
      • 4.2 Objectives
      • 4.3 Knowledge Statement 4.1
      • 4.4 Knowledge Statement 4.2
      • 4.5 Knowledge Statement 4.3
      • 4.6 Knowledge Statement 4.4
      • 4.7 Knowledge Statement 4.5
      • 4.8 Knowledge Statement 4.6
      • 4.9 Knowledge Statement 4.7
      • 4.10 Knowledge Statement 4.8
      • 4.11 Knowledge Statement 4.9
      • 4.12 Knowledge Statement 4.10
      • 4.13 Knowledge Statement 4.11
      • 4.14 Knowledge Statement 4.12
      • 4.15 Knowledge Statement 4.13
      • 4.16 Knowledge Statement 4.14
      • 4.17 Knowledge Statement 4.15
      • 4.18 Knowledge Statement 4.16
      • 4.19 Knowledge Statement 4.17
      • 4.20 Knowledge Statement 4.18
      • 4.21 Knowledge Statement 4.19
      • 4.22 Knowledge Statement 4.20
      • 4.23 Knowledge Statement 4.21
      • 4.24 Knowledge Statement 4.22
      • 4.25 Knowledge Statement 4.23
      • 4.26 Quiz
      • 4.27 Quiz Question 1
      • 4.28 Quiz Solution 1
      • 4.29 Quiz Question 2
      • 4.30 Quiz Solution 2
      • 4.31 Quiz Question 3
      • 4.32 Quiz Solution 3
      • 4.33 Quiz Question 4
      • 4.34 Quiz Solution 4
      • 4.35 Quiz Question 5
      • 4.36 Quiz Solution 5
      • 4.37 Case Study 1 Scenario
      • 4.38 Case study 1 Questions
      • 4.39 Case Study 2 Scenario
      • 4.40 Case study 2 Questions
      • 4.41 Key Takeaways
      • 4.42 Conclusion
    • Domain 05 – Protection of Information Assets
      • 5.1 Introduction
      • 5.2 Objectives
      • 5.3 Knowledge Statement 5.1
      • 5.4 Knowledge Statement 5.2
      • 5.5 Knowledge Statement 5.3
      • 5.6 Knowledge Statement 5.4 and 5.5
      • 5.7 Knowledge Statement 5.6
      • 5.8 Knowledge Statement 5.7
      • 5.9 Knowledge Statement 5.8
      • 5.10 Knowledge Statement 5.9
      • 5.11 Knowledge Statement 5.10
      • 5.12 Knowledge Statement 5.11
      • 5.13 Knowledge Statement 5.12
      • 5.14 Knowledge Statement 5.13
      • 5.15 Knowledge Statement 5.14
      • 5.16 Knowledge Statement 5.15
      • 5.17 Knowledge Statement 5.16
      • 5.18 Knowledge Statement 5.17
      • 5.19 Knowledge Statement 5.18
      • 5.20 Knowledge Statement 5.19
      • 5.21 Knowledge Statement 5.20
      • 5.22 Knowledge Statement 5.21
      • 5.23 Knowledge Statement 5.22
      • 5.24 Knowledge Statement 5.23
      • 5.25 Knowledge Statement 5.24
      • 5.26 Knowledge Statement 5.25
      • 5.27 Knowledge Statement 5.26
      • 5.28 Quiz
      • 5.29 Quiz Question 1
      • 5.30 Quiz Solution 1
      • 5.31 Quiz Question 2
      • 5.32 Quiz Solution 2
      • 5.33 Quiz Question 3
      • 5.34 Quiz Solution 3
      • 5.35 Quiz Question 4
      • 5.36 Quiz Solution 4
      • 5.37 Case Study Scenario
      • 5.38 Case Study Questions
      • 5.39 Key Takeaways
      • 5.40 Conclusion
    • Course Summary
      • CISA Summary
    • Course Case Study
      • Course Case Study
    • Quiz

CISA  training is essential for professionals dealing with controlling, monitoring, and assessing an organization’s information technology and business systems. This includes:

  • IS/IT auditors/consultants
  • IT compliance managers
  • Chief Compliance Officers
  • Chief risk & privacy officers
  • Security heads/directors
  • Security managers/architects

error: Content is protected !!