CISA Prep Course Training Overview
Get ready for the newly updated CISA exam with our top-quality preparation course.
CISA Prep Course Training, you’ll cover all five domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams. Along with our custom course material, you will receive a free copy of the CISA Review Manual 2013.
CISA Prep Course Training
The CISA exam is offered three times each year (June, September, and December), consists of 200 multiple-choice questions, and is focused on the five domains defined by ISACA.
What You’ll Learn
In-depth coverage of the five domains required to pass the CISA exam:
- The Process of Auditing Information Systems
- Governance and Management of IT
- Information Systems Acquisition, Development, and Implementation
- Information Systems Operations, Maintenance, and Support
- Protection of Information Assets
Systems administration experience, familiarity with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course
1. Testing-Taking Tips and Study Techniques
Preparation for the CISA Exam
Submitting Required Paperwork
Resources and Study Aids
Passing the Exam the First Time
2. The Audit Process
Standards and Guidelines
3. IT Governance
Roles and Responsibilities
4. Lifecycle Management
Business Application Development
Information Systems Maintenance Practices
5. System Infrastructure Control
Auditing Application Controls
Application System Development
Business Application Systems
6. Information Systems Hardware and Architecture
Information Systems Operations
Information Systems Hardware
7. Information Systems Used for IT Delivery and Support
WAN Technologies – X.25/Frame Relay/PPP/ISDN/DSL/Cable
8. Protection of Logical Assets
Roles and Responsibilities – RACI
Taxonomy – Information Classification
Policies, Procedures, Standards, Guidelines, Baselines
Knowledge Transfer – Awareness, Training, Education
9. Physical Security
Environmental Protection Practices
Policies and Procedures
10. Business Continuity and Disaster Recovery
BIA Roles and Teams
Data Backups, Vaulting, Journaling, Shadowing
11. Review and Q&A Session
Final Review and Test Prep
IS audit, control, assurance, and security professionals, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers, who have five years of experience with audit, IT systems, and security of information systems.
JK Michael’s customer relationship culture is outstanding. The facilitators wowed us as there was never a boring moment during sessions, the training immensely added to my management skills.
Olumuyiwa IsholaTotal Nig. Plc (IT)
JK Michaels is an institution that I rate so high due to the vast experience of their faculty. My money was well spent because it meets my objective of coming for the training.
Alade AdekunleManager, Ten A,
I have heard a lot about JK Michaels and their positive impact on participants. This was proved beyond my expectations when I came for Training.