An ISACA Certified Information Systems Auditor is recognized as one of the leading authorities in the areas of IS auditing, control, and information security. This official CISA training course provides you with in-depth coverage of the five CISA domains that are covered on the CISA certification exam. These domains include auditing information systems; IT governance and management of IT; information systems acquisition, development, and implementation; information systems operations, maintenance, and support; and protection of information assets.
Audience
This course is designed specifically for experienced information security professionals who are preparing to take the ISACA CISA exam.
Prerequisite
IT professionals must have 5 years or more of IS audit, control, assurance and security experience.
Course Content
Domain 1—The Process of Auditing Information Systems
Provide audit services in accordance with IT audit standards to assist the organization in protecting and controlling information systems.
ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional ethics and other applicable standards.
Risk assessment concepts, tools and techniques in an audit context.
Control objectives and controls related to information systems.
Audit planning and audit project management techniques, including follow-up.
Fundamental business processes (e.g., purchasing, payroll, accounts payable, accounts receivable) including relevant IT.
Applicable laws and regulations which affect the scope, evidence collection and preservation, and frequency of audits.
Evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis, fraud, investigation) used to gather, protect and preserve audit evidence different sampling methodologies.
Reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution, audit report structure).
Audit quality assurance systems and frameworks.
Domain 2—Governance and Management of IT
Provide assurance that the necessary leadership and organization structure and processes are in place to achieve objectives and to support the organization's strategy.
IT governance, management, security and control frameworks, and related standards, guidelines, and practices
The purpose of IT strategy, policies, standards and procedures for an organization and the essential elements of each organizational structure, roles and responsibilities related to IT.
The processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures
The organization’s technology direction and IT architecture and their implications for setting long-term strategic directions
Relevant laws, regulations and industry standards affecting the organization
Quality management systems
The use of maturity models
Process optimization techniques
IT resource investment and allocation practices, including prioritization criteria (e.g., portfolio management, value management, project management)
IT supplier selection, contract management, relationship management and performance monitoring
Processes including third party outsourcing relationships
Enterprise risk management
Practices for monitoring and reporting of IT performance (e.g., balanced scorecards, key performance indicators [KPI])
IT human resources (personnel) management practices used to invoke the business continuity plan
business impact analysis (BIA) related to business continuity planning
The standards and procedures for the development and maintenance of the business continuity plan and testing methods
Domain 3—Information Systems Acquisition, Development, and Implementation
Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization’s strategies and objectives.
Benefits realization practices, (e.g., feasibility studies, business cases, total cost of ownership [TCO], ROI) project governance mechanisms (e.g., steering committee, project oversight board, project management office)
Project management control frameworks, practices and tools
Risk management practices applied to projects
IT architecture related to data, applications and technology (e.g., distributed applications, web based applications, web services, n-tier applications)
Acquisition practices (e.g., evaluation of vendors, vendor management, escrow)
Requirements analysis and management practices (e.g., requirements verification, traceability, gap analysis, vulnerability management, security requirements)
Project success criteria and risks
Objectives and techniques that ensure the completeness, accuracy, validity and authorization of transactions and data
System development methodologies and tools including their strengths and weaknesses (e.g., agile development practices, prototyping, rapid application development [RAD], object-oriented design techniques)
Testing methodologies and practices related to information systems development
Configuration and release management relating to the development of information systems
System migration and infrastructure deployment practices and data conversion tools, techniques and procedures.
Post-implementation review objectives and practices (e.g., project closure, control implementation, benefits realization, performance measurement)
Domain 4—Information Systems Operations, Maintenance and Support
Provide assurance that the processes for information systems operations, maintenance and support meet the organization’s strategies and objectives.
Service level management practices and the components within a service level agreement
Techniques for monitoring third party compliance with the organization’s internal controls
Operations and end-user procedures for managing scheduled and non-scheduled processes The technology concepts related to hardware and network components, system software and database management systems
Control techniques that ensure the integrity of system interfaces
Software licensing and inventory practices
System resiliency tools and techniques (e.g., fault tolerant hardware, elimination of single point of failure, clustering)
Database administration practices
Capacity planning and related monitoring tools and techniques
Systems performance monitoring processes, tools and techniques (e.g., network analyzers, system utilization reports, load balancing)
Problem and incident management practices (e.g., help desk, escalation procedures, tracking)
Processes, for managing scheduled and non-scheduled changes to the production systems and/or infrastructure including change, configuration, release and patch management practices
Data backup, storage, maintenance, retention and restoration practices
Regulatory, legal, contractual and insurance issues related to disaster recovery
Business impact analysis (BIA) related to disaster recovery planning
The development and maintenance of disaster recovery plans
Types of alternate processing sites and methods used to monitor the contractual agreements (e.g., hot sites, warm sites, cold sites)
Processes used to invoke the disaster recovery plans
Disaster recovery testing methods
Domain 5—Protection of Information Assets
Provide assurance that the organization’s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.
Techniques for the design, implementation, and monitoring of security controls, including security awareness programs
Processes related to monitoring and responding to security incidents (e.g., escalation procedures, emergency incident response team)
Logical access controls for the identification, authentication and restriction of users to authorized functions and data
The security controls related to hardware, system software (e.g., applications, operating systems), and database management systems.
Risks and controls associated with virtualization of systems
The configuration, implementation, operation and maintenance of network security controls
Network and Internet security devices, protocols, and techniques
Information system attack methods and techniques
Detection tools and control techniques (e.g., malware, virus detection, spyware)
Public key infrastructure (PKI) components and digital signature techniques
Risks and controls associated with peer-to-peer computing, instant messaging, and web-based technologies (e.g., social networking, message boards, blogs)
Controls and risks associated with the use of mobile & wireless devices
Voice communications security (e.g., PBX, VoIP)
The evidence preservation techniques and processes followed in forensics investigations (e.g., IT, process, chain of custody, fraud evidence collection)
Data classification standards and supporting procedures
Physical access controls for the identification, authentication and restriction of users to authorized facilities
environmental protection devices and supporting practices
The processes and procedures used to store, retrieve, transport and dispose of confidential information assets
Domain 6 - Business Continuity Plan/Disaster Recovery Plan (BCP/DRP)
Starts with risk assessment
People, data, infrastructure, and other resources that support key business processes
Dangers and threats to the organization
Estimated probability of threat occurrence
BCP includes
DRP plan
Plan to restore operations to normal following disaster
Improvement of security operations
BCP Lifecycle
Create BCP policy
Businesses Impact Analysis (BIA)
Classify of operations and criticality
Identify IS processes that support business criticality
Develop BCP and IS DRP
Develop resumption procedures
Training and awareness programs
Test and implement plan
BCP Policy
Should encompass preventative, detective, and corrective controls
BCP most critical corrective control
Incident management control
Main severity criterion is service downtime
Media backup control
BIA identifies:
Different business processes & criticality
Critical IS resources supporting critical business processes
Critical recovery period before significant or unacceptable loses occur
Recovery point objective (RPO) – based on acceptable data loss; earliest time in which it is acceptable to recover; date/time or synchronization point to which systems/data will be restored.
Recovery time objective (RTO) – based on acceptable downtime; earliest time when business operations must resume.
Interruption window – how long a business can wait before operations resume (after this point, losses are unaffordable)
Maximum Tolerable outage (MTO) – maximum time business can operate in alternate processing mode before other problems occur
Service delivery objective (SDO) – acceptable level of services required during alternate processing Recovery Alternatives
Hot site – fully configured and ready to operate within hours. Not for extended use.
Warm site – partially configured (network and peripheral devices, but no main computers). Site ready in hours, operations ready in days or weeks.Cold site – has basic utilities, ready in weeks.
Redundant site – dedicated, self-developed sites.
Mobile site – data center in a box
Reciprocal agreements with other businesses
Redundant Array of Inexpensive/Independent Disks (RAID)
Level 0 -striped disk array, no fault tolerance; stripes multiple disks into one volume (faster when software based)
Level 1 – mirroring; 2 drives, half the space (faster when software based)
Level 2 – Hamming code ECC – interweaving data based on hamming code (EXPENSIVE and rare; HW based, resource intensive)
Level 3 – parallel transfer with parity; at least 2 striped data drives with 1 for parity (faster in HW)
Level 5 – block level; independent disks with distributed parity blocks; at least 3 drives, stripes data and parity (faster in HW) _ mirrored sets
Level 6 – Level 5 with 2 independent distributed parity schemes (faster in HW)
Level 10 – high reliability & performance; at least 4 drives, stripes level 1 segments; hi I/O
Level) 0 + 1 – High transfer rate; striped plus mirror; losing 2 drives = major data loss
Insurance Coverage
IS equipment/facilities
software media reconstruction
media damage Extra expense – of continuing operations after disaster; loss due to computer
Business interruption
Valuable papers and records
Errors and omissions
Fidelity coverage – loss due to dishonest/fraudulent acts
Media transportation
Covers loss based on historical performance, not existing
No compensation for loss of image/goodwill Grandfather (monthly), father (weekly), son (daily) backup rotation scheme
CISA
Certified Information System Auditing (CISA)
ITIL 4 Foundation certification
ITIL 4 Foundation training online
ITIL 5 Foundation certification
PRINCE2 Foundation certification
PRINCE2 Practitioner certification
COBIT certification training
PMP certification training
IT management certification courses
project management certification courses
IT service management certification
ITIL 4 Foundation Singapore
PRINCE2 certification Singapore
PMP training Singapore
COBIT course Singapore
IT management courses Singapore
ITIL 4 certification Malaysia
PRINCE2 training Malaysia
PMP certification Malaysia
COBIT Malaysia course
IT management certification Malaysia
ITIL certification Thailand
PRINCE2 Thailand training
PMP Thailand course
COBIT certification Thailand
ITIL certification Cambodia
PRINCE2 Cambodia
PMP Cambodia training
IT management course Cambodia
ITIL Myanmar training
PRINCE2 Myanmar certification
PMP Myanmar course
IT management certification Myanmar
ITIL 4 Foundation UK
PRINCE2 Practitioner UK
PMP certification UK
COBIT UK training
IT management courses UK
ITIL certification USA
PRINCE2 USA training
PMP certification USA online
COBIT USA course
IT management certification USA
ITIL 4 Foundation Dubai
PRINCE2 certification Dubai
PMP training Dubai
COBIT UAE course
IT management certification UAE
PRINCE2 Practitioner training online
best ITIL training provider
accredited PRINCE2 training
best ITIL 4 Foundation training in Singapore
PRINCE2 Practitioner course online with certification
PMP certification training for beginners
COBIT certification online course with exam
IT management certification for professionals
project management certification for IT professionals
online IT management certification program
IT governance certification (COBIT)
agile project management PRINCE2
hybrid project management certification
IT service management courses online