• Training page
Click to expand full contents »

Domain 1: The Process of Auditing Information Systems

  • IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards.
  • Risk assessment concepts, tools and techniques in an audit context.
  • Control objectives and controls related to information systems.
  • Audit planning and audit project management techniques, including follow-up.
  • Fundamental business processes, including relevant IT.
  • Applicable laws and regulations which affect the scope, evidence collection and preservation, and frequency of audits.
  • Evidence collection techniques used to gather, protect and preserve audit evidence.
  • Sampling methodologies.
  • Reporting and communication techniques.
  • Audit quality assurance systems and frameworks.

Domain 2: Governance and Management of IT

  • IT governance, management, security and control frameworks, and related standards, guidelines, and practices.
  • The purpose of IT strategy, policies, standards and procedures for an organisation and the essential elements of each.
  • Organisational structure, roles and responsibilities related to IT.
  • Processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures.
  • Organisation’s technology direction and IT architecture and their implications for setting long-term strategic directions.
  • Relevant laws, regulations and industry standards affecting the organisation.
  • Quality management systems.
  • Maturity models.
  • Process optimization techniques.
  • IT resource investment and allocation practices, including prioritization criteria.
  • IT supplier selection, contract management, relationship management and performance monitoring processes including third party outsourcing relationships.
  • Enterprise risk management.
  • Monitoring and reporting of IT performance.
  • IT human resources (personnel) management practices used to invoke the business continuity plan.
  • Business impact analysis (BIA) related to business continuity planning.
  • The standards and procedures for the development and maintenance of the business continuity plan and testing methods.

Domain 3: Information Systems Acquisition, Development, and Implementation

  • Benefits realisation practices.
  • Project governance mechanisms.
  • Project management control frameworks, practices and tools.
  • Risk management practices applied to projects.
  • IT architecture related to data, applications and technology.
  • Acquisition practices.
  • Analysis and management practices.
  • Analysis and management practices.
  • Project success criteria and risks.
  • Control objectives and techniques that ensure the completeness, accuracy, validity and authorisation of transactions and data.
  • System development methodologies and tools including their strengths and weaknesses.
  • Testing methodologies and practices related to information systems development.
  • Configuration and release management relating to the development of information systems.
  • System migration and infrastructure deployment practices and data conversion tools, techniques and procedures.
  • Post-implementation review objectives and practices.

Domain 4: Information Systems Operations, Maintenance and Support

  • Service level management practices and the components within a service level agreement.
  • Techniques for monitoring third party compliance with the organisation’s internal controls.
  • Operations and end-user procedures for managing scheduled and non-scheduled processes.
  • Technology concepts related to hardware and network components, system software and database management systems.v
  • Control techniques that ensure the integrity of system interfaces.
  • Software licensing and inventory practices.
  • System resiliency tools and techniques.
  • Database administration practices.
  • Capacity planning and related monitoring tools and techniques.
  • Systems performance monitoring processes, tools and techniques.
  • Problem and incident management practices.
  • Processes, for managing scheduled and non-scheduled changes to the production systems and/or infrastructure including change, configuration, release and patch management practices.
  • Data backup, storage, maintenance, retention and restoration practices.
  • Regulatory, legal, contractual and insurance issues related to disaster recovery.
  • Business impact analysis (BIA) related to disaster recovery planning.
  • Development and maintenance of disaster recovery plans.
  • Alternate processing sites and methods used to monitor the contractual agreements.
  • Processes used to invoke the disaster recovery plans.
  • Disaster recovery testing methods.

Domain 5: Protection of Information Assets

  • Techniques for the design, implementation, and monitoring of security controls, including security awareness programs.
  • Processes related to monitoring and responding to security incidents.
  • Logical access controls for the identification, authentication and restriction of users to authorised functions and data.
  • Security controls related to hardware, system software, and database management systems.
  • Risks and controls associated with virtualization of systems.
  • Configuration, implementation, operation and maintenance of network security controls.
  • Network and Internet security devices, protocols, and techniques.
  • Information system attack methods and techniques.
  • Detection tools and control techniques.
  • Security testing techniques.
  • Risks and controls associated with data leakage.
  • Encryption-related techniques.
  • Public key infrastructure (PKI) components and digital signature techniques.
  • Risks and controls associated with peer-to-peer computing, instant messaging, and web-based technologies.
  • Controls and risks associated with the use of mobile & wireless devices.
  • Voice communications security.
  • Evidence preservation techniques and processes followed in forensics investigations.
  • Data classification standards and supporting procedures.
  • Physical access controls for the identification, authentication and restriction of users to authorized facilities.
  • Environmental protection devices and supporting practices.
  • Processes and procedures used to store, retrieve, transport and dispose of confidential information assets.

Disclaimer:

The Swirl logoTMis a trade mark of AXELOS Limited.
ITIL®is a registered trade mark of AXELOS Limited.
PRINCE2®is a Registered Trade Mark of AXELOS Limited.
COBIT®is a trademark of ISACA®registered in the United States and other countries.
CISM CRISC CGEIT CISA® are Registered Trade Marks of the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute
CISSP is a registered mark of The International Information Systems Security Certification Consortium ((ISC)2)