• Training page

Established in 1978, the Certified Information Systems Auditor (CISA) qualification, awarded by ISACA®, is the globally accepted standard of achievement among information systems (IS) audit, control and security professionals. The CISA certification demonstrates proficiency in information systems audit and is highly sought after by both professionals and employers alike. Gaining this internationally-recognized certification will increase recognition in the marketplace and build your influence in the workplace. This Certified Information Systems Auditor (CISA) training course will prepare you to undertake ISACA's challenging CISA exam and is designed to equip you with the knowledge required to achieve certification at the first attempt.

Please note: the exam is not taken during this training course. It needs to be booked directly with ISACA. There are strict booking dates for the exam, with an advance registration deadline. Pls visit http://www.isaca.org to download the candidate guide and book the exam.

Who should attend for this Course?

  • Internal and external auditors.
  • Finance/CIA professionals.
  • IT professionals.
  • Information security professionals.
  • Anyone seeking career enhancement in IT Governance field

Entry requirements

ISACA requires a minimum of five years' professional information systems auditing, control or security work experience to qualify for full certification. You can take the CISA exam prior to meeting ISACA’s experience requirements, however, the CISA qualification will not be awarded until all requirements are met. We do not set specific entry requirements for this course. Find out more about CISA requirements: http://www.isaca.org

What will you learn?

Cover all five CISA domains.

The training programme mirrors the examination structure and covers the five CISA domains:

  • Domain 1: The Process of Auditing Information Systems.
  • Domain 2: Governance and Management of IT.
  • Domain 3: Information Systems Acquisition, Development, and Implementation.
  • Domain 4: Information Systems Operations, Maintenance and Support.
  • Domain 5: Protection of Information Assets.

(50 questions will be discussed at the end of each domain)

Instructor:

Thilak Pathirage: MBA(Sri j) BCOM(spl) CISSP CISA CISM CGEIT CRISC CBCP ITILV3 ISO27K(LA) FIB- Former AGM-OpRisk & Information Risk Management. Seylan Bank. To read his full profile: http://www.linkedin.com/in/thilakjayasenapathirage

Date Commencement: Request for dates Course Duration: 8 Saturdays Location: ITGRC Training Center      

Course Price: LKR 50,000/=

The CISA exam

The CISA examination runs a multiple-choice format and consists of a 4-hour paper. The examination tests the candidate’s knowledge of Information System audit principles and practices, as well as technical content areas.

What's included in the course?

  • Lunch and refreshment.
  • Full course materials
  • Certificate of attendance.
  • 1000 questions with remote support

CISA Review Manual

A copy of the current CISA Review Manual is essential for any exam candidate. Unless you already have your own copy, you have the option to purchase it from the ISACA book store. https://www.isaca.org/bookstore/

      Additional information This course is non-residential, but we can help you to find a hotel close to the training venue. To take advantage of this offer, drop us a email on This email address is being protected from spambots. You need JavaScript enabled to view it. after you book your course. Prepare for CISA success. Book your training with us! Register Now-

link to enrollment page

Click to expand full contents »

Domain 1: The Process of Auditing Information Systems

  • IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards.
  • Risk assessment concepts, tools and techniques in an audit context.
  • Control objectives and controls related to information systems.
  • Audit planning and audit project management techniques, including follow-up.
  • Fundamental business processes, including relevant IT.
  • Applicable laws and regulations which affect the scope, evidence collection and preservation, and frequency of audits.
  • Evidence collection techniques used to gather, protect and preserve audit evidence.
  • Sampling methodologies.
  • Reporting and communication techniques.
  • Audit quality assurance systems and frameworks.

Domain 2: Governance and Management of IT

  • IT governance, management, security and control frameworks, and related standards, guidelines, and practices.
  • The purpose of IT strategy, policies, standards and procedures for an organisation and the essential elements of each.
  • Organisational structure, roles and responsibilities related to IT.
  • Processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures.
  • Organisation’s technology direction and IT architecture and their implications for setting long-term strategic directions.
  • Relevant laws, regulations and industry standards affecting the organisation.
  • Quality management systems.
  • Maturity models.
  • Process optimization techniques.
  • IT resource investment and allocation practices, including prioritization criteria.
  • IT supplier selection, contract management, relationship management and performance monitoring processes including third party outsourcing relationships.
  • Enterprise risk management.
  • Monitoring and reporting of IT performance.
  • IT human resources (personnel) management practices used to invoke the business continuity plan.
  • Business impact analysis (BIA) related to business continuity planning.
  • The standards and procedures for the development and maintenance of the business continuity plan and testing methods.

Domain 3: Information Systems Acquisition, Development, and Implementation

  • Benefits realisation practices.
  • Project governance mechanisms.
  • Project management control frameworks, practices and tools.
  • Risk management practices applied to projects.
  • IT architecture related to data, applications and technology.
  • Acquisition practices.
  • Analysis and management practices.
  • Analysis and management practices.
  • Project success criteria and risks.
  • Control objectives and techniques that ensure the completeness, accuracy, validity and authorisation of transactions and data.
  • System development methodologies and tools including their strengths and weaknesses.
  • Testing methodologies and practices related to information systems development.
  • Configuration and release management relating to the development of information systems.
  • System migration and infrastructure deployment practices and data conversion tools, techniques and procedures.
  • Post-implementation review objectives and practices.

Domain 4: Information Systems Operations, Maintenance and Support

  • Service level management practices and the components within a service level agreement.
  • Techniques for monitoring third party compliance with the organisation’s internal controls.
  • Operations and end-user procedures for managing scheduled and non-scheduled processes.
  • Technology concepts related to hardware and network components, system software and database management systems.v
  • Control techniques that ensure the integrity of system interfaces.
  • Software licensing and inventory practices.
  • System resiliency tools and techniques.
  • Database administration practices.
  • Capacity planning and related monitoring tools and techniques.
  • Systems performance monitoring processes, tools and techniques.
  • Problem and incident management practices.
  • Processes, for managing scheduled and non-scheduled changes to the production systems and/or infrastructure including change, configuration, release and patch management practices.
  • Data backup, storage, maintenance, retention and restoration practices.
  • Regulatory, legal, contractual and insurance issues related to disaster recovery.
  • Business impact analysis (BIA) related to disaster recovery planning.
  • Development and maintenance of disaster recovery plans.
  • Alternate processing sites and methods used to monitor the contractual agreements.
  • Processes used to invoke the disaster recovery plans.
  • Disaster recovery testing methods.

Domain 5: Protection of Information Assets

  • Techniques for the design, implementation, and monitoring of security controls, including security awareness programs.
  • Processes related to monitoring and responding to security incidents.
  • Logical access controls for the identification, authentication and restriction of users to authorised functions and data.
  • Security controls related to hardware, system software, and database management systems.
  • Risks and controls associated with virtualization of systems.
  • Configuration, implementation, operation and maintenance of network security controls.
  • Network and Internet security devices, protocols, and techniques.
  • Information system attack methods and techniques.
  • Detection tools and control techniques.
  • Security testing techniques.
  • Risks and controls associated with data leakage.
  • Encryption-related techniques.
  • Public key infrastructure (PKI) components and digital signature techniques.
  • Risks and controls associated with peer-to-peer computing, instant messaging, and web-based technologies.
  • Controls and risks associated with the use of mobile & wireless devices.
  • Voice communications security.
  • Evidence preservation techniques and processes followed in forensics investigations.
  • Data classification standards and supporting procedures.
  • Physical access controls for the identification, authentication and restriction of users to authorized facilities.
  • Environmental protection devices and supporting practices.
  • Processes and procedures used to store, retrieve, transport and dispose of confidential information assets.

Disclaimer:

The Swirl logoTMis a trade mark of AXELOS Limited.
ITIL®is a registered trade mark of AXELOS Limited.
PRINCE2®is a Registered Trade Mark of AXELOS Limited.
COBIT®is a trademark of ISACA®registered in the United States and other countries.
CISM CRISC CGEIT CISA® are Registered Trade Marks of the Information Systems Audit and Control Association (ISACA) and the IT Governance Institute
CISSP is a registered mark of The International Information Systems Security Certification Consortium ((ISC)2)