TRENDS is authorized to promote and deliver ISACA courses in partnership with Trainocate. 'ISACA Logo is a registered trademark of ISACA. All rights reserved.

Certified Information Systems Auditor

Schedule

Start End Duration Location Details

Course Details

Certified Information Systems Auditor

Course code: CISA

Duration: 5 Days

Prerequisite:

A minimum of 5 years of professional information systems auditing, control or security work experience (as described in the CISA job practice areas) is required for certification.

Course Description:

The Certified Information Systems Auditor (CISA) Training aims to make working professionals adept at evaluating, securing and controlling complex business and IT systems in an enterprise. This CISA course will also highlight government regulations and helps devise policies with stronger internal control measures and disclosures.

CISA Certification acts as a career differentiator for security professionals or IT managers who wish to enhance their marketability and credibility. This is an ideal path for those looking at a long term career in Information Systems Auditing. This CISA course is highly recommended for IS/IT auditors, IT managers, Audit Managers, Security Managers, System Analysts, Consultants, and even CIOs and CTOs. 

Course Objectives:

•    Entire Process of Auditing Information Systems
•    Management and Governance of IT
•    Acquisition, Implementation and Development of Business Information Systems
•    Managing Operations, Support and Maintenance of IS
•    Securing Information Assets

Intended Audience:
The course is suited specifically for all experienced individuals working in Information security areas which may include:
•    Information Security Auditors
•    All those aspiring to become Information Security Auditors
•    Information Technology or Information Systems Consultants
•    CIO’s
•    Security Consultants
•    Enterprise Leadership roles
•    Risk Management professionals

Course Outlines:

•    Information System Auditing
•    Management and Governance of IT
•    From Acquisition to Development and to final Implementation of Information System.
•    Operation, maintenance and service management of Information System.
•    How to Protect your information assets.