Leader in the cybersecurity training sector.

ISACA CERTIFIED Information Systems Auditor

Satisfaction rate
4.9
Success rate
4.9
Gain worldwide recognition and credibility. Start your career with CISA. Validate your expertise with ISACA's CISA certification, the gold standard for IT audit, assurance, security and cybersecurity professionals.

The target audience for training

  • Early to mid-career professionals seeking greater recognition and credibility in their interactions with internal and external stakeholders, regulators and customers. Professional roles include:
  • IT audit directors/managers/consultants
  • IT and internal auditors
  • Compliance, Risk and Confidentiality Managers
  • IT Directors/Managers/Consultants

What you will learn

CISA is the globally recognised standard for information systems audit, control and assurance, sought after and valued by the world's leading brands. It is often a mandatory qualification for employment as an IT auditor. CISA holders have validated their ability to apply a risk-based approach to the planning, execution and reporting of audit engagements.

Training programme

  • Planning
    • Standards, guidelines and codes of ethics for the audit of information systems
    • Types of business processes and controls
    • Risk-based audit planning
    • Types of audits and evaluations
  • Execution
    • Audit project management
    • Sampling methodology
    • Techniques for collecting audit evidence
    • Data analysis
    • Communication and reporting techniques
    • Quality assurance and improvement of the audit process
  • Governance and strategy
    • IT managers
    • IT standards, policies and procedures
    • Organisational structure
    • Enterprise Architecture
    • Enterprise risk management
    • Maturity models
    • Laws, regulations and industry standards affecting the organisation
  • Management
    • IT resource management
    • Procurement and management of IT service providers
    • IT performance monitoring and reporting
    • Quality assurance and IT quality management
  • Acquisition and development of information systems
    • Governance and project management
    • Business case and feasibility analysis
    • Systems development methodologies
    • Identification and design of controls
  • Implementation of information systems
    • Test methodologies
    • Configuration and publication management
    • System migration, infrastructure deployment and data conversion
    • Post-implementation examination
  • Operating information systems
    • Common technological components
    • IT asset management
    • Task scheduling and production process automation
    • System interfaces
    • End-user computing
    • Data governance
    • Systems performance management
    • Problem and incident management
    • Change, configuration, version and patch management
    • IT service level management
    • Database management
  • Business resilience
    • Business impact analysis
    • System resilience
    • Data backup, storage and recovery
    • Business continuity plan
    • Disaster recovery plans
  • Frameworks, standards and guidelines for the security of information assets
    • Confidentiality principles
    • Physical and environmental access controls
    • Identity and access management
    • Network and access point security
    • Data classification
    • Data encryption and related techniques
    • Public Key Infrastructure
    • Web-based communication technologies
    • Virtualised environments
    • Mobile, wireless and Internet of Things devices
  • Security event management
    • Safety awareness and training programmes
    • Methods and techniques for attacking information systems
    • Security testing tools and techniques
    • Safety monitoring tools and techniques
    • Security incident management
    • Evidence gathering and computer forensics

Training objectives

  • Developing and implementing an IT audit strategy based on IT audit standards
  • Plan specific audits to determine whether information systems are protected, controlled and provide value to the organisation
  • Carrying out audits in accordance with IT audit standards to achieve planned audit objectives
  • Report audit findings and make recommendations to key stakeholders to communicate findings and make changes where necessary
  • Carry out follow-ups or prepare status reports to ensure that appropriate measures have been taken by management in a timely manner.

Training prerequisites

One year's experience as an information systems auditor. You may also submit one year's experience in non-IT auditing. A two- or four-year degree may be substituted for the experience requirement, provided that your degree was obtained within the last 10 years.

Contents of the official kit

Full Kit : Review Manual, QAE, Exam

Cost

4200 €

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

en_GBEnglish

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.