Certified Information Security Auditor

Formations Certified Information Security Auditor

OBJECTIF

The training prepares for CISA certification (Certified Information Systems Auditor), the only certification recognized worldwide in the field of governance, audit, control and security of information systems. Its excellent international reputation comes from the fact that this certification places high and identical requirements around the world. It covers the entire Common Body of Knowledge (CBK) curriculum, a common core of knowledge in security defined by the ISACA Information Systems Audit and Control Association. It sanctions both the passing of the CISA exam and the validation of five years of experience. However, it is possible to take the exam before 5 years of experience. The certificate will then be awarded after validation of years of experience or equivalences

In particular, the objectives of the training are as follows:

  • Analyze the different areas of the program being examined.
  • Assimilate the vocabulary and guiding ideas of the exam.
  • Practice the course of the test and acquire the strategies for answering the questionnaire.

PREREQUISITES

• General knowledge in IT, security and audit

GENERAL INFORMATION

• Code : CISA
• Duration : 5 jour
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord,Tunis

TARGETED AUDIENCE

• Auditors
• IT Consultants
• IT managers
• Security Officers
• IS Directors

RESOURCES

• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises

Modules taught

  • Domain 1: IS audit process
  • • Auditing standards
    • Risk analysis and internal control
    • The practice of an IS audit

  • Domain 2: IS Governance
  • • IS Governance Strategy
    • Procedures and Risk Management
      • The practice of IS governance
    • Audit of a governance structure

  • Domain 3: Systems and Infrastructure Lifecycle Management
  • • Project Management: Practice and Audit
    • Development practices
    • Audit of application maintenance and systems
    • Application controls

  • Domain 4: Provision and support of services
  • • Audit of IS operations
    • Audit of the material aspects of the IS
    • Audit of IS and network architectures

  • Domain 5: Protection of computer assets
  • • Security Management: Policy and Governance
    • Audit and logical and physical security
    • Audit of network security
    • Audit of nomadic devices

  • Domain 6: Continuity plan and computer emergency plan
  • • The practices of continuity plans and emergency plans
    • Audit of continuity and emergency systems

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.