Site Powered by

Information Systems Auditor
Build skills equivalent to ISACA's CISA program
  • Credit Hours: 5 Days

  • Format: Virtual Classroom - Instructor-led, Online

  • Professional Certificate: CISA

  • Recommended for: Security Professional, IT consultants, Information security officers, Network administrators, and Security engineers who have 5 years experience with IT systems

Since its inception in 1978, CISA has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, and insightful data. 

What You'll Learn

  • The Process of Auditing Information Systems
  • Governance and Management of IT
  • Information Systems Acquisition, Development, and Implementation
  • Information Systems Operations, Maintenance, and Support
  • Protection of Information Assets

Who Needs to Attend

IS audit, control, assurance, and security professionals, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers, who have five years of experience with audit, IT systems, and security of information systems.


Systems administration experience, familiarity with TCP/IP, and an understanding of UNIX, Linux, and Windows. This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Prep Course.

Course Outline

1. CISA Overview

2. The Audit Process

  • Risk
  • Audit
  • Standards and Guidelines

3. IT Governance

  • Best Practices
  • Management Practices
  • Roles and Responsibilities

4. Lifecycle Management

  • Project Management
  • Business Application Development
  • Information Systems Maintenance Practices

5. System Infrastructure Control

  • Auditing Application Controls
  • Application System Development
  • Business Application Systems

6. Information Systems Hardware and Architecture

  • Information Systems Operations
  • Information Systems Hardware
  • SDLC
  • Databases

7. Information Systems Used for IT Delivery and Support

  • OSI
  • TCP/IP Model
  • Routers/Switches/Hubs
  • Firewalls
  • Wireless
  • WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cable

8. Protection of Logical Assets

  • CIA
  • Roles and Responsibilities - RACI
  • Asset Management
  • Taxonomy - Information Classification
  • Risk Management
  • Policies, Procedures, Standards, Guidelines, Baselines
  • Knowledge Transfer - Awareness, Training, Education

9. Physical Security

  • Environmental Protection Practices
  • Physical Authentication
  • Policies and Procedures

10. Business Continuity and Disaster Recovery

  • BIA Policy
  • BIA Roles and Teams
  • Data Backups, Vaulting, Journaling, Shadowing
  • Alternate Sites
  • Emergency Response
  • Required Notifications
  • BIA Tests

Purchase this Course


Become versed as an Information Systems Auditor in 5 Days