Level: Advanced

Certified Information Systems Auditor (CISA)

5 Day | Instructor Led

The technical skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction. In addition, it presents a number of professional and personal benefits.

Inquire About
Certified Information Systems Auditor (CISA)

Ideal Candidates for Certified Information Systems Auditor (CISA) Class

The CISA certification requires a minimum of 5 years of professional information systems auditing, control or security work experience in the domains of the certification.

Certified Information Systems Auditor (CISA) Prerequisites

Systems administration experience, familiarity with TCP/IP, and an understanding of UNIX, Linux, and Windows.


This advanced course also requires intermediate-level knowledge of the security concepts covered in our Security+ Course.

What You'll Get in Certified Information Systems Auditor (CISA)

Expert Level Instruction

The CISA Review Manual 2016

The CISA Review Questions, Answers & Explanations Manual 2016

Ultimate Knowledge Institute Award Winning CISA Student Workbook

Daily Homework Questions (Over 600 Questions)

Daily Quiz Questions (Over 600 Questions)

Handy Reference Charts and Tables

Flash Cards

Course Related Readings (Reinforcement)

Daily Exercises to Reinforce Memory Recall - Cognitive Core

What You'll Learn in Certified Information Systems Auditor (CISA)

IS Audit Process

IT Governance

Systems and Infrastructure Lifecycle Management

IT Service Delivery and Support

Protection of Information Assets

Business Continuity and Disaster Recovery

Certified Information Systems Auditor (CISA) Certification

The technical skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world. CISA certification signifies commitment to serving an organization and the IS audit, control and security industry with distinction. In addition, it presents a number of professional and personal benefits.

Certified Information Systems Auditor (CISA) Outline

Domain 1—The Process of Auditing Information Systems

Provide audit services in accordance with IS audit standards to assist the organization in protecting and controlling information systems.

Domain 2—Governance and Management of IT

Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy.

Domain 3—Information Systems Acquisition, Development and Implementation

Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization’s strategies and objectives.

Domain 4—Information Systems Operations, Maintenance and Service Management

Provide assurance that the processes for information systems operations, maintenance and service management meet the organization’s strategies and objectives.

Domain 5—Protection of Information Assets

Provide assurance that the organization’s policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

Advanced Cyber Range Environment (ACRE) - Ransomware Exercise

The Ransomware exercise is a customized, six-hour, live fire Cyber Range training exercise hosted on ACRE. This exercise is led by expert cyber security engineers and can be executed in a classroom as well as remotely. In this exercise, a ransomware-based attack (i.e., “WannaKry”) is launched via a malicious spear phishing originated compromise. This exercise includes a hands-on keyboard interface, which creates realistic technical training and management interaction opportunities. This exercise is not simulated – it is real malware, detonated in representative network enviroment. Participants are encouraged to view the attack as if it were happening to their institutions in real time, and asked to share what they have done or would do based on the facts provided. Such “range-based” exercises help institutions better understand the impact of an attack and prompt them to improve the ways in which their network defenders respond, communicate, request assistance, and recover from real-world cyber attacks. Institutions that have participated in this exercise have benefited directly by building greater interaction with their security community, as well as increasing capability maturity levels and resiliency across their specific customer sector.


CompTIA Cybersecurity Analyst (CSA+)

CompTIA's Cybersecurity Analyst (CSA+) training from UKI teaches students to apply behavioral analytics to improve the overall state of IT security, providing critical knowledge and skills that are required to prevent, detect and combat cybersecurity threats.


CompTIA Advanced Security Practitioner (CASP) CAS 003

The CASP certification is a vendor-neutral, intensive exam that validates your knowledge and skills in enterprise security, risk management, research and analysis, and the integration of computing, communications and business disciplines. This exam preparation course provides in-depth review of the four domains included in the exam. Demonstrations and practice exams reinforce the concepts and provide the framework for a personalized study plan for exam success.


© 2018 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W