CISA is a globally recognized standard for knowing an IT auditor's knowledge, expertise and skills in assessing vulnerabilities and instituting IT controls in an enterprise environment. It is designed for IT auditors, Audit managers, consultants and security professionals.
Helps enterprises to navigate a complex and evolving regulatory landscape.
Reduce the complexity and time necessary to manage vulnerabilities.
Measure security and ensure compliance.
What you’ll master?
Preparation and Protocol for Disaster Recovery.
Understanding of Efficient IT Service Delivery.
Regular Audits of the Information System.
Some Sample Videos:
Class:1- Kicking off with CISA.
Class:2- Introduction of Information system auditing process.
Class:3- Fundamentals of Audit Standards and Codes of Ethics.
Class:4 - Understanding Risk-Based Audit Planning.
Class:5 - Session on types of Audits and Assessments.
Class: 6 - Overview of Audit Project Management.
Class:7 - Understanding Sampling Methodology
Class: 8 - Know the techniques of Audit Evidence Collection.
Class:9 - Data Analytics explanation.
Class: 10 - Session on Reporting and Communication Techniques.
Class: 11 - Introduction of IT Governance and Strategy.
Class: 12 - Understanding IT-Related Frameworks.
Class: 13 - Lesson on IT Standards, Policies, and Procedures.
Class: 14 - A little bit about Organizational Structure.
Class: 15 - Tutorial on Enterprise Architecture and Enterprise Risk Management.
Class: 16 - Maturity Models overview.
Class: 17 - About Laws, Regulations, and Industry Standards. (affect the Organization)
Class: 18 - An outline of IT Resource Management.
Class: 19 - Session on IT Service Provider Acquisition and Management
Class: 20 - Session on IT Performance Monitoring and Reporting
Class:21 - Understanding Quality Assurance and Quality Management.
Class:22 - About Project Governance and Management.
Class:23 - Fundamentals of Business Case and Feasibility Analysis.
Class:24 - Methodologies of System Development.
Class:25 - Session on Control Identification and Design.
Class:26 - Introduction of Testing Methodologies.
Class: 27 - Session on Configuration and Release Management.
Class: 28 - Lesson on System Migration, Infrastructure Deployment, and Data Conversion.
Class: 29 - About Post-implementation Review.
Class: 30 - Learn about Common Technology Components.
Class:31- IT Asset Management explanation.
Class:32- Fundamentals of Job Scheduling and Production Process Automation.
Class:33- Tutorial on System Interfaces and End-User Computing.
Class:34 - Basics of Data Governance.
Class:35 - Systems Performance Management Intro.
Class:36 - Problem and Incident Management Intro.
Class:37 - IT Service Level Management fundamentals.
Class: 38 - Overview of Database Management.
Class: 39 - Business Impact Analysis basics.
Class: 40 - Know about System Resiliency.
Class: 41 - Lesson on Data Backup, Storage, and Restoration.
Class: 42 - Understanding Business Continuity Plan.
Class: 43 - Understanding Disaster Recovery Plans.
Class: 44 - Frameworks of Information Asset Security.
Class: 45 - Understanding the Privacy Principles.
Class: 46 - Introduction of Physical Access and Environmental Controls.
Class: 47 - Tutorial on Identity and Access Management.
Class: 48 - Basics of Network and End-Point Security.
Class: 49 - Introduction of Data Classification and Encryption.
Class:50 - Overview of Public Key Infrastructure.
Class:51 - Techniques of Web-Based Communication.
Class:52 - About Virtualized Environments.
Class:53 - Security Event Management Intro.
Class:54 - Methods and Techniques of Information System Attack.
Class:55 - Know the Tools and Techniques in Security Testing.
Class:56 - Know the Tools and Techniques in Security Monitoring.
Class:57 - Incident Response Management fundamentals.
Class: 58 -Session on Evidence Collection and Forensics.
Class: 59 - How to Plan audit to determine whether information systems are protected and controlled?
Class: 60 - How to Conduct audits by IS audit standards?
Class:61- Tutorial on Communicate audit progress.
Class:62- How to Conduct audit follow‐up? (whether risks have been sufficiently addressed)
Class:63- How to evaluate the IT strategy for alignment?
Class:64- How to evaluate the effectiveness of IT governance structure?
Class:65 - Tutorial on evaluating the organization’s management of IT policies and practices.
Class: 66 - Tutorial on evaluating the organization’s management of IT policies and practices. (for compliance with regulatory and legal requirements)
Class:67 - How to evaluate IT resource and portfolio management for alignment?
Class:68 - How to evaluate the organization's risk management policies and practices?
Class:69 - Tutorial on evaluating IT management and also about monitoring controls.
Class: 70 - How to evaluate the monitoring and reporting of IT key performance indicators?
Class: 71 - How to evaluate the organization’s ability to continue business operations.?
Class: 72 - Session on evaluating the organization's project management policies and practices.
Class: 73 - Session on evaluating controls at all stages of the information systems development lifecycle.
Class: 74 - Tutorial on Conducting post‐implementation review of systems.
Class: 75 - How to find whether IT service management practices align with business requirements?
Class: 76 - Tutorial on Conducting a periodic review of information systems and enterprise architecture.
Class: 77 - Understanding database management practices.
Class: 78 - How to figure out data governance policies and practices?
Class:79 - How to figure out problem and incident management policies and practices?
Class:80 - Tutorial on estimating the organization's information security and privacy policies and practices.
Class:81 - How to check the physical and environmental controls? (to determine whether information assets are adequately safeguarded)
Class:82 - Tutorial on checking the logical security controls.
Class:83 - How to evaluate data classification practices for alignment with the organization’s policies?
Class:84 - How to evaluate policies and practices related to asset lifecycle management?
Class:85 - Tutorial on identifying potential threats and vulnerabilities by performing technical security testing.
Class:86 - How to utilize data analytics tools to streamline audit processes?
Class: 87 - Tutorial about Provide consulting services and guidance to the organization.
Class: 88 - Lesson on identifying opportunities for process improvement.
Class: 89 - Understand the information security program to determine its effectiveness and alignment using the organization’s strategies and objectives.
Class: 90 - Session on evaluating potential opportunities and threats.
Schedule Your Classes
The duration of the Course is 3 Months (90 days)
Weekdays - Monday to Saturday.
Weekend classes - Saturday and Sunday.
Class Consist of both Theory and Practical session.
Materials will be provided.
Please note that the Training Structure may vary for every student.
Have a Question?
Please send us any questions you may have. We would love to answer it.