CISA Certification Training
Course - ISACA Certified Information Systems Auditor

Certify I.T Training's CISA Certified Information Systems Auditor Training Package includes expert instructor-led training modules with customized presentations and learning supplements for an all-inclusive training program that provides the benefits of classroom training at your own pace.

The Certified Information Systems Auditor (CISA) Certification training course provides students with knowledge and skills IT Security professionals and auditors need to prepare for the CISA certification exam, including: the Information Systems Audit Process, Information Technology Governance, Systems and Infrastructure Life Cycle Management, IT Service Delivery and Support, Protection of Information Assets and Business Continuity and Disaster Recovery.

The Certified Information Systems Auditor (CISA) program, sponsored by ISACA®, has been the globally accepted standard of achievement among information systems (IS) audit, control and security professionals since 1978. As a Certified Information Systems Auditor (CISA), you'll perform a business-critical function: assessing your organization's IT and business systems to ensure they are monitored, controlled, and protected.

Candidates for this exam typically have a minimum of five years of experience as an information systems auditor or a similar combination of education and job experience. The CISA Certification is also part of the new DOD 8570.1 requirements for military and government personnel and contractors.

Certify I.T Training follows the approved Microsoft course curriculum, ensuring you receive the training and knowledge needed to succeed.Certify I.T Training is so certain this course meets and exceeds the exam objectives, we guarantee you will pass your exam!


Deployment Methods


CISA, 1 Yr Access, & Technical Email Support, 1 Study guide, 40 hours Self Study, 1 Yr Technical Email Support, Training simulations.

ISACA Certified Information Systems Auditor

Course Outline

The IS Audit Process
Risk Analysis and Risk Management
ISACA Code of Conduct
Performing an Audit
IT Governance
ISS and The Role of Policies and Procedures
Risk Management
Information Systems Management Practices
Organizational Structure and Responsibility
Project Management
Systems and Infrastructure
Business Application Development
Application Controls
Business Tools
IT Service Delivery and Support
Information Systems Operations, Hardware and Software
Enterprise Network Architectures
Network Infrastructure
IP Addressing
Protection of Information Assets
Access, Exposures, and Security
Auditing the Physical Framework
Crypt MD5 Demo
Password Restrictions
Business Continuity and Disaster Recovery
Recovery Strategies
IP Subnet Calculator

About us | Contact us | Support | T&C | Privacy Policy | Site Map | Guarantee ©2010 - 2013 Certify IT Training