Certified Information Systems Auditor with Exam v18 - Austin Peay State University
IT and Software Development

Certified Information Systems Auditor with Exam v18

150 Hours
Beginner
English

This CISA Certified Information Systems Auditor Training Program, offered by our accredited school partners, includes expert training modules with all-inclusive training program that provides the benefits of classroom training at your own pace. The Certified Information Systems Auditor (CISA) program is the standard of achievement for those who audit, control, monitor and assess information technology and business systems. Earning the CISA Certification will highlight your experience, skills and knowledge, and demonstrates you are capable to manage vulnerabilities, ensure compliance and institute controls within the field.

The Certified Information Systems Auditor (CISA) Certification training course provides students with knowledge and skills IT Security professionals and auditors need to prepare for the CISA certification exam, including: the Information Systems Audit Process, Information Technology Governance, Systems and Infrastructure Life Cycle Management, IT Service Delivery and Support, Protection of Information Assets and Business Continuity and Disaster Recovery.
A minimum of 5 years of professional information systems auditing, control or security work experience is required for certification.

Course outline:
Module 01 – The Process of Auditing Information Systems
Lesson 1: Management of the Audit Function
Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines
Lesson 3: Risk Analysis
Lesson 4: Internal Controls
Lesson 5: Performing An IS Audit
Lesson 6: Control Self-Assessment
Lesson 7: The Evolving IS Audit Process

Module 02 – Governance and Management of IT
Lesson 1: Corporate Governance
Lesson 2: IT Governance
Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
Lesson 4: Information Systems Strategy
Lesson 5: Maturity and Process Improvement Models
Lesson 6: IT Investment and Allocation Practices
Lesson 7: Policies and Procedures
Lesson 8: Risk Management
Lesson 9: IS Management Practices
Lesson 10: IS Organizational Structure and Responsibilities
Lesson 11: Auditing IT Governance Structure and Implementation
Lesson 12: Business Continuity Planning

Module 03 – Information Systems Acquisition, Development and Implementation
Lesson 1: Business Realization
Lesson 2: Project Management Structure
Lesson 3: Project Management Practices
Lesson 4: Business Application Development
Lesson 5: Business Application Systems
Lesson 6: Alternative Forms of Software Project Organization
Lesson 7: Alternative Development Methods
Lesson 8: Infrastructure Development/Acquisition Practices
Lesson 9: Information Systems Maintenance Practices
Lesson 10: System Development Tools And Productivity Aids
Lesson 11: Business Process Reengineering And Process Change Projects
Lesson 12: Application Controls
Lesson 13: Auditing Application Controls
Lesson 14: Auditing Systems Development, Acquisition And Maintenance

Module 04 – Information Systems Operations, Maintenance and Support
Lesson 1: Information Systems Operations
Lesson 2: Information Systems Hardware
Lesson 3: IS Architecture and Software
Lesson 4: Network Infrastructure
Lesson 5: Disaster Recovery Planning

Module 05 – Protection of Information Assets
Lesson 1: Importance Of Information Security
Lesson 2: Logical Access
Lesson 3: Network Infrastructure Security
Lesson 4: Auditing Information Security Management Framework
Lesson 5: Auditing Network Infrastructure Security
Lesson 6: Environmental Exposures and Controls
Lesson 7: Physical Access Exposures and Controls
Lesson 8: Mobile Computing

Enroll through one of our accredited university or college partners today!

Module 01 – The Process of Auditing Information Systems
Lesson 1: Management of the Audit Function
Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines
Lesson 3: Risk Analysis
Lesson 4: Internal Controls
Lesson 5: Performing An IS Audit
Lesson 6: Control Self-Assessment
Lesson 7: The Evolving IS Audit Process

Module 02 – Governance and Management of IT
Lesson 1: Corporate Governance
Lesson 2: IT Governance
Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
Lesson 4: Information Systems Strategy
Lesson 5: Maturity and Process Improvement Models
Lesson 6: IT Investment and Allocation Practices
Lesson 7: Policies and Procedures
Lesson 8: Risk Management
Lesson 9: IS Management Practices
Lesson 10: IS Organizational Structure and Responsibilities
Lesson 11: Auditing IT Governance Structure and Implementation
Lesson 12: Business Continuity Planning

Module 03 – Information Systems Acquisition, Development and Implementation
Lesson 1: Business Realization
Lesson 2: Project Management Structure
Lesson 3: Project Management Practices
Lesson 4: Business Application Development
Lesson 5: Business Application Systems
Lesson 6: Alternative Forms of Software Project Organization
Lesson 7: Alternative Development Methods
Lesson 8: Infrastructure Development/Acquisition Practices
Lesson 9: Information Systems Maintenance Practices
Lesson 10: System Development Tools And Productivity Aids
Lesson 11: Business Process Reengineering And Process Change Projects
Lesson 12: Application Controls
Lesson 13: Auditing Application Controls
Lesson 14: Auditing Systems Development, Acquisition And Maintenance

Module 04 – Information Systems Operations, Maintenance and Support
Lesson 1: Information Systems Operations
Lesson 2: Information Systems Hardware
Lesson 3: IS Architecture and Software
Lesson 4: Network Infrastructure
Lesson 5: Disaster Recovery Planning

Module 05 – Protection of Information Assets
Lesson 1: Importance Of Information Security
Lesson 2: Logical Access
Lesson 3: Network Infrastructure Security
Lesson 4: Auditing Information Security Management Framework
Lesson 5: Auditing Network Infrastructure Security
Lesson 6: Environmental Exposures and Controls
Lesson 7: Physical Access Exposures and Controls
Lesson 8: Mobile Computing

The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. Once a CISA candidate has passed the CISA certification exam and has met the work experience requirements, the final step is to complete and submit a CISA Application for Certification. A minimum of 5 years of professional information systems auditing, control or security work experience (as described in the CISA job practice areas) is required for certification. It is important to note that many individuals choose to take the CISA exam prior to meeting the experience requirements. This practice is acceptable and encouraged although the CISA designation will not be awarded until all requirements are met. The work experience for CISA certification must be gained within the 10-year period preceding the application date for certification or within 5 years from the date of originally passing the exam. The CISA Application for Certification is available at www.isaca.org/cisaapp. Note that candidates have 5 years from the passing date to apply for certification.

6 Reasons to Complete Your Training With Us

Flexibility
With our programs, you can learn and study at your own pace with access 24/7/365 for the duration of your program. This means you can learn on your own terms and work around your own schedule.
Support
Our online training comes with access to real, live support personnel that will help you through every step from our admissions adviser who will assist you with selecting the right training for you, to our student adviser who will be there with you during your entire training journey.
Relevancy
We have tailored our programs to provide comprehensive training in the technical and soft skills employers are looking for. With direct input and feedback from industry leaders and hiring managers, our program aligns with exactly what you need to successfully enter the workforce.
Certification
Our career training not only gives you the knowledge you need but preparation for the certification exams relevant to your desired career path. If you are pursuing an exciting new career in a field with a national certification, our program will both prepare you to sit for the exam but will often include a voucher for the exam cost.
Simulations and Case Studies
Our training programs have been developed with real learners and professionals in mind, so our programs incorporate real-world case studies and virtual simulations that will provide examples and interactions with real-life situations you may encounter during your career. These allow you to learn by experience with circumstances similar to what will be your daily responsibilities on the job.
Engaging and Interactive
Our training curriculum was developed with you in mind, looking at modern day learners and their needs. Our curriculum contains a mix of formats including reading, listening, watching, and interacting that will immerse you into a fun and engaging learning experience you will not only enjoy but not want to end.

Program Description



This CISA Certified Information Systems Auditor Training Program, offered by our accredited school partners, includes expert training modules with all-inclusive training program that provides the benefits of classroom training at your own pace. The Certified Information Systems Auditor (CISA) program is the standard of achievement for those who audit, control, monitor and assess information technology and business systems. Earning the CISA Certification will highlight your experience, skills and knowledge, and demonstrates you are capable to manage vulnerabilities, ensure compliance and institute controls within the field.

The Certified Information Systems Auditor (CISA) Certification training course provides students with knowledge and skills IT Security professionals and auditors need to prepare for the CISA certification exam, including: the Information Systems Audit Process, Information Technology Governance, Systems and Infrastructure Life Cycle Management, IT Service Delivery and Support, Protection of Information Assets and Business Continuity and Disaster Recovery.
A minimum of 5 years of professional information systems auditing, control or security work experience is required for certification.

Course outline:
Module 01 – The Process of Auditing Information Systems
Lesson 1: Management of the Audit Function
Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines
Lesson 3: Risk Analysis
Lesson 4: Internal Controls
Lesson 5: Performing An IS Audit
Lesson 6: Control Self-Assessment
Lesson 7: The Evolving IS Audit Process

Module 02 – Governance and Management of IT
Lesson 1: Corporate Governance
Lesson 2: IT Governance
Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
Lesson 4: Information Systems Strategy
Lesson 5: Maturity and Process Improvement Models
Lesson 6: IT Investment and Allocation Practices
Lesson 7: Policies and Procedures
Lesson 8: Risk Management
Lesson 9: IS Management Practices
Lesson 10: IS Organizational Structure and Responsibilities
Lesson 11: Auditing IT Governance Structure and Implementation
Lesson 12: Business Continuity Planning

Module 03 – Information Systems Acquisition, Development and Implementation
Lesson 1: Business Realization
Lesson 2: Project Management Structure
Lesson 3: Project Management Practices
Lesson 4: Business Application Development
Lesson 5: Business Application Systems
Lesson 6: Alternative Forms of Software Project Organization
Lesson 7: Alternative Development Methods
Lesson 8: Infrastructure Development/Acquisition Practices
Lesson 9: Information Systems Maintenance Practices
Lesson 10: System Development Tools And Productivity Aids
Lesson 11: Business Process Reengineering And Process Change Projects
Lesson 12: Application Controls
Lesson 13: Auditing Application Controls
Lesson 14: Auditing Systems Development, Acquisition And Maintenance

Module 04 – Information Systems Operations, Maintenance and Support
Lesson 1: Information Systems Operations
Lesson 2: Information Systems Hardware
Lesson 3: IS Architecture and Software
Lesson 4: Network Infrastructure
Lesson 5: Disaster Recovery Planning

Module 05 – Protection of Information Assets
Lesson 1: Importance Of Information Security
Lesson 2: Logical Access
Lesson 3: Network Infrastructure Security
Lesson 4: Auditing Information Security Management Framework
Lesson 5: Auditing Network Infrastructure Security
Lesson 6: Environmental Exposures and Controls
Lesson 7: Physical Access Exposures and Controls
Lesson 8: Mobile Computing

Enroll through one of our accredited university or college partners today!

FAQ

To request more information, you can contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

Online courses are accessible 24/7/365 and self-paced, allowing you to progress at your own pace on your own schedule. They can be taken from anywhere in the world from the comfort of your own home. Classroom courses have a set schedule of the days and times the courses will be held, and you must attend during those specific times.

Find out if online learning is right for you by contacting our team of registration advisers. Our team is available to answer any of your questions about taking an online course before you commit to enrolling. We will walk you through what to expect to ensure you are making the right decision. You can contact a registration adviser today via online chat, our website contact form, or toll free at 1-855-201-6910.

No, you are not required to have a diploma or higher education degree to enroll in an online course. However, some occupations may require minimum educational thresholds for employment or certification. For more information on your desired career requirements, please contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

To take an online course, you will need to have access to an internet connection and an internet ready device such as a laptop, PC, or tablet. For course specific requirements, please visit the course page or contact a registration adviser today.

Our courses are developed with multiple formats including text, audio, video, and interactivity. Our courses also include multiple resources and tools which can include flashcards, games, activities, and more.

No, you can take the online courses from anywhere in the world.

We participate in several financial assistance options including third party funding, both military and non-military. To request more information on the financial assistance options available and check your eligibility, contact us via online chat, our website contact form, or toll free at 1-855-201-6910.

Duration is the amount of time you will receive access to your course. Durations vary by course and range between 1 month and 12 months. If you complete your course before your duration ends you will continue to have access to your course until the duration period ends.

Many of our career training programs include certification vouchers. This means that at the successful completion of your course, at no additional charge, you will receive an exam voucher for the corresponding industry certification. This voucher will allow you to register and sit for the appropriate certification exam to obtain your industry credential.

Our online courses are open enrollment, so you can start immediately. If you are using any third-party funding to cover your course tuition, your start date may be a future date determined by your funding program.

Once enrolled, you will be assigned a client adviser who will provide you with customer and technical support. Your client adviser will supply you with your course access information, any needed materials, and be available to answer any questions you have during your training experience. They will regularly check-in with you to monitor your progress and assist you with staying on track. You will also be assigned to a course mentor who will provide curriculum support throughout your training. Your mentor is available to answer any questions you have on your course curriculum, will monitor your progress and understanding of the curriculum, and may give assignments or quizzes.

If you experience any trouble accessing your course including technical issues or lost login credentials, please contact your client adviser at Austin Peay State University.

Our goal for students is to successfully complete their training course and achieve their career goals. We understand that extenuating circumstances can interfere with your ability to complete your course in the duration given. Because of this we have free or low-cost extensions available for our courses upon request. To discuss or request an extension please contact your client adviser at Austin Peay State University.

Upon successful completion of your course and fulfillment of any outstanding financial obligations, you will receive your certificate of completion. Certificates are provided to you within 30 days of completion. Your certificate will validate the training course you completed with a stamp of completion.

Students that successfully complete our career training programs are assigned a career development adviser who will coordinate placement at a local externship or hands on opportunity. These opportunities are optional and may vary based on availability and occupation. Your career development adviser will also provide job search services such as: resume building, mock interviews, job opportunity resources, and more. Our professional enrichment courses do not come with a career adviser or career services.