OVERVIEW
In this online course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization’s information systems align with overall business goals and objectives. You will evaluate the security and controls of business structure and governance methods; the policies, procedures, and guidelines used; and the overall security of the business environment. Also, this course will help you prepare for the ISACA® CISA® certification exam.
LEARNING OUTCOMES:
- The Process of Auditing Information Systems
- Governance and Management of IT
- Information Systems Acquisition, Development, and Implementation
- Information Systems Operations, Maintenance, and Support
- Protection of Information Assets
1. The Information Systems Audit Process • ISACA Information Systems Auditing Standards and Guidelines • Develop and Implement an Information Systems Audit Strategy • Plan an Audit • Conduct an Audit • The Evidence Lifecycle • Communicate Issues, Risks, and Audit Results • Support the Implementation of Risk Management and Control Practices 2. IT Governance • Evaluate the Effectiveness of IT Governance • Evaluate the IT Organizational Structure • Evaluate the IT Strategy • Evaluate IT Policies, Standards, and Procedures for Compliance • Ensure Organizational Compliance • IT Resource Investment, Use, and Allocation Practices • Evaluate IT Contracting Strategies and Policies • Evaluate Risk Management Practices • Performance Monitoring and Assurance Practices 3. Systems and Infrastructure Lifecycle Management • Determine the Business Case for Change • Evaluate Project Management Frameworks and Governance Practices • Perform Periodic Project Reviews • Evaluate Control Mechanisms for Systems • Evaluate Development and Testing Processes • Evaluate Implementation Readiness • Evaluate a System Migration 4. Systems and Infrastructure Lifecycle Maintenance • Perform a Post-Implementation System Review • Perform Periodic System Reviews • Evaluate the Maintenance Process • Evaluate the Disposal Process 5. IT Service Delivery and Support • Evaluate Service Level Management Practices • Evaluate Operations Management • Evaluate Data Administration Practices • Evaluate the Use of Capacity and Performance Monitoring Methods • Evaluate Change, Configuration, and Release Management Practices • Evaluate Problem and Incident Management Practices • Evaluate the Functionality of the IT Infrastructure 6. Protection of Information Assets • Information Security Design • Encryption Basics • Evaluate the Design, Implementation, and Monitoring of Logical Access Controls • Evaluate the Design, Implementation, and Monitoring of Physical Access Controls • Evaluate the Design, Implementation, and Monitoring of Environmental Controls • Evaluate Network Infrastructure Security • Evaluate the Confidential Information Processes and Procedures 7. Business Continuity and Disaster Recovery • Evaluate the Adequacy of Backup and Restore • Evaluate the BCP and DRP 8. Appendix A: ISACA CISA Certification Process
DURATION: 3 DAYS
PRICE: $2,499 per participant