The Certified Information Systems Auditor (CISA) Certification training course from StudyITonline provides students with knowledge and skills IT Security professionals and auditors need to prepare for the CISA certification exam, including: the Information Systems Audit Process, Information Technology Governance, Systems and Infrastructure Life Cycle Management, IT Service Delivery and Support, Protection of Information Assets and Business Continuity and Disaster Recovery.
The Certified Information Systems Auditor (CISA) program, sponsored by ISACA®, has been the globally accepted standard of achievement among information systems (IS) audit, control and security professionals since 1978. As a Certified Information Systems Auditor (CISA), you'll perform a business-critical function: assessing your organization's IT and business systems to ensure they are monitored, controlled, and protected.
Candidates for this exam typically have a minimum of five years of experience as an information systems auditor or a similar combination of education and job experience. The CISA Certification is also part of the new DOD 8570.1 requirements for military and government personnel and contractors.
StudyITonline's CISA training course maps directly to the exam objectives and offers numerous features such as exam tips, case studies, and practice exams. We are so certain this class will provide you with the knowledge and skills you need to succeed, we guarantee you will pass your exam!Get more info on buying this course
CISA: Certified Information Systems Auditor
Overview The IS Audit Process
Risk Analysis and Risk Management
ISACA Code of Conduct
Performing an Audit
ISS and The Role of Policies and Procedures
Information Systems Management Practices
Organizational Structure and Responsibility
Systems and Infrastructure
Business Application Development
SLOC SDLC Demo
IT Service Delivery and Support
Information Systems Operations, Hardware and Software
Enterprise Network Architectures
Protection of Information Assets
Access, Exposures, and Security
Auditing the Physical Framework
Crypt MD5 Demo
Business Continuity and Disaster Recovery
IP Subnet Calculator