• CATALOG
  • MILITARY
  • FINANCIAL ASSISTANCE
  • LOGIN
      Forget your password?
  • Open Search Dialog
Home > Training Programs > Cybersecurity > ISACA CISA Training Boot Camp

ISACA CISA Training Boot Camp

The Information Systems Audit and Control Association (ISACA) Certified Information Systems Auditor (CISA) Boot Camp is a five-day training course focused on preparing you for the ISACA CISA exam. You will leave with the knowledge and domain expertise needed to take the CISA exam.

Infosec-ISACA-CISA-Training-Boot-Camp
$4,499.00 (USD)

Have a question?We're here to help

Overview

Objective

Outline

  1. The process of auditing information systems
    1. Executing risk-based IS audit strategy
    2. Plan specific audits
    3. Conduct audits in accordance with IT audit standards
  2. Governance of IT and management
    1. Corporate governance
    2. Governance of enterprise IT
    3. Information systems strategy
    4. Maturity and process improvement models
    5. IT investment and allocation practices
    6. Policies and procedures
    7. Risk management
    8. Information technology management practices
    9. IT organization structure and responsibilities
    10. Auditing IT governance structure and implementation
    11. Business continuity planning
    12. Auditing business continuity
  3. Information systems acquisition, development, and implementation
    1. Business realization
    2. Project management structure
    3. Project management practices
    4. Business application development
    5. Virtualization and cloud computing environments
    6. Business application systems
    7. Development methods
    8. Infrastructure development/acquisition practices
    9. Information systems maintenance practices
    10. System development tools and productivity aids
    11. Process improvement practices
    12. Application controls
    13. Auditing application controls
    14. Auditing systems development, acquisition and maintenance
  4. Information systems operations, maintenance, and services management
    1. Information systems operations
    2. IT asset management
    3. Information systems hardware
    4. IS architecture and software
    5. IS network infrastructure
    6. Auditing infrastructure and operations
    7. Disaster recovery planning
  5. Protection of information assets
    1. Information security management
    2. Logical access
    3. Network infrastructure security
    4. Auditing information security management framework
    5. Auditing network infrastructure security
    6. Environmental exposures and controls
    7. Physical access exposures and controls
    8. Mobile computing
    9. Peer-to-peer computing
    10. Instant messaging
    11. Social media
    12. Cloud computing
    13. Data leakage
    14. End-user computing security risk and controls

Requirements

Prerequisites

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO

Instructor

FAQs

Reviews

You've got questions.
We're here to help.

Our highly knowledgeable Enrollment Specialists will answer any questions you might have about the course and payment options.

REQUEST INFO
Alabama State University
Division of Continuing Education
32 Commerce Street
Montgomery, AL 36104 US
MAIN CONTENT

Copyright © 1997 - 2024 All rights reserved. The material on this site cannot be reproduced or redistributed unless you have obtained prior written permission from Cengage Learning. Privacy Policy