CISA Course Content
The Information Systems Audit Process
» Lesson Introduction
» ISACA Information Systems Auditing Standards and Guidelines
» Develop and Implement an Information Systems Audit Strategy
» Plan an Audit
» Conduct an Audit
» The Evidence Lifecycle
» Communicate Issues, Risks, and Audit Results
» Support the Implementation of Risk Management and Control Practices
» Lesson Lab
» Lesson Follow Up
IT Governance
» Lesson Introduction
» Evaluate the Effectiveness of IT Governance
» Evaluate the IT Organizational Structure
» Evaluate the IT Strategy
» Evaluate IT Policies, Standards, and Procedures for Compliance
» Ensure Organizational Compliance
» IT Resource Investment, Use, and Allocation Practices
» Evaluate IT Contracting Strategies and Policies
» Evaluate Risk Management Practices
» Performance Monitoring and Assurance Practices
» Lesson Lab
» Lesson Follow Up
Systems and Infrastructure Lifecycle Management
» Lesson Introduction
» Determine the Business Case for Change
» Evaluate Project Management Frameworks and Governance Practices
» Perform Periodic Project Reviews
» Evaluate Control Mechanisms for Systems
» Evaluate Development and Testing Processes
» Evaluate Implementation Readiness
» Evaluate a System Migration
» Lesson Lab
» Lesson Follow Up
Systems and Infrastructure Lifecycle Maintenance
» Lesson Introduction
» Perform a Post-Implementation System Review
» Perform Periodic System Reviews
» Evaluate the Maintenance Process
» Evaluate the Disposal Process
» Lesson Lab
» Lesson Follow Up
IT Service Delivery and Support
» Lesson Introduction
» Evaluate Service Level Management Practices
» Evaluate Operations Management
» Evaluate Data Administration Practices
» Evaluate the Use of Capacity and Performance Monitoring Methods
» Evaluate Change, Configuration, and Release Management Practices
» Evaluate Problem and Incident Management Practices
» Evaluate the Functionality of the IT Infrastructure
» Lesson Lab
» Lesson Follow Up
Protection of Information Assets
» Lesson Introduction
» Information Security Design
» Encryption Basics
» Evaluate the Design, Implementation, and Monitoring of Logical Access Controls
» Evaluate the Design, Implementation, and Monitoring of Physical Access Controls
» Evaluate the Design, Implementation, and Monitoring of Environmental Controls
» Evaluate Network Infrastructure Security
» Evaluate the Confidential Information Processes and Procedures
» Lesson Lab
» Lesson Follow Up
Business Continuity and Disaster Recovery
» Lesson Introduction
» Evaluate the Adequacy of Backup and Restore
» Evaluate the BCP and DRP
» Lesson Lab
» Lesson Follow Up
Below you can find city wise CISA Institutes
CISA training institutes in India
CISA training institutes in Chennai
CISA training institutes in Bangalore
CISA training institutes in Mumbai
CISA training institutes in Pune
CISA training institutes in Delhi-NCR
30-08-2013 by Training Support