Certified Information System Auditor

Course Code: CS05

Course Objective

  • the effective skills necessary to develop, manage, and supervise programs to defend against unauthorized admittance to information.
  • identify different issues arising during an organization-wide security planning and how to avoid and eliminate them.

 

Target Audience

  • individuals preparing for the CISA Certification exam.
  • System Administrators.

 

Course Outline

  • Module 1: The IS Audit Process
  • ISACA IS Auditing Standards, Guidelines and Procedures and Code of Professional Ethics
  • IS auditing practices and techniques
  • Techniques to gather information and preserve evidence (e.g., observation, inquiry, interview, CAATs, electronic media)
  • The evidence life cycle (e.g., the collection, protection, chain of custody)
  • Control objectives and controls related to IS (e.g., CobiT)
  • Risk assessment in an audit context
  • Audit planning and management techniques
  • Reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution)
  • Control self-assessment (CSA)
  • Continuous audit techniques
  • Module 2: IT Governance
  • ISACA IS Auditing Standards, Guidelines and Procedures and Code of Professional Ethics
  • IS auditing practices and techniques
  • Techniques to gather information and preserve evidence (e.g., observation, inquiry, interview, CAATs, electronic media)
  • The evidence life cycle (e.g., the collection, protection, chain of custody)
  • Control objectives and controls related to IS (e.g., CobiT)
  • Risk assessment in an audit context
  • Audit planning and management techniques
  • Reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution)
  • Control self-assessment (CSA)
  • Continuous audit techniques
  • Module 3: Systems and Infrastructure Life Cycle
  • ISACA IS Auditing Standards, Guidelines and Procedures and Code of Professional Ethics
  • IS auditing practices and techniques
  • Techniques to gather information and preserve evidence (e.g., observation, inquiry, interview, CAATs, electronic media)
  • The evidence life cycle (e.g., the collection, protection, chain of custody)
  • Control objectives and controls related to IS (e.g., CobiT)
  • Risk assessment in an audit context
  • Audit planning and management techniques
  • Reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution)
  • Control self-assessment (CSA)
  • Continuous audit techniques
  • Module 4: IT Service Delivery and Support
  • ISACA IS Auditing Standards, Guidelines and Procedures and Code of Professional Ethics
  • IS auditing practices and techniques
  • Techniques to gather information and preserve evidence (e.g., observation, inquiry, interview, CAATs, electronic media)
  • The evidence life cycle (e.g., the collection, protection, chain of custody)
  • Control objectives and controls related to IS (e.g., CobiT)
  • Risk assessment in an audit context
  • Audit planning and management techniques
  • Reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution)
  • Control self-assessment (CSA)
  • Continuous audit techniques
  • Module 5: Protection of Information Assets
  • ISACA IS Auditing Standards, Guidelines and Procedures and Code of Professional Ethics
  • IS auditing practices and techniques
  • Techniques to gather information and preserve evidence (e.g., observation, inquiry, interview, CAATs, electronic media)
  • The evidence life cycle (e.g., the collection, protection, chain of custody)
  • Control objectives and controls related to IS (e.g., CobiT)
  • Risk assessment in an audit context
  • Audit planning and management techniques
  • Reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution)
  • Control self-assessment (CSA)
  • Continuous audit techniques
  • Module 6: Business Continuity and Disaster Recovery
  • ISACA IS Auditing Standards, Guidelines and Procedures and Code of Professional Ethics
  • IS auditing practices and techniques
  • Techniques to gather information and preserve evidence (e.g., observation, inquiry, interview, CAATs, electronic media)
  • The evidence life cycle (e.g., the collection, protection, chain of custody)
  • Control objectives and controls related to IS (e.g., CobiT)
  • Risk assessment in an audit context
  • Audit planning and management techniques
  • Reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution)
  • Control self-assessment (CSA)
  • Continuous audit techniques


Register for this course


Date & Location

Date : 08 January 2023

Duration : 5 days

Place : Sharm El-Shaikh

Join This Course Now

Date : 07 May 2023

Duration : 5 days

Place : Dubai

Join This Course Now

Date : 16 July 2023

Duration : 5 days

Place : Cairo

Join This Course Now

download the Course file