SlideShare a Scribd company logo
1 of 4
Download to read offline
Page 1
AAPM American Academy of Financial Management AAFM ®
1670-F East Cheyenne Mtn. Blvd.; Box #293
Colorado Springs CO 80906 -USA504-495-1748 Fax: 419-828-4923-
CONTACT LEGAL * info@certifiedprojectmanager.us
CERTIFIED INTERNATIONAL INFORMATION SYSTEM
AUDITOR (CIISA) COURSE OUTLINE
Course Certified Information System Auditor/CIISA
Instructor Certified American Academy Instructor
Descriptions The CIISA credential of a professionals I.S auditor is
valuable. This course delves into the unique
challenges of managing an audit and the knowledge
necessary to complete the task.
Information system auditors take up where the
financial auditors do not tread-into the design and
implementation effectiveness and operation
effectiveness of information system. The course will
focus on general computer control, application level
control auditing as well introducing of risk based
management approach.
The course is also designed to help candidates
familiar with IT audit concepts and rules for
regulatory compliance under Sarbanes-Oxely
(corporations), Gramm-Leach-Biley and FFIEC (both
financial), FISMA (government), HIPAA (medical
records), SCADA (utilities) and other regulators.
The course will also help you to become a true
management consultant in IT audit filed and will help
you well prepared for the American Academy
examination, which offered by American I.S Audit
and control Association.
The instructor-led classroom training covers the
Information System Audit body of knowledge to
build a working understanding of the material.
The training course will cover topics such as auditor
responsibilities, scope, audit charter, technical
material, privacy requirements, for CIISA exam
preparation. The course has updated the contents to
reflect the new subject material of the CIISA exam.
Page 2
AAPM American Academy of Financial Management AAFM ®
1670-F East Cheyenne Mtn. Blvd.; Box #293
Colorado Springs CO 80906 -USA504-495-1748 Fax: 419-828-4923-
CONTACT LEGAL * info@certifiedprojectmanager.us
Durations 3 Days
Objectives At the completion of this course, the participants shall have
comprehensive undertandingand knowledge in Information
System and Technology Audit and encompassing such as:
 Participants shall obtain an expanded understanding the
role of IT auditors in evaluating IT-related operational
and control risk and in assessing the appropriateness and
adequacy of management control practices and IT-
related controls inside participants’ organization
 Participants shall obtain the capability in conducting IT
audit and implement techniques in performing
assurance, attestation, and audit engagements
 Participants shall obtain an expanded familiarity with
the principle references in IT governance, control and
security as related to IT audit
 Participants shall obtain the working ability to plan,
conduct, and report on information technology audits
 Participants shall obtain an understanding of the role of
IT auditors regarding IT-related compliance and
regulatory audits, such as evaluating control standards
 Participants shall be prepared and throughly confident
upon themselves to take CIISA professional certificate
examination
Target Audience  IT Managers
 Security Managers
 Auditing Staffs
 IT Operation Staffs
Course Contents and Descriptions
Module 1: IS Audit
Process
Course Contents and Descriptions
Module 2: IT
Governance
The class session will focus on IT audit concepts and
processes, which includes: review of some of the key
fundamentals of IT auditing, including general auditing
standards, risk-based auditing, pre-audit objectives,
determining scope and audit objectives, and the process of
performing an IT audit.
Page 3
AAPM American Academy of Financial Management AAFM ®
1670-F East Cheyenne Mtn. Blvd.; Box #293
Colorado Springs CO 80906 -USA504-495-1748 Fax: 419-828-4923-
CONTACT LEGAL * info@certifiedprojectmanager.us
The class session will include discussion on IT
performance, controls, control self-assessment, risk
analysis, and the objectives of the IT audit or assurance
report.
Module 3: System and
Infrastructure Life Cycle
The class session shall describe on practical methodology in
conducting the effective and efficient IT audit, expand upon
the need for appropriate controls and assurance processes
for business and IT environment. The participants will be
geared toward gaining a working understanding of the
content and value of the management guidelines and
assurance methodology.
Discussion will focus on the importance of measurement in
achieving organizational and IT objectives. The session will
also focus on the business and IT environments subject to
operational and control assessments (audit).
Module 4: IT Service
Delivery and Support
Provide assurance that the IT service management
practices will ensure delivery of the level of service
required to meet the organization’s objectives. The module
describes as follows:
• Evaluate service level management practices to ensure
that the level of service from internal and external
service providers is defined and managed
• Evaluate operations management to ensure that IT
support functions effectively meet business needs
• Evaluate data administration practices to ensure the
integrity and optimization of databases
• Evaluate the use of capacity and performance
monitoring tools and techniques to ensure that IT
services meet the organization’s objectives
• Evaluate change, configuration and release management
practices to ensure that changes made to the
organization's production environment are adequately
controlled and documented
• Evaluate problem and incident management practices to
ensure that incidents, problems or errors are recorded,
analyzed and resolved in a timely manner
• Evaluate the functionality of the IT infrastructure (e.g.,
network components, hardware, system software) to
ensure that it supports the organization's objectives
Module 5: Protection of
Information Assets
Provide assurance that the security architecture
policies, standards, procedures and controls) ensures
the confidentiality, integrity and availability of
Page 4
AAPM American Academy of Financial Management AAFM ®
1670-F East Cheyenne Mtn. Blvd.; Box #293
Colorado Springs CO 80906 -USA504-495-1748 Fax: 419-828-4923-
CONTACT LEGAL * info@certifiedprojectmanager.us
information assets. The module descriptions are as
follows:
• Evaluate the design, implementation and
monitoring of logical access controls to ensure the
confidentiality, integrity, availability and
authorized use of information assets
• Evaluate network infrastructure security to ensure
confidentiality, integrity, availability and
authorized use of the network and the information
transmitted
• Evaluate the design, implementation and
monitoring of environmental controls to prevent or
minimize loss
• Evaluate the design, implementation and
monitoring of physical access controls to ensure
that information assets are adequately safeguarded
• Evaluate the processes and procedures used to
store, retrieve, transport and dispose of confidential
information assets
Module 6: Business
Continuity Plan
Provide assurance that in the event of a disruption
the business continuity and disaster recovery
processes will ensure the timely resumption of
IT service, while minimizing the business
impacts. The module covers as described below:
• Evaluate the adequacy of backup and restore
provisions to ensure the availability of
information required to resume processing
• Evaluate the organization's disaster recovery
plan to ensure that it enables the recovery of IT
processing capabilities in the event of a disaster
• Evaluate the organization's business continuity
plan to ensure the organization's ability to
continue essential business operations during
the period of an IT disruption
Case Studies Case-based discussions will be conducted with topics
related to the subjects of training. Exam exercises and
questions evaluation.

More Related Content

Similar to Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf

Architecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk ManagementArchitecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk Managementjadams6
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxJoshJaro
 
Seven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsSeven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsMaria Macri
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detailecarrow
 
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdfInfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdfpriyanshamadhwal2
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College SectorNikhat Rasheed
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT SystemsICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT SystemsMohammad Abdul Matin Emon
 
Ensuring SOC 2 Compliance A Comp Checklist.pdf
Ensuring SOC 2 Compliance A Comp Checklist.pdfEnsuring SOC 2 Compliance A Comp Checklist.pdf
Ensuring SOC 2 Compliance A Comp Checklist.pdfsocurely
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptxPrashant Singh
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Auditor Sistem Informasi dalam Kurikulum Magister Sistem Informasi
Auditor Sistem Informasi dalam Kurikulum Magister Sistem InformasiAuditor Sistem Informasi dalam Kurikulum Magister Sistem Informasi
Auditor Sistem Informasi dalam Kurikulum Magister Sistem InformasiYeffry Handoko
 
Quality management system processes
Quality management system processesQuality management system processes
Quality management system processesselinasimpson2801
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001PECB
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templatesIT-Toolkits.org
 

Similar to Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf (20)

Architecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk ManagementArchitecting the Framework for Compliance & Risk Management
Architecting the Framework for Compliance & Risk Management
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
Seven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsSeven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance Programs
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdfInfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
 
2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector2008 Pioneering The Employment Services Audit In The Ontario College Sector
2008 Pioneering The Employment Services Audit In The Ontario College Sector
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Ch2 2009 cisa
Ch2 2009 cisaCh2 2009 cisa
Ch2 2009 cisa
 
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT SystemsICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
ICAB - ITK Chapter 5 Set 1 - Internal Control in IT Systems
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
 
Ensuring SOC 2 Compliance A Comp Checklist.pdf
Ensuring SOC 2 Compliance A Comp Checklist.pdfEnsuring SOC 2 Compliance A Comp Checklist.pdf
Ensuring SOC 2 Compliance A Comp Checklist.pdf
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 
Governance and management of IT.pptx
Governance and management of IT.pptxGovernance and management of IT.pptx
Governance and management of IT.pptx
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Auditor Sistem Informasi dalam Kurikulum Magister Sistem Informasi
Auditor Sistem Informasi dalam Kurikulum Magister Sistem InformasiAuditor Sistem Informasi dalam Kurikulum Magister Sistem Informasi
Auditor Sistem Informasi dalam Kurikulum Magister Sistem Informasi
 
Quality management system processes
Quality management system processesQuality management system processes
Quality management system processes
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templates
 

More from Yoyo Sudaryo

Syllabus-Financial Planner.doc
Syllabus-Financial Planner.docSyllabus-Financial Planner.doc
Syllabus-Financial Planner.docYoyo Sudaryo
 
Syllabus-Certified Asset Management Professional.doc
Syllabus-Certified Asset Management Professional.docSyllabus-Certified Asset Management Professional.doc
Syllabus-Certified Asset Management Professional.docYoyo Sudaryo
 
Syllabus Chartered Portfolio Analyst.docx
Syllabus Chartered Portfolio Analyst.docxSyllabus Chartered Portfolio Analyst.docx
Syllabus Chartered Portfolio Analyst.docxYoyo Sudaryo
 
Syllabus Certified Strategic Business Analyst.doc
Syllabus Certified Strategic Business Analyst.docSyllabus Certified Strategic Business Analyst.doc
Syllabus Certified Strategic Business Analyst.docYoyo Sudaryo
 
Syllabus-Financial Risk Management.docx
Syllabus-Financial Risk Management.docxSyllabus-Financial Risk Management.docx
Syllabus-Financial Risk Management.docxYoyo Sudaryo
 
silabi Financial Planner Analist.pdf
silabi Financial Planner Analist.pdfsilabi Financial Planner Analist.pdf
silabi Financial Planner Analist.pdfYoyo Sudaryo
 
Kuliah perdana manajemen keuangan (program mm)
Kuliah perdana manajemen keuangan (program mm)Kuliah perdana manajemen keuangan (program mm)
Kuliah perdana manajemen keuangan (program mm)Yoyo Sudaryo
 
Manajemen Risiko mm/S1
Manajemen Risiko mm/S1Manajemen Risiko mm/S1
Manajemen Risiko mm/S1Yoyo Sudaryo
 
Factors that affect financial distress
Factors that affect financial distressFactors that affect financial distress
Factors that affect financial distressYoyo Sudaryo
 
MJ STRATEGIK CSR 15
MJ STRATEGIK CSR 15MJ STRATEGIK CSR 15
MJ STRATEGIK CSR 15Yoyo Sudaryo
 
Kuliah 1-15 mj strategik paran
Kuliah 1-15 mj strategik paranKuliah 1-15 mj strategik paran
Kuliah 1-15 mj strategik paranYoyo Sudaryo
 
Review Strategik 15
Review Strategik 15 Review Strategik 15
Review Strategik 15 Yoyo Sudaryo
 
Mnd013 AIBK-materi-sesi 15
Mnd013 AIBK-materi-sesi 15Mnd013 AIBK-materi-sesi 15
Mnd013 AIBK-materi-sesi 15Yoyo Sudaryo
 
An overview of international financial management
An overview of international financial management An overview of international financial management
An overview of international financial management Yoyo Sudaryo
 
Mnd013 analisis inv bank dan lembaga keuangan-modul-sesi 6
Mnd013 analisis inv bank dan lembaga keuangan-modul-sesi 6Mnd013 analisis inv bank dan lembaga keuangan-modul-sesi 6
Mnd013 analisis inv bank dan lembaga keuangan-modul-sesi 6Yoyo Sudaryo
 
Mnd013 analisis inv bank dan lembaga keuangan-materi-sesi 6
Mnd013 analisis inv bank dan lembaga keuangan-materi-sesi 6Mnd013 analisis inv bank dan lembaga keuangan-materi-sesi 6
Mnd013 analisis inv bank dan lembaga keuangan-materi-sesi 6Yoyo Sudaryo
 
6. mnc004 modul- mnj. strategi - sesi 6 - 2020
6. mnc004   modul- mnj. strategi - sesi 6 - 20206. mnc004   modul- mnj. strategi - sesi 6 - 2020
6. mnc004 modul- mnj. strategi - sesi 6 - 2020Yoyo Sudaryo
 

More from Yoyo Sudaryo (20)

Syllabus-Financial Planner.doc
Syllabus-Financial Planner.docSyllabus-Financial Planner.doc
Syllabus-Financial Planner.doc
 
Syllabus-Certified Asset Management Professional.doc
Syllabus-Certified Asset Management Professional.docSyllabus-Certified Asset Management Professional.doc
Syllabus-Certified Asset Management Professional.doc
 
Syllabus Chartered Portfolio Analyst.docx
Syllabus Chartered Portfolio Analyst.docxSyllabus Chartered Portfolio Analyst.docx
Syllabus Chartered Portfolio Analyst.docx
 
Syllabus Certified Strategic Business Analyst.doc
Syllabus Certified Strategic Business Analyst.docSyllabus Certified Strategic Business Analyst.doc
Syllabus Certified Strategic Business Analyst.doc
 
Syllabus-Financial Risk Management.docx
Syllabus-Financial Risk Management.docxSyllabus-Financial Risk Management.docx
Syllabus-Financial Risk Management.docx
 
silabi Financial Planner Analist.pdf
silabi Financial Planner Analist.pdfsilabi Financial Planner Analist.pdf
silabi Financial Planner Analist.pdf
 
DF.pdf
DF.pdfDF.pdf
DF.pdf
 
Kuliah perdana manajemen keuangan (program mm)
Kuliah perdana manajemen keuangan (program mm)Kuliah perdana manajemen keuangan (program mm)
Kuliah perdana manajemen keuangan (program mm)
 
Manajemen Risiko mm/S1
Manajemen Risiko mm/S1Manajemen Risiko mm/S1
Manajemen Risiko mm/S1
 
Mnd013 aibk-RPS
Mnd013 aibk-RPSMnd013 aibk-RPS
Mnd013 aibk-RPS
 
Factors that affect financial distress
Factors that affect financial distressFactors that affect financial distress
Factors that affect financial distress
 
Perwalian sesi 2
Perwalian sesi 2Perwalian sesi 2
Perwalian sesi 2
 
MJ STRATEGIK CSR 15
MJ STRATEGIK CSR 15MJ STRATEGIK CSR 15
MJ STRATEGIK CSR 15
 
Kuliah 1-15 mj strategik paran
Kuliah 1-15 mj strategik paranKuliah 1-15 mj strategik paran
Kuliah 1-15 mj strategik paran
 
Review Strategik 15
Review Strategik 15 Review Strategik 15
Review Strategik 15
 
Mnd013 AIBK-materi-sesi 15
Mnd013 AIBK-materi-sesi 15Mnd013 AIBK-materi-sesi 15
Mnd013 AIBK-materi-sesi 15
 
An overview of international financial management
An overview of international financial management An overview of international financial management
An overview of international financial management
 
Mnd013 analisis inv bank dan lembaga keuangan-modul-sesi 6
Mnd013 analisis inv bank dan lembaga keuangan-modul-sesi 6Mnd013 analisis inv bank dan lembaga keuangan-modul-sesi 6
Mnd013 analisis inv bank dan lembaga keuangan-modul-sesi 6
 
Mnd013 analisis inv bank dan lembaga keuangan-materi-sesi 6
Mnd013 analisis inv bank dan lembaga keuangan-materi-sesi 6Mnd013 analisis inv bank dan lembaga keuangan-materi-sesi 6
Mnd013 analisis inv bank dan lembaga keuangan-materi-sesi 6
 
6. mnc004 modul- mnj. strategi - sesi 6 - 2020
6. mnc004   modul- mnj. strategi - sesi 6 - 20206. mnc004   modul- mnj. strategi - sesi 6 - 2020
6. mnc004 modul- mnj. strategi - sesi 6 - 2020
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 

Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf

  • 1. Page 1 AAPM American Academy of Financial Management AAFM ® 1670-F East Cheyenne Mtn. Blvd.; Box #293 Colorado Springs CO 80906 -USA504-495-1748 Fax: 419-828-4923- CONTACT LEGAL * info@certifiedprojectmanager.us CERTIFIED INTERNATIONAL INFORMATION SYSTEM AUDITOR (CIISA) COURSE OUTLINE Course Certified Information System Auditor/CIISA Instructor Certified American Academy Instructor Descriptions The CIISA credential of a professionals I.S auditor is valuable. This course delves into the unique challenges of managing an audit and the knowledge necessary to complete the task. Information system auditors take up where the financial auditors do not tread-into the design and implementation effectiveness and operation effectiveness of information system. The course will focus on general computer control, application level control auditing as well introducing of risk based management approach. The course is also designed to help candidates familiar with IT audit concepts and rules for regulatory compliance under Sarbanes-Oxely (corporations), Gramm-Leach-Biley and FFIEC (both financial), FISMA (government), HIPAA (medical records), SCADA (utilities) and other regulators. The course will also help you to become a true management consultant in IT audit filed and will help you well prepared for the American Academy examination, which offered by American I.S Audit and control Association. The instructor-led classroom training covers the Information System Audit body of knowledge to build a working understanding of the material. The training course will cover topics such as auditor responsibilities, scope, audit charter, technical material, privacy requirements, for CIISA exam preparation. The course has updated the contents to reflect the new subject material of the CIISA exam.
  • 2. Page 2 AAPM American Academy of Financial Management AAFM ® 1670-F East Cheyenne Mtn. Blvd.; Box #293 Colorado Springs CO 80906 -USA504-495-1748 Fax: 419-828-4923- CONTACT LEGAL * info@certifiedprojectmanager.us Durations 3 Days Objectives At the completion of this course, the participants shall have comprehensive undertandingand knowledge in Information System and Technology Audit and encompassing such as:  Participants shall obtain an expanded understanding the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT- related controls inside participants’ organization  Participants shall obtain the capability in conducting IT audit and implement techniques in performing assurance, attestation, and audit engagements  Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit  Participants shall obtain the working ability to plan, conduct, and report on information technology audits  Participants shall obtain an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards  Participants shall be prepared and throughly confident upon themselves to take CIISA professional certificate examination Target Audience  IT Managers  Security Managers  Auditing Staffs  IT Operation Staffs Course Contents and Descriptions Module 1: IS Audit Process Course Contents and Descriptions Module 2: IT Governance The class session will focus on IT audit concepts and processes, which includes: review of some of the key fundamentals of IT auditing, including general auditing standards, risk-based auditing, pre-audit objectives, determining scope and audit objectives, and the process of performing an IT audit.
  • 3. Page 3 AAPM American Academy of Financial Management AAFM ® 1670-F East Cheyenne Mtn. Blvd.; Box #293 Colorado Springs CO 80906 -USA504-495-1748 Fax: 419-828-4923- CONTACT LEGAL * info@certifiedprojectmanager.us The class session will include discussion on IT performance, controls, control self-assessment, risk analysis, and the objectives of the IT audit or assurance report. Module 3: System and Infrastructure Life Cycle The class session shall describe on practical methodology in conducting the effective and efficient IT audit, expand upon the need for appropriate controls and assurance processes for business and IT environment. The participants will be geared toward gaining a working understanding of the content and value of the management guidelines and assurance methodology. Discussion will focus on the importance of measurement in achieving organizational and IT objectives. The session will also focus on the business and IT environments subject to operational and control assessments (audit). Module 4: IT Service Delivery and Support Provide assurance that the IT service management practices will ensure delivery of the level of service required to meet the organization’s objectives. The module describes as follows: • Evaluate service level management practices to ensure that the level of service from internal and external service providers is defined and managed • Evaluate operations management to ensure that IT support functions effectively meet business needs • Evaluate data administration practices to ensure the integrity and optimization of databases • Evaluate the use of capacity and performance monitoring tools and techniques to ensure that IT services meet the organization’s objectives • Evaluate change, configuration and release management practices to ensure that changes made to the organization's production environment are adequately controlled and documented • Evaluate problem and incident management practices to ensure that incidents, problems or errors are recorded, analyzed and resolved in a timely manner • Evaluate the functionality of the IT infrastructure (e.g., network components, hardware, system software) to ensure that it supports the organization's objectives Module 5: Protection of Information Assets Provide assurance that the security architecture policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of
  • 4. Page 4 AAPM American Academy of Financial Management AAFM ® 1670-F East Cheyenne Mtn. Blvd.; Box #293 Colorado Springs CO 80906 -USA504-495-1748 Fax: 419-828-4923- CONTACT LEGAL * info@certifiedprojectmanager.us information assets. The module descriptions are as follows: • Evaluate the design, implementation and monitoring of logical access controls to ensure the confidentiality, integrity, availability and authorized use of information assets • Evaluate network infrastructure security to ensure confidentiality, integrity, availability and authorized use of the network and the information transmitted • Evaluate the design, implementation and monitoring of environmental controls to prevent or minimize loss • Evaluate the design, implementation and monitoring of physical access controls to ensure that information assets are adequately safeguarded • Evaluate the processes and procedures used to store, retrieve, transport and dispose of confidential information assets Module 6: Business Continuity Plan Provide assurance that in the event of a disruption the business continuity and disaster recovery processes will ensure the timely resumption of IT service, while minimizing the business impacts. The module covers as described below: • Evaluate the adequacy of backup and restore provisions to ensure the availability of information required to resume processing • Evaluate the organization's disaster recovery plan to ensure that it enables the recovery of IT processing capabilities in the event of a disaster • Evaluate the organization's business continuity plan to ensure the organization's ability to continue essential business operations during the period of an IT disruption Case Studies Case-based discussions will be conducted with topics related to the subjects of training. Exam exercises and questions evaluation.