SlideShare a Scribd company logo
ISACA 
For Student
Get to know 
ISACA
ISACA (Information Systems Audit and Control Association) 
• 1969 ISACA was incorporated in, this to recognized for a centralized source of 
information and guidance in the growing field of auditing controls for computer 
systems. 
• It was formerly known as the Information Systems Audit and Control Association but 
now goes simply by ISACA 
• ISACA is a global nonprofit association focused on IT governance. 
• Today, ISACA’s membership—more than 100,000 strong worldwide—is 
characterized by its diversity. Members live and work in more than 180 countries and 
cover a variety of professional IT-related positions—to name just a few, IS auditor, 
consultant, educator, IS security professional, regulator, chief information officer and 
internal auditor 
• Another of ISACA’s strengths is its chapter network. ISACA has more than 190 
chapters established in over 75 countries worldwide, and those chapters provide 
members education, resource sharing, advocacy, professional networking and a host 
of other benefits on a local level.
Area of ISACA certification: 
1. Information systems audit process 
2. Information systems governance 
3. Systems and infrastructure life cycle management 
4. Information technology service delivery and support 
5. Protection of information assets 
6. Business continuity and disaster recovery
ISACA Vision and Mission 
ISACA’s vision (to aspire to as an organization) 
“Trust in, and value from, information systems” 
ISACA’s mission (to guide decision making and investments) 
“For professionals and organizations 
be the leading global provider of knowledge, certifications, community, 
advocacy and education 
on information systems assurance and security, 
enterprise governance of IT, and IT-related risk and compliance”
About ISACA 
• ISACA Is Non-profit association in the area of: 
• IT auditing/ auditors 
• IT security professionals 
• IT risk and compliance professionals 
• IT governance professionals and more! 
• Nearly all industry categories: finance, banking, public 
accounting, government/public sector, technology, utilities 
and manufacturing.
About ISACA 
• What is an IT Auditor? 
An IT Auditor performs a formal inspection and verification to 
check whether a standard or set of guidelines is being 
followed, records are accurate, or efficiency and effectiveness 
targets are being met. 
CISA certification is the gold-standard credential for Information Systems 
Auditors. CISA certified systems auditors have the skills and expertise to 
audit computer systems, manage vulnerabilities, institute security controls 
and oversee compliance at the enterprise level 
Big 5 IT Certification with highest salary. 
 Research from Footepartners
The role of IT auditor's was born through a union of accounting and technology 
fields in a computer-driven economy. 
Responsible for identifying risks to a company by way of its online systems, 
including databases, email, intranet and Internet networks, as well as tangible 
threats to computer hardware and equipment. 
Avoiding damage done by disgruntled former workers, competitors or hackers 
while highlighting inadequacies and areas for improvement are all roles of this 
profession. 
To succeed in this position, you must have a variety of technology, business 
and social skills.
Skills of Auditor 
• Hard Skills 
The hard skills IT auditors include: 
• Strong understanding of general computer controls, 
data analytics, basic system infrastructure, and risk 
assessment. 
• Data analytics is a process of inspecting, cleaning, 
transforming, and modeling data to highlight useful 
information, suggest conclusions, and support 
decision-making. 
• IT auditors use specialized data analysis tools or off-the- 
shelf database and spreadsheet software to detect 
fraud, find data errors, and help the organization 
eliminate waste
• The IT auditor needs a solid base knowledge of Basic 
system infrastructure such as hardware, software, 
networks, database, OS and cloud computing -- from 
installation to operation and repair. 
• Programming knowledge is helpful, since IT auditing 
uses computer-assisted audit tools to perform many job 
functions. 
• Note :The auditor must learn and monitor 
advancements in these tools, then apply the correct 
ones to each task.
• What is IT Security Professional? 
IT Security Professional is the person 
responsible for implementing, monitoring and 
enforcing security rules established and 
authorized by management. 
Certified Information Security Manager (CISM) | CISM covers four vital domains in 
cyber security management: security governance, risk management, security 
program creation and incidence response. The key differentiator of CISM is its 
focus on the big picture, i.e., how to use information security to advance top-level 
business goals.
• To minimize liabilities/reduce risks, the IT 
security professional must: 
– Stay current with security technology 
– Stay current with laws and regulations
About ISACA 
• What is an IT risk and compliance officer? 
IT risk and compliance officers assess the business risk 
associated with the use, ownership, operation, involvement, 
influence and adoption of IT within enterprise while collecting 
evidence on both the effectiveness and operation of the IT 
controls during an audit period. 
Certified in Risk and Information Systems Control 
(CRISC) | CRISC certification demonstrates a mastery of 
IT and enterprise risk management. Calculating and 
mitigating risk is a coveted skill in enterprise IT; talented 
CRISC certified pros make significant contributions to 
the business and are rewarded in kind.
What is IT Governance Professional? 
An IT governance professional is a person who oversees all the rules and regulations 
under which information systems function and the mechanisms put in place to ensure 
that the information systems in place sustain and extend the organization's strategies 
and objectives. 
IT governance (ITG) is defined as the processes that ensure the effective and 
efficient use of IT in enabling an organization to achieve its goals. 
IT demand governance is the process by which organizations ensure the 
evaluation, selection, prioritization, and funding of competing IT investments; 
oversee their implementation; and extract (measurable) business benefits. 
Certified in the Governance of Enterprise IT (CGEIT) | CGEIT validates 
expertise in the principles and real-world applications of enterprise IT 
governance. CGEIT certified professionals have the credibility to ensure good 
governance, which reduces unanticipated security issues and helps to 
formulate an agile response to any surprises that still arise.
About ISACA 
Why a career in…IT audit, IT security, IT risk and 
compliance or IT governance? 
• High-level understanding of organization 
and industry 
• Exposure to senior-level management 
• Growth market, excellent salary potential 
• Networking opportunities 
• Potential global travel 
• Diverse work environment
16 
Skill-sets needed? 
• Creative 
• Conceptual 
• Excellent communicators 
• Persuasive 
• Inquisitive 
About ISACA
About ISACA: Certification 
90,000+ CISAs certified since inception in 1978 18,000+ CISMs certified since inception in 2003 
16,000+ CRISCs 5,000+ CGEITs certified since inception in 2007 certified since inception in 2010
18 
About ISACA: Certification 
Value of Professional Certifications 
• Global recognition 
• Credibility 
• Higher pay 
• Diverse career opportunities 
• Career advancement
About ISACA: Certification 
Recognition: SC Magazine Awards 
CISA: SC Magazine’s 2011 Best Professional Certification Program finalist; 2009 winner 
CISM: SC Magazine’s 2009-2012 Best Professional Certification Program finalist 
CGEIT: SC Magazine’s 2011 Best Professional Certification Program finalist
About ISACA: Certification 
Foote Partners Salary Survey on IT Certifications 
CISA – 
• Consistently ranking among the top-paying 
industry certifications 
• Ranked as having the high paid premium 
• 2ND highest paying IT security certification in 
2011 
• Consistently ranks among the top-paying 
industry certifications 
• Top five of Foote Partners’ 2011 semiannual 
“HOT LIST Forecast” of IT skills and 
certifications that will increase in value 
(Source: Foote Partners IT Skills and Certification Pay Index, 2nd quarter 2011)
About ISACA 
Foote Partners Salary Survey On IT Certifications 
CISM 
• Highest-paying IT security certification in the 
2012 IT Skills and Certifications Pay Index 
(ITSCPI) 
• The top paying IT security certification in 2011 
• Ranked as having the highest pay premium 
(Source: Foote Partners IT Skills and Certification Pay Index, 2nd quarter 2011)
About ISACA: Research 
COBIT 5 
For more information please visit www.isaca.org/cobit5
About ISACA: Research 
COBIT 
COBIT ranks globally among top four IT Governance Frameworks 
Fact: 60,000+ 
downloads of COBIT 5 
since its introduction 
in April 2012 
For more information please visit www.isaca.org/cobit5
About ISACA: Research 
COBIT 
Harley-Davidson, USA 
Sun Microsystems, USA 
DataSek, Uruguay 
Dongbu HiTek, Korea 
Jefferson Wells, USA 
Manta Group, Canada 
Pension-Fennia, Finland 
Government of Dubai 
Ontario Pension Board 
Prudential, Asia 
Blackboard, Inc. 
Allstate, USA 
Fact: COBIT has been touted in 
the media in 40 countries. 
Unisys, USA 
Bahrain Civil Service 
Central Bank of Republic of Armenia 
Curtin University of Technology, Western Australia 
Blue Cross/Blue Shield, No. Carolina & IBM Consulting 
Kuwait Turkish Participation Bank 
Canadian Tire Financial Services 
Charles Schwab & Co. Inc., USA 
U.S. Dept of Veterans Affairs 
Adnoc Distributions, UAE 
For more information please visit www.isaca.org/cobitcasestudies
Move Yourself Forward 
Student Membership 
As an ISACA student member, you will join a community of more than 
1,000 students in more than 300 universities worldwide. 
ISACA Students major in a variety 
of areas including: 
Information systems 
Business administration 
Accounting 
Information technology 
Engineering 
Computer Science 
So don’t be left behind…Join ISACA and see what you can find.
Move Yourself Forward 
ISACA 
Student Member Benefits 
“Knowledge and experience to put students far 
ahead of the competition when it comes time to 
begin their careers.”
ISACA Student Groups 
ISACA urges students to form an ISACA Student Group on campus. ISACA 
student groups encourage education beyond the classroom and allow 
students to network and learn from each other. 
Benefits of creating an ISACA Student Groups are: 
• Ability to affiliate, if possible, with an ISACA local chapter and participate in 
their events; 
• Become recognized by your educational institution; student membership in 
ISACA is not required; 
• Internationally recognized by ISACA HQ with an official student group logo 
• Have the ability to interact with professionals in 
the field 
For more information about student group including 
a step by step guide, please visit 
http://www.isaca.org/studentgroup and 
http://www.isaca.org/createISG

More Related Content

What's hot

Information security governance
Information security governanceInformation security governance
Information security governance
Koen Maris
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
Prime Infoserv
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
kpatrickwheeler
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
ITpreneurs
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy
James Deiotte
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliancerhanna11
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
Wilfred Barretto
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT Skills
Eryk Budi Pratama
 
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,..."I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
Anup Narayanan
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure General
Caroline Bombart
 
Business RISKS From IT
Business RISKS From IT Business RISKS From IT
Business RISKS From IT
Sanjiv Arora
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
Prof. Jacques Folon (Ph.D)
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
Raymond Cunningham
 
General manager | NMO 2019
General manager | NMO 2019General manager | NMO 2019
General manager | NMO 2019
National Management Olympiad
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
Murray Security Services
 

What's hot (20)

Information security governance
Information security governanceInformation security governance
Information security governance
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
Infocon Bangladesh 2016
Infocon Bangladesh 2016Infocon Bangladesh 2016
Infocon Bangladesh 2016
 
Pci Europe 2009 Underside Of The Compliance Ecosystem
Pci Europe 2009   Underside Of The Compliance EcosystemPci Europe 2009   Underside Of The Compliance Ecosystem
Pci Europe 2009 Underside Of The Compliance Ecosystem
 
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISCHow Training and Consulting Companies Can Position CISSP, CISM and CRISC
How Training and Consulting Companies Can Position CISSP, CISM and CRISC
 
Security as a Strategy
Security as a Strategy Security as a Strategy
Security as a Strategy
 
IT Risk Management & Compliance
IT Risk Management & ComplianceIT Risk Management & Compliance
IT Risk Management & Compliance
 
Yhcg - IT security and risk management
Yhcg  - IT security and risk managementYhcg  - IT security and risk management
Yhcg - IT security and risk management
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT Skills
 
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,..."I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
"I am Certified, but am I Safe?" - Information Security Summit, Kuala Lumpur,...
 
ISACA Certification Brochure General
ISACA Certification Brochure GeneralISACA Certification Brochure General
ISACA Certification Brochure General
 
Business RISKS From IT
Business RISKS From IT Business RISKS From IT
Business RISKS From IT
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
General manager | NMO 2019
General manager | NMO 2019General manager | NMO 2019
General manager | NMO 2019
 
IT Position of Trust Designation
IT Position of Trust DesignationIT Position of Trust Designation
IT Position of Trust Designation
 

Similar to 5548 isaca for-students

Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
Suman Thapaliya
 
CISA sertifikacija
CISA sertifikacijaCISA sertifikacija
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
goreankush1
 
What are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxWhat are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptx
infosec train
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
SagarNegi10
 
Item46763
Item46763Item46763
Item46763
madunix
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurancea3virani
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
FERMA
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
SagarNegi10
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
CGTI
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
GrapesTech Solutions
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting OverviewRonan Martin
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
Know about cisa certification
Know about cisa certificationKnow about cisa certification
Know about cisa certification
JasonRoy50
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdfInfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
priyanshamadhwal2
 

Similar to 5548 isaca for-students (20)

Orientation in IT Audit
Orientation in IT AuditOrientation in IT Audit
Orientation in IT Audit
 
CISA sertifikacija
CISA sertifikacijaCISA sertifikacija
CISA sertifikacija
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
What are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptxWhat are the Job Prospects After Doing CISA.pptx
What are the Job Prospects After Doing CISA.pptx
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
Item46763
Item46763Item46763
Item46763
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurance
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
Brandon Consulting Overview
Brandon Consulting OverviewBrandon Consulting Overview
Brandon Consulting Overview
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Know about cisa certification
Know about cisa certificationKnow about cisa certification
Know about cisa certification
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdfInfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf
 

More from Universitas Bina Darma Palembang

29510 pertemuan18(form method-get-post-dan-session(1))
29510 pertemuan18(form method-get-post-dan-session(1))29510 pertemuan18(form method-get-post-dan-session(1))
29510 pertemuan18(form method-get-post-dan-session(1))
Universitas Bina Darma Palembang
 
28501 pertemuan14(php)
28501 pertemuan14(php)28501 pertemuan14(php)
28501 pertemuan14(php)
Universitas Bina Darma Palembang
 
28500 pertemuan22(header dokumen html dgn tag title)
28500 pertemuan22(header dokumen html dgn tag title)28500 pertemuan22(header dokumen html dgn tag title)
28500 pertemuan22(header dokumen html dgn tag title)
Universitas Bina Darma Palembang
 
25437 pertemuan25(hitcounter)
25437 pertemuan25(hitcounter)25437 pertemuan25(hitcounter)
25437 pertemuan25(hitcounter)
Universitas Bina Darma Palembang
 
18759 pertemuan20(web html editor)
18759 pertemuan20(web html editor)18759 pertemuan20(web html editor)
18759 pertemuan20(web html editor)
Universitas Bina Darma Palembang
 
18040 pertemuan13(css)
18040 pertemuan13(css)18040 pertemuan13(css)
18040 pertemuan13(css)
Universitas Bina Darma Palembang
 
16406 pertemuan17(konsep basis-data-di-web)
16406 pertemuan17(konsep basis-data-di-web)16406 pertemuan17(konsep basis-data-di-web)
16406 pertemuan17(konsep basis-data-di-web)
Universitas Bina Darma Palembang
 
15294 pertemuan9(eksplorasi &defenisi masalah0
15294 pertemuan9(eksplorasi &defenisi masalah015294 pertemuan9(eksplorasi &defenisi masalah0
15294 pertemuan9(eksplorasi &defenisi masalah0
Universitas Bina Darma Palembang
 
12738 pertemuan 15(php lanjutan)
12738 pertemuan 15(php lanjutan)12738 pertemuan 15(php lanjutan)
12738 pertemuan 15(php lanjutan)
Universitas Bina Darma Palembang
 
6346 pertemuan21(web statis dengan struktur html)
6346 pertemuan21(web statis dengan struktur html)6346 pertemuan21(web statis dengan struktur html)
6346 pertemuan21(web statis dengan struktur html)
Universitas Bina Darma Palembang
 
5623 pertemuan11(html1)
5623 pertemuan11(html1)5623 pertemuan11(html1)
5623 pertemuan11(html1)
Universitas Bina Darma Palembang
 
4740 pertemuan8(komponen dalam web)
4740 pertemuan8(komponen dalam web)4740 pertemuan8(komponen dalam web)
4740 pertemuan8(komponen dalam web)
Universitas Bina Darma Palembang
 
4075 pertemuan10 (analisa kebutuhan)
4075 pertemuan10 (analisa kebutuhan)4075 pertemuan10 (analisa kebutuhan)
4075 pertemuan10 (analisa kebutuhan)
Universitas Bina Darma Palembang
 
2670 pertemuan12(html lanjut)
2670 pertemuan12(html lanjut)2670 pertemuan12(html lanjut)
2670 pertemuan12(html lanjut)
Universitas Bina Darma Palembang
 
2190 pertemuan24(polling)
2190 pertemuan24(polling)2190 pertemuan24(polling)
2190 pertemuan24(polling)
Universitas Bina Darma Palembang
 

More from Universitas Bina Darma Palembang (20)

30448 pertemuan1
30448 pertemuan130448 pertemuan1
30448 pertemuan1
 
29510 pertemuan18(form method-get-post-dan-session(1))
29510 pertemuan18(form method-get-post-dan-session(1))29510 pertemuan18(form method-get-post-dan-session(1))
29510 pertemuan18(form method-get-post-dan-session(1))
 
28501 pertemuan14(php)
28501 pertemuan14(php)28501 pertemuan14(php)
28501 pertemuan14(php)
 
28500 pertemuan22(header dokumen html dgn tag title)
28500 pertemuan22(header dokumen html dgn tag title)28500 pertemuan22(header dokumen html dgn tag title)
28500 pertemuan22(header dokumen html dgn tag title)
 
25437 pertemuan25(hitcounter)
25437 pertemuan25(hitcounter)25437 pertemuan25(hitcounter)
25437 pertemuan25(hitcounter)
 
23921 pertemuan 3
23921 pertemuan 323921 pertemuan 3
23921 pertemuan 3
 
19313 pertemuan6
19313 pertemuan619313 pertemuan6
19313 pertemuan6
 
18759 pertemuan20(web html editor)
18759 pertemuan20(web html editor)18759 pertemuan20(web html editor)
18759 pertemuan20(web html editor)
 
18040 pertemuan13(css)
18040 pertemuan13(css)18040 pertemuan13(css)
18040 pertemuan13(css)
 
17945 pertemuan5
17945 pertemuan517945 pertemuan5
17945 pertemuan5
 
16406 pertemuan17(konsep basis-data-di-web)
16406 pertemuan17(konsep basis-data-di-web)16406 pertemuan17(konsep basis-data-di-web)
16406 pertemuan17(konsep basis-data-di-web)
 
15294 pertemuan9(eksplorasi &defenisi masalah0
15294 pertemuan9(eksplorasi &defenisi masalah015294 pertemuan9(eksplorasi &defenisi masalah0
15294 pertemuan9(eksplorasi &defenisi masalah0
 
13926 pertemuan4
13926 pertemuan413926 pertemuan4
13926 pertemuan4
 
12738 pertemuan 15(php lanjutan)
12738 pertemuan 15(php lanjutan)12738 pertemuan 15(php lanjutan)
12738 pertemuan 15(php lanjutan)
 
6346 pertemuan21(web statis dengan struktur html)
6346 pertemuan21(web statis dengan struktur html)6346 pertemuan21(web statis dengan struktur html)
6346 pertemuan21(web statis dengan struktur html)
 
5623 pertemuan11(html1)
5623 pertemuan11(html1)5623 pertemuan11(html1)
5623 pertemuan11(html1)
 
4740 pertemuan8(komponen dalam web)
4740 pertemuan8(komponen dalam web)4740 pertemuan8(komponen dalam web)
4740 pertemuan8(komponen dalam web)
 
4075 pertemuan10 (analisa kebutuhan)
4075 pertemuan10 (analisa kebutuhan)4075 pertemuan10 (analisa kebutuhan)
4075 pertemuan10 (analisa kebutuhan)
 
2670 pertemuan12(html lanjut)
2670 pertemuan12(html lanjut)2670 pertemuan12(html lanjut)
2670 pertemuan12(html lanjut)
 
2190 pertemuan24(polling)
2190 pertemuan24(polling)2190 pertemuan24(polling)
2190 pertemuan24(polling)
 

Recently uploaded

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 

Recently uploaded (20)

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 

5548 isaca for-students

  • 2. Get to know ISACA
  • 3. ISACA (Information Systems Audit and Control Association) • 1969 ISACA was incorporated in, this to recognized for a centralized source of information and guidance in the growing field of auditing controls for computer systems. • It was formerly known as the Information Systems Audit and Control Association but now goes simply by ISACA • ISACA is a global nonprofit association focused on IT governance. • Today, ISACA’s membership—more than 100,000 strong worldwide—is characterized by its diversity. Members live and work in more than 180 countries and cover a variety of professional IT-related positions—to name just a few, IS auditor, consultant, educator, IS security professional, regulator, chief information officer and internal auditor • Another of ISACA’s strengths is its chapter network. ISACA has more than 190 chapters established in over 75 countries worldwide, and those chapters provide members education, resource sharing, advocacy, professional networking and a host of other benefits on a local level.
  • 4. Area of ISACA certification: 1. Information systems audit process 2. Information systems governance 3. Systems and infrastructure life cycle management 4. Information technology service delivery and support 5. Protection of information assets 6. Business continuity and disaster recovery
  • 5. ISACA Vision and Mission ISACA’s vision (to aspire to as an organization) “Trust in, and value from, information systems” ISACA’s mission (to guide decision making and investments) “For professionals and organizations be the leading global provider of knowledge, certifications, community, advocacy and education on information systems assurance and security, enterprise governance of IT, and IT-related risk and compliance”
  • 6. About ISACA • ISACA Is Non-profit association in the area of: • IT auditing/ auditors • IT security professionals • IT risk and compliance professionals • IT governance professionals and more! • Nearly all industry categories: finance, banking, public accounting, government/public sector, technology, utilities and manufacturing.
  • 7. About ISACA • What is an IT Auditor? An IT Auditor performs a formal inspection and verification to check whether a standard or set of guidelines is being followed, records are accurate, or efficiency and effectiveness targets are being met. CISA certification is the gold-standard credential for Information Systems Auditors. CISA certified systems auditors have the skills and expertise to audit computer systems, manage vulnerabilities, institute security controls and oversee compliance at the enterprise level Big 5 IT Certification with highest salary.  Research from Footepartners
  • 8. The role of IT auditor's was born through a union of accounting and technology fields in a computer-driven economy. Responsible for identifying risks to a company by way of its online systems, including databases, email, intranet and Internet networks, as well as tangible threats to computer hardware and equipment. Avoiding damage done by disgruntled former workers, competitors or hackers while highlighting inadequacies and areas for improvement are all roles of this profession. To succeed in this position, you must have a variety of technology, business and social skills.
  • 9. Skills of Auditor • Hard Skills The hard skills IT auditors include: • Strong understanding of general computer controls, data analytics, basic system infrastructure, and risk assessment. • Data analytics is a process of inspecting, cleaning, transforming, and modeling data to highlight useful information, suggest conclusions, and support decision-making. • IT auditors use specialized data analysis tools or off-the- shelf database and spreadsheet software to detect fraud, find data errors, and help the organization eliminate waste
  • 10. • The IT auditor needs a solid base knowledge of Basic system infrastructure such as hardware, software, networks, database, OS and cloud computing -- from installation to operation and repair. • Programming knowledge is helpful, since IT auditing uses computer-assisted audit tools to perform many job functions. • Note :The auditor must learn and monitor advancements in these tools, then apply the correct ones to each task.
  • 11. • What is IT Security Professional? IT Security Professional is the person responsible for implementing, monitoring and enforcing security rules established and authorized by management. Certified Information Security Manager (CISM) | CISM covers four vital domains in cyber security management: security governance, risk management, security program creation and incidence response. The key differentiator of CISM is its focus on the big picture, i.e., how to use information security to advance top-level business goals.
  • 12. • To minimize liabilities/reduce risks, the IT security professional must: – Stay current with security technology – Stay current with laws and regulations
  • 13. About ISACA • What is an IT risk and compliance officer? IT risk and compliance officers assess the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within enterprise while collecting evidence on both the effectiveness and operation of the IT controls during an audit period. Certified in Risk and Information Systems Control (CRISC) | CRISC certification demonstrates a mastery of IT and enterprise risk management. Calculating and mitigating risk is a coveted skill in enterprise IT; talented CRISC certified pros make significant contributions to the business and are rewarded in kind.
  • 14. What is IT Governance Professional? An IT governance professional is a person who oversees all the rules and regulations under which information systems function and the mechanisms put in place to ensure that the information systems in place sustain and extend the organization's strategies and objectives. IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals. IT demand governance is the process by which organizations ensure the evaluation, selection, prioritization, and funding of competing IT investments; oversee their implementation; and extract (measurable) business benefits. Certified in the Governance of Enterprise IT (CGEIT) | CGEIT validates expertise in the principles and real-world applications of enterprise IT governance. CGEIT certified professionals have the credibility to ensure good governance, which reduces unanticipated security issues and helps to formulate an agile response to any surprises that still arise.
  • 15. About ISACA Why a career in…IT audit, IT security, IT risk and compliance or IT governance? • High-level understanding of organization and industry • Exposure to senior-level management • Growth market, excellent salary potential • Networking opportunities • Potential global travel • Diverse work environment
  • 16. 16 Skill-sets needed? • Creative • Conceptual • Excellent communicators • Persuasive • Inquisitive About ISACA
  • 17. About ISACA: Certification 90,000+ CISAs certified since inception in 1978 18,000+ CISMs certified since inception in 2003 16,000+ CRISCs 5,000+ CGEITs certified since inception in 2007 certified since inception in 2010
  • 18. 18 About ISACA: Certification Value of Professional Certifications • Global recognition • Credibility • Higher pay • Diverse career opportunities • Career advancement
  • 19. About ISACA: Certification Recognition: SC Magazine Awards CISA: SC Magazine’s 2011 Best Professional Certification Program finalist; 2009 winner CISM: SC Magazine’s 2009-2012 Best Professional Certification Program finalist CGEIT: SC Magazine’s 2011 Best Professional Certification Program finalist
  • 20. About ISACA: Certification Foote Partners Salary Survey on IT Certifications CISA – • Consistently ranking among the top-paying industry certifications • Ranked as having the high paid premium • 2ND highest paying IT security certification in 2011 • Consistently ranks among the top-paying industry certifications • Top five of Foote Partners’ 2011 semiannual “HOT LIST Forecast” of IT skills and certifications that will increase in value (Source: Foote Partners IT Skills and Certification Pay Index, 2nd quarter 2011)
  • 21. About ISACA Foote Partners Salary Survey On IT Certifications CISM • Highest-paying IT security certification in the 2012 IT Skills and Certifications Pay Index (ITSCPI) • The top paying IT security certification in 2011 • Ranked as having the highest pay premium (Source: Foote Partners IT Skills and Certification Pay Index, 2nd quarter 2011)
  • 22. About ISACA: Research COBIT 5 For more information please visit www.isaca.org/cobit5
  • 23. About ISACA: Research COBIT COBIT ranks globally among top four IT Governance Frameworks Fact: 60,000+ downloads of COBIT 5 since its introduction in April 2012 For more information please visit www.isaca.org/cobit5
  • 24. About ISACA: Research COBIT Harley-Davidson, USA Sun Microsystems, USA DataSek, Uruguay Dongbu HiTek, Korea Jefferson Wells, USA Manta Group, Canada Pension-Fennia, Finland Government of Dubai Ontario Pension Board Prudential, Asia Blackboard, Inc. Allstate, USA Fact: COBIT has been touted in the media in 40 countries. Unisys, USA Bahrain Civil Service Central Bank of Republic of Armenia Curtin University of Technology, Western Australia Blue Cross/Blue Shield, No. Carolina & IBM Consulting Kuwait Turkish Participation Bank Canadian Tire Financial Services Charles Schwab & Co. Inc., USA U.S. Dept of Veterans Affairs Adnoc Distributions, UAE For more information please visit www.isaca.org/cobitcasestudies
  • 25. Move Yourself Forward Student Membership As an ISACA student member, you will join a community of more than 1,000 students in more than 300 universities worldwide. ISACA Students major in a variety of areas including: Information systems Business administration Accounting Information technology Engineering Computer Science So don’t be left behind…Join ISACA and see what you can find.
  • 26. Move Yourself Forward ISACA Student Member Benefits “Knowledge and experience to put students far ahead of the competition when it comes time to begin their careers.”
  • 27. ISACA Student Groups ISACA urges students to form an ISACA Student Group on campus. ISACA student groups encourage education beyond the classroom and allow students to network and learn from each other. Benefits of creating an ISACA Student Groups are: • Ability to affiliate, if possible, with an ISACA local chapter and participate in their events; • Become recognized by your educational institution; student membership in ISACA is not required; • Internationally recognized by ISACA HQ with an official student group logo • Have the ability to interact with professionals in the field For more information about student group including a step by step guide, please visit http://www.isaca.org/studentgroup and http://www.isaca.org/createISG