SlideShare a Scribd company logo
1 of 13
Download to read offline
Overview
The CISA is a globally reputed certification for
security professionals who audit, monitor, and
assess organizations’ information systems and
business operations. The certification showcases
the candidate’s auditing experience, knowledge,
and skills to evaluate vulnerabilities, report on
compliance, and institute controls within the
enterprise. Organizations require audit
professionals who possess the knowledge and
expertise to identify critical issues and security
challenges. The skills and practices that CISA
promotes and evaluates are the building blocks
of success in the field. Possessing the CISA
demonstrates proficiency and is the basis for
measurement in the profession.
www.infosectrain.com | sales@infosectrain.com 01
Target Audience
• Individuals who are willing to learn in Information Systems Auditing
• Professionals who are Auditors or working in an Audit environment
• The professionals who are willing to make a Career in Information Systems
Auditing
• IT managers
• Security Managers
• System Analysts
• Consultants
• A maximum of 1 year of information systems experience OR 1 year of non-IS
auditing experience can be substituted for 1 year of experience.
• 60 to 120 completed university semester credit hours (the equivalent of a 2-year
or 4-year degree) not limited by the 10-year preceding restriction can be
substituted for 1 or 2 years, respectively, of experience.
• A master’s degree in information security or information technology from an
accredited university can be substituted for 1 year of experience.
Pre-Requisite
A minimum of 5 years of professional information systems auditing, control or
security work experience (as described in the CISA job practice areas) is
required for certification. Substitutions and waivers of such experience, to a
maximum of 3 years, maybe obtained as follows:
www.infosectrain.com | sales@infosectrain.com 02
Exam Information
Duration 4 hours
Number of Questions 150
Question format
Passing grade
Languages available
Multiple Choice
450 out of 800
English, French, German, Hebrew,
Italian, Japanese, Korean, Spanish,
Turkish, Chinese
Why Infosec Train?
Certified &
Experienced Instructor
Flexible Schedule Access to the
recorded
sessions
Tailor Made Training Telegram
Discussion
Group
Post Training
Support
www.infosectrain.com | sales@infosectrain.com 03
www.infosectrain.com | sales@infosectrain.com 05
Our Expert Instructors
Certified Security specialist having several years of experience in Information Security across all
domains including application security, vulnerability assessment, ethical hacking, pen testing and
IT risk and compliance and more
CISSP I CCSP I CSSLP I CRISC I CISM I CISA I CGEIT
PRABH NAIR
8+ years’ experience as an IT Information Security analyst. Compatible team player through
complete project cycles, testing and final implementation.
CISA | CISSP | CRISC | ECSA | CEH
JEEVAN K
Ajit has more than 15 years of experience which include Consulting, Network and InfoSec training
( CISA, CISM, CISSP, CCSP, Security+, SSCP), Content development, Assessments and auditing and
more
CISSP I CCSP I CRISC I CISA I CGEIT
AJIT
Chartered Accountant from Institute of CA of India with over 10 years of experience in Financial
Reporting, auditing and taxation across CA Practice and corporate. Certified Information Security
Auditor (CISA) accreditation from ISACA ( Rank - 2, ISACA Chennai Chapter, June 2019 ).
CA | CISA | Dip-IFR (UK)
ASWINI S
Happy Learners from LinkedIn
HAPPY LEARNERS
FROM THE WORLD
Fatimah Akintola
CISA | USA
I made the right choice, and every session was
worth it. Thank you once again. I would highly
recommend my friends, the professor has
immense knowledge and the subject and was
very logical and practical.
Wahidullah Badri
CISA | India
The session was very productive and
informative, understood many concepts.
Talented and knowledgeable trainer, explained
the concepts clearly and practicing questions in
topic.
Prabhav
CISA | India
I had the opportunity to take CISA lessons. The
Trainer has been consistently giving me a lot of
mental and material support. I would
recommend his mentorship for any aspirant.
www.infosectrain.com | sales@infosectrain.com 06
www.infosectrain.com | sales@infosectrain.com 04
CISA Course Outline
The five domains in CISA include
Information System
Auditing Process
Information Systems
Acquisition, Development
and Implementation
Information Asset
Security and
Control
Governance and
Management of IT
IS Operations and
Business Resilience
01
DOMAIN
02
DOMAIN
03
DOMAIN
05
DOMAIN
04
DOMAIN
Domain 1: Information System Auditing Process
• IS Audit Standards, Guidelines and Codes of Ethics
• Business Processes
• Types of Controls
• Risk-based Audit Planning
• Types of Audits and Assessments
1.1 Planning
• Audit Project Management
• Sampling Methodology
• Audit Evidence Collection Techniques
• Data Analytics
• Reporting and Communication Techniques
• Quality Assurance and Improvement of the Audit Process
1.2 Execution
www.infosectrain.com | sales@infosectrain.com 07
Domain 2: Governance and Management of IT
• IT-related Frameworks
• IT Standards, Policies and Procedures
• Organizational Structure
• Enterprise Architecture
• Enterprise Risk Management
• Maturity Models
• Laws, Regulations and Industry Standards Affecting the Organization
2.1 IT Governance and IT Strategy
• IT Resource Management
• IT Service Provider Acquisition and Management
• IT Performance Monitoring and Reporting
• Quality Assurance and Quality Management of IT
2.2 IT Management
www.infosectrain.com | sales@infosectrain.com 08
Domain 3: Information Systems Acquisition, Development
and Implementation
• Project Governance and Management
• Business Case and Feasibility Analysis
• System Development Methodologies
• Control Identification and Design
3.1 Information Systems Acquisition and Development
• Testing Methodologies
• Configuration and Release Management
• System Migration, Infrastructure Deployment and Data Conversion
• Post-implementation Review
3.2 Information Systems Implementation
www.infosectrain.com | sales@infosectrain.com 09
Domain 4: IS Operations and Business Resilience
• Common Technology Components
• IT Asset Management
• Job Scheduling and Production Process Automation
• System Interfaces
• End-user Computing
• Data Governance
• Systems Performance Management
• Problem and Incident Management
• Change, Configuration, Release and Patch Management
• IT Service Level Manageme
4.1 Information Systems Operations
• Business Impact Analysis
• System Resiliency
• Data Backup, Storage and Restoration
• Business Continuity Plan
• Disaster Recovery Plans
4.2 Business Resilience
www.infosectrain.com | sales@infosectrain.com 10
Domain 5: Information Asset Security and Control
• Privacy Principles
• Physical Access and Environmental Controls
• Identity and Access Management
• Network and End-point Security
• Data Classification
• Data Encryption and Encryption-related Techniques
• Public Key Infrastructure
• Web-based Communication Technologies
• Virtualized Environments
• Mobile, Wireless and Internet-of-things Devices
5.1 Information Asset Security Frameworks, Standards and Guidelines
• Security Awareness Training and Programs
• Information System Attack Methods and Techniques
• Security Testing Tools and Techniques
• Security Monitoring Tools and Techniques
• Incident Response Management
• Evidence Collection and Forensics
5.2 Security Event Management
www.infosectrain.com | sales@infosectrain.com 11
www.infosectrain.com | sales@infosectrain.com

More Related Content

Similar to InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf

CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOSagarNegi10
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSOSagarNegi10
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptxssuserde23af
 
Certified Information System Auditor- CISA
Certified Information System Auditor- CISACertified Information System Auditor- CISA
Certified Information System Auditor- CISAKnowledgehut
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchMcKonly & Asbury, LLP
 
Dont let governance risk and compliance be a roll of the dice | ESPC22
Dont let governance risk and compliance be a roll of the dice |  ESPC22 Dont let governance risk and compliance be a roll of the dice |  ESPC22
Dont let governance risk and compliance be a roll of the dice | ESPC22 Nikki Chapple
 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxInfosectrain3
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshopSLVA Information Security
 
cissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptioncissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptionInfosec train
 
CISSP _Course _Description and course overview
CISSP _Course _Description and course overviewCISSP _Course _Description and course overview
CISSP _Course _Description and course overviewpriyanshamadhwal2
 
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdfSyllabus CIISA ( Certified Internasional Information System Auditor ).pdf
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdfYoyo Sudaryo
 
Ttss consulting(1)
Ttss consulting(1)Ttss consulting(1)
Ttss consulting(1)Steven Trom
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Joshua Fonseca
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
Alexander Knorr Transcript
Alexander Knorr TranscriptAlexander Knorr Transcript
Alexander Knorr TranscriptAlexander Knorr
 

Similar to InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf (20)

CISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSOCISSO Certification | CISSO Training | CISSO
CISSO Certification | CISSO Training | CISSO
 
CISSO Certification| CISSO Training | CISSO
CISSO Certification|  CISSO Training | CISSOCISSO Certification|  CISSO Training | CISSO
CISSO Certification| CISSO Training | CISSO
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
538522937-Cisa-easdasdsadsadasdBook-New-1-188.pptx
 
Certified Information System Auditor- CISA
Certified Information System Auditor- CISACertified Information System Auditor- CISA
Certified Information System Auditor- CISA
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
CISSP Training Program
CISSP Training ProgramCISSP Training Program
CISSP Training Program
 
CISA sertifikacija
CISA sertifikacijaCISA sertifikacija
CISA sertifikacija
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
Dont let governance risk and compliance be a roll of the dice | ESPC22
Dont let governance risk and compliance be a roll of the dice |  ESPC22 Dont let governance risk and compliance be a roll of the dice |  ESPC22
Dont let governance risk and compliance be a roll of the dice | ESPC22
 
CISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptxCISSP Vs. CISA Which is better for you.pptx
CISSP Vs. CISA Which is better for you.pptx
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
cissp-course content.pdf & cissp description
cissp-course content.pdf & cissp descriptioncissp-course content.pdf & cissp description
cissp-course content.pdf & cissp description
 
CISSP _Course _Description and course overview
CISSP _Course _Description and course overviewCISSP _Course _Description and course overview
CISSP _Course _Description and course overview
 
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdfSyllabus CIISA ( Certified Internasional Information System Auditor ).pdf
Syllabus CIISA ( Certified Internasional Information System Auditor ).pdf
 
Ttss consulting(1)
Ttss consulting(1)Ttss consulting(1)
Ttss consulting(1)
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
Alexander Knorr Transcript
Alexander Knorr TranscriptAlexander Knorr Transcript
Alexander Knorr Transcript
 

More from priyanshamadhwal2

Audit Scenario Based Interview Questions
Audit Scenario Based Interview QuestionsAudit Scenario Based Interview Questions
Audit Scenario Based Interview Questionspriyanshamadhwal2
 
Everything about APT 29 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚
Everything about APT 29 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚Everything about APT 29 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚
Everything about APT 29 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚priyanshamadhwal2
 
Certified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification TrainingCertified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification Trainingpriyanshamadhwal2
 
Security Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based QuestionsSecurity Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based Questionspriyanshamadhwal2
 
Data protection Officier Online Training
Data protection Officier Online TrainingData protection Officier Online Training
Data protection Officier Online Trainingpriyanshamadhwal2
 
𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭
𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭
𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭priyanshamadhwal2
 
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞priyanshamadhwal2
 
Comptia security plus domain SYO 701.pdf
Comptia security plus domain SYO 701.pdfComptia security plus domain SYO 701.pdf
Comptia security plus domain SYO 701.pdfpriyanshamadhwal2
 
Presenting Top 10 Cyber Attacks of 2024 stay informed
Presenting Top 10 Cyber Attacks of 2024 stay informedPresenting Top 10 Cyber Attacks of 2024 stay informed
Presenting Top 10 Cyber Attacks of 2024 stay informedpriyanshamadhwal2
 
Most Important security technologies 2024
Most Important security technologies 2024Most Important security technologies 2024
Most Important security technologies 2024priyanshamadhwal2
 
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬priyanshamadhwal2
 
Threat_Hunting_professional_Training_Tips
Threat_Hunting_professional_Training_TipsThreat_Hunting_professional_Training_Tips
Threat_Hunting_professional_Training_Tipspriyanshamadhwal2
 
Difference between cloud storage and local storage
Difference between cloud storage and local storageDifference between cloud storage and local storage
Difference between cloud storage and local storagepriyanshamadhwal2
 
Axis Bank Customers Face credit card frauds
Axis Bank Customers Face credit card fraudsAxis Bank Customers Face credit card frauds
Axis Bank Customers Face credit card fraudspriyanshamadhwal2
 
𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐞 𝐌𝐚𝐥𝐢𝐜𝐢𝐨𝐮𝐬 𝐌𝐢𝐧𝐝 𝐑𝐞𝐚𝐬𝐨𝐧𝐬 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤𝐬
𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐞 𝐌𝐚𝐥𝐢𝐜𝐢𝐨𝐮𝐬 𝐌𝐢𝐧𝐝 𝐑𝐞𝐚𝐬𝐨𝐧𝐬 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤𝐬𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐞 𝐌𝐚𝐥𝐢𝐜𝐢𝐨𝐮𝐬 𝐌𝐢𝐧𝐝 𝐑𝐞𝐚𝐬𝐨𝐧𝐬 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤𝐬
𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐞 𝐌𝐚𝐥𝐢𝐜𝐢𝐨𝐮𝐬 𝐌𝐢𝐧𝐝 𝐑𝐞𝐚𝐬𝐨𝐧𝐬 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤𝐬priyanshamadhwal2
 
Data_ Privacy_ Challenges _and_ solutions
Data_ Privacy_ Challenges _and_ solutionsData_ Privacy_ Challenges _and_ solutions
Data_ Privacy_ Challenges _and_ solutionspriyanshamadhwal2
 
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠priyanshamadhwal2
 
PMP _Certification_ preparation_ training
PMP _Certification_ preparation_ trainingPMP _Certification_ preparation_ training
PMP _Certification_ preparation_ trainingpriyanshamadhwal2
 
Microsoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdf
Microsoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdfMicrosoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdf
Microsoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdfpriyanshamadhwal2
 
Penetration Testing vs Vulnerability Assessment
Penetration Testing vs Vulnerability AssessmentPenetration Testing vs Vulnerability Assessment
Penetration Testing vs Vulnerability Assessmentpriyanshamadhwal2
 

More from priyanshamadhwal2 (20)

Audit Scenario Based Interview Questions
Audit Scenario Based Interview QuestionsAudit Scenario Based Interview Questions
Audit Scenario Based Interview Questions
 
Everything about APT 29 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚
Everything about APT 29 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚Everything about APT 29 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚
Everything about APT 29 𝐓𝐡𝐞 𝐂𝐨𝐳𝐲 𝐁𝐞𝐚𝐫 𝐄𝐧𝐢𝐠𝐦𝐚
 
Certified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification TrainingCertified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification Training
 
Security Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based QuestionsSecurity Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based Questions
 
Data protection Officier Online Training
Data protection Officier Online TrainingData protection Officier Online Training
Data protection Officier Online Training
 
𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭
𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭
𝐂𝐈𝐒𝐒𝐏 𝐃𝐨𝐦𝐚𝐢𝐧 𝟏: 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐧𝐝 𝐑𝐢𝐬𝐤 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭
 
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
𝐂𝐑𝐈𝐒𝐂 𝐌𝐢𝐧𝐝 𝐌𝐚𝐩 𝐟𝐨𝐫 𝐄𝐟𝐟𝐞𝐜𝐭𝐢𝐯𝐞 𝐑𝐢𝐬𝐤 𝐆𝐨𝐯𝐞𝐫𝐧𝐚𝐧𝐜𝐞
 
Comptia security plus domain SYO 701.pdf
Comptia security plus domain SYO 701.pdfComptia security plus domain SYO 701.pdf
Comptia security plus domain SYO 701.pdf
 
Presenting Top 10 Cyber Attacks of 2024 stay informed
Presenting Top 10 Cyber Attacks of 2024 stay informedPresenting Top 10 Cyber Attacks of 2024 stay informed
Presenting Top 10 Cyber Attacks of 2024 stay informed
 
Most Important security technologies 2024
Most Important security technologies 2024Most Important security technologies 2024
Most Important security technologies 2024
 
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
 
Threat_Hunting_professional_Training_Tips
Threat_Hunting_professional_Training_TipsThreat_Hunting_professional_Training_Tips
Threat_Hunting_professional_Training_Tips
 
Difference between cloud storage and local storage
Difference between cloud storage and local storageDifference between cloud storage and local storage
Difference between cloud storage and local storage
 
Axis Bank Customers Face credit card frauds
Axis Bank Customers Face credit card fraudsAxis Bank Customers Face credit card frauds
Axis Bank Customers Face credit card frauds
 
𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐞 𝐌𝐚𝐥𝐢𝐜𝐢𝐨𝐮𝐬 𝐌𝐢𝐧𝐝 𝐑𝐞𝐚𝐬𝐨𝐧𝐬 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤𝐬
𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐞 𝐌𝐚𝐥𝐢𝐜𝐢𝐨𝐮𝐬 𝐌𝐢𝐧𝐝 𝐑𝐞𝐚𝐬𝐨𝐧𝐬 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤𝐬𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐞 𝐌𝐚𝐥𝐢𝐜𝐢𝐨𝐮𝐬 𝐌𝐢𝐧𝐝 𝐑𝐞𝐚𝐬𝐨𝐧𝐬 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤𝐬
𝐔𝐧𝐝𝐞𝐫𝐬𝐭𝐚𝐧𝐝𝐢𝐧𝐠 𝐭𝐡𝐞 𝐌𝐚𝐥𝐢𝐜𝐢𝐨𝐮𝐬 𝐌𝐢𝐧𝐝 𝐑𝐞𝐚𝐬𝐨𝐧𝐬 𝐟𝐨𝐫 𝐂𝐲𝐛𝐞𝐫𝐚𝐭𝐭𝐚𝐜𝐤𝐬
 
Data_ Privacy_ Challenges _and_ solutions
Data_ Privacy_ Challenges _and_ solutionsData_ Privacy_ Challenges _and_ solutions
Data_ Privacy_ Challenges _and_ solutions
 
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
 
PMP _Certification_ preparation_ training
PMP _Certification_ preparation_ trainingPMP _Certification_ preparation_ training
PMP _Certification_ preparation_ training
 
Microsoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdf
Microsoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdfMicrosoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdf
Microsoft_Azure_Security_Technologies_Exam_AZ-500_Course_Content.pdf
 
Penetration Testing vs Vulnerability Assessment
Penetration Testing vs Vulnerability AssessmentPenetration Testing vs Vulnerability Assessment
Penetration Testing vs Vulnerability Assessment
 

Recently uploaded

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 

Recently uploaded (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

InfosecTrain_Certified_Information_Systems_Auditor_CISA_Course_Content.pdf

  • 1.
  • 2. Overview The CISA is a globally reputed certification for security professionals who audit, monitor, and assess organizations’ information systems and business operations. The certification showcases the candidate’s auditing experience, knowledge, and skills to evaluate vulnerabilities, report on compliance, and institute controls within the enterprise. Organizations require audit professionals who possess the knowledge and expertise to identify critical issues and security challenges. The skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA demonstrates proficiency and is the basis for measurement in the profession. www.infosectrain.com | sales@infosectrain.com 01
  • 3. Target Audience • Individuals who are willing to learn in Information Systems Auditing • Professionals who are Auditors or working in an Audit environment • The professionals who are willing to make a Career in Information Systems Auditing • IT managers • Security Managers • System Analysts • Consultants • A maximum of 1 year of information systems experience OR 1 year of non-IS auditing experience can be substituted for 1 year of experience. • 60 to 120 completed university semester credit hours (the equivalent of a 2-year or 4-year degree) not limited by the 10-year preceding restriction can be substituted for 1 or 2 years, respectively, of experience. • A master’s degree in information security or information technology from an accredited university can be substituted for 1 year of experience. Pre-Requisite A minimum of 5 years of professional information systems auditing, control or security work experience (as described in the CISA job practice areas) is required for certification. Substitutions and waivers of such experience, to a maximum of 3 years, maybe obtained as follows: www.infosectrain.com | sales@infosectrain.com 02
  • 4. Exam Information Duration 4 hours Number of Questions 150 Question format Passing grade Languages available Multiple Choice 450 out of 800 English, French, German, Hebrew, Italian, Japanese, Korean, Spanish, Turkish, Chinese Why Infosec Train? Certified & Experienced Instructor Flexible Schedule Access to the recorded sessions Tailor Made Training Telegram Discussion Group Post Training Support www.infosectrain.com | sales@infosectrain.com 03
  • 5. www.infosectrain.com | sales@infosectrain.com 05 Our Expert Instructors Certified Security specialist having several years of experience in Information Security across all domains including application security, vulnerability assessment, ethical hacking, pen testing and IT risk and compliance and more CISSP I CCSP I CSSLP I CRISC I CISM I CISA I CGEIT PRABH NAIR 8+ years’ experience as an IT Information Security analyst. Compatible team player through complete project cycles, testing and final implementation. CISA | CISSP | CRISC | ECSA | CEH JEEVAN K Ajit has more than 15 years of experience which include Consulting, Network and InfoSec training ( CISA, CISM, CISSP, CCSP, Security+, SSCP), Content development, Assessments and auditing and more CISSP I CCSP I CRISC I CISA I CGEIT AJIT Chartered Accountant from Institute of CA of India with over 10 years of experience in Financial Reporting, auditing and taxation across CA Practice and corporate. Certified Information Security Auditor (CISA) accreditation from ISACA ( Rank - 2, ISACA Chennai Chapter, June 2019 ). CA | CISA | Dip-IFR (UK) ASWINI S
  • 6. Happy Learners from LinkedIn HAPPY LEARNERS FROM THE WORLD Fatimah Akintola CISA | USA I made the right choice, and every session was worth it. Thank you once again. I would highly recommend my friends, the professor has immense knowledge and the subject and was very logical and practical. Wahidullah Badri CISA | India The session was very productive and informative, understood many concepts. Talented and knowledgeable trainer, explained the concepts clearly and practicing questions in topic. Prabhav CISA | India I had the opportunity to take CISA lessons. The Trainer has been consistently giving me a lot of mental and material support. I would recommend his mentorship for any aspirant. www.infosectrain.com | sales@infosectrain.com 06
  • 7. www.infosectrain.com | sales@infosectrain.com 04 CISA Course Outline The five domains in CISA include Information System Auditing Process Information Systems Acquisition, Development and Implementation Information Asset Security and Control Governance and Management of IT IS Operations and Business Resilience 01 DOMAIN 02 DOMAIN 03 DOMAIN 05 DOMAIN 04 DOMAIN
  • 8. Domain 1: Information System Auditing Process • IS Audit Standards, Guidelines and Codes of Ethics • Business Processes • Types of Controls • Risk-based Audit Planning • Types of Audits and Assessments 1.1 Planning • Audit Project Management • Sampling Methodology • Audit Evidence Collection Techniques • Data Analytics • Reporting and Communication Techniques • Quality Assurance and Improvement of the Audit Process 1.2 Execution www.infosectrain.com | sales@infosectrain.com 07
  • 9. Domain 2: Governance and Management of IT • IT-related Frameworks • IT Standards, Policies and Procedures • Organizational Structure • Enterprise Architecture • Enterprise Risk Management • Maturity Models • Laws, Regulations and Industry Standards Affecting the Organization 2.1 IT Governance and IT Strategy • IT Resource Management • IT Service Provider Acquisition and Management • IT Performance Monitoring and Reporting • Quality Assurance and Quality Management of IT 2.2 IT Management www.infosectrain.com | sales@infosectrain.com 08
  • 10. Domain 3: Information Systems Acquisition, Development and Implementation • Project Governance and Management • Business Case and Feasibility Analysis • System Development Methodologies • Control Identification and Design 3.1 Information Systems Acquisition and Development • Testing Methodologies • Configuration and Release Management • System Migration, Infrastructure Deployment and Data Conversion • Post-implementation Review 3.2 Information Systems Implementation www.infosectrain.com | sales@infosectrain.com 09
  • 11. Domain 4: IS Operations and Business Resilience • Common Technology Components • IT Asset Management • Job Scheduling and Production Process Automation • System Interfaces • End-user Computing • Data Governance • Systems Performance Management • Problem and Incident Management • Change, Configuration, Release and Patch Management • IT Service Level Manageme 4.1 Information Systems Operations • Business Impact Analysis • System Resiliency • Data Backup, Storage and Restoration • Business Continuity Plan • Disaster Recovery Plans 4.2 Business Resilience www.infosectrain.com | sales@infosectrain.com 10
  • 12. Domain 5: Information Asset Security and Control • Privacy Principles • Physical Access and Environmental Controls • Identity and Access Management • Network and End-point Security • Data Classification • Data Encryption and Encryption-related Techniques • Public Key Infrastructure • Web-based Communication Technologies • Virtualized Environments • Mobile, Wireless and Internet-of-things Devices 5.1 Information Asset Security Frameworks, Standards and Guidelines • Security Awareness Training and Programs • Information System Attack Methods and Techniques • Security Testing Tools and Techniques • Security Monitoring Tools and Techniques • Incident Response Management • Evidence Collection and Forensics 5.2 Security Event Management www.infosectrain.com | sales@infosectrain.com 11