Contact for queries :
(852) 3568-7071

Login

Upon completing this course, students will know how to:

  • Implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices.
  • Evaluate an organization’s structure, policies, accountability, mechanisms, and monitoring practices.
  • Evaluate information systems acquisition, development, and implementation.
  • Evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained.
  • Define the protection policies used to promote the confidentiality, integrity, and availability of information assets.

Prerequisites:

Students taking this course should have a minimum of five years of professional information systems auditing, control, or security work experience as described in the CISA job practice domain areas, or equivalent knowledge.

Course Outline

The Process of Auditing Information Systems

ISACA Information Systems Auditing Standards and Guidelines

Fundamental Business Processes

Develop and Implement an Information Systems Audit Strategy

Plan an Audit

Conduct an Audit

The Evidence Life Cycle

Communicate Issues, Risks, and Audit Results

Support the Implementation of Risk Management and Control Practices

IT Governance and Management

Evaluate the Effectiveness of IT Governance

Evaluate the IT Organizational Structure and HR Management

Evaluate the IT Strategy and Direction

Evaluate IT Policies, Standards, and Procedures

Evaluate the Effectiveness of Quality Management Systems

Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices

Performance Monitoring and Assurance Practices

Evaluate the Organization’s Business Continuity Plan

Information Systems Acquisition, Development, and Implementation

Evaluate the Business Case for Change

Evaluate Project Management Frameworks and Governance

Practices

Development Life Cycle Management

Perform Periodic Project Reviews

Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness

Evaluate a System Migration

Perform a Post-Implementation System Review Information

Systems Operations, Maintenance, and Support

Maintenance,  and Support

Perform Periodic System Reviews

Evaluate Service Level Management Practices

Evaluate Third-Party Management Practices

Evaluate Operations and End User Management Practices

Evaluate the Maintenance Process

Evaluate Data Administration Practices

Evaluate the Use of Capacity and Performance Monitoring

Methods

Evaluate Change, Configuration, and Release Management

Practices

Evaluate Problem and Incident Management Practices

Evaluate the Adequacy of Backup and Restore Provisions

Protection of Information Assets Information Security Design Encryption Basics

Evaluate the Functionality of the IT Infrastructure

Evaluate Network Infrastructure Security

Evaluate the Design, Implementation, and Monitoring of Logical Access Controls

Risks and Controls of Virtualization

Evaluate the Design, Implementation, and Monitoring of Data Classification Process

Evaluate the Design, Implementation, and Monitoring of Physical Access Controls

Evaluate the Design, Implementation, and Monitoring of Environmental Controls

Appendices

ISACA® CISA® Certification Process

Mapping Course Content to the ISACA® CISA® Certification Exam

 

Course Curriculum

Section 1: Introduction
Introduction to Software Training FREE 00:40:00
Object Oriented Design Patterns 00:00:35
Software Testing 00:30:00
Section 2: Advanced Computing
Advanced Database Development 00:25:00
Algorithm analysis 00:45:00
Multi Threading in Softwares 00:40:00
Managing Software Testing 00:20:00
The Software Quiz 00:04:00
TAKE THIS COURSE
  • HK$ 6,000
  • 12 Hours
59 STUDENTS ENROLLED
    top
    Technix-Pro Education Centre © All rights reserved. ITIL® is a registered trade mark of AXELOS. All rights reserved. PRINCE2® is a registered trade mark of AXELOS Limited, All rights reserved. PRINCE2 Agile® is a registered trade mark of AXELOS Limited. All rights reserved. The Swirl logo™ is a trade mark of AXELOS Limited. All rights reserved