Certified Information Systems Auditor (CISA)

Description

Duration: 5 days

Information systems security and auditing have become critical priorities for organizations of all sizes. The CISA certification, held by more than 151,000 professionals worldwide according to ISACA, is a widely recognized credential in the IT audit and security field. This course prepares professionals to evaluate, control, and maintain the integrity of information systems in alignment with business objectives and regulatory standards. Participants will build a thorough understanding of IS auditing practices and gain the knowledge needed to sit for the CISA exam.

Target Audience

  • IT professionals
  • Internal and external auditors
  • Compliance officers
  • Individuals responsible for maintaining the integrity, confidentiality, and availability of information systems
  • Those seeking to move into roles in IT auditing, security management, or governance

Prerequisites

  • Candidates must have at least 5 years of professional experience in IS audit, control, assurance, or security.

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing – (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Code Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Code Academy for an engaging and effective learning experience.

Methods

  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
5/25/20265/29/2026
6/15/20266/19/2026
7/6/20267/10/2026
7/27/20267/31/2026
8/17/20268/21/2026
9/7/20269/11/2026
9/28/202610/2/2026
10/19/202610/23/2026
11/9/202611/13/2026
11/30/202612/4/2026
12/21/202612/25/2026
1/11/20271/15/2027
2/1/20272/5/2027
2/22/20272/26/2027
3/15/20273/19/2027
4/5/20274/9/2027
4/26/20274/30/2027
Learning Objectives
  • Assess organizational policies, procedures, and infrastructures to verify that information systems are adequately controlled and support business objectives
  • Apply risk management principles and governance frameworks within the context of information systems auditing
  • Implement security measures that effectively protect information assets
  • Understand and work within IS audit standards, guidelines, and codes of ethics
  • Build competencies in audit project management, evidence collection, and data analytics
  • Evaluate IT governance structures, strategies, and management practices
  • Review information systems acquisition, development, and implementation processes
  • Analyze information systems operations and organizational resilience strategies
  • Apply frameworks, standards, and guidelines related to information asset security
  • Prepare thoroughly to pass the CISA certification exam
Course Outline
Module Domain 1: The Information Systems Auditing Process

Planning topics include IS Audit Standards, Guidelines and Codes of Ethics, Business Process Types of Controls, Risk-based Audit Planning, and Types of Audits and Assessments. Execution topics include Audit Project Management, Sampling Methodology, Audit Evidence Collection Techniques, Data Analytics, Reporting and Communication Techniques, and Quality Assurance and Improvement of the Audit Process.

Module Domain 2: IT Governance and Management

IT Governance and IT Strategy topics include IT-related Frameworks, IT Standards, Policies and Procedures, Organizational Structure, Enterprise Architecture, Enterprise Risk Management, Maturity Models, and Laws, Regulations and Industry Standards Affecting the Organization. IT Management topics include IT Resource Management, IT Service Provider Acquisition and Management, IT Performance Monitoring and Reporting, and Quality Assurance and Quality Management of IT.

Module Domain 3: Acquisition, Development, and Implementation of Information Systems

Information Systems Acquisition and Development topics include Project Governance and Management, Business Case and Feasibility Analysis, System Development Methodologies, and Control Identification and Design. Information Systems Implementation topics include Testing Methodologies, Configuration and Release Management, System Migration, Infrastructure Deployment and Data Conversion, and Post-implementation Review.

Module Domain 4: Information Systems Operations and Organizational Resilience

Information Systems Operations topics include Common Technology Components, IT Asset Management, Job Scheduling and Production Process Automation, System Interfaces, End-user Computing, Data Governance, Systems Performance Management, Problem and Incident Management, Change/Configuration/Release and Patch Management, IT Service Level Management, Database Management, and Control Identification and Design. Business Resilience topics include Business Impact Analysis, System Resiliency, Data Backup/Storage and Restoration, Business Continuity Plan, and Disaster Recovery Plans.

Module Domain 5: Protection of Information Assets

Information Asset Security Frameworks, Standards and Guidelines topics include Privacy Principles, Physical Access and Environmental Controls, Identity and Access Management, Network and End-point Security, Data Classification, Data Encryption and Encryption-related Techniques, and Public Key Infrastructure. Security Event Management topics include Security Awareness Training and Programs, Information System Attack Methods and Techniques, Security Testing Tools and Techniques, Security Monitoring Tools and Techniques, Incident Response Management, and Evidence Collection and Forensics.