8420  Reviews star_rate star_rate star_rate star_rate star_half

Certified Information Systems Auditor (CISA) Training

An ISACA CISA (Certified Information Systems Auditor) is recognized as one of the leading authorities in the areas of IS (Information Systems) auditing, control, and information security. This...

Read More
$3,850 USD
Duration 4 days
Course Code 2040
Available Formats Classroom, Virtual

Overview

An ISACA CISA (Certified Information Systems Auditor) is recognized as one of the leading authorities in the areas of IS (Information Systems) auditing, control, and information security. This official CISA training course provides in-depth coverage of the five CISA domains covered on the CISA certification exam. These domains include Information System Auditing, governance and management of IT; information systems acquisition, development, and implementation; information systems operations and business resilience; and protection of information assets.

Skills Gained

In this CISA training, you will:

  • Prepare for the Certified Information Systems Auditor (CISA) Exam.
  • Develop and implement a risk-based IT audit strategy in compliance with IT audit standards.
  • Evaluate the effectiveness of an IT governance structure.
  • Ensure that the IT organizational structure and human resources (personnel) management support the organization’s strategies and objectives.
  • Review the information security policies, standards, and procedures for completeness and alignment with generally accepted practices.

Prerequisites

IT professionals must have 5 years or more of IS audit, control, assurance, and security experience.

Course Details

Domain 1 - Information System Auditing Process

  • Plan an audit to determine whether information systems are protected, controlled, and provide value to the enterprise.
  • Conduct an audit following IS audit standards and a risk-based IS audit strategy.
  • Communicate audit progress, findings, results, and recommendations to stakeholders.
  • Conduct audit follow-up to evaluate whether risks have been sufficiently addressed.
  • Evaluate IT management and monitoring of controls.
  • Utilize data analytics tools to streamline audit processes.
  • Provide consulting services and guidance to the enterprise to improve the quality and control of information systems.
  • Identify opportunities for process improvement in the enterprise's IT policies and practices.

Topics:

  • IS Audit Standards, Guidelines, Functions, and Codes of Ethics
  • Types of Audits, Assessments, and Reviews
  • Risk-based Audit Planning
  • Types of Controls and Considerations
  • Audit Project Management
  • Audit Testing and Sampling Methodology
  • Audit Evidence Collection Techniques
  • Audit Data Analytics
  • Reporting and Communication Techniques
  • Quality Assurance and Improvement of Audit Process

Domain 2 – Governance and Management of IT

  • Evaluate the IT strategy for alignment with the enterprise’s strategies and objectives.
  • Evaluate the effectiveness of IT governance structure and IT organizational structure.
  • Evaluate the enterprise’s management of IT policies and practices.
  • Evaluate the enterprise’s IT policies and practices for compliance with regulatory and legal requirements.
  • Evaluate IT resource and portfolio management for alignment with the enterprise’s strategies and objectives.
  • Evaluate the enterprise’s risk management policies and practices.
  • Evaluate IT management and monitoring of controls.
  • Evaluate the monitoring and reporting of IT key performance indicators (KPIs).
  • Evaluate whether IT supplier selection and contract management processes align with business requirements.
  • Evaluate whether IT service management practices align with business requirements.
  • Conduct periodic reviews of information systems and enterprise architecture. Evaluate data governance policies and practices.
  • Evaluate the information security program to determine its effectiveness and alignment with the enterprise’s strategies and objectives.
  • Evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices.

Topics

  • Laws, Regulations, and Industry Standards
  • Organizational Structure, IT Governance, and IT Strategy
  • IT Policies, Standards, Procedures, and Guidelines
  • Enterprise Architecture and Considerations
  • Enterprise Risk Management (ERM)
  • Privacy Program and Principles
  • Data Governance and Classification
  • IT Resource Management
  • IT Vendor Management
  • IT Performance Monitoring and Reporting
  • Quality Assurance and Quality Management of IT

Domain 3 – Information Systems Acquisition, Development, and Implementation

  • Evaluate whether the business case for proposed information system changes meets business objectives.
  • Evaluate the enterprise's project management policies and practices.
  • Evaluate controls at all stages of the information systems development lifecycle.
  • Evaluate the readiness of information systems for implementation and migration into production. • Conduct a post-implementation review of systems to determine whether project deliverables, controls, and requirements are met.
  • Evaluate change, configuration, release, and patch management policies and practices.

Topics:

  • Project Governance and Management
  • Business Case and Feasibility Analysis
  • System Development Methodologies
  • Control Identification and Design
  • System Readiness and Implementation Testing
  • Implementation Configuration and Release Management
  • System Migration, Infrastructure Deployment, and Data Conversion
  • Postimplementation Review

Domain 4 – Information Systems Operations and Business Resilience

  • Evaluate the enterprise’s ability to continue business operations.
  • Evaluate whether IT service management practices align with business requirements.
  • Conduct periodic reviews of information systems and enterprise architecture.
  • Evaluate IT operations to determine whether they are controlled effectively and continue to support the enterprise’s objectives.
  • Evaluate IT maintenance practices to determine whether they are controlled effectively and continue to support the enterprise’s objectives.
  • Evaluate database management practices.
  • Evaluate data governance policies and practices.
  • Evaluate problem and incident management policies and practices.
  • Evaluate change, configuration, release, and patch management policies and practices.
  • Evaluate end-user computing to determine whether the processes are effectively controlled.
  • Evaluate policies and practices related to asset lifecycle management.

Topics:

  • IT Components
  • IT Asset Management
  • Job Scheduling and Production Process Automation
  • System Interfaces
  • End-user Computing and Shadow IT
  • Systems Availability and Capacity Management
  • Problem and Incident Management
  • IT Change, Configuration, and Patch Management
  • Operational Log Management
  • IT Service Level Management
  • Database Management
  • Business Impact Analysis
  • System and Operational Resilience
  • Data Backup, Storage, and Restoration
  • Business Continuity Plan
  • Disaster Recovery Plans

Domain 5 – Protection of Information Assets

  • Conduct audits by IS audit standards and a risk-based IS audit strategy.
  • Evaluate problem and incident management policies and practices.
  • Evaluate the enterprise's information security and privacy policies and practices.
  • Evaluate physical and environmental controls to determine whether information assets are adequately safeguarded.
  • Evaluate logical security controls to verify information confidentiality, integrity, and availability.
  • Evaluate data classification practices for alignment with the enterprise’s policies and applicable external requirements.
  • Evaluate policies and practices related to asset lifecycle management.
  • Evaluate the information security program to determine its effectiveness and alignment with the enterprise’s strategies and objectives.
  • Perform technical security testing to identify potential threats and vulnerabilities.
  • Evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices.

Topics:

  • Information Asset Security Policies, Frameworks, Standards, and Guidelines
  • Physical and Environmental Controls
  • Identity and Access Management
  • Network and End-Point Security
  • Data Loss Prevention
  • Data Encryption
  • Public Key Infrastructure (PKI)
  • Cloud and Virtualized Environments
  • Mobile, Wireless, and Internet-of-Things Devices
  • Security Awareness Training and Programs
  • Information System Attack Methods and Techniques
  • Security Testing Tools and Techniques
  • Security Monitoring Logs, Tools, and Techniques
  • Security Incident Response Management
  • Evidence Collection and Forensics CISA Exam Preparation
  • CISA Exam Rules • Exam Tips • Day of the Exam • CISA Certification Step
|
View Full Schedule

Schedule

12 options available

  • Jul 15, 2025 - Jul 18, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
    SAVE 20% on this course -
    Promo Code: LEARN20
  • Jul 22, 2025 - Jul 25, 2025 (4 days)
    Virtual | 12:00 PM 7:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |12:00 PM 7:30 PM EDT
    Virtual | 12:00 PM 7:30 PM EDT
    Enroll
    Enroll Add to quote
    SAVE 20% on this course -
    Promo Code: LEARN20
  • Jul 29, 2025 - Aug 1, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
    SAVE 20% on this course -
    Promo Code: LEARN20
  • Aug 5, 2025 - Aug 8, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
    SAVE 20% on this course -
    Promo Code: LEARN20
  • Aug 12, 2025 - Aug 15, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
    SAVE 20% on this course -
    Promo Code: LEARN20
  • Aug 19, 2025 - Aug 22, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
    SAVE 20% on this course -
    Promo Code: LEARN20
  • Aug 26, 2025 - Aug 29, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
    SAVE 20% on this course -
    Promo Code: LEARN20
  • Sep 2, 2025 - Sep 5, 2025 (4 days)
    Virtual | 11:00 AM 6:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |11:00 AM 6:30 PM EDT
    Virtual | 11:00 AM 6:30 PM EDT
    Enroll
    Enroll Add to quote
  • Sep 9, 2025 - Sep 12, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
  • Sep 16, 2025 - Sep 19, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
  • Sep 23, 2025 - Sep 26, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote
  • Oct 7, 2025 - Oct 10, 2025 (4 days)
    Virtual | 9:00 AM 4:30 PM EDT
    Language English
    Select from 1 options below
    Virtual |9:00 AM 4:30 PM EDT
    Virtual | 9:00 AM 4:30 PM EDT
    Enroll
    Enroll Add to quote

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

Courseware was effective but would like to have some PDF material on BPML and XPATH

Course was great and informative. The instructor had a good flow and was very personable.

I didn't have any problem navigating Exitcertified website or lab material at all.

the class/lecture was amazing and very easy to understand and was in detail.

You get detailed labs to guide you through the technical material giving you a hands on method of learning otherwise difficult material.