Cyber Security Category Banner Image

Certified Information Systems Auditor (CISA®)

  • Length 4 days
Course overview
View dates &
book now

Why study this course

CISA® is the globally recognised gold standard for IS audit, control, and assurance, in-demand and valued by leading global brands. It’s often a mandatory qualification for employment as an IT auditor. CISA professionals offer the credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to organisations.

The CISA certification is designed for those who audit, control, monitor and assess an enterprise’s information technology and business systems. CISAs are recognised internationally as professionals with the assurance knowledge, skills, experience and credibility necessary to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, validate controls, and deliver value to the enterprise. The increased dependence on technology and information ensures that CISA certification-holders will continue to be in demand for assurance and security functions.

This course is an intensive, four-day review program designed to prepare professionals for the Certified Information Systems Auditor exam.

This course includes a digital courseware manual and access to the CISA Questions, Answers and Explanations (QAE) database for 12 months.

Please note: The exam is not included in the course fee but can be purchased separately. Please contact us for a quote.

Aligns to certification



Request Course Information


What you’ll learn

After completing this course, participants should be able to:

  • Demonstrate in-depth knowledge of the five domains required to prepare for the CISA certification

  • Provide audit services in accordance with standards to assist organisations in protecting and controlling information systems

  • Identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies


ISACA Accredited Elite Partner Logo

ISACA at Lumify Work

ISACA provides practical guidance, benchmarks and other effective tools for all enterprises that use information systems. Through its comprehensive guidance and services, ISACA defines the roles of information systems governance, security, audit and assurance professionals worldwide.

Lumify Work is an Accredited Elite Partner of ISACA.


Who is the course for?

This course is designed for mid-career IS audit, control and assurance professionals looking to leverage career growth, including:

  • IT Audit Directors, Managers, and Consultants

  • IT Auditors

  • Compliance/Risk/Privacy Directors

  • IT Directors, Managers, and Consultants


Course subjects

Domain 1: Information Systems Auditing Process
Providing audit services in accordance with standards to assist organisations in protecting and controlling information systems. Domain 1 affirms your credibility to offer conclusions on the state of an organisation's IS/IT security, risk and control solutions.

A. Planning

  • IS Audit Standards, Guidelines, and Codes of Ethics

  • Business Processes

  • Types of Controls

  • Risk-Based Audit Planning

  • Types of Audits and Assessments

B. Execution

  • Audit Project Management

  • Sampling Methodology

  • Audit Evidence Collection Techniques

  • Data Analytics

  • Reporting and Communication Techniques

  • Quality Assurance and Improvement of the Audit Process

Domain 2: Governance and Management of IT
Domain 2 confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.

A. IT Governance

  • IT Governance and IT Strategy

  • IT-Related Frameworks

  • IT Standards, Policies, and Procedures

  • Organisational Structure

  • Enterprise Architecture

  • Enterprise Risk Management

  • Maturity Models

  • Laws, Regulations, and Industry Standards affecting the Organisation

B. IT Management

  • IT Resource Management

  • IT Service Provider Acquisition and Management

  • IT Performance Monitoring and Reporting

  • Quality Assurance and Quality Management of IT

Domain 3: Information Systems Acquisition, Development and Implementation
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

A. Information Systems Acquisition and Development

  • Project Governance and Management

  • Business Case and Feasibility Analysis

  • System Development Methodologies

  • Control Identification and Design

B. Information Systems Implementation

  • Testing Methodologies

  • Configuration and Release Management

  • System Migration, Infrastructure Deployment, and Data Conversion

  • Post-implementation Review

Domain 4: Information Systems Operations and Business Resilience
Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

A. Information Systems Operations

  • Common Technology Components

  • IT Asset Management

  • Job Scheduling and Production Process Automation

  • System Interfaces

  • End-User Computing

  • Data Governance

  • Systems Performance Management

  • Problem and Incident Management

  • Change, Configuration, Release, and Patch Management

  • IT Service Level Management

  • Database Management

B. Business Resilience

  • Business Impact Analysis (BIA)

  • System Resiliency

  • Data Backup, Storage, and Restoration

  • Business Continuity Plan (BCP)

  • Disaster Recovery Plans (DRP)

Domain 5: Protection of Information Assets
Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.

A. Information Asset Security and Control

  • Information Asset Security Frameworks, Standards, and Guidelines

  • Privacy Principles

  • Physical Access and Environmental Controls

  • Identity and Access Management

  • Network and End-Point Security

  • Data Classification

  • Data Encryption and Encryption-Related Techniques

  • Public Key Infrastructure (PKI)

  • Web-Based Communication Techniques

  • Virtualised Environments

  • Mobile, Wireless, and Internet-of-Things (IoT) Devices

B. Security Event Management

  • Security Awareness Training and Programs

  • Information System Attack Methods and Techniques

  • Security Testing Tools and Techniques

  • Security Monitoring Tools and Techniques

  • Incident Response Management

  • Evidence Collection and Forensics


Prerequisites

It is recommended that you have familiarity with and experience in information systems auditing, control or security.

To earn the CISA certification, a candidate must pass the CISA Exam and also meet the additional criteria as determined by ISACA.


Industry Association Recognition

This course is eligible for Continuing Professional Education (CPE) hours/points to assist in maintaining your ISACA certification.

  • Contact hours: 28 hours

  • Continuing Professional Education: 28 CPEs

If you wish to claim CPEs, Lumify Work can verify your attendance. Please complete this ISACA form and email us at [email protected].


Terms & Conditions

The supply of this course by Lumify Work is governed by the booking terms and conditions. Please read the terms and conditions carefully before enrolling in this course, as enrolment in the course is conditional on acceptance of these terms and conditions.


Request Course Information

Personalise your schedule with Lumify USchedule

Interested in a course that we have not yet scheduled? Get in touch, and ask for your preferred date and time. We can work together to make it happen.



Offers

  • Continue your learning experience online with Lumify Plus
    Lumify Plus (formerly DDLS Plus) is your online learning pathway to extend knowledge beyond courses. Get resources to help you practice what you learned and prepare for future courses, exams and certifications.
  • Cyber Security Executive Bundle
    Lumify Work offers cyber security training to cater for all levels of your organisation - from front-line staff to highly experienced senior cyber security professionals. We’ve partnered with the leading vendors to provide the most comprehensive cyber security training solutions in Australasia.
  • Cyber Risk and Audit Professional Bundle
    Do you want to show you have the skills to audit, control, monitor and assess your organisation’s information technology and business systems?
  • Cyber Risk and Governance Professional Bundle
    Are you interested in learning how to take a holistic approach addressing cyber threats and governing risk within organisations?