"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Similar documents
Certified Information Systems Auditor (CISA)

CISA ITEM DEVELOPMENT GUIDE

CISA Training.

COURSE BROCHURE CISA TRAINING

Certified Information Security Manager (CISM) Course Overview

CCISO Blueprint v1. EC-Council

Position Description IT Auditor

Cybersecurity Auditing in an Unsecure World

The Common Controls Framework BY ADOBE

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

Introduction To IS Auditing

Objectives of the Security Policy Project for the University of Cyprus

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Information Technology General Control Review

FDIC InTREx What Documentation Are You Expected to Have?

CISA EXAM PREPARATION - Weekend Program

Information Security Policy

locuz.com SOC Services

TSC Business Continuity & Disaster Recovery Session

Healthcare Security Success Story

Application for Certification

Certified information Systems Security Professional(CISSP) Bootcamp

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

CompTIA Security+ Study Guide (SY0-501)

University of Pittsburgh Security Assessment Questionnaire (v1.7)

IT Attestation in the Cloud Era

COURSE BROCHURE. COBIT5 FOUNDATION Training & Certification

FRAMEWORK MAPPING HITRUST CSF V9 TO ISO 27001/27002:2013. Visit us online at Flank.org to learn more.

Disaster Recovery and Business Continuity Planning (Mile2)

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

CISM QAE ITEM DEVELOPMENT GUIDE

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

E-guide Getting your CISSP Certification

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

Course Outline. CISSP - Certified Information Systems Security Professional

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

TAN Jenny Partner PwC Singapore

CISSP* CBK (ISC) GUIDE TO THE. OFFICIAL (ISCf. \Xjfl^J Taylor &. Francis Group ' Boca Raton London New York. CRC Press THIRD EDITION

REPORT 2015/149 INTERNAL AUDIT DIVISION

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Advent IM Ltd ISO/IEC 27001:2013 vs

Checklist: Credit Union Information Security and Privacy Policies

Oracle Data Cloud ( ODC ) Inbound Security Policies

Version 1/2018. GDPR Processor Security Controls

Data Security and Privacy Principles IBM Cloud Services

MEETING ISO STANDARDS

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK

Risk Management in Electronic Banking: Concepts and Best Practices

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM ITEM DEVELOPMENT GUIDE

ISO & ISO & ISO Cloud Documentation Toolkit

Table of Contents. Preface xvii PART ONE: FOUNDATIONS OF MODERN INTERNAL AUDITING

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

WELCOME ISO/IEC 27001:2017 Information Briefing

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

10/13/2016 Certified Information Systems Auditor/Prepare for the Exam/Pages/CISASelfAssessment.aspx?

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

AT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant

EU GDPR & ISO Integrated Documentation Toolkit integrated-documentation-toolkit

Your IT Audit and Information Security Partner. CISA Exam Preparation June 2015 Session 6 : 14 April 2015 Starting around 4:45pm..

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

ITIL V3 Service Lifecycle - Continual Service Improvement (CSI)

No IT Audit Staff? How to Hack an IT Audit. Presenters. Mark Bednarz, Partner-In-Charge, Risk Advisory PKF O Connor Davies, LLP

CompTIA Cybersecurity Analyst+

INFORMATION SYSTEMS AUDITOR EXAM PREPARATION COURSE NICOSIA LIVE ON-LINE. 1 P a g e

John Snare Chair Standards Australia Committee IT/12/4

Gujarat Forensic Sciences University

Canada Life Cyber Security Statement 2018

General Data Protection Regulation

Altius IT Policy Collection

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. 22 Mar

ISACA CISA Review Course CHAPTER 1 THE IS AUDIT PROCESS

The NIST Cybersecurity Framework

Manchester Metropolitan University Information Security Strategy

Business continuity management and cyber resiliency

CISM Certified Information Security Manager

Val-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.

Baseline Information Security and Privacy Requirements for Suppliers

Rethinking Information Security Risk Management CRM002

Financial CISM. Certified Information Security Manager (CISM) Download Full Version :

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Information technology Security techniques Information security controls for the energy utility industry

An Introduction to the ISO Security Standards

Securing the cloud ISACA Korea. Han Ther, Lee CISA, CISM, CISSP, CRISC, ITILF, MCSA

EXAM PREPARATION GUIDE

Risk Based IT Auditing Master Class. Unlocking your World to a Sea of Opportunities

354 & Index Board of Directors Responsibilities Audit Committee and Risk Committee Coordination, 244 Audit Committee Functions and Responsibilities, 2

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Security Policies and Procedures Principles and Practices

Sparta Systems TrackWise Digital Solution

SECURITY & PRIVACY DOCUMENTATION

Transcription:

Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business goals and objectives. You will evaluate the security and controls of business structure and governance methods; the policies, procedures, and guidelines used; and the overall security of the business environment. Also, this course will help you prepare for the ISACA CISA certification exam. CISA Certification acts as a career differentiator for security professionals or IT managers who wish to enhance their marketability and credibility. This is an ideal path for those looking at a long term career in Information Systems Auditing. This course is highly recommended for IS/IT auditors, IT managers, Audit Managers, Security Managers, System Analysts, Consultants, and even CIOs and CTOs. Objectives After taking this course, students will be able to: Entire Process of Auditing Information Systems Management and Governance of IT Acquisition, Implementation and Development of Business Information Systems Managing Operations, Support and Maintenance of IS Securing Information Assets Topics The Process of Auditing Information Systems Governance and Management of IT Information Systems Acquisition, Development, and Implementation Information Systems Operations, Maintenance, and Support Protection of Information Assets Audience This course is highly recommended for IS/IT auditors, IT managers, Audit Managers, Security Managers, System Analysts, Consultants, and even CIOs and CTOs. Prerequisites Before taking this course, you should have a minimum of 5 years of professional information systems auditing. Control or security work experience (as described in the CISA job practice areas) is required for certification. Duration Five days

Course Outline I. The Process of Auditing Information Systems A. Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards B. Knowledge of the risk assessment concepts and tools and used in planning, examination, reporting and follow-up C. Knowledge of fundamental business processes (e.g., purchasing, payroll, accounts payable, accounts receivable) and the role of IS in these processes D. Knowledge of the control principles related to controls in information systems E. Knowledge of risk-based audit planning and audit project management, including follow-up F. Knowledge of the applicable laws and regulations that affect the scope, evidence collection and preservation, and frequency of audits G. Knowledge of the evidence collection (e.g., observation, inquiry, inspection, interview, data analysis, forensic investigation, computer-assisted audit [CAATs]) used to gather, protect and preserve audit evidence H. Knowledge of different sampling methodologies and other substantive/data analytical procedures I. Knowledge of reporting and communication (e.g., facilitation, negotiation, conflict resolution, audit report structure, issue writing, management summary, result verification) J. Knowledge of audit quality assurance (QA) systems and frameworks K. Knowledge of various types of audits (e.g., internal, external, financial) and methods for assessing and placing reliance on the work of other auditors or control entities II. Governance and Management of IT A..Knowledge of the purpose of IT strategy, policies, standards and procedures for an organization and the essential elements of each B. Knowledge of IT governance, management, security and control frameworks, and related standards, guidelines and practices C. Knowledge of the organizational structure, roles and responsibilities related to IT, including segregation of duties (SoD) D. Knowledge of the relevant laws, regulations and industry standards affecting the organization E. Knowledge of the organizations technology direction and IT architecture and their implications for setting longterm strategic directions F. Knowledge of the processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures G. Knowledge of the use of capability and maturity models H. Knowledge of process optimization I. Knowledge of IT resource investment and allocation practices, including prioritization criteria (e.g., portfolio management, value management, personnel management) J. Knowledge of IT supplier selection, contract management, relationship management and performance monitoring processes, including thirdparty outsourcing relationships K. Knowledge of enterprise risk management (ERM) L. Knowledge of the practices for monitoring and reporting of controls performance (e.g., continuous monitoring, quality assurance [QA]) M. Knowledge of quality management and quality assurance (QA) systems

III. N. Knowledge of the practices for monitoring and reporting of IT performance (e.g., balanced scorecard [BSC], key performance indicators [KPIs]) O. Knowledge of business impact analysis (BIA) P. Knowledge of the standards and procedures for the development, maintenance and testing of the business continuity plan (BCP) Q. Knowledge of the procedures used to invoke and execute the business continuity plan (BCP) and return to normal operations Information Systems Acquisition, Development and Implementation A. Knowledge of benefits realization practices, (e.g., feasibility studies, business cases, total cost of ownership [TCO], return on investment [ROI]) B. Knowledge of IT acquisition and vendor management practices (e.g., evaluation and selection process, contract management, vendor risk and relationship management, escrow, software licensing), including third-party outsourcing relationships, IT suppliers and service providers. C. Knowledge of project governance mechanisms (e.g., steering committee, project oversight board, project management office) D. Knowledge of project management control frameworks, practices and tools E. Knowledge of the risk management practices applied to projects F. Knowledge of requirements analysis and management practices (e.g., requirements verification, traceability, gap analysis, vulnerability management, security requirements) G. Knowledge of the enterprise architecture (EA) related to data, applications and technology (e.g., web-based applications, web services, n-tier IV. applications, cloud services, virtualization) H. Knowledge of system development methodologies and tools, including their strengths and weaknesses (e.g., agile development practices, prototyping, rapid application development [RAD], object-oriented design, secure coding practices, system version control) I. Knowledge of the control objectives and that ensure the completeness, accuracy, validity and authorization of transactions and data J. Knowledge of the testing methodologies and practices related to the information system development life cycle (SDLC) K. Knowledge of the configuration and release management relating to the development of information systems L. Knowledge of system migration and infrastructure deployment practices and data conversion tools, and procedures M. Knowledge of project success criteria and project risk N. Knowledge of post-implementation review objectives and practices (e.g., project closure, control implementation, benefits realization, performance measurement) Information Systems Operations, Maintenance and Support A. Knowledge of service management frameworks B. Knowledge of service management practices and service level management C. Knowledge of the for monitoring third-party performance and compliance with service agreements and regulatory requirements D. Knowledge of enterprise architecture (EA)

E. Knowledge of the functionality of fundamental technology (e.g., hardware and network components, system software, middleware, database management systems) F. Knowledge of system resiliency tools and (e.g., fault-tolerant hardware, elimination of single point of failure, clustering) G. Knowledge of IT asset management, software licensing, source code management and inventory practices H. Knowledge of job scheduling practices, including exception handling I. Knowledge of the control that ensure the integrity of system interfaces J. Knowledge of capacity planning and related monitoring tools and K. Knowledge of systems performance monitoring processes, tools and (e.g., network analyzers, system utilization reports, load balancing) L. Knowledge of data backup, storage, maintenance and restoration practices M. Knowledge of database management and optimization practices N. Knowledge of data quality (completeness, accuracy, integrity) and life cycle management (aging, retention) O. Knowledge of problem and incident management practices P. Knowledge of change management, configuration management, release management and patch management practices Q. Knowledge of the operational risk and controls related to end-user computing R. Knowledge of the regulatory, legal, contractual and insurance issues related to disaster recovery S. Knowledge of business impact analysis (BIA) related to disaster recovery planning T. Knowledge of the development and maintenance of disaster recovery plans (DRPs) U. Knowledge of the benefits and drawbacks of alternate processing sites (e.g., hot sites, warm sites, cold sites) V. Knowledge of disaster recovery testing methods W. Knowledge of the processes used to invoke the disaster recovery plans (DRPs) V. Protection of Information Assets A. Knowledge of the generally accepted practices and applicable external requirements (e.g., laws, regulations) related to the protection of information assets B. Knowledge of privacy principles C. Knowledge of the for the design, implementation, maintenance, monitoring and reporting of security controls D. Knowledge of the physical and environmental controls and supporting practices related to the protection of E. Knowledge of the physical access controls for the identification, authentication and restriction of users to authorized facilities and hardware F. Knowledge of the logical access controls for the identification, authentication and restriction of users to authorized functions and data G. Knowledge of the security controls related to hardware, system software (e.g., applications, operating systems) and database management systems. H. Knowledge of the risk and controls associated with virtualization of systems I. Knowledge of the risk and controls associated with the use of mobile and wireless devices, including personally owned devices (bring your own device [BYOD]) J. Knowledge of voice communications security (e.g., PBX, Voice-over Internet Protocol [VoIP])

K. Knowledge of network and Internet security devices, protocols and L. Knowledge of the configuration, implementation, operation and maintenance of network security controls M. Knowledge of encryption-related and their uses N. Knowledge of public key infrastructure (PKI) components and digital signature O. Knowledge of the risk and controls associated with peer-to-peer computing, instant messaging, and web-based technologies (e.g., social networking, message boards, blogs, cloud computing) P. Knowledge of the data classification standards related to the protection of Q. Knowledge of the processes and procedures used to store, retrieve, transport and dispose of confidential R. Knowledge of the risk and controls associated with data leakage S. Knowledge of the security risk and controls related to end-user computing T. Knowledge of methods for implementing a security awareness program U. Knowledge of information system attack methods and V. Knowledge of prevention and detection tools and control W. Knowledge of security testing (e.g., penetration testing, vulnerability scanning) X. Knowledge of the processes related to monitoring and responding to security incidents (e.g., escalation procedures, emergency incident response team) Y. Knowledge of the processes followed in forensics investigation and procedures in collection and preservation of the data and evidence (i.e., chain of custody) Z. Knowledge of the fraud risk factors related to the protection of information assets