Information Security Training Courses Icon

CISA Exam Boot Camp


3 Days
Classroom Session   |  
4 Days
Live Online

IIBA (CDU)

ASPE is an IIBA Endorsed Education Provider of business analysis training. Select Project Delivery courses offer IIBA continuing development units (CDU) in accordance with IIBA standards.

NASBA (CPE)

NASBA continuing professional education credits (CPE) assist Certified Public Accountants in reaching their continuing education requirements.

PMI (PDU)

Select courses offer Leadership (PDU-L), Strategic (PDU-S) and Technical PMI professional development units that vary according to certification. Technical PDUs are available in the following types: ACP, PBA, PfMP, PMP/PgMP, RMP, and SP.

PMI
PMP/PgMP
19.00 T-PDUs
S
2.00 S-PDUs

Expertise Level: Intermediate
Certification
Classroom Registration Fees
Individual:
$1895.00
Group Rate:
$1695.00
(per registrant, 2 or more)
Live Online Registration
Live Online:
$1895.00
Private Onsite Package

This course can be tailored to your needs for private, onsite delivery at your location.

Learn More About Enterprise Team Training

Overview

The course will begin with a review of the IS audit process based upon internationally accepted audit standards. The student will learn methods for conducting a risk assessment as well as techniques to successfully evaluate the effectiveness of Information Technology (IT) controls based upon the identified risks. Students will also become familiar with Governance, Risk Management and Compliance (GRC) from an IS auditor’s perspective. The course will also review the processes for ensuring the organizational strategies and objectives are met not only during the acquisition, development and testing phases of the systems life cycle but also during the operations and maintenances phases.

While designed to review the IS audit processes and procedures, this course has a focus on preparing candidates to sit for the CISA certification examination. This focus will include practice exams and question analysis to aid students in figuring out exactly what the questions are asking and how to answer them.

Understand the fundamentals audit and risk analysis techniques
Become familiar with audit planning
Understand the criticality of Enterprise Risk Management (ERM) and Quality Management
Recognize the contributions an auditor can make to basic business functions such as human resource management and contract management
Discover how IS audit can play an important role in improving the System Development Life Cycle (SDLC) and acquisitions processes
Understand how to identify and mitigate problems during the operations and maintenance of IT systems
Develop processes and procedure for conducting incident management, business continuity and disaster recovery
Understand the major tenants of IS security including confidentiality, integrity and availability
Explore basic IT security controls including encryption, mobile security and data classification
Discover the challenges organizations face when implementing cloud based solutions and techniques for auditing the cloud
Upcoming Dates and Locations
Guaranteed To Run
Jun 5, 2017 – Jun 7, 2017    8:30am – 4:30pm Sacramento, California

Please call ASPE for location details
at 1-877-800-5221

Sacramento, CA 95814
United States

Register
Jun 5, 2017 – Jun 7, 2017    11:30am – 7:30pm Live Online
11:30am – 7:30pm
Register
Aug 7, 2017 – Aug 9, 2017    8:30am – 4:30pm Live Online
8:30am – 4:30pm
Register
Aug 7, 2017 – Aug 9, 2017    8:30am – 4:30pm Columbia, Maryland

Please call ASPE for location details
at 1-877-800-5221

Columbia, MD 21044
United States

Register
Sep 11, 2017 – Sep 13, 2017    8:30am – 4:30pm San Diego, California

Please call ASPE for location details
at 1-877-800-5221

San Diego, CA 92101
United States

Register
Sep 11, 2017 – Sep 13, 2017    11:30am – 7:30pm Live Online
11:30am – 7:30pm
Register
Course Outline

1) The Process of Auditing Information Systems

Provide audit services in accordance with IT audit standards to assist the organization in protecting and controlling information systems.

  1. Audit process / IT audit standards
  2. Audit & risk
  3. Control objectives and controls
  4. Audit planning
  5. Audit QA

2) Governance and Management of IT

Provide assurance that the necessary leadership and organization structure and processes are in place to achieve objectives and to support the organization's strategy.

  1. Governance
  2. Roles / responsibilities
  3. Policies / standards / guidelines
  4. Enterprise Risk management
  5. Information Security Strategy
  6. Quality management
  7. Resource management
  8. Human Resources
  9. Contract management
  10. Business Continuity Planning

3) Information Systems Acquisition, Development and Implementation

Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization’s strategies and objectives.

  1. Benefit realization
  2. Project / program management
  3. IT architectures
  4. Acquisition
  5. Project risk analysis / management
  6. SDLC
  7. Development methodologies
  8. Configuration management / release management
  9. Migration
  10. Post implementation

4) Information Systems Operations, Maintenance and Support

Provide assurance that the processes for information systems operations, maintenance and support meet the organization’s strategies and objectives.

  1. Third parties management
  2. Operations
  3. Databases
  4. Capacity planning
  5. System interfaces
  6. Software
  7. Incident management
  8. Configuration Management
  9. Disaster Recovery Planning
  10. Backup & restoration

5) Protection of Information Assets

Provide assurance that the organization’s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.

  1. Confidentiality - Integrity - Availability
  2. Identification - Authentication - Authorization - Accounting
  3. Policies / Standards / Baselines / Guidelines
  4. Security awareness
  5. Access controls
  6. Controls
  7. Encryption
  8. Public Key Infrastructure
  9. Mobile / wireless
  10. Data classification
  11. Environmental protection
  12. Forensics
  13. VOIP security
  14. Social media security
Who should attend
  • IT Auditors
  • Security Auditors
  • Information Systems Managers
  • Internal Audit Directors
  • Security Analysts
  • Risk Analysts
  • Compliance Managers
  • IT Project Managers
  • Security Managers and Directors

Yes, this course looks perfect for my needs!

Download the brochure