Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

CISA – Certified Information Systems Auditor Study Guide

Packt via Coursera

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This course provides a thorough guide to mastering IT auditing skills, preparing you for the CISA exam. The course covers key areas such as governance, systems development, and asset protection, essential for a successful career in information systems auditing. You'll learn how to conduct audits according to global standards, improve IT processes and controls, and use data analytics to enhance audit effectiveness. This will help you gain the skills necessary for acing the CISA exam. What sets this course apart is its balance of theory and practical insights. It not only helps you understand key concepts but also empowers you to apply them in real-world auditing scenarios. This course is designed for IT auditors, security analysts, and risk managers, especially those from non-technical backgrounds who are aiming to advance in IT audit, governance, and security management. Based on the book CISA – Certified Information Systems Auditor Study Guide, by Hemang Doshi.

Syllabus

  • Audit Planning
    • In this section, we delve into the intricacies of information system (IS) audit planning, emphasizing its role in IT governance and alignment with business objectives. We explore strategies for designing risk-based audit plans to identify IT vulnerabilities, ensuring that audit functions support business goals and enhance IT system security and compliance.
  • Audit Execution
    • In this section, we delve into the execution of audit plans, emphasizing the importance of audit project management, evidence collection, and data analytics. We explore techniques for managing audit projects efficiently, developing robust evidence-gathering methods, and leveraging data analytics to enhance audit processes, all crucial for maintaining audit integrity and protecting organizational assets.
  • IT Governance
    • In this section, we explore the implementation of Enterprise Governance of IT (EGIT) to align IT with business objectives, focusing on maximizing value and managing risks. We also discuss designing IT governance frameworks for effective risk management and analyzing enterprise architecture to provide strategic support, which are crucial for IS auditors in ensuring organizational success.
  • It Management
    • In this section, we explore IT management strategies to align IT assets with business goals, focusing on resource management, performance metrics, and third-party risk analysis. We aim to optimize IT performance and ensure quality service delivery through effective monitoring and reporting techniques.
  • Information Systems Acquisition and Development
    • In this section, we delve into the processes of acquiring and developing information systems, emphasizing project management structures, business case design, and feasibility analysis. We also explore various system development methodologies and control mechanisms to ensure effective implementation and risk mitigation.
  • Information Systems Implementation
    • In this section, we delve into the implementation of information systems, emphasizing the importance of testing methodologies and system migration strategies to mitigate risks and ensure successful operations. We also explore post-implementation reviews to evaluate system effectiveness, providing essential insights for information systems auditors.
  • Information Systems Operations
    • In this section, we delve into the critical aspects of information systems operations, emphasizing the importance of aligning IT processes with business objectives to enhance efficiency and service delivery. We explore key topics such as IT asset management, job scheduling, and system performance management, providing insights into optimizing resource utilization and minimizing downtime for continuous service delivery.
  • Business Resilience
    • In this section, we delve into the critical aspects of business resilience, focusing on developing strategies such as Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP) to ensure ongoing operations during disruptions. We also analyze Recovery Time Objective (RTO) and Recovery Point Objective (RPO) to optimize recovery strategies, highlighting the importance of these measures in preventing costly downtimes and ensuring swift recovery from unforeseen events.
  • Information Asset Security and Control
    • In this section, we explore the implementation of security frameworks for information assets, focusing on designing physical and environmental access controls and analyzing identity and access management strategies. These practices are crucial for protecting sensitive data, ensuring business continuity, and preventing financial and reputational damage.
  • Network Security and Control
    • In this section, we explore the critical aspects of network security, focusing on implementing various firewall types and understanding their roles within the OSI layers. We also design secure VPNs, assess their security risks, and analyze VoIP security measures and common attack methods to ensure data integrity and availability.
  • Public Key Cryptography and Other Emerging Technologies
    • In this section, we explore the implementation of public key infrastructure (PKI) to enhance information asset security and analyze cloud computing models for secure deployment. We also evaluate security measures for the Internet of Things (IoT) to ensure effective data protection, providing IS auditors with the necessary knowledge to assess and implement robust security systems.
  • Security Event Management
    • In this section, we explore security event management by implementing security awareness training, analyzing attack methods, and designing incident response plans to protect information systems effectively. We focus on identifying risks and applying strategic security measures to safeguard organizational data and operations.

Taught by

Packt - Course Instructors

Reviews

Start your review of CISA – Certified Information Systems Auditor Study Guide

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.