Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Updated in May 2025.
This course now features Coursera Coach!
A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course.
This course offers a comprehensive exploration of Information Systems (IS) auditing, aligned with ISACA’s five core domains essential for the CISA exam. Starting with foundational IS auditing standards, guidelines, and ethical considerations, it then moves into governance and IT management, emphasizing frameworks and controls critical for effective audits.
The course covers the lifecycle of information systems—from acquisition and development to implementation and operations—highlighting how aligning technology with business goals supports continuity and resilience in organizations. Throughout, practical scenarios are used to bridge theory and real-world applications, focusing on risk management, control assessments, and compliance.
This course covers emerging technologies like cloud computing and virtualization, highlighting their impact on audit practices. By the end, you’ll be ready for the CISA exam and equipped to handle modern IT auditing challenges.
Ideal for IT professionals seeking to specialize in IS auditing or improve their IT governance knowledge, especially those pursuing CISA certification. Prior experience in IT security, audit, or risk management is helpful but not mandatory.
Syllabus
- Course 1: Information Systems Auditing and Governance
- Course 2: Governance and Management of IT
- Course 3: Systems Acquisition, Development and Implementation
- Course 4: Information Systems Operations and Business Resiliency
- Course 5: Protection of Information Assets
Courses
-
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This course offers a thorough exploration of IT governance principles and their application in information systems auditing. You will begin with the foundational aspects of governance, including the policies, controls, and best practices that support effective enterprise IT management. Understanding the role of business intelligence, strategic planning, and organizational structures will be crucial for those looking to align IT initiatives with broader business goals. Detailed discussions on IT standards, policies, and procedures will provide the clarity needed to differentiate and implement these essential governance components effectively. As you progress, the course delves into risk management and maturity models, which are critical for conducting comprehensive risk-based audits. You will explore various risk analysis methodologies and learn how to apply frameworks like ISACA’s Capability Maturity Model Integration to assess the maturity of controls and policies within an organization. Key concepts such as roles, responsibilities, and the segregation of duties will be covered to ensure a holistic understanding of governance structures and their impact on risk management and audit quality. In the final modules, the course focuses on resource management, cloud governance, and quality assurance. You will gain insights into managing IT resources, handling organizational change, and adhering to industry standards and regulations. Additionally, you will learn how to assess third-party services, govern cloud environments, and implement performance monitoring frameworks like COBIT and ITIL. By the end of the course, you will be equipped with the expertise to perform high-quality IS audits and contribute significantly to your organization’s IT governance and compliance strategies. This course is designed for IT professionals, auditors, and governance specialists seeking to deepen their knowledge in IT governance and prepare for the CISA certification exam. A basic understanding of information systems and governance principles is recommended, though no prior CISA experience is necessary.
-
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This comprehensive course is designed to guide you through the key requirements and strategies for passing the CISA certification exam. Starting with an overview of the exam structure and the core areas it covers, you will gain a clear understanding of what to expect and how to prepare effectively. The initial modules focus on the professional standards and ethics required in IS auditing, laying the groundwork for building credibility and value in this specialized field. Moving forward, the course delves into the critical aspects of risk management and audit planning. You will explore different control types, project management techniques, and sampling methodologies essential for conducting thorough IS audits. Practical insights into audit planning, materiality assessment, and risk-based approaches will enhance your ability to execute audits that meet professional standards and business needs. The final sections emphasize evidence collection, data analytics, and audit reporting. You will master the use of Computer-Assisted Audit Techniques (CAATs) and learn how to present findings effectively to stakeholders. Continuous auditing and quality assurance methods are also covered to ensure you can deliver high-quality audit results. By the end of the course, you will be well-prepared to tackle the CISA exam and advance your career in IS auditing. This course is aimed at IT professionals, auditors, and consultants looking to gain the CISA certification. Participants should have a basic understanding of information systems and auditing principles. No prior CISA exam experience is necessary, but a foundational knowledge of IT security and audit processes will be beneficial.
-
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This course is designed to build your expertise in auditing IT operations and ensuring system resiliency, which are critical components of the CISA certification. Starting with an overview of necessary IT components, you will learn about the hardware architecture and platforms essential for maintaining effective information systems operations. You will explore the benefits and challenges of using USB and RFID technologies and gain a deep understanding of IT Asset Management (ITAM) practices, including Hardware Asset Management (HAM) and Software Asset Management (SAM). The course also addresses system interfaces and end-user computing (EUC), emphasizing the importance of implementing appropriate controls to safeguard system interactions and user activities. The course then shifts focus to data governance and software licensing, where you will learn how data governance frameworks ensure data protection, compliance, and optimal utilization. Detailed discussions on operating systems and source code management will enhance your ability to audit various software environments effectively. You will also explore incident and problem management practices, understanding how to evaluate and improve organizational response to IT disruptions. These modules are crucial for professionals aiming to excel in managing and auditing complex IT infrastructures. In the final sections, the course delves into service management, database management, and business continuity planning. You will learn about release and patch management, service level agreements (SLAs), and the critical role of Database Management Software (DBMS) in supporting IS operations. The course covers business impact analysis (BIA), system resiliency through redundancies, and the essentials of business continuity and disaster recovery planning. You will gain practical insights into developing and testing Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP), ensuring you are well-prepared to conduct thorough audits and contribute to organizational resiliency. By the end of the course, you will have a comprehensive understanding of IT operations auditing and be ready to excel in the CISA exam. This course is aimed at IT auditors, risk management professionals, and IT operations specialists preparing for the CISA certification. It is suitable for individuals with a basic understanding of IT infrastructure and governance, but no prior CISA exam experience is necessary.
-
This course offers an in-depth exploration of information security auditing principles, tailored for professionals preparing for the CISA certification. Starting with an overview of frameworks, standards, and guidelines, you will understand their critical role in protecting information assets. The course outlines the responsibilities of IS auditors in evaluating security baselines and implementing effective data privacy practices. Key modules focus on physical and environmental controls, ensuring that you are equipped to audit diverse aspects of information systems security, from infrastructure protection to compliance requirements. As you progress, the course delves into access management and data protection strategies. You will learn about identity and access management principles, logical access controls, and common authorization issues that pose risks to information systems. Detailed discussions on audit logging, data loss prevention (DLP), and network infrastructure will provide you with the skills needed to monitor and protect sensitive information effectively. The course also addresses the auditing of applications within networked environments, helping you understand the complexities of securing interconnected systems. In the latter sections, the focus shifts to advanced topics such as cryptography, network security, and cloud computing. You will explore the fundamentals of encryption systems, including symmetric and asymmetric keys, and learn to apply cryptographic principles for robust information security. Modules on PKI, virtualization, and cloud environments will further enhance your ability to assess and mitigate risks in modern IT landscapes. Additionally, the course covers security testing techniques, network penetration testing, and the use of IDS/IPS tools, preparing you to perform comprehensive security audits. By the end of this course, you will have a solid understanding of information security auditing, ready to tackle the CISA exam and advance your career in cybersecurity. This course is designed for IT auditors, security professionals, and individuals preparing for the CISA certification. It is suitable for those with a basic understanding of information systems and security principles. No prior CISA experience is required, but familiarity with IT audit processes will be beneficial.
-
Updated in May 2025. This course now features Coursera Coach! A smarter way to learn with interactive, real-time conversations that help you test your knowledge, challenge assumptions, and deepen your understanding as you progress through the course. This comprehensive course is designed to equip you with the knowledge and skills necessary to effectively audit IT project governance and system development processes. It begins with an overview of project governance and management, emphasizing the roles and responsibilities of key stakeholders, including project sponsors and the Project Management Office (PMO). You will gain a solid understanding of project initiation, planning, and execution phases, learning how to differentiate between auditing project content and project execution. Special focus is given to the project management methodologies, such as Agile and Predictive approaches, and the essential procedures for closing projects, ensuring you are well-versed in each phase of the project lifecycle. The course then transitions to system development and risk management, where you will explore various system development lifecycle (SDLC) models and their associated risks. You will learn how to assess these risks and understand different software development methods, including the use of Computer Aided Software Engineering (CASE) tools and fourth-generation languages (4GLs). Key topics such as business case development, feasibility analysis, and the identification and design of effective data controls are thoroughly covered, preparing you to evaluate system and software development from an IS auditor's perspective. In the final modules, the focus shifts to testing methodologies, data integrity, and change management. You will delve into decision support systems, testing plans, and methodologies to ensure data integrity and accuracy in application systems. The course also covers data migration processes, changeover techniques, and post-implementation reviews (PIR). By the end of the course, you will have a robust understanding of how to audit complex IT projects and system development processes, positioning you for success in the CISA exam and your professional career. This course is ideal for IT auditors, project managers, and professionals preparing for the CISA certification. It is recommended for individuals with a foundational understanding of information systems and project management. No prior CISA experience is required, but familiarity with IT governance and audit principles will be beneficial.
Taught by
Packt - Course Instructors