Certified Information Systems Auditor (CISA)

  • Course Code
    ISAC-005

Certified Information Systems Auditor (CISA)

  • The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and Skill Makers , and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. Enhance your career by earning CISA—world-renowned as the standard of achievement for those who audit, control, monitor and assess information technology and business systems.

Learning Outcomes

    This Course has been designed to prepare Delegates for the CISA examination by enabling them to supplement their existing Skill Makers and understanding to be better prepared to pass the exam, as defined by ISACA:

    • Use the Skill Makers gained in a practical manner beneficial to your organization
    • Provide audit services in accordance with IT audit standards
    • IS Audit Process 
    • Provide assurance on leadership and organizational structure and processes
    • Provide assurance on acquisition/ development, testing and implementation of IT assets
    • Provide assurance on IT operations including service operations and third party
    • Provide assurance on organization’s security policies, standards, procedures, and controls to ensure confidentiality, integrity, and availability of information assets
    • IT Governance

Course Contents

    Testing-Taking Tips and Study Techniques

    • Preparation for the CISA Exam 
    • Submitting Required Paperwork 
    • Resources and Study Aids 
    • Passing the Exam, the First Time 

    The Audit Process

    • Risk 
    • Audit 
    • Standards and Guidelines 

    IT Governance

    • Best Practices 
    • Management Practices 
    • Roles and Responsibilities 

    Lifecycle Management

    • Project Management 
    • Business Application Development 
    • Information Systems Maintenance Practices 

    System Infrastructure Control:

    • Auditing Application Controls 
    • Application System Development 
    • Business Application Systems 

    Information Systems Hardware and Architecture:

    • Information Systems Operations 
    • Information Systems Hardware 
    • SDLC 
    • Databases 

    Information Systems Used for IT Delivery and Support:

    • TCP/IP Model 
    • TCP/UDP/ICMP/IP 
    • Routers/Switches/Hubs 
    • Firewalls 
    • Wireless 
    • WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cable 

    Protection of Logical Assets:

    • CIA 
    • Roles and Responsibilities - RACI 
    • Taxonomy - Information Classification 
    • Risk Management 
    • Policies, Procedures, Standards, Guidelines, Baselines 
    • Skill Makers Transfer - Awareness, Training, Education

    Physical Security:

    • Environmental Protection Practices 
    • Physical Authentication 
    • Policies and Procedures 

    Business Continuity and Disaster Recovery:

    • BIA Policy 
    • BIA Roles and Teams 
    • Data Backups, Vaulting, Journaling, Shadowing 
    • Alternate Sites 
    • Emergency Response 
    • Required Notifications 

Our Methodology

    • Make coaching and monitoring innovative and using modern
    • Media training also using on the go training by using interactive means and focusing on
    • The exercises, practical applications and real situations study
    • Live delivery method, instructor-led training
    • Experienced consultant, trainers, and professional
    • Qualified trainer with high-level experience

Attendance Reports

    • Send daily attendance reports to training departments
    • Send full attendance report to training dep. by the end of the course
    • Attend 100 % from the course days also provide daily
    • Issue attendance certificate for participant who attend minimum 80% from the course duration

Pre/Post Reports

    • Pre- assessment before starting training
    • Post assessment after finish training
    • Full report for the deferent between Pre-& Post assessment

Who Should Attend

    • Internal and External Auditors
    • Finance/CPA Professionals
    • IT Professionals
    • Information Security Professionals
    • Information security and risk consulting professionals
Date City Venue Language Price Status Register
27 Oct 31 Oct - 2024 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
01 Dec 05 Dec - 2024 Cairo 5 Stars Hotel English SAR 14850 Planned Register
01 Dec 05 Dec - 2024 Dubai 5 Stars Hotel English SAR 14850 Planned Register
16 Feb 20 Feb - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
23 Feb 27 Feb - 2025 Dubai 5 Stars Hotel English SAR 14850 Planned Register
23 Feb 27 Feb - 2025 Cairo 5 Stars Hotel English SAR 14850 Planned Register
18 May 22 May - 2025 Cairo 5 Stars Hotel English SAR 14850 Planned Register
18 May 22 May - 2025 Dubai 5 Stars Hotel English SAR 14850 Planned Register
29 Jun 03 Jul - 2025 Dubai 5 Stars Hotel English SAR 14850 Planned Register
29 Jun 03 Jul - 2025 Cairo 5 Stars Hotel English SAR 14850 Planned Register
10 Aug 14 Aug - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
31 Aug 04 Sep - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
26 Oct 30 Oct - 2025 Riyadh 5 Stars Hotel English SAR 12000 Planned Register
30 Nov 04 Dec - 2025 Dubai 5 Stars Hotel English SAR 14850 Planned Register
30 Nov 04 Dec - 2025 Cairo 5 Stars Hotel English SAR 14850 Planned Register