PACE NONCREDIT COURSE:
ISACA CISA Training Boot Camp
Areas of Study
Course Type
Overview
| Duration: 5 days
Information security is critical in today’s fast-paced world, and that’s led to a growing demand for professionals who understand how to measure the risk of an organization’s data and systems and create and administer programs and policies to combat security breaches.
The ISACA CISA Boot Camp teaches you the skills necessary to develop, manage, and supervise programs to defend against unauthorized admittance to information. You will gain in-depth knowledge of auditing information systems and how it applies to real-world scenarios — and leave fully prepared to pass your CISA exam.
You will receive an exam voucher for the ISACA CISA certification exam with your enrollment.
Our Certification Success Program, paired with our provided prep materials, boot camp sessions, and post-work, is designed to ease any concerns you may have when taking the certification exam. If your first attempt is unsuccessful, this program provides peace of mind that you may be eligible to take the certification exam a second time (if needed) at no additional fee.
*To qualify for a second certification exam voucher, students must:
- Attend at least 85% of each day of class
- Score a 90% or higher on their final practice exam
- Take the first exam within 90 days of class completion
- Upload your exam failure notice from your first exam attempt
Curriculum
- The process of auditing information systems
- Executing risk-based IS audit strategy
- Plan specific audits
- Conduct audits in accordance with IT audit standards
- Governance of IT and management
- Corporate governance
- Governance of enterprise IT
- Information systems strategy
- Maturity and process improvement models
- IT investment and allocation practices
- Policies and procedures
- Risk management
- Information technology management practices
- IT organization structure and responsibilities
- Auditing IT governance structure and implementation
- Business continuity planning
- Auditing business continuity
- Information systems acquisition, development, and implementation
- Business realization
- Project management structure
- Project management practices
- Business application development
- Virtualization and cloud computing environments
- Business application systems
- Development methods
- Infrastructure development/acquisition practices
- Information systems maintenance practices
- System development tools and productivity aids
- Process improvement practices
- Application controls
- Auditing application controls
- Auditing systems development, acquisition and maintenance
- Information systems operations, maintenance, and services management
- Information systems operations
- IT asset management
- Information systems hardware
- IS architecture and software
- IS network infrastructure
- Auditing infrastructure and operations
- Disaster recovery planning
- Protection of information assets
- Information security management
- Logical access
- Network infrastructure security
- Auditing information security management framework
- Auditing network infrastructure security
- Environmental exposures and controls
- Physical access exposures and controls
- Mobile computing
- Peer-to-peer computing
- Instant messaging
- Social media
- Cloud computing
- Data leakage
- End-user computing security risk and controls
Course Requirements
Requirements: Hardware Requirements: Software Requirements: Other: Instructional Material Requirements: The student materials required for this course are included in enrollment and will be available online.