Certified Information Security Auditor (CISA) Training
8/9/2021 - 8/13/2021


COURSE COST: $3595.00

COURSE TIMES: 9:00am - 4:30pm

Printable version of this course
Register for this course


This 5 day course covers all the requirements for ISACA's Certified Information Security Auditor Exam.



*Course Cost listed does not include the cost of courseware or Exam. Please refer to your Invoice for the additional cost. If you have any questions, please contact us (learn@vtec.org or 207-775-0244).This course to run is subject to minimum enrollment. This course may run as a instructor led virtual live on line class if the minimum enrollment has not been met.


Information System Auditing Process
IS Audit Standards, Guidelines and Codes of Ethics
Business Processes
Types of Controls
Risk-based Audit Planning
Types of Audits and Assessments
Audit Project Management
Sampling Methodology, Audit Evidence Collection Techniques
Data Analytics
Reporting and Communication Techniques
Quality Assurance and Improvement of the Audit Process

Governance and Management of IT
IT Governance and IT Strategy
IT-related Frameworks
IT Standards, Policies and Procedures
Organizational Structure
Enterprise Architecture
Enterprise Risk Management
Maturity Models
Laws, Regulations and Industry Standards Affecting the Organization
IT Management
IT Resource Management, IT Service Provider Acquisition and Management
IT Performance Monitoring and Reporting
Quality Assurance and Quality Management of IT

Information Systems Acquisition, Development and Implementation
Information Systems Acquisition and Development
Project Governance and Management
Business Case and Feasibility Analysis
System Development Methodologies
Control Identification and Design
Information Systems Implementation
Testing Methodologies
Configuration and Release Management
System Migration, Infrastructure Deployment and Data Conversion
Post-implementation Review

IS Operations and Business Resilience
Information Systems Operations
Common Technology Components, IT Asset Management
Job Scheduling and Production Process Automation
System Interfaces, End-user Computing, Data Governance
Systems Performance Management
Problem and Incident Management, Change, Configuration, Release and Patch Management
IT Service Level Management, Database Management
Business Resilience, Business Impact Analysis
System Resiliency
Data Backup, Storage and Restoration
Business Continuity Plan
Disaster Recovery Plans

Information Asset Security and Control
Information Asset Security Frameworks, Standards and Guidelines
Privacy Principles, Physical Access and Environmental Controls
Identity and Access Management, Network and End-point Security
Data Classification, Data Encryption and Encryption-related Techniques
Public Key Infrastructure, Web-based Communication Technologies
Virtualized Environments, Mobile, Wireless and Internet-of-things Devices
Security Event Management, Security Awareness Training and Programs
Information System Attack Methods and Techniques
Security Testing Tools and Techniques
Security Monitoring Tools and Techniques
Incident Response Management
Evidence Collection and Forensics