Course curriculum
-
1
Important Notices
-
Program Introduction
-
ISACA Student Membership
-
ISACA Exam Voucher
-
-
2
CISA Notes
-
CISA Notes
-
-
3
Assessments
-
Information System Auditing Process
-
Audit Standards, Guidelines, Functions, and Codes of Ethics
-
ISACA IS Audit and Assurance Guidelines
-
ISACA IS Audit and Assurance Standards
-
Planning
-
Audit Charter
-
ISACA Code of Professional Ethics
-
IT Assurance Framework (ITAF)
-
Management of the IS Audit Function
-
Compliance Audit
-
IS Audit Resource Management
-
IS Audit
-
Types of Audits, Assessments, and Reviews
-
Using the Services of Other Auditors and Experts
-
Administrative Audit
-
Financial Audit
-
Integrated Audit
-
Operational Audit
-
Specialized Audits
-
Forensic Audit
-
Fraud Audit
-
Functional Audit
-
Third-Party Service Audit
-
Audit Universe and Risk Assessment
-
Individual Audit Assignments
-
Integrated Auditing
-
Risk-Based Audit Planning
-
Short- and Long-Term Audit Planning
-
Audit Risk and Materiality
-
Detection Risk
-
Effect of Laws and Regulations on IS Audit Planning
-
Inherent Risk
-
IS Audit Risk Assessment Techniques
-
Risk Analysis
-
Types of Controls and Considerations
-
Control Objectives and Control Measures
-
Corrective Controls
-
Detective Controls
-
Preventive Controls
-
Center for Internet Security (CIS) 18 Critical Security Controls
-
Compensating Controls
-
Control Relationship to Risk
-
OWASP Software Assurance Maturity Model (SAMM)
-
Prescriptive Controls and Frameworks
-
Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)
-
Evaluation of the Control Environment
-
Management Control Monitoring
-
Payment Card Industry (PCI) Data Security Standard (DSS)
-
Service Organization Controls (SOC) Reports
-
Application of IS-Specific Controls
-
Audit Project Management
-
General Control Methods
-
Managerial Controls
-
Physical Controls
-
Technical Controls
-
Audit Objectives
-
Audit Testing and Sampling Methodology
-
Execution and Monitoring of the Audit Plan
-
Planning the Audit Engagement
-
Statistical and Non-Statistical Sampling
-
Audit Documentation
-
Audit Evidence Collection Techniques
-
Evaluation of Evidence
-
Methods of Collection (Interviews, Observation, Review of Documentation)
-
Types of Evidence
-
Audit Data Analytics
-
Computer-Assisted Audit Techniques (CAATs)
-
Continuous Auditing and Monitoring
-
Data Integrity, Privacy, and Security
-
Audit Findings and Recommendations
-
Audit QA and Continuous Improvement
-
Communicating Audit Results
-
Quality Assurance and Improvement of the Audit Process
-
Reporting and Communication Techniques
-
EAM, Snapshots, Audit Hooks)
-
Governance and Management of IT
-
Governance, Risk, and Compliance
-
Impact of Laws, Regulations, and Industry Standards on IS Audit
-
IT Governance
-
Laws, Regulations, and Industry Standards
-
Audit’s Role in EGIT
-
Enterprise Governance of Information and Technology
-
Good Practices for EGIT
-
Information Security Governance
-
Organizational Structure, IT Governance, and IT Strategy
-
Business Intelligence
-
Information Systems Strategy
-
IT Policies, Standards, Procedures, and Guidelines
-
Organizational Structure of the IT Strategy and Steering Levels
-
Strategic Planning
-
Enterprise Architecture and Considerations
-
Framework for Enterprise Architecture
-
Sherwood Applied Business Security Architecture (SABSA)
-
The Zachman Framework for Enterprise Architecture
-
TOGAF (The Open Group Architecture Framework)
-
Enterprise Risk Management (ERM)
-
Risk Appetite and Risk Tolerance
-
Risk Management Framework
-
Role of EA in Auditing Infrastructure and Operations
-
Data Privacy Laws and Regulations
-
Data Privacy Principles
-
Data Privacy Program and Principles
-
Data Privacy Program Management
-
Data Classification Schemes
-
Data Governance and Classification
-
Data Governance Framework
-
Data Management Policies and Procedures
-
Data Privacy Auditing
-
Data Lifecycle Management
-
IT Asset Management
-
IT Human Resource Management
-
IT Resource Management
-
IT Management
-
IT Infrastructure and Operations
-
IT Service Management
-
IT Vendor Management
-
Software and License Management
-
Third-Party Service Delivery Management
-
IT Performance Monitoring and Reporting
-
Vendor Risk Management
-
Approaches and Techniques
-
IT Balanced Scorecard
-
IT Governance and Management Reporting
-
Performance Metrics and KPIs
-
Tools and Techniques for IT Performance Monitoring
-
IT Quality Management Systems
-
Quality Assurance and Quality Management of IT
-
Six Sigma
-
Information Systems Acquisition and Development
-
Information Systems Acquisition, Development and Implementation
-
Project Governance and Management
-
Project Governance and Management
-
Project Management Techniques
-
Project Benefits Realization
-
Project Life Cycle and Phases
-
Project Management Metrics
-
Project Management Success Factors
-
Project Management Tools
-
Business Case and Feasibility Analysis
-
Business Case Development
-
Feasibility Analysis
-
Project Feasibility
-
Project Objectives
-
Cost-Benefit Analysis
-
Project Scoping
-
Requirements Definition
-
Risk Analysis and Management
-
Stakeholder Identification and Analysis
-
Agile Development
-
Prototyping
-
Rapid Application Development (RAD)
-
System Development Methodologies
-
Traditional System Development Life Cycle (SDLC)
-
Computer-Aided Software Engineering (CASE) Tools
-
Implementation Considerations
-
Object-Oriented Systems Development (OOSD)
-
Software Acquisition and Development
-
Control Identification and Design
-
Control Objectives for Information and Related Technologies (COBIT)
-
Information Technology Infrastructure Library (ITIL)
-
Internal Controls
-
Risk Management
-
Control Frameworks
-
Information Systems Implementation
-
Integration Testing
-
System Readiness and Implementation Testing
-
Unit Testing
-
Implementation Configuration and Release Management
-
Implementation Readiness Assessment
-
Post-Implementation Review
-
System Testing
-
User Acceptance Testing (UAT)
-
Change Control Procedures
-
Change Management
-
Release Management
-
System Migration, Infrastructure Deployment and Data Conversion
-
Benefits Realization Review
-
System Performance Evaluation
-
System Control
-
Acquisition Practices
-
Hardware
-
Information Systems Operations and Business Resilience
-
Information Systems Operations
-
Infrastructure
-
IT Components
-
Cloud Services
-
Data Centers
-
IT Asset Management
-
Networks
-
oftware
-
Asset Classification
-
Asset Disposal
-
Asset Inventory
-
Asset Lifecycle Management
-
Job Scheduling and Production Process Automation
-
External System Interfaces
-
Internal System Interfaces
-
Job Scheduling
-
Production Process Automation
-
System Interfaces
-
Availability Management
-
End-User Computing and Shadow IT
-
End-User Computing Risks
-
Shadow IT Risks
-
Systems Availability and Capacity Management
-
Capacity Planning
-
Incident Analysis
-
Incident Identification
-
Incident Response
-
Problem and Incident Management
-
Change Management
-
Configuration Management
-
IT Change, Configuration, and Patch Management
-
Operational Log Management
-
Patch Management
-
IT Service Level Management
-
Log Analysis
-
Log Collection
-
Log Retention
-
Service Level Agreements (SLAs)
-
Data Integrity
-
Data Security
-
Database Administration
-
Database Management
-
Service Performance Monitoring
-
Business Impact Analysis
-
Business Resilience
-
Critical Business Functions
-
Impact Scenarios
-
System and Operational Resilience
-
Backup Strategies
-
Data Backup, Storage, and Restoration
-
Data Restoration
-
Resilience Planning
-
Resilience Testing
-
Business Continuity Plan
-
Continuity Planning
-
Continuity Testing
-
Disaster Recovery Plans
-
Recovery Strategies
-
Agile Methodology
-
Business Continuity Plan
-
Continuity Planning
-
Continuity Testing
-
Disaster Recovery Plans
-
Recovery Strategies
-
Information Asset Security and Control
-
Information Asset Security Policies, Frameworks, Standards, and Guidelines
-
Information Asset Security Policies, Procedures, and Guidelines
-
Policy Development Process
-
Purpose and Benefits
-
COBIT
-
Information Security Frameworks and Standards
-
NIST Cybersecurity Framework
-
Policy Framework
-
Physical and Environmental Controls
-
Baseline Configuration
-
Baseline Security Evaluation Checklist
-
Environmental Exposures and Controls
-
Information Security Baselines
-
Environmental Controls
-
Fire Suppression Systems
-
Physical Access Exposures and Controls
-
Physical Security
-
Power Supply
-
Access Control Mechanisms
-
Industrial Control Systems Security
-
Physical Security Monitoring
-
SCADA Systems
-
Surveillance Systems
-
Access Control Mechanisms
-
Industrial Control Systems Security
-
Physical Security Monitoring
-
ICS Security Risks
-
Information Security Management
-
Security Governance and Management
-
Security Governance Framework
-
Security Roles and Responsibilities
-
Data Classification and Ownership
-
Data Classification Process
-
Program Development
-
Security Awareness and Training
-
Data Encryption and Cryptography
-
Data Ownership and Stewardship
-
Encryption Techniques
-
Network Security
-
Public Key Infrastructure (PKI)
-
Firewalls and Network Segmentation
-
Intrusion Detection and Prevention Systems
-
Operating System Security
-
OS Hardening
-
Patch Management
-
Application Security
-
Database Activity Monitoring
-
Database Encryption
-
Database Security
-
Secure Software Development
-
BYOD Security
-
Cloud Security Frameworks
-
Cloud Security Risks
-