top of page
ISACA

   ISACA CISA

CISA

​​Description:​

​​

​​The CISA (Certified Information Systems Auditor) is a globally recognized certification for professionals in the fields of auditing, control, and security of information systems. The CISA certification is intended for individuals who audit, control, monitor, and evaluate an organization's technological infrastructure and business processes. It focuses on assessing vulnerabilities, reporting compliance, and instituting controls.

CISA

Domains:

Domain 1: Information Systems Auditing Process

Domain 2: Governance and Management of IT

Domain 3: Information Systems Acquisition, Development, and Implementation

Domain 4: Information Systems Operations and Business Resilience

Domain 5: Protection of Information Assets

​​Who benefits?
 

The CISA (Certified Information Systems Auditor) certification offers various benefits both for information security professionals and for the organizations that employ them. Here are some of the key benefits:

 

• Professional Recognition: The certification is internationally recognized and is often a requirement for IT auditing positions in many corporations and government agencies. 

• Professional Credibility: It elevates an individual's professional stature, providing a competitive career advantage, especially in areas involving auditing and systems security. 

• Earning Potential: Certified professionals often have higher earning potential due to their specialized skills and verified expertise. 

• Professional Network: Access to a global network of peers, resources, and ongoing information offered by ISACA.

​​Prerequisites:

For candidates interested in participating in a preparation course for the CISA (Certified Information Systems Auditor) certification offered by ISACA, it is important to note that the course is intensive and requires a specific set of knowledge and prior experience. Here are the typical prerequisites for candidates seeking to effectively prepare for the CISA exam:

 

Relevant Experience: Ideally, candidates should have experience in IT or in auditing, control, assurance, or security roles, which are fundamental to understanding the concepts discussed in the CISA course. This could include experience in systems auditing, IT security, IT risk management, or information systems governance. 

IT Fundamentals: A solid understanding of basic information systems operations, including hardware, software, networks, and security, is crucial. This is essential for understanding the audit procedures that will be taught. 

• Audit Principles: While the course may cover auditing fundamentals, having some familiarity with audit principles and practices is highly beneficial. 

Standards and Regulations: Knowledge of key standards and regulations affecting IT auditing, such as ISO/IEC 27001, COBIT, and relevant compliance laws (e.g., GDPR, Sarbanes-Oxley Act), is recommended for a better understanding of the responsibilities and the legal and regulatory context of IT auditing. 

Critical Analysis: The ability to think critically and analyze complex information is important, as the course involves evaluating IT processes to identify risks and vulnerabilities. 

Commitment to Learning: Candidates must be prepared to dedicate significant time not only to attending the course but also to independent study, reviewing material, and practicing with sample questions to prepare for the exam.

 

These prerequisites help ensure that participants in the CISA exam preparation course have a proper foundation to make the most of the training and increase their chances of success in the exam. This course is intensive and covers a broad range of knowledge required to become a certified information systems auditor.ation you hold.

Exam Information:

  • Exam: ISACA CISA

  • Exam Format: Multiple Choice

  • Total Number of Questions: 150

  • Exam Duration: 4 Hours

  • Required Score: 450/800

Course Duration:
  6 Days | 24 Hours | 4 hours per day

CISM

Objectives:

By the end of the course, participants should be able to:

Evaluate IT Policies and Procedures: The certification prepares professionals to conduct audits on information systems and assess an organization's IT policies and procedures, ensuring they are aligned with business objectives and effective in managing and protecting data.

Verify Compliance with Regulatory Standards: CISA professionals are qualified to verify compliance with laws and regulatory standards. They help ensure that the organization follows the necessary standards to protect the integrity and security of information systems.

 

Identify IT Risks: They are trained to identify risks in IT use that may affect the organization's operation and survival, proposing measures to mitigate these risks.

 

Propose Improvements: CISA professionals can propose improvements after audits, helping organizations increase the efficiency of their control systems and IT operations, as well as strengthen IT governance mechanisms.

 

Audit IT Projects: Ability to audit ongoing or already implemented IT projects to ensure they are being carried out within the approved specifications, schedules, and budgets.

​​​The 5 CISA Domains:

 

Domain 1. Information Systems Auditing Process (21%) 

This domain focuses on the importance of adhering to recognized auditing standards and how information systems audits should be conducted. It covers aspects such as: 

• Audit planning: Identifying risks, audit objectives, resource allocation, and audit techniques. 

• Conducting the audit: Executing audits according to established plans, including data collection and analysis. 

• Communicating results: Preparing audit reports that effectively communicate findings and recommendations. 

• Monitoring and control: Evaluating management's actions in response to audit findings.

 

Domain 2. Governance and Management of IT (17%) 

This domain examines the IT governance structure, ensuring that IT practices support and align with the organization's strategic objectives. It includes: 

• IT strategies and policies: Evaluating the adequacy of IT policies and strategies to achieve organizational goals and manage IT risks effectively. 

• IT management practices: Assessing the effectiveness of management practices in supporting service delivery and managing IT resources. 

• IT governance auditing: Evaluating the adequacy and effectiveness of IT governance controls.

 

Domain 3. Information Systems Acquisition, Development, and Implementation (12%) 

This domain deals with auditing the phases of acquisition, development, and implementation of IT systems to ensure processes are controlled and meet business requirements. It includes: 

• IT project management: Auditing projects to ensure they are delivered within scope, schedule, and budget. 

• Systems testing: Assessing the adequacy and effectiveness of testing performed to ensure new systems and upgrades meet specified requirements. 

• Systems implementation: Evaluating implementation processes to ensure systems are implemented effectively and securely.

 

Domain 4. Information Systems Operations, Maintenance, and Support (23%) 

Focuses on evaluating IT operations and maintenance to ensure they are efficient and secure. It includes: 

• IT operations procedures: Assessing the efficiency and effectiveness of IT operational procedures. 

• Change management: Auditing change management processes to ensure that all changes are controlled. 

• IT service support: Evaluating the management of support processes to ensure IT services are delivered as agreed.

 

Domain 5. Protection of Information Assets (27%) 

This domain addresses the need to protect an organization's information assets from threats. It includes: 

• Security policies and procedures: Assessing the adequacy and effectiveness of security policies and procedures. 

• Security incident management: Evaluating incident management processes to ensure a rapid and effective response to security incidents. 

• Business continuity management: Evaluating business continuity plans to ensure the continuity and recovery of IT operations in the event of a disruption.

​​​Certification Process: 5 Steps:

​​​​

To obtain the CISA (Certified Information Systems Auditor) certification from ISACA, you must follow these essential steps:

 

  • 1. Pass the CISA Exam: The first critical step is passing the exam, which assesses knowledge in auditing, control, and information systems security.

  • 2. Agree to the Code of Professional Ethics: After passing the exam, you must agree to follow ISACA’s code of ethics, which guides the professional and personal conduct of certification holders.

  • 3. Comply with the Continuing Education Policy: You are required to complete a minimum of 20 hours of Continuing Professional Education (CPE) annually and a total of 120 hours over a three-year period to keep the certification up to date and ensure continued proficiency in the field.

  • 4. Professional Experience: You must submit proof of at least five years of work experience in information security, including at least three years in information security management across three or more practice areas. These areas include information security governance, information risk management, development and management of information security programs, and information security incident management. The work experience must be gained within five years after passing the exam.

  • 5. Work Experience Substitutions: ISACA allows some substitutions that may reduce the five-year work experience requirement, such as:  ​

    • Two years substituted if you hold another relevant certification, such as CISM (Certified Information Security Manager) or CISSP (Certified Information Systems Security Professional).

       

    • Two years substituted if you have a postgraduate degree in information security or a related field.

    • One year substituted for 12 months of experience in information systems management or general security management.

    • One year substituted for each skills-based security certification you hold.

CISA

Course Brochures (click the icon)

  • 21 Oct 2024, 17:00 – 28 Oct 2024, 20:00
    Online ZOOM
    ISACA ™️ CISA CERTIFIED INFORMATION SYSTEMS AUDITOR by SCORPIONSHIELD ATC ONLINE ZOOM New CBK Online Training Preparation Course for Exam 15,16,17,22,23,26 Julho 17h00-21h00
    Share

For more information:

Privacy Notice (GDPR):

Information will not be shared and used exclusively to communicate.

bottom of page