Cisa

This query is : Resolved 

17 May 2013 I want to pursue CISA along with my CA FINAL.Is this course value-worthy? Whether my experience working in a ca firm as a STAFF counted for experience require for CISA.
Regards Ayan Kumar Ghosh

26 June 2013 CISA would help you, but do some course that takes your career to next level.

Consider doing SAP fico, preferably from some one who has hands on experience in SAP for several years.


26 June 2013 Thanks 4 ur reply. plz sir explain more


26 June 2013 Cisa can be done after u qualify as a ca as it will enable u to get bank audits if u choose to practice as a CA.sap fi has a huge market for jobs. But do it from renowned institute else it will not help u. Siemens is one of the best institute but the fees is very high

29 June 2013 WHAT IS THE EXPERIENCE REQUIRED FOR CISA CERTIFICATION? CAN ANY ONE APPEAR FOR CISA EXAM WITHOUT RELEVANT EXPERIENCE?

06 July 2013 When Indian CA are in high demand why you want to do this course is best known to you. Anyhow, this will be an added benefit if you decide to move from India. I am giving you full details and contact address with number which is available on Net. This I have picked up from Net and giving for the knowledge of all who are not aware what is CISA

Covering all five CISA domains:
The CISA training course is designed to mirror the examination and covers the same exam content. The current official ISACA material covers the following areas of Information Systems Audting:
The CISA examination runs a multiple-choice format and consists of a 4-hour long paper. The examination tests both a delegate’s knowledge of Information System audit principles and practices, as well as technical content areas.
The ISACA CISA exam covers one process and five content areas (domains) and those tasks that are routinely performed by a Certified Information Systems Auditor.
Click to expand full contents »
Domain 1: The Process of Auditing Information Systems
IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards
Risk assessment concepts, tools and techniques in an audit context
Control objectives and controls related to information systems
Audit planning and audit project management techniques, including follow-up
Fundamental business processes, including relevant IT
Applicable laws and regulations which affect the scope, evidence collection and preservation, and frequency of audits
Evidence collection techniques used to gather, protect and preserve audit evidence
Sampling methodologies
Reporting and communication techniques
Audit quality assurance systems and frameworks
Domain 2: Governance and Management of IT
IT governance, management, security and control frameworks, and related standards, guidelines, and practices
The purpose of IT strategy, policies, standards and procedures for an organisation and the essential elements of each
Organisational structure, roles and responsibilities related to IT
Processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures
Organisation’s technology direction and IT architecture and their implications for setting long-term strategic directions
Relevant laws, regulations and industry standards affecting the organisation
Quality management systems
Maturity models
Process optimization techniques
IT resource investment and allocation practices, including prioritization criteria
IT supplier selection, contract management, relationship management and performance monitoring processes including third party outsourcing relationships
Enterprise risk management
Monitoring and reporting of IT performance
IT human resources (personnel) management practices used to invoke the business continuity plan
Business impact analysis (BIA) related to business continuity planning
The standards and procedures for the development and maintenance of the business continuity plan and testing methods
Domain 3: Information Systems Acquisition, Development, and Implementation
Benefits realisation practices
Project governance mechanisms
Project management control frameworks, practices and tools
Risk management practices applied to projects
IT architecture related to data, applications and technology
Acquisition practices
Analysis and management practices
Project success criteria and risks
Control objectives and techniques that ensure the completeness, accuracy, validity and authorisation of transactions and data
System development methodologies and tools including their strengths and weaknesses
Testing methodologies and practices related to information systems development
Configuration and release management relating to the development of information systems
System migration and infrastructure deployment practices and data conversion tools, techniques and procedures.
Post-implementation review objectives and practices
Domain 4: Information Systems Operations, Maintenance and Support
Service level management practices and the components within a service level agreement
Techniques for monitoring third party compliance with the organisation’s internal controls
Operations and end-user procedures for managing scheduled and non-scheduled processes
Technology concepts related to hardware and network components, system software and database management systems
Control techniques that ensure the integrity of system interfaces
Software licensing and inventory practices
System resiliency tools and techniques
Database administration practices
Capacity planning and related monitoring tools and techniques
Systems performance monitoring processes, tools and techniques
Problem and incident management practices
Processes, for managing scheduled and non-scheduled changes to the production systems and/or infrastructure including change, configuration, release and patch management practices
Data backup, storage, maintenance, retention and restoration practices
Regulatory, legal, contractual and insurance issues related to disaster recovery
Business impact analysis (BIA) related to disaster recovery planning
Development and maintenance of disaster recovery plans
Alternate processing sites and methods used to monitor the contractual agreements
Processes used to invoke the disaster recovery plans
Disaster recovery testing methods
Domain: Protection of Information Assets
Techniques for the design, implementation, and monitoring of security controls, including security awareness programs
Processes related to monitoring and responding to security incidents
Logical access controls for the identification, authentication and restriction of users to authorised functions and data
Security controls related to hardware, system software, and database management systems.
Risks and controls associated with virtualization of systems
Configuration, implementation, operation and maintenance of network security controls
Network and Internet security devices, protocols, and techniques
Information system attack methods and techniques
Detection tools and control techniques
Security testing techniques
Risks and controls associated with data leakage
Encryption-related techniques
Public key infrastructure (PKI) components and digital signature techniques
Risks and controls associated with peer-to-peer computing, instant messaging, and web-based technologies
Controls and risks associated with the use of mobile & wireless devices
Voice communications security
Evidence preservation techniques and processes followed in forensics investigations
Data classification standards and supporting procedures
Physical access controls for the identification, authentication and restriction of users to authorized facilities
Environmental protection devices and supporting practices
Processes and procedures used to store, retrieve, transport and dispose of confidential information assets
Entry requirements
There are no formal entry requirements for this course.
What's included?
Our package includes lunch and refreshments as well as a full set of course slides.
A copy of the current CISA Review Manual is essential for any exam candidate. Unless you already have your own copy, you have the option to purchase at a specially reduced price the CISA Exam Passport as part of this course package. They are excellent materials that may assist you in your learning experience and quest for knowledge.
Although the course is non-residential, we offer help finding appropriate hotels, close to the training venue. To take advantage of this offer, drop us an e-mail after you book your course.
The CISA Exam
Please note: the exam is not taken during this training course. It needs to be booked & paid for directly with the ISACA exam board, please contact us for more details. There are strict booking dates for the exam, with an advance registration deadline date of approximately two months before each course start date.
Other information
Certificates of attendance are awarded to all delegates.
This course is also available to be delivered in-house, call or email us for further details.
Delegates travelling from outside the UK, Click here to find out the variety of ways we can help organise your trip.
How to book
There are three ways to book your course: online, via fax, or telephone:
By telephone: call us on 0845 070 1750
By fax: Send a completed booking form by fax to +44 (0) 1353 662667.
Online: Use the form above.
We can also accept purchase orders from local authorities, government departments, and other public sector organisations, and will consider account facilities for large corporate customers. Follow this link to our payment options page for more information.
All bookings are subject to our terms and conditions.

02 March 2016 Hi,
if you are still interested in CISA, please refer to my experience with CISA certification. It may help you to clear in first attempt

http://datainfosec.blogspot.in/2016/02/cisa-certification-approach-for-success.html



You need to be the querist or approved CAclub expert to take part in this query .
Click here to login now

Join CCI Pro
CAclubindia's WhatsApp Groups Link


Similar Resolved Queries


loading


Unanswered Queries