17 May 2013
I want to pursue CISA along with my CA FINAL.Is this course value-worthy? Whether my experience working in a ca firm as a STAFF counted for experience require for CISA. Regards Ayan Kumar Ghosh
26 June 2013
Cisa can be done after u qualify as a ca as it will enable u to get bank audits if u choose to practice as a CA.sap fi has a huge market for jobs. But do it from renowned institute else it will not help u. Siemens is one of the best institute but the fees is very high
06 July 2013
When Indian CA are in high demand why you want to do this course is best known to you. Anyhow, this will be an added benefit if you decide to move from India. I am giving you full details and contact address with number which is available on Net. This I have picked up from Net and giving for the knowledge of all who are not aware what is CISA
Covering all five CISA domains: The CISA training course is designed to mirror the examination and covers the same exam content. The current official ISACA material covers the following areas of Information Systems Audting: The CISA examination runs a multiple-choice format and consists of a 4-hour long paper. The examination tests both a delegate’s knowledge of Information System audit principles and practices, as well as technical content areas. The ISACA CISA exam covers one process and five content areas (domains) and those tasks that are routinely performed by a Certified Information Systems Auditor. Click to expand full contents » Domain 1: The Process of Auditing Information Systems IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards Risk assessment concepts, tools and techniques in an audit context Control objectives and controls related to information systems Audit planning and audit project management techniques, including follow-up Fundamental business processes, including relevant IT Applicable laws and regulations which affect the scope, evidence collection and preservation, and frequency of audits Evidence collection techniques used to gather, protect and preserve audit evidence Sampling methodologies Reporting and communication techniques Audit quality assurance systems and frameworks Domain 2: Governance and Management of IT IT governance, management, security and control frameworks, and related standards, guidelines, and practices The purpose of IT strategy, policies, standards and procedures for an organisation and the essential elements of each Organisational structure, roles and responsibilities related to IT Processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures Organisation’s technology direction and IT architecture and their implications for setting long-term strategic directions Relevant laws, regulations and industry standards affecting the organisation Quality management systems Maturity models Process optimization techniques IT resource investment and allocation practices, including prioritization criteria IT supplier selection, contract management, relationship management and performance monitoring processes including third party outsourcing relationships Enterprise risk management Monitoring and reporting of IT performance IT human resources (personnel) management practices used to invoke the business continuity plan Business impact analysis (BIA) related to business continuity planning The standards and procedures for the development and maintenance of the business continuity plan and testing methods Domain 3: Information Systems Acquisition, Development, and Implementation Benefits realisation practices Project governance mechanisms Project management control frameworks, practices and tools Risk management practices applied to projects IT architecture related to data, applications and technology Acquisition practices Analysis and management practices Project success criteria and risks Control objectives and techniques that ensure the completeness, accuracy, validity and authorisation of transactions and data System development methodologies and tools including their strengths and weaknesses Testing methodologies and practices related to information systems development Configuration and release management relating to the development of information systems System migration and infrastructure deployment practices and data conversion tools, techniques and procedures. Post-implementation review objectives and practices Domain 4: Information Systems Operations, Maintenance and Support Service level management practices and the components within a service level agreement Techniques for monitoring third party compliance with the organisation’s internal controls Operations and end-user procedures for managing scheduled and non-scheduled processes Technology concepts related to hardware and network components, system software and database management systems Control techniques that ensure the integrity of system interfaces Software licensing and inventory practices System resiliency tools and techniques Database administration practices Capacity planning and related monitoring tools and techniques Systems performance monitoring processes, tools and techniques Problem and incident management practices Processes, for managing scheduled and non-scheduled changes to the production systems and/or infrastructure including change, configuration, release and patch management practices Data backup, storage, maintenance, retention and restoration practices Regulatory, legal, contractual and insurance issues related to disaster recovery Business impact analysis (BIA) related to disaster recovery planning Development and maintenance of disaster recovery plans Alternate processing sites and methods used to monitor the contractual agreements Processes used to invoke the disaster recovery plans Disaster recovery testing methods Domain: Protection of Information Assets Techniques for the design, implementation, and monitoring of security controls, including security awareness programs Processes related to monitoring and responding to security incidents Logical access controls for the identification, authentication and restriction of users to authorised functions and data Security controls related to hardware, system software, and database management systems. Risks and controls associated with virtualization of systems Configuration, implementation, operation and maintenance of network security controls Network and Internet security devices, protocols, and techniques Information system attack methods and techniques Detection tools and control techniques Security testing techniques Risks and controls associated with data leakage Encryption-related techniques Public key infrastructure (PKI) components and digital signature techniques Risks and controls associated with peer-to-peer computing, instant messaging, and web-based technologies Controls and risks associated with the use of mobile & wireless devices Voice communications security Evidence preservation techniques and processes followed in forensics investigations Data classification standards and supporting procedures Physical access controls for the identification, authentication and restriction of users to authorized facilities Environmental protection devices and supporting practices Processes and procedures used to store, retrieve, transport and dispose of confidential information assets Entry requirements There are no formal entry requirements for this course. What's included? Our package includes lunch and refreshments as well as a full set of course slides. A copy of the current CISA Review Manual is essential for any exam candidate. Unless you already have your own copy, you have the option to purchase at a specially reduced price the CISA Exam Passport as part of this course package. They are excellent materials that may assist you in your learning experience and quest for knowledge. Although the course is non-residential, we offer help finding appropriate hotels, close to the training venue. To take advantage of this offer, drop us an e-mail after you book your course. The CISA Exam Please note: the exam is not taken during this training course. It needs to be booked & paid for directly with the ISACA exam board, please contact us for more details. There are strict booking dates for the exam, with an advance registration deadline date of approximately two months before each course start date. Other information Certificates of attendance are awarded to all delegates. This course is also available to be delivered in-house, call or email us for further details. Delegates travelling from outside the UK, Click here to find out the variety of ways we can help organise your trip. How to book There are three ways to book your course: online, via fax, or telephone: By telephone: call us on 0845 070 1750 By fax: Send a completed booking form by fax to +44 (0) 1353 662667. Online: Use the form above. We can also accept purchase orders from local authorities, government departments, and other public sector organisations, and will consider account facilities for large corporate customers. Follow this link to our payment options page for more information. All bookings are subject to our terms and conditions.
02 March 2016
Hi, if you are still interested in CISA, please refer to my experience with CISA certification. It may help you to clear in first attempt