Certified Information Systems Auditor (CISA)

CISA Course (Certified Information Systems Auditor) is ranked among the top paying IT certifications in 2016. A product by ISACA, which carries an international standard of performance, it is the most in-demand certification opted by Cyber Security Professionals in order to advance their career in this domain.
The CISA certification validates a professional with proven ability to identify, assess, evaluate, monitor and control the enterprise systems. Considering the increasing risks and vulnerabilities in the digital era, it has become necessary to employ professionals with proven knowledge and skill set to audit and control business systems.

  • It enhances employment opportunities for the professionals.
  • This certification helps information systems auditors keep their skills current.
  • CISA certification demonstrates expertise on the ISACA products and technologies.
  • The CISA certification is helpful for professionals who require upgrading their credentials.
  • It enhances professional recognition and earning potential, as ISACA designations are globally accepted and recognized.

This  training program, specifically for those who want to appear for CISA 2019 examination in near future, provides an intense environment in which participants can acquire, thoroughly and properly, the skills and knowledge expected of a world-class information systems audit, control and security professional. This  course is structured to follow the CISA 2019 content areas and provide students with simulated examination practice. The course covers each of the core competencies and associated tasks and knowledge statements, thereby ensuring a detailed and thorough coverage of all areas that will be tested. In the process the course provides outstanding preparation for the CISA 2019 exam. The fundamental thrust of examination is on understanding the concepts, not on memorizing facts. As a result, the course will be presented in an interactive manner to ensure the underlying concepts are understood and examination questions can be analyzed properly to achieve the correct answer.

But whether or not you intend to immediately sit for the CISA 2019 exam, this course is a powerful way to equip yourself with the knowledge of the five core competencies that the define  the successful information systems auditor. 

What Will I Learn ?

  • Course Objectives

    This course has been independently commissioned with three objectives:

    1. To provide an in-depth understanding of the tasks and knowledge expected of a world class information systems auditor.

    2. To provide candidates with a clear understanding of the CISA 2019 examination and certification processes.

    3. To maximize your prospects at the CISA 2019 exam if you choose to sit it.

    What will you learn?

    The  course materials are based on the CISA® 2019 job practice as defined by ISACA . A job practice serves as the basis for the exam and the experience requirements to earn the certification. This job practice

    consists of task and knowledge statements, organized by domains. The latest job practice analysis performed by ISACA reflects the vital and evolving responsibilities of IT Auditors. This job practice is effective as of 25th May 2019.

Prerequisite Knowledge

Required prerequisites include completion of one of the following:
  • Submission of an application for CISA Certification
  • Compliance with the Information Systems Auditing Standards
  • Adherence to the Code of Professional Ethics
  • Adherence to the Continuing Professional Education Program
  • Meeting job requirements (minimum of five years of professional IS audit, control, assurance or security work experience is required for certification with some substitution and waivers)

Who can benefits ?

The CISA designation is for Information Systems Audit professionals who have 5 years of front-line experience with the audit of information systems such as

  •  Information Security Auditors
  • IT Administrators
  • Chief Information Security Officer
  •  Risk managers and compliance personnels
  • Executive and Operational Managers seeking an overall understanding of essential IT Audit management, risks and controls

Opportunity Scope

Mentor shall discuss on classroom.

Modules / Chapter

Domain 1: Information System Auditing Process (21%)

·        Planning

o   IS Audit Standards, Guidelines and Codes of Ethics

o   Business Processes

o   Types of Controls

o   Risk-based Audit Planning

o   Types of Audits and Assessments

·        Execution

o   Audit Project Management

o   Sampling Methodology

o   Audit Evidence Collection Techniques

o   Data Analytics

o   Reporting and Communication Techniques

o   Quality Assurance and Improvement of the Audit Process

Domain 2: Governance and Management of IT (17%)

·        IT Governance and IT Strategy

o   IT-related Frameworks

o   IT Standards, Policies and Procedures

o   Organizational Structure             

o   Enterprise Architecture

o   Enterprise Risk Management

o   Maturity Models

o   Laws, Regulations and Industry Standards Affecting the Organization

 ·        IT Management

o   IT Resource Management

o   IT Service Provider Acquisition and Management

o   IT Performance Monitoring and Reporting           

o   Quality Assurance and Quality Management of IT


Domain 3: Information Systems Acquisition, Development and Implementation (12%)

·        Information Systems Acquisition and Development

o   Project Governance and Management

o   Business Case and Feasibility Analysis

o   System Development Methodologies

o   Control Identification and Design

·        Information Systems Implementation o

o   Testing Methodologies

o   Configuration and Release Management

o   System Migration, Infrastructure Deployment and Data Conversion o Post-implementation Review


Domain 4:  IS Operations and Business Resilience (23%)

·        Information Systems Operations

o   Common Technology Components            

o   IT Asset Management

o   Job Scheduling and Production Process Automation

o   System Interfaces o End-user Computing

o   Data Governance

o   Systems Performance Management

o   Problem and Incident Management

o   Change, Configuration, Release and Patch Management

o   IT Service Level Management

o   Database Management

·        Business Resilience

o   Business Impact Analysis

o   System Resiliency

o   Data Backup, Storage and Restoration o

o   Business Continuity Plan

o   Disaster Recovery Plans


Domain 5: Information Asset Security and Control (27%)

·        Information Asset Security Frameworks, Standards and Guidelines

o   Privacy Principles

o   Physical Access and Environmental Controls

o   Identity and Access Management            

o   Network and End-point Security

o   Data Classification

o   Data Encryption and Encryption-related Techniques 

o   Public Key Infrastructure

o   Web-based Communication Technologies

o   Virtualized Environments

o   Mobile, Wireless and Internet-of-things Devices

 ·        Security Event Management

o   Security Awareness Training and Programs

o   Information System Attack Methods and Techniques

o   Security Testing Tools and Techniques

o   Security Monitoring Tools and Techniques

o   Incident Response Management

o   Evidence Collection and Forensics 

Enquiry Form

Required fields are marked (*).

(Max 350 words only)

Contact Information

  • Address

    Anamnagar - 32 Kathmandu, Nepal

  • Email


  • Phone

    +977-1-4102721, 4102722, 4244804

  • Opening Hours

    10 AM - 5 PM

Registration Form

Required fields are marked (*).

(Max 350 words only)

Contact Information

  • Address

    Anamnagar - 32 Kathmandu, Nepal

  • Email


  • Phone

    +977-1-4102721, 4102722, 4244804

  • Opening Hours

    10 AM - 5 PM


Sign Up for News and Offers

Subscribe for the latest news and great deals we offer