নির্বাচিত পোস্ট | লগইন | রেজিস্ট্রেশন করুন | রিফ্রেস

কি আর বলব ভাই , কিছুই বলার নাই..................!!!!!!!!!!!!

কি আর বলব ভাই , কিছুই বলার নাই..................!!!!!!!!!!!!

পাওয়ার

আমি কইলাম সবই জানি , কইয়া দিমু কিন্তু ................!!!!!!!!!!!!!!!!!!!!!!!!!

পাওয়ার › বিস্তারিত পোস্টঃ

(CISA) Certified Information Systems Auditor

১৬ ই মার্চ, ২০১৩ রাত ৯:১৮

What is CISA?

Certified Information Systems Auditor (CISA) with vast experience in IT, IT Audit and Consulting provides insights on CISA. CISA is the top audit professional certification sponsored by the Information Systems Audit and Control Association (ISACA). In a world dependent on IT the value of IT security expertise is obvious.

Course Description:

CISA stands for Certified Information Systems Auditor. To earn CISA certification, you must have at least five years of experience in information system control, IT auditing or information technology system control. You must agree to the ISACA, or Information Systems Audit and Control Association, code of ethics and submit an application to take the CISA exam. If the application is approved, you must pass the CISA exam. After passing the exam, you must maintain their certification. Maintaining the CISA certification is crucial for those who rely on those credentials to be qualified to work in IT auditing.

Who Should Attend?

The CISA designation is for Information Systems Audit professionals who have 5 years of front-line experience with the audit of information systems.

Benefits of Attendance:

• Confirms your knowledge and experience

• Quantifies and markets your expertise

• Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise

• Is globally recognized as the mark of excellence for the IS audit professional

• Combines the achievement of passing a comprehensive exam with recognition of work and educational experience, providing you with credibility in the marketplace.

• Increases your value to your organization

• Gives you a competitive advantage over peers when seeking job growth

• Helps you achieve a high professional standard through ISACA’s requirements for continuing education and ethical conduct



Prerequisites:

There are two stages in CISA, clearing the exam and getting certified to have a tag of Certified Systems auditor. There are no prerequisites for clearing CISA after which you will be qualified. For getting a certification you need to have work experience. You can download the form for certification application which will give your idea of areas where you can have experience to be certified.

CompTIA Network+ Certification (2011 Objectives)

CompTIA Security+ Certification (2011 Objectives)



CISA Certified Information Systems Auditor - Course Content

Lesson 1: The Process of Auditing Information Systems

ISACA Information Systems Auditing Standards and Guidelines

Fundamental Business Processes

Develop and Implement an Information Systems Audit Strategy

Plan an Audit

Conduct an Audit

The Evidence Life Cycle

Communicate Issues, Risks, and Audit Results

Support the Implementation of Risk Management and Control Practices

Lesson 2: IT Governance and Management

Evaluate the Effectiveness of IT Governance

Evaluate the IT Organizational Structure and HR Management

Evaluate the IT Strategy and Direction

Evaluate IT Policies, Standards, and Procedures

Evaluate the Effectiveness of Quality Management Systems

Evaluate IT Management and Monitoring of Controls

IT Resource Investment, Use, and Allocation Practices

Evaluate IT Contracting Strategies and Policies

Evaluate Risk Management Practices

Performance Monitoring and Assurance Practices

Evaluate the Organizations Business Continuity Plan

Lesson 3: Information Systems Acquisition, Development, and Implementation

Evaluate the Business Case for Change

Evaluate Project Management Frameworks and Governance Practices

Development Life Cycle Management

Perform Periodic Project Reviews

Evaluate Control Mechanisms for Systems

Evaluate Development and Testing Processes

Evaluate Implementation Readiness

Evaluate a System Migration

Perform a Post-Implementation System Review

Lesson 4: Information Systems Operations, Maintenance, and Support

Perform Periodic System Reviews

Evaluate Service Level Management Practices

Evaluate Third-Party Management Practices

Evaluate Operations and End User Management Practices

Evaluate the Maintenance Process

Evaluate Data Administration Practices

Evaluate the Use of Capacity and Performance Monitoring Methods

Evaluate Change, Configuration, and Release Management Practices

Evaluate Problem and Incident Management Practices

Evaluate the Adequacy of Backup and Restore Provisions

Lesson 5: Protection of Information Assets

Information Security Design

Encryption Basics

Evaluate the Functionality of the IT Infrastructure

Evaluate Network Infrastructure Security

Evaluate the Design, Implementation, and Monitoring of Logical Access Controls

Risks and Controls of Virtualization

Evaluate the Design, Implementation, and Monitoring of Data Classification Process

Evaluate the Design, Implementation, and Monitoring of Physical Access Controls

Evaluate the Design, Implementation, and Monitoring of Environmental Controls



For admission and further queries please contact

K Md. Shafiul Alam Jony,

Sr. Account Executive

Cell: 01717875119

E-mail: [email protected]

New Horizons CLC of Dhaka.

House –7, Momtaz Plaza (3rd Floor), Road – 4, Dhanmondi.

মন্তব্য ০ টি রেটিং +০/-০

মন্তব্য (০) মন্তব্য লিখুন

আপনার মন্তব্য লিখুনঃ

মন্তব্য করতে লগ ইন করুন

আলোচিত ব্লগ


full version

©somewhere in net ltd.