Tue, Dec 11, 2018
  • Chartered Financial Analyst (CFA) Program
  • Study CISA @ 3VLC
  • Join CISA Classes for June

    Join our next class for CISA commencing on June 2nd 2018.

  • Study CISA @ 3VLC

    Become a certified Information System Auditor

    Study @ 3VLC

  • Study CFA @ 3VLC

Contact Us

3V Learning Centre
Princess Plaza, Block 4, Unit 7,
2, Araromi Street, Off Moloney street,
Behind Access Bank, Obalende,
Lagos Island, Lagos, Nigeria.

Training Centre: 5, Adefolu Drive,
off Bamishile Street, off Allen Avenue,
by PEP Store (Mama Cass B/stop), Ikeja, Lagos.

Phone:
+2348023306865 +2348080016941
+2348051649248,+2348099614641
+2348132569664, +2348079074882

Get Support

image Skype: vlearningcentre
image BBM PIN:
5C43286C
5C3D6F14

+2348023306865
+2348099614641
+2348080016941
+2348132569664

 

Our Opening Hours

Open Monday - Friday at Obalende & 
Monday - Sunday @ Allen Avenue, Ikeja.

Monday
08:30 - 17:30
Tuesday
08:30 - 17:30
Wednesday
08:30 - 17:30
Thursday
08:30 - 17:30
Friday
08:30 - 17:30
Saturday
08:00 - 18:00
Sunday
08:00 - 18:00

The Certified Information Systems Auditor (CISA) Exam Overview

imageIs your organization's critical information protected? ...Really? Without comprehensive security plans, policies, and procedures, your organization's information security could be missing something. And that's all it takes for the worst to happen. As a Certified Information Systems Auditor (CISA), you'll perform a business-critical function -- assess your organization's IT and business systems to ensure they are monitored, controlled, and protected. These are valuable skills... and CISA is a valuable certification. There is rapidly growing demand for skilled CISAs. CISA is on the level of CISSP and CCIE in prestige and in the way it distinguishes you from your peers. It's globally recognized within the IT industry and beyond. It's used by the US Department of Defense and others as a minimum requirement for many high-end security positions. And studies have found that just having the CISA credential can increase your salary.

Course Descriptions:

 

CISA Exam Syllabus: The 5 Domains

  • Domain 1: The process of auditing information systems
  • Domain 2: Governance and management of IT
  • Domain 3: Information systems acquisition, development, and implementation
  • Domain 4: Information systems operations, maintenance and support
  • Domain 5: Protection of information assets

1. The Process of Auditing Information Systems

The first domain covers how IT auditors provide services in accordance with IT audit standards, in order to assist the organization in protecting and controlling information systems.

The tasks include developing and implementing a risk-based IT audit strategy, planning and conducting the audit, and reporting findings.

Candidates are expected to know the ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards.

2. Governance and Management of IT

The second domain covers how IT auditors provide assurance that necessary organization structure and processes are in place.

For example, they need to evaluate the effectiveness of the IT governance structure, organizational structure, HR management, and policies and standards, in order to determine whether they support the organization’s strategies and objectives.

3. IS Acquisition, Development, and Implementation

The third domain covers how IT auditors provide assurance that the practices for the acquisition, development, testing, and implementation of IS meet the organization’s strategies and objectives.

Tasks include evaluating proposed investments in IS acquisition, development, maintenance and subsequent retirement, evaluating project management practices and controls and conducting reviews.

4. IS Operations, Maintenance and Support

Provide assurance that the processes for information systems operations, maintenance and support meet the organization’s strategies and objectives.

Specifically, it includes conducting periodic reviews of IS, and evaluation such as service level management practices, operations and end-user procedures, and process of information systems maintenance.

5. Protection of Information Assets

The last domain covers how IT auditors provide assurance that the organization’s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.

This includes evaluating the information security policies, standards and procedures; the design, implementation and monitoring of various controls, such as system and logical security controls, data classification processes, and physical access and environmental controls.

 

Testimonials

Find us on Facebook

Newsletter Subscription

captcha 

Find us on Facebook

Visit this page on Mobile
Qr Code

Request a Phone Call

Have an Enquiry or Question?

Do you have an enquiry you would like to make, enter your name and phone number and we will call you back.