CISA Boot Camp Day 1
- Course Title: Information System Auditing Process
- Corresponds to: Domain 1 of the CISA exam – 21%
- Prerequisites: There is no prerequisite for this course
- Learning Level: Basic
- Instructional Method: Group Live
- CPE hours earned: 8
- Field of Study: Information Technology – Technical
Course Description
Computer security has, in turn, become much more important as organizations of all sizes utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information. Such use of computer security is essential in minimizing the risk of malicious attacks from individuals and groups.
To be effective in ensuring accountability, auditors must be able to evaluate information systems security and offer recommendations for reducing security risks to an acceptable level.
Information System Auditing is primarily an examination of the system controls within an IT architecture — which is the process of evaluating the suitability and validity of an organization’s IT configurations, practices and operations. Information System Auditing has been developed to allow an enterprise to achieve goals effectively and efficiently through assessing whether computer systems safeguard assets and maintain data integrity.
Auditors are concerned with four objectives: asset safeguards, data integrity, system effectiveness, system efficiency. One of the key issues of auditing is to identify whether errors and irregularities will cause material losses. Auditing might also assess whether the processes followed have contributed or are contributing to any ongoing losses. To assess these auditors need to collect evidence.
Audience
Objectives
- Understand the IS Audit Process
- Identify ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards
- Comprehend risk assessment concepts, tools and techniques in an audit context
- Identify control objectives and controls related to information systems
- Distinguish applicable laws and regulations which affect evidence collection
- Determine appropriate evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis) used to gather, protect and preserve audit evidence
- Explain different sampling methodologies related to audit processes.
- Address the examination requirements for Domain 1 of the CISA exam.
Request a Consultation Today
We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.
BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.