(314) 504-0530 info@bac-mail.com

CISA Boot Camp Day 1

  • Course Title: Information System Auditing Process
  • Corresponds to: Domain 1 of the CISA exam – 21%
  • Prerequisites: There is no prerequisite for this course
  • Learning Level: Basic
  • Instructional Method:  Group Live
  • CPE hours earned: 8
  • Field of Study: Information Technology – Technical

Back to Boot Camp Training Programs >

Course Description
The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. At the same time, however, they have created significant, unprecedented risks to enterprises public, private, and governmental.

Computer security has, in turn, become much more important as organizations of all sizes utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate disclosure of sensitive information. Such use of computer security is essential in minimizing the risk of malicious attacks from individuals and groups.

To be effective in ensuring accountability, auditors must be able to evaluate information systems security and offer recommendations for reducing security risks to an acceptable level.

Information System Auditing is primarily an examination of the system controls within an IT architecture — which is the process of evaluating the suitability and validity of an organization’s IT configurations, practices and operations. Information System Auditing has been developed to allow an enterprise to achieve goals effectively and efficiently through assessing whether computer systems safeguard assets and maintain data integrity.

Auditors are concerned with four objectives: asset safeguards, data integrity, system effectiveness, system efficiency. One of the key issues of auditing is to identify whether errors and irregularities will cause material losses. Auditing might also assess whether the processes followed have contributed or are contributing to any ongoing losses. To assess these auditors need to collect evidence.

Audience
This course would best meet the objectives of an individual preparing to sit for the CISA professional certification examination.  Additionally, non-exam candidates or individuals desiring to gain a deeper understanding of the IT Audit methodologies and process would also benefit from attending this course.
Objectives
After completing this course, participants will be able to:

  • Understand the IS Audit Process
  • Identify ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards
  • Comprehend risk assessment concepts, tools and techniques in an audit context
  • Identify control objectives and controls related to information systems
  • Distinguish applicable laws and regulations which affect evidence collection
  • Determine appropriate evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis) used to gather, protect and preserve audit evidence
  • Explain different sampling methodologies related to audit processes.
  • Address the examination requirements for Domain 1 of the CISA exam.

CISA Boot Camp

Need more information?

If you have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.

7 + 11 =

Request a Consultation Today

We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.

cybersecurity and infrastructure security angency

BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.