Certified Information Systems Auditor® (CISA®) ISACA Exam Voucher

Original price was: $ 1,250.00 USD.Current price is: $ 599.00 USD.

Included in Purchase: 

  • ISACA Certified Information Systems Auditor Exam voucher with a validity of 12 months

Availability: 7 in stock



   
Categories: , Tag:

What is covered on the CISA exam?
The Certified Information Systems Auditor® (CISA®) exam consists of 150 questions covering 5 job practice domains, all testing your knowledge and ability on real-life job practices leveraged by expert professionals.

  • Domain 1: Information System Auditing Process
  • Domain 2: Governance & Management of IT
  • Domain 3: Information Systems Acquisition, Development & Implementation
  • Domain 4: Information Systems Operations and Business Resilience
  • Domain 5: Protection of Information Assets

Secondary Classifications – Tasks

  • Plan an audit to determine whether information systems are protected, controlled, and provide value to the organization.
  • Conduct audits in accordance with IS audit standards and a risk based IS audit strategy.
  • Apply project management methodologies to the audit process.
  • Communicate and collect feedback on audit progress, findings, results, and recommendations with stakeholders.
  • Conduct post-audit follow up to evaluate whether identified risk has been sufficiently addressed.
  • Utilize data analytics tools to enhance audit processes.
  • Evaluate the role and/or impact of automatization and/or decision-making systems for an organization.
  • Evaluate audit processes as part of quality assurance and improvement programs.
  • Evaluate the IT strategy for alignment with the organization’s strategies and objectives.
  • Evaluate the effectiveness of IT governance structure and IT organizational structure.
  • Evaluate the organization’s management of IT policies and practices, including compliance with legal and regulatory requirements.
  • Evaluate IT resource and project management for alignment with the organization’s strategies and objectives.
  • Evaluate the organization’s enterprise risk management (ERM) program.
  • Determine whether the organization has defined ownership of IT risk, controls, and standards.
  • Evaluate the monitoring and reporting of IT key performance indicators (KPIs) and IT key risk indicators (KRIs).
  • Evaluate the organization’s ability to continue business operations.
  • Evaluate the organization’s storage, backup, and restoration policies and processes.
  • Evaluate whether the business cases related to information systems meet business objectives.
  • Evaluate whether IT vendor selection and contract management processes meet business, legal, and regulatory requirements.
  • Evaluate supply chains for IT risk factors and integrity issues.
  • Evaluate controls at all stages of the information systems development life cycle.
  • Evaluate the readiness of information systems for implementation and migration into production.
  • Conduct post-implementation reviews of systems to determine whether project deliverables, controls, and requirements are met.
  • Evaluate whether effective processes are in place to support end users.
  • Evaluate whether IT service management practices align with organizational requirements.
  • Conduct periodic review of information systems and enterprise architecture (EA) to determine alignment with organizational objectives.
  • Evaluate whether IT operations and maintenance practices support the organization’s objectives.
  • Evaluate the organization’s database management practices.
  • Evaluate the organization’s data governance program.
  • Evaluate the organization’s privacy program.
  • Evaluate data classification practices for alignment with the organization’s data governance program, privacy program, and applicable external requirements.
  • Evaluate the organization’s problem and incident management program.
  • Evaluate the organization’s change, configuration, release, and patch management programs.
  • Evaluate the organization’s log management program.
  • Evaluate the organization’s policies and practices related to asset life cycle management.
  • Evaluate risk associated with shadow IT and end-user computing (EUC) to determine effectiveness of compensating controls.
  • Evaluate the organization’s information security program.
  • Evaluate the organization’s threat and vulnerability management program.
  • Utilize technical security testing to identify potential vulnerabilities.
  • Evaluate logical, physical, and environmental controls to verify the confidentiality, integrity, and availability of information assets.
  • Evaluate the organization’s security awareness training program.
  • Provide guidance to the organization in order to improve the quality and control of information systems.
  • Evaluate potential opportunities and risks associated with emerging technologies, regulations, and industry practices.