Certified Information Systems Auditor

CISA Course Introduction

This 5-days intensive course is designed for a professional preparing for the ISACA's CISA exam to gain more confidence. This course will wrap-up only key concept and vital knowledge of each domain. It is recommended that attendee should have hands-on experiences or familiar with information systems audit job before attend this course. Valuable technique for the exam will be shared by the exam passer.

CISA Course Objectives

  • To prepare for the ISACA's CISA examination
  • To summarize vital knowledge based on the latest exam domain
  • To learn some techniques from the experienced exam passer

Target Group

  • IT Auditor

Course Outline of CISA

Day 1
    – IS Audit Standards, Guidelines, and Codes of Ethics
    – Business Processes
    – Types of Controls
    – Risk-Based Audit Planning
    – Types of Audits and Assessments
    – Audit Project Management
    – Sampling Methodology
    – Audit Evidence Collection Techniques
    – Data Analytics
    – Reporting and Communication Techniques

Day 2
    – IT Governance and IT Strategy
    – IT-Related Frameworks
    – IT Standards, Policies, and Procedures
    – Organizational Structure
    – Enterprise Architecture
    – Maturity Models
    – Laws, Regulations, and Industry Standards affecting the Organization
    – IT Resource Management
    – IT Service Provider Acquisition and Management
    – IT Performance Monitoring and Reporting
    – Quality Assurance and Quality Management of IT

Day 3
    – Benefits Realization
    – Project Management Structure
    – Project Management Practices
    – Business Application Development
    – Virtualization and Cloud Computing Environments
    – Business Application Systems
    – Development Methods
    – Infrastructure Development/Acquisition Practices
    – Information Systems Maintenance Practices
    – System Development Tools and Productivity Aids
    – Process Improvement Practices
    – Application Controls
    – Information Systems Operations
    – IT Asset Management
    – Information Systems Hardware
    – IS Architecture and Software
    – IS Network Infrastructure
    – Disaster Recovery Planning
    – Project Governance and Management
    – Business Case and Feasibility Analysis
    – System Development Methodologies
    – Control Identification and Design
    – Testing Methodologies
    – Configuration and Release Management
    – System Migration, Infrastructure Deployment, and Data Conversion
    – Post-implementation Review

Day 4
    – Common Technology Components
    – IT Asset Management
    – Job Scheduling and Production Process Automation
    – System Interfaces
    – End-user Computing
    – Data Governance
    – Systems Performance Management
    – Problem and Incident Management
    – Change, Configuration, Release, and Patch Management
    – IT Service Level Management
    – Database Management
    – Business Impact Analysis (BIA)
    – System Resiliency
    – Data Backup, Storage, and Restoration
    – Business Continuity Plan (BCP)
    – Disaster Recovery Plans (DRP)

Day 5
    – Information Asset Security Frameworks, Standards, and Guidelines
    – Privacy Principles
    – Physical Access and Environmental Controls
    – Identity and Access Management
    – Network and End-Point Security
    – Data Classification
    – Data Encryption and Encryption-Related Techniques
    – Public Key Infrastructure (PKI)
    – Web-Based Communication Techniques
    – Virtualized Environments
    – Mobile, Wireless, and Internet-of-Things (IoT) Devices
    – Security Awareness Training and Programs
    – Information System Attack Methods and Techniques
    – Security Testing Tools and Techniques
    – Security Monitoring Tools and Techniques
    – Incident Response Management
    – Evidence Collection and Forensics

15-18 November 2022

Course Level



4 Days

Tuition Fee

32,000.00 THB


ACIS Certified Professional Instructor

Our website uses both essential and non-essential cookies to analyze use of our products and services. This agreement applies to non-essential cookies only. By accepting, you are agreeing to third parties receiving information about your usage and activities. If you choose to decline this agreement, we will continue to use essential cookies for the operation of the website. View Policy