Online And On-Site Computer Training Across The USA. CISSP CASP Security+ A+ MCDBA MCST MCSE CCNA CCNP CCVP CCSP PMP ITIL Web Design Certification Courses

Certified Information Systems Auditor (CISA) Training Online for Home or Office Study

Have you told someone about RTEK 2000 today?

Certified Information Systems Auditor (CISA)
Product ID: RTK-CISA

Certified Information Systems Auditor (CISA)

best video training"...It's nice to seat in my favorite chair at home and learn. I have enjoyed the training and will be back for other courses. ...The combination of price, convenience and the quality of teaching - this is what I am usually looking for."
Stanley Burkov

The Best Alternative to CISA In-Class Training:

CISA Training Video
  • Repeat as many times as you want;

  • Full Audio, Video, and Demonstration components;

  • Interactive Hands-on-lab Simulations;

  • Learn at your place

  • Access the course with any mobile device

  • Schedule at your own pace and time!

Shortcuts to:

  Save hundred of dollars with RTEK 2000!
Order Now! for only USD$435.00!
Retail Price $495.00
for 12-month online access

Since 1978, the Certified Information Systems Auditor (CISA) program, sponsored by the Information Systems Audit and Control Association (ISACA®), has been the globally accepted standard among information systems (IS) audit, control, and security professionals.

This course will highlight the technical skills and practices needed to successfully challenge the CISA examination. The CISA is a preferred certification by organizations around the world and signifies a professional commitment to serving an organization and the IS audit, control, and security industry.

Our CISA Certified Information Systems Auditor course provides the student with the knowledge and proficiency to prepare for the globally recognized CISA certification exam.
Our CISA Certified Information Systems Auditor course provides the student with the knowledge and proficiency to prepare for the globally recognized CISA certification exam. This course will immerse the student into the subject, with in-depth coverage of the information covering the five domains that make up the "Body of Knowledge" for the CISA exam and will provide the student the tools to build their technical skills to develop, manage, and perform IT security audits.

Package Includes:

  • 12 Months Online On-Demand Access
  • Featuring live instructor-led classroom sessions with full audio, video and demonstration components
  • Printable Courseware
  • Accessible with any mobile device
  • Free 1 Year Upgrade Policy

The Expert Trainers:
K. Mayer Kenneth Mayer - Certified CEH Trainer (CCSI, MCT, CCNP, CCDA)

Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high Chapter consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.

CISA Online (On-Demand) Course Outline

Module 01 - The Process of Auditing Information Systems
Lesson 1: Management of the Audit Function
Organization of the IS Audit Function
IS Audit Resource Management
Audit Planning
Effect of Laws and Regulations on IS Audit Planning
Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines
ISACA IT Audit And Assurance Standards And Guidelines
ISACA IT Audit And Assurance Standards Framework
Auditing Standards
Audit Guidelines
Audit and Assurance Tools and Techniques
Relationship Among Standards, Guidelines, and Tools and Techniques
Information Technology Assurance Framework
Information Technology Assurance Framework Components
ITAF General Standards (Section 2200)
ITAF Performance Standards (Section 2400)
Reporting Standards (Section 2600)
IT Assurance Guidelines (Section 3000)
Lesson 3: Risk Analysis
Risk Analysis
Lesson 4: Internal Controls
Internal Control Objectives
IS Control Objectives
General Controls
IS Controls
Lesson 5: Performing An IS Audit
Performing an IS Audit
Classification of Audits
Audit Programs
Audit Methodology
Fraud Detection
Risk-Based Auditing
Audit Risk and Materiality
Risk Assessment and Treatment
Risk Assessment Techniques
Audit Objectives
Compliance Versus Substantive Testing
Interviewing and Observing Personnel in the Performance Of Their Duties
Using The Services Of Other Auditors And Experts
Computer-Assisted Audit Techniques (CAAT)
Evaluation Of Audit Strengths And Weaknesses
Communicating Audit Results
Management Implementation Of Recommendations
Audit Documentation
Lesson 6: Control Self-Assessment
Objectives of CSA
Benefits of CSA
Disadvantages of CSA
Auditor Role in CSA
Technology Drivers for CSA
Traditional Versus CSA Approach
Lesson 7: The Evolving IS Audit Process
Automated Work Papers
Integrated Auditing
Continuous Auditing Module 01 Review

Module 02 - Governance and Management of IT
Lesson 1: Corporate Governance
Corporate Governance
Lesson 2: IT Governance
IT Governance
Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
IT Monitoring and Assurance Practices for Board and Senior Management
Best Practices for IT Governance
IT Governance Frameworks
Audit Role in IT Governance
IT Strategy Committee
IT Balanced Scorecard
Information Security Governance
Importance of Information Security Governance
Outcomes of Security Governance
Effective Information Security Governance
Roles and Responsibilities of Senior Management and Board of Directors
Enterprise Architecture
Lesson 4: Information Systems Strategy
Strategic Planning
Steering Committee
Lesson 5: Maturity and Process Improvement Models
Maturity and Process Improvement Models
Lesson 6: IT Investment and Allocation Practices
IT Investment and Allocation Practices
Implement IT Portfolio Management
IT Portfolio Management Versus Balanced Scorecard
Lesson 7: Policies and Procedures
Information Security Policy
Lesson 8: Risk Management
Risk Management
Developing a Risk Management Program
Risk Management Process
Risk Analysis Methods
Lesson 9: IS Management Practices
Human Resource Management
Organizational Change Management
Financial Management Practices
Quality Management
Information Security Management
Performance Optimization
Lesson 10: IS Organizational Structure and Responsibilities
IS Roles and Responsibilities
Segregation of Duties
Segregation of Duties Controls
Compensating Controls for Lack of Segregation
Lesson 11: Auditing IT Governance Structure and Implementation
Reviewing Documentation
Reviewing Contractual Commitments
Lesson 12: Business Continuity Planning
IS Business Continuity Planning
Disasters and Other Disruptive Events
Business Continuity Planning Process
Business Continuity Policy
Business Impact Analysis
Classification of Operations and Criticality Analysis
Development of Business Continuity Plans
Other Issues and Plan Development
Components of a BCP
BCP Testing
BCP Maintenance
Summary of BCP

Module 03 - Information Systems Acquisition, Development and Implementation
Lesson 1: Business Realization
Portfolio/Program Management
Business Case Development and Approval
Benefits Realization Techniques
Lesson 2: Project Management Structure
Project Context and Environment
Project Organizational Forms
Project Communication and Culture
Project Objectives
Roles and Responsibilities of Groups and Individuals
Lesson 3: Project Management Practices
Initiation of a Project
Project Planning
Example of Project Management for New Software
Software Size Estimation
Lines of Source Code
Function Point Analysis (FPA)
Function Points
Cost Budgets
Software Cost Estimation
Scheduling and Establishing the Timeframe
Critical Path Methodology
Gantt Charts
Program Evaluation Review Technique (PERT)
Time Box Management
General Project Management
Project Controlling
Management of Resource Usage
Management of Risk
Closing a Project
Lesson 4: Business Application Development
Traditional SDLC Approach
SDLC Phases
Integrated Resource Management Systems
Description of SDLC Phases
Risks Associated with Software Development
Lesson 5: Business Application Systems
Electronic Commerce
E-Commerce Models
E-Commerce Architectures
E-Commerce Risks
E-Commerce Requirements
E-Commerce Audit and Control Issues or Best Practices
Components of PKI
Electronic Data Interchange
General Requirements of EDI
Traditional EDI
Web Based EDI
EDI Risks and Controls
Controls in EDI Environment
E-Mail Security Issues
Standards for E-Mail Security
Point-Of-Sale Systems (POS)
Electronic Banking
Risk Management Challenges in E-Banking
Risk Management Controls for E-Banking
Electronic Finance
Payment Systems
Electronic Money Model
Electronic Checks Model
Electronic Transfer Model
Electronic Funds Transfer
Controls in an EFT Environment
Automated Teller Machines
Image Processing
Business Intelligence
Decision Support System (DSS)
DSS Frameworks
Customer Relation Management (CRM)
Supply Chain Management (SCM)
Lesson 6: Alternative Forms of Software Project Organization
Agile Development
Rapid Application Development (RAD)
Lesson 7: Alternative Development Methods
Data Oriented System Development
Object Oriented System Development
Component-Based Development
Web-Based Application Development
Software Reengineering
Reverse Engineering
Lesson 8: Infrastructure Development/Acquisition Practices
Project Phases of Physical Architecture Analysis
Planning Implementation of Infrastructure
Critical Success Factors
Hardware Acquisition
Acquisition Steps
System Software Acquisition
System Software Implementation
System Software Change Control Procedures
Lesson 9: Information Systems Maintenance Practices
Change Management Process Overview
Deploying Changes
Testing Changed Programs
Auditing Program Changes
Emergency Changes
Change Exposures (Unauthorized Changes)
Configuration Management
Lesson 10: System Development Tools And Productivity Aids
Code Generators
Computer Aided Software Engineering
Fourth-Generation Languages (4GL)
Lesson 11: Business Process Reengineering And Process Change Projects
Business Process Reengineering And Process Change Projects Continued
Benchmarking Process
The Benchmarking Process
ISO 9126
Software Capability Maturity Model
ISO 15504
Lesson 12: Application Controls
Inputs Controls
Processing Procedures And Controls
Processing Controls
Data File Control Procedures
Output Controls
Business Process Control Assurance
Lesson 13: Auditing Application Controls
Risk Assessment Model To Analyze Application Controls
Observing And Testing User Performing Procedures
Data Integrity Testing
Example Of Referential And Relational Integrity
Data Integrity In Online Transaction Processing Systems
Test Application Systems
Continuous Online Auditing
Online Auditing Techniques
Lesson 14: Auditing Systems Development, Acquisition And Maintenance
Project Management
Feasibility Study
Requirements Definition
Software Acquisition Process
Detailed Design And Development
Implementation Phase
Post Implementation Review
System Change Procedures And The Program Migration Process

Module 04 - Information Systems Operations, Maintenance and Support
Lesson 1: Information Systems Operations
Management of IS Operations
Service Management
Service Level
Infrastructure Operations
Monitoring Use of Resources
Process of Incident Handling
Problem Management
Detection, Documentation, Control, Resolution and Reporting of Abnormal Conditions
Change Management Process
Release Management
Information Security Management
Media Sanitization
Lesson 2: Information Systems Hardware
Computer Hardware Components and Architecture
Common Enterprise Backend Devices
Specialized Devices
Security Control
Radiofrequency Identification
RFID Applications
RFID Risks
RFID Security Control
Hardware Maintenance Program
Hardware Monitoring Procedures
Capacity Management
Lesson 3: IS Architecture and Software
Operating Systems
Software Integrity Issues
Activity Logging and Reporting Options
Data Communication Software
Data Management
File Organization
Database Management Systems
Example of Data in DBMS
DBMS Architecture
DBMS Metadata Architecture
Database Structure
Relational Database
Database Models
Relational Database Model
Database Controls
Tape and Disk Management Systems
Utility Programs
Software Licensing Issues
Digital Rights Management
Lesson 4: Network Infrastructure
Enterprise Network Architecture
Types of Networks
Network Services
Network Standards and Protocols
OSI Architecture
OSI Layers
Application of the OSI Model in Network Architectures
Local Area Network
Network Physical Media Specifications
Implementation of WANs
LAN Media Access Technologies
LAN Components
OSI Layer Diagram
LAN Technology Selection Criteria
Wide Area Networks
WAN Message Transmission Techniques
WAN Devices
WAN Technologies
Wireless Networks
Wireless Wide Area Networks
Wireless Local Area Networks
Wireless Security
Wireless Application Protocol
Risks of Wireless Communications
World Wide Web Services
General Internet Terminology
Network Administration and Control
Network Performance Metrics
Network Management Issues
Network Management Tools
Client/Server Technology
Lesson 5: Disaster Recovery Planning
Recovery Point Objective and Recovery Time Objective
Recovery Strategies
Application Disaster Recovery Methods
Data Storage Disaster Recovery Methods
Telecommunication Networks Disaster Recovery Methods
Methods for Network Protection
Development of Disaster Recovery Plans
Organization and Assignment Of Responsibilities
Backup and Restoration
Off-Site Library Controls
Types of Backup Devices and Media
Periodic Backup Procedures
Frequency of Rotation
Backup Schemes

Module 05 - Protection of Information Assets
Lesson 1: Importance Of Information Security
Key Elements of Information Security Management
Information Security Management Roles and Responsibilities
Inventory and Classification of Information Assets
System Access Permission
Mandatory and Discretionary Access Controls
Privacy Management Issue and the Role of IS Auditors
Critical Success Factors to Information Security Management
Information Security and External Parties
Identification of Risks Related to External Parties
Addressing Security When Dealing with Customers
Addressing Security and Third-Party Agreements
Human Resources Security and Third Parties
Computer Crime Issues and Exposures
Types of Computer Crimes
Peer to Peer, Instant Messaging, Data Leakage and Web-Based Technologies
Security Incident Handling and Response
Lesson 2: Logical Access
Logical Access Exposures
Familiarization with the Enterprise IT Environment
Paths of Logical Access
General Points of Entry
Logical Access Control Software
Identification and Authentication
Features of Passwords
Identification and Authentication Best Practices
Token Devices, One-Time Passwords
Management of Biometrics
Single Sign-On
Authorization Issues
Access Control Lists
Logical Access Security Administration
Remote Access Security
Common Connectivity Methods
Remote Access Using PDAs
Access Issues with Mobile Technology
Access Rights to System Logs
Tools for Audit Trail Analysis
Use of Intrusion Detection
Storing, Retrieving, Transporting and Disposing of Confidential Information
Lesson 3: Network Infrastructure Security
LAN Security
Client/Server Security
Wireless Security Threats and Risks Mitigation
Internet Threats and Security
Network Security Threats
Internet Security Control Audits
Firewall Security Systems
Common Attacks Against a Firewall
Examples of Firewall Implementation
Intrusion Detection
Describing IDS and IPS Deployment
Uses of Encryption
Technical Controls Against Viruses
AV Software
Voice Over IP
Private Branch Exchange
Lesson 4: Auditing Information Security Management Framework
Auditing Logical Access
Techniques for Testing Security
Lesson 5: Auditing Network Infrastructure Security
Auditing Remote Access
Network Penetration Test
Types of Penetration Tests
Full Network Assessment Reviews
Development and Authorization of Network Changes
Unauthorized Changes
Computer Forensics
Chain of Evidence
Lesson 6: Environmental Exposures and Controls
Lesson 7: Physical Access Exposures and Controls
Physical Access Exposures
Physical Access Controls
Auditing Physical Access
Lesson 8: Mobile Computing
Course Closure

Course Features:

  • Video Lectures and Expert Instruction
    Practical knowledge is essential for success in a real world environment and we have chosen our instructors with this in mind - many of our instructors are business owners and have been employed in their respective fields for decades!
  • PowerPoint
    Utilizing PowerPoint presentations enhances the delivery by displaying a variety of visual information to the user. This type of representation allows the user to better interpret the material through charts, definitions, graphs, and more...
  • Easy Navigation
    Move forward, back, and repeat entire topics or just a section. A progress bar illuminates as you advance through exercises.
  • Printable Study Guides
    Printable study guides for the entire course are available. This allows all material to be viewed, reviewed, and printed for viewing at a later date.
  • Review Exercises
    Each section has a review quiz to aid in the learning process by validating the comprehension of the material covered before moving on to a new section.
  • Resume Option
    All courses are resumed to where you left off last session allowing you to learn when it is convenient for you without the hassle of remembering where you where.
  • Full Motion Video
    All courses feature full-motion videos of instructors teaching the information as if they are speaking directly to you. Our unique delivery simulates a one-on-one classroom environment creating a more personal lesson and learning experience.
  • Certificate of Completion
    Upon completion of your training course, you will receive a Certificate of completion displaying your full name, course completed as well as the date of completion. You can print this out or save it digitally to showcase your accomplishment.
  • Live, Hands-On Demonstrations
    Demonstrations are a way for the instructor to show and tell the user how to perform a task by actually doing it on screen in front of them.
  • Mobile Access: All our training courses are now available across all mobile devices.

CISA training online CISA Online training on-demand If you have any questions regarding CISA Training we encourage you contacting RTEK 2000!

Need an "On-Site" training at your facility?
Please fill out the form!
share on facebook  follow us on twitter  share with Linkedin users