Daily Archives: August 13, 2019

Home / 2019 / August / 13

Certified Information Systems Auditor Training in Tbilisi, Georgia

Program Information

The CISA (Certified Information Systems Auditor) designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. The CISA has gained world-class recognition making it a certification that IT-inclined accountants would definitely consider.

This training has been designed in a manner to provide all the necessary theoretical basis and practical skills used in IT Audit. The syllabus has been crafted based on the CISA certification program, hence it provides all the essential information and knowledge for the participants’ to proceed with the certification.

Target Audience

This program is a suite for those interested in IT Audit and CISA Certification. Namely the following:

  • Professionals and Executives in Informations System Sector
  • Experts in information & Operational Risk management
  • IT infrastructure security specialists
  • Internal Control & Information Systems Audit Professionals

Program Objectives

Upon the successful completion of this course, the participants will have the thorough understanding of:

  • The Goals and the Objectives of Information Systems Internal Audit
  • Role of IT Audit in internal control system
  • Effective techniques for IT Audit Planning
  • Ways for gathering Audit Related Information and Evidence
  • Methods to evaluate IT internal control system
  • Information Risk Management and Audit of Information Security

Program Outline

Auditing Information Systems

  • Overview of ISACA Auditing Standards and Guidelines
  • IT Audit Tools and Approaches
  • Developing and Implementing an Information Systems Audit Strategy
  • Planning and Conducting an Audit
  • Risk Assessment in Audit Process
  • Collection of Information and Audit Evidence
  • Communicate Issues, Risks, and Audit Results
  • Supporting the Implementation of Risk Management and Control Practices

Governance & Management of IT

  • Assessing the Effectiveness of IT Governance, Organizational Structure and Segregation of Duties
  • Evaluating IT Strategy and Direction, Policies, Standards, and Procedures
  • Evaluating the Effectiveness of Quality Management Systems, IT Management and Monitoring Controls
  • Maturity and Process Improvement models
  • IT Resource Investment, Use, and Allocation Practices
  • Assessing IT Contracting Strategies and Policies and Management Practices
  • Assessing Risk Management Practices, Performance Monitoring and Assurance Practices
  • Evaluating Organizations’ Business Continuity Plan

Information Systems Acquisition, Development, Implementation and Life Cycle Management

  • Evaluating Project Management Frameworks and Governance Practices
  • Methodology and tools for Software Development
  • Development Life Cycle Management
  • Performing Periodic Project Reviews
  • Evaluating Control Mechanisms for Systems
  • Assessing Development and Testing Processes
  • Data Migration and Information Systems Implementation
  • Goals and practices of system launch quality assessment

 Information Systems Operations, Maintenance, and Support

  • Practices in IT services management and operational management;
  • Planning and capacity management;
  • Third-Party, Operations and End User Management Practices
  • Evaluating the Maintenance Process & Data Administration Practices
  • Evaluating the Use of Capacity and Performance Monitoring Methods
  • Evaluating Change, Configuration, and Release Management Practices
  • Problems and incidents management Practices
  • Adequacy of Back up, Disaster recovery planning and plans testing..

IT Security Audit

  • Information Security Controls
  • Information Security Design & Encryption Basics
  • The Functionality & Security of IT Infrastructure
  • Evaluating the Design, Implementation, and Monitoring of Logical Access Controls
  • Risks and Controls of Virtualization
  • Evaluating the Design, Implementation, and Monitoring of Data Classification Process

Program Methodology

The seminar will be conducted along workshop principles with formal lectures, case studies and interactive worked examples. Relevant patterns will be provided to illustrate the application of each tool in an operations environment. The sample questions from Previous CISA exams will be explained and demonstrated. The demo-exam will take place after the completion of theoretical studies. Each learning point will be reinforced with practical exercises.

Registration Information

Program Dates: 16 – 20 December 2019

Registration Closes on: 31 October 2019

Venue: Regus Tbilisi – Vazha Pshavela

Program Fee: $3950

Fee Covers:

Register Online  

Online Payment via PayPal

Get in touch for assistance & questions

Email: trainings@risalatconsultants.com or risalatconsultants@gmail.com
Skype: risalatconsultantsint
Call/Viber/WhatsApp: +995 555 11 66 22 or +995 555 71 33 11

Socialize with Risalat

LinkedIn | TwitterFacebook