Certified Information Systems Auditor Training in Tbilisi

Program Date

23 Sep 27 Sep 2024

Program Location

Tbilisi, Georgia

Program Venue

Regus Tbilisi - Vazha Pshavela

Registration & Payment Deadline

31 Jul 2024

Program Information

The CISA (Certified Information Systems Auditor) designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. The CISA has gained world-class recognition making it a certification that IT-inclined accountants would definitely consider.

Certified Information Systems Auditor Training in Tbilisi, Georgia has been designed in a manner to provide all the necessary theoretical basis and practical skills used in IT Audit. The syllabus has been crafted based on the CISA certification program, hence it provides all the essential information and knowledge for the participants’ to proceed with the certification.

Target Audience

This program is a suit for those interested in IT Audit and CISA Certification. Namely the following:

  • Professionals and Executives in Information System Sector
  • Experts in information & Operational Risk management
  • IT infrastructure security specialists
  • Internal Control & Information Systems Audit Professionals.

Program Objectives

Upon the successful completion of this course, the participants will have the thorough understanding of:

  • The Goals and the Objectives of Information Systems Internal Audit
  • Role of IT Audit in internal control system
  • Effective techniques for IT Audit Planning
  • Ways for gathering Audit Related Information and Evidence
  • Methods to evaluate IT internal control system
  • Information Risk Management and Audit of Information Security.

Program Outline

Domain 1 – Information Systems Auditing Process

1.1 Planning

  • IS Audit Standards, Guidelines, and Codes of Ethics
  • Business Processes
  • Types of Controls
  • Risk-Based Audit Planning
  • Types of Audits and Assessments

1.2 Execution

  • Audit Project Management
  • Sampling Methodology
  • Audit Evidence Collection Techniques
  • Data Analytics
  • Reporting and Communication Techniques
Domain 2 – Governance and Management of IT

2.1 IT Governance

  • IT Governance and IT Strategy
  • IT-Related Frameworks
  • IT Standards, Policies, and Procedures
  • Organizational Structure
  • Enterprise Architecture
  • Enterprise Risk Management
  • Maturity Models
  • Laws, Regulations, and Industry Standards affecting the Organization

  2.2 IT Management

  • IT Resource Management
  • IT Service Provider Acquisition and Management
  • Performance Monitoring and Reporting of IT
  • Quality Assurance and Quality Management of IT
Domain 3 – Information Systems Acquisition, Development, and Implementation

3.1 Information Systems Acquisition and Development

  • Project Governance and Management
  • Business Case and Feasibility Analysis
  • System Development Methodologies
  • Control Identification and Design

3.2 Information Systems Implementation

  • Testing Methodologies
  • Configuration and Release Management
  • System Migration, Infrastructure Deployment, and Data Conversion
  • Post-implementation Review
Domain 4 – Information Systems Operations and Business Resilience

4.1 Information Systems Operations

  • Common Technology Components
  • IT Asset Management
  • Job Scheduling and Production Process Automation
  • System Interfaces
  • End-User Computing
  • Data Governance
  • Systems Performance Management
  • Problem and Incident Management
  • Change, Configuration, Release, and Patch Management
  • IT Service Level Management
  • Database Management

 4.2 Business Resilience

  • Business Impact Analysis (BIA)
  • System Resiliency
  • Data Backup, Storage, and Restoration
  • Business Continuity Plan (BCP)
  • Disaster Recovery Plans (DRP)
Domain 5 – Protection of Information Assets

5.1 Information Asset Security and Control

  • Information Asset Security Frameworks, Standards, and Guidelines
  • Privacy Principles
  • Physical Access and Environmental Controls
  • Identity and Access Management
  • Network and End-Point Security
  • Data Classification
  • Data Encryption and Encryption-Related Techniques
  • Public Key Infrastructure (PKI)
  • Web-Based Communication Techniques
  • Virtualized Environments
  • Mobile, Wireless, and Internet-of-Things (IoT) Devices

   5.2 Security Event Management

  • Security Awareness Training and Programs
  • Information System Attack Methods and Techniques
  • Security Testing Tools and Techniques
  • Security Monitoring Tools and Techniques
  • Incident Response Management
  • Evidence Collection and Forensics.

Program Methodology

Certified Information Systems Auditor Training in Tbilisi, Georgia will be conducted along workshop principles with formal lectures, case studies and interactive worked examples. Relevant patterns will be provided to illustrate the application of each tool in an operations environment. The sample questions from Previous CISA exams will be explained and demonstrated. The demo-exam will take place after the completion of theoretical studies. Each learning point will be reinforced with practical exercises.

Program Fee

Payment Options

Fee Covers

  • Visa Assistance (complimentary)

  • Participant Assessment

  • Airport Pickup

  • Accommodation

  • Wi-Fi

  • Welcome Dinner

  • Breakfast

  • Workshop Kit

  • Program Materials

  • Program Experts

  • Practical Activities

  • Lunch

  • Refreshments

  • Interactive workshop

  • City Map & Direction

  • Risalat T-shirt (complimentary)

  • Field Visit

  • Program Certificate

  • Entertaining Tour

  • Program Report