CISA: The Process of Auditing Information Systems – Part 1

Individuals in IS audit, controls and security professions; individuals preparing for the CISA certification exam.

Prerequisite
None

Expected Duration
77 minutes

Description
Auditing information systems requires professionals to understand, and plan an effective auditing process. This course covers the audit function, including best practices for organizing, planning, and resourcing audit activities. This course also covers industry-recognized audit and assurance standards, guidelines, and tools, as well as effective information systems controls frameworks including COBIT5 and risk analysis. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.

Objective

Managing the IS Audit Function

  • start the course
  • recognize the task and knowledge statements of domain 1
  • describe characteristics of the IS audit function
  • identify best practices in IS audit resource management
  • identify best practices for planning audits
  • identify the effects of laws and regulations on IS audit planning
  • Audit Standards, Guidelines, and Tools

  • recognize the ISACA Code of Professional Ethis
  • identify the IS audit and assurance general standards
  • identify the IS audit and assurance performance standards
  • identify the IS audit and assurance reporting standards
  • ISACA IS Audit and Assurance Guidelines

  • identify the IS audit and assurance general guidelines
  • identify the IS audit and assurance performance guidelines
  • identify the IS audit and assurance reporting guidelines
  • distinguish between the different categories of IS audit and assurance tools and techniques
  • identify best practices when applying ISACA guidelines, standards, and tools and techniques in relation to each other and external guidelines such as regulatory requirements
  • recognize characteristics of the ITAF reference model
  • IS Controls

  • identify the steps of the risk management process
  • distinguish between preventive, detective, and corrective controls
  • identify IS different types of IS control objectives
  • describe how the COBIT 5 framework is used as part of IS control
  • identify general controls used for information systems
  • identify IS control procedures
  • Practice: IS Auditing Best Practices

  • identify best practices when planning and managing IS audits
  • MONTHLY SUBSCRIPTION

    $129/month
     

    ANNUAL SUBSCRIPTION

    $1295/year

    Multi-license discounts available for Annual and Monthly subscriptions.