ISACA Certified Information Systems Auditor – CISA


Demonstrate excellence in IT systems auditing by completing the ISACA Certified Information Systems Auditor course. Designed according to the rigorous requirements of the ISACA, students can be sure of learning the theories and practical skills required to become a fully-qualified systems auditor.

Report Abuse


Demonstrate excellence in IT systems auditing by completing the ISACA Certified Information Systems Auditor course. Designed according to the rigorous requirements of the ISACA, students can be sure of learning the theories and practical skills required to become a fully-qualified systems auditor.

Since 1978 the CISA qualification has been regarded as an industry-leading qualification for IT auditors, with holders demonstrating a proven level of competence. The ISACA Certified Systems Auditor course is best suited to:

  • IT professionals responsible for audit, control and security of corporate computer and networking resources.
  • Consultants tasked with documenting current business system provisions and making recommendations on how to improve monitoring, control and protection provisions.
  • Junior IT security team members who would like to take their knowledge to expert level.
  • Individuals who need to achieve an industry-recognised qualification to prove their competence.

With 30 modules of study, the ISACA Certified Information Systems Auditor course relies on a series of instructor led videos and self-study manuals to help students get to grips with the concepts being taught. The course is delivered online using the learning platform allowing learners to access material anyplace anytime, whenever and wherever is most convenient for them.

Knowledge and understanding of each module is tested routinely throughout the course using flash cards and educational games; there are also numerous scenarios in each module that students can replicate to improve their understanding. End of unit tests and quizzes ensure learners have fully understood the concepts behind information systems auditing before moving on to the next module. Students can also discuss what they are learning using the social networking facilities, adding another valuable learning tool by which to add additional, practical knowledge.

Key Learning Points

Over the course of thirty modules students are introduced to core concepts of IT systems auditing, learning practical skills that can be used to document enterprise class systems and identify areas that require improvement. Learners are taken through each concept and before being given the opportunity to test their knowledge using a series of practical examples.

Core concepts covered by the course include:

  • The information systems audit process and how it is applied in a real-world environment.
  • The importance of applying information technology governance principles to maintain levels of security and availability.
  • Defining and managing the information systems and infrastructure lifecycle to better plan for upgrades and replacements.
  • Codifying IT service delivery and support mechanisms and levels to ensure that systems and users remain fully productive and issues are properly prioritised.
  • Identifying critical information assets and designing systems to protect each from loss, theft or unauthorised access.
  • Building a business continuity and disaster recovery strategy that will help keep the organisation running in the event of a major system failure.

Advantages of this course

Upon completion of the course students will not only have an in-depth appreciation of IT systems, auditing principles and procedures, but they will also be fully prepared to sit the associated Certified Information Systems Auditor (CISA) certification exam.

The benefits the benefits of this particular course are plentiful:

  • A greater understanding of IT systems auditing procedures and how they are applied.
  • Improved practical auditing skills that will help employees raise standards and security within their organisations.
  • The skills and experience required to sit and pass the well-respected CISA certification.
  • The acquisition of extremely valuable skills that will help learners secure internal promotions or new roles within the IT system auditing sector, widening employment prospects.

The SACA Certified Information Systems Audit course is an essential pre-requisite for IT systems auditors who want to achieve the CISA qualification. It is also important to note that the CISA accreditation is an essential component of the DOD 8570.1 security clearance, required to work on projects for government agencies.

Lesson 1
  • Introduction
  • Audit Process
  • Auditing Standards
  • Auditing Guidelines
  • Cobit Model
  • Audit Management
  • Internal Control Classifications
  • Planning
  • Program
  • Evidence
  • Audit Control Evaluation
  • CSA Control Self- Assessment
Lesson 2
  • IT Governance
  • Outsourcing And Governance
  • IT Strategy
  • Governance And Security Policies
  • Organizational Compliance
  • Outsourcing And Globalization
  • Outsourcing
  • IT Performance
Lesson 3
  • System And Infrastructure
  • Requirements
  • Project Management Tools- Part1
  • Project Management Tools- Part2
  • Applications
  • Agile Development
  • Monitoring And Controlling
  • Acquisition Process
  • Testing Process
  • Information Systems Maintenance Practices
  • Data Conversion Tools
Lesson 4
  • Media Disposal Process
  • Post Implementation Review
  • Periodic Review
  • System Maintenance
Lesson 5
  • IT Service Delivery And Support
  • How To Evalutate Service Level Management Practices
  • Operations Management
  • Databases
  • Structured Query Language
  • Monitoring Performance
  • Source Code And Performance Monitoring
  • Patch Management
  • Incident Management
  • Hardware Component Types
  • Network Component Types
Lesson 6
  • IS Auditor Technical Overview
  • Security Design
  • Types Of Attacks
  • Cryptography
  • Encryption
  • Asymmetric Encryption
  • Digital Certificate
  • Different Kinds Of Attacks
  • Access Controls
  • Identification And Authenication
  • Physical Access Exposure
  • Environmental Security
  • Network Security Devices And Network Components
  • Network Address Translation
  • Virtual Private Networks
  • Voice System Risks
  • Intrusion Detection
  • Firewalls
  • Firewall Implementation
  • Network Access Protection
  • Honey Pot
  • Risks To Portable And Wireless Devices
  • Bluetooth
  • OSI Networking
  • Managing Data
Lesson 7
  • Business Continuity And Disaster Recovery
  • Fault Tolerance
  • Business Continuity And Disaster Recovery Regulations

Additional information

Exams Included


Course Type

Online Course

Expiry Date After Purchase

1 year

Device Processor

1 gigahertz (GHz)

RAM Required

1 GB

Operating System

iOS, Windows 10, Windows 7, Windows 8


Google Chrome, Internet Explorer 8 or above, Mozilla Firefox, Safari 6 or above


Android, iPad, iPhone, Mac, Windows


There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.

Vendor Information

  • Store Name: Otutu Online Store
  • Vendor: Otutu Online Store
  • No ratings found yet!

We want you to be satisfied, so all eligible courses purchased on Vogate can be refunded within 14 days. For whatever reason, if you are unhappy with a course, you can request a refund, provided the request meets the guidelines in our refund policy.

Certain restrictions may apply and some purchases may only be eligible for credit refunds. For more information regarding our refund policy, please see below.

How to submit a refund request

If you’re looking for instructions on how to submit a refund request, please visit our support and help section

Our 14-day policy

While our 14-day refund policy is to allow customers to learn risk free, we must also protect our vendors from fraud and provide them a reasonable payment schedule. Payments are sent to vendor after 30 days, so we will not process refund requests received after 14 days of purchase.

Additional reasons for denied refunds

We reserve the right, in our sole discretion, to limit or deny refund requests in cases where we believe there is refund abuse, including but not limited to the following:

  • A significant portion of the course has been consumed or downloaded by a customer before the refund was requested.
  • Multiple refunds have been requested by a customer for the same course or other courses
  • Excessive refunds have been requested by a customer.
  • Users who have their account reported, banned or course access disabled due to a violation of our Terms or Trust & Safety Guidelines. 
  • We do not grant refunds for any subscription services.

These refund restrictions will be enforced to the extent permitted by applicable law. 

Product Enquiry

You may also like…