CISA: The Process of Auditing Information Systems - Part 1


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description
Auditing information systems requires professionals to understand, and plan an effective auditing process. This course covers the audit function, including best practices for organizing, planning, and resourcing audit activities. This course also covers industry-recognized audit and assurance standards, guidelines, and tools, as well as effective information systems controls frameworks including COBIT5 and risk analysis. This course is one of a series in the Skillsoft learning path that covers the objectives for the ISACA Certified Information Systems Auditor (CISA) certification exam.

Target Audience
Individuals in IS audit, controls and security professions; individuals preparing for the CISA certification exam.

Prerequisites
None

Expected Duration (hours)
1.3

Lesson Objectives

CISA: The Process of Auditing Information Systems - Part 1

  • start the course
  • recognize the task and knowledge statements of domain 1
  • describe characteristics of the IS audit function
  • identify best practices in IS audit resource management
  • identify best practices for planning audits
  • identify the effects of laws and regulations on IS audit planning
  • recognize the ISACA Code of Professional Ethis
  • identify the IS audit and assurance general standards
  • identify the IS audit and assurance performance standards
  • identify the IS audit and assurance reporting standards
  • identify the IS audit and assurance general guidelines
  • identify the IS audit and assurance performance guidelines
  • identify the IS audit and assurance reporting guidelines
  • distinguish between the different categories of IS audit and assurance tools and techniques
  • identify best practices when applying ISACA guidelines, standards, and tools and techniques in relation to each other and external guidelines such as regulatory requirements
  • recognize characteristics of the ITAF reference model
  • identify the steps of the risk management process
  • distinguish between preventive, detective, and corrective controls
  • identify IS different types of IS control objectives
  • describe how the COBIT 5 framework is used as part of IS control
  • identify general controls used for information systems
  • identify IS control procedures
  • identify best practices when planning and managing IS audits
  • Course Number:
    sp_cisb_a01_it_enus

    Expertise Level
    Intermediate