Exam Preparation

Certified in Information

Video preview
No available sessions at this moment.
Get in touch with our Training Advisior to find out about the next available sessions.
DownloadDownload Brochure

Course Overview

This training course is of high value for both individuals who would like to invest in their future and keen to join the community of senior information technology leaders and consultants. The Certified information systems auditor (CISA) certification is highly appreciated from

Key Takeaways

A different look at IT as a “business enabler”, and how to converge it with business goals and objectives.
Trainees will became aware about set of topics and knowledge areas in IT governance and its operational management.
Realise the key roles and responsibilities in managing IT in the organization, and became able to design the needed structures for successful and secured IT.
Integrate contemporary managerial concepts and theories to the continuous improvement in IT function at organisation level.
Learn how to prioritise and launch IT projects, and integrate it to the business strategy successful.

Information Systems Audit and Control Association
Brand Logo
ISACA was incorporated in 1969 by a small group of individuals who recognized a need for a centralized source of information and guidance in the growing field of auditing controls for computer systems. Today, ISACA serves 140,000 professionals in 180 countries. As an independent, nonprofit, global association, ISACA engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves.

Course Outline

  • Introduction to CISA
  • Understanding the importance of Audit Planning
  • What is an Audit Charter and why it is important
  • What is Electronic Data Interchange and how it is beneficial for CISA
  • What are the various types of controls used in the Audit Planning
  • What is Risk in the field of Information Systems
  • Understanding vulnerabilities and threats
  • What are the various types of risks that we may face when we work on our audit
  • How to properly apply the Risk response methodology
  • Key Aspects - Risk based Audit Planning
  • Why Data Analytics is important in the field of auditing
  • What are the various Reporting and Communication Techniques and why it is used
DOMAIN 2: Governance and Management of IT
  • How to apply IT Standards, Policies and Procedures
  • What are the 2 Approaches for Policy Development (Top down & Bottom up)
  • How to do a proper Organizational Structure - Roles and Responsibility of Various Functions
  • How to build an IT Strategy & Steering Committee
  • What is Enterprise Architecture and how it is applied
  • Why do we need Risk Treatment
  • How to properly apply Risk Analysis Methods
  • What are the various ways to make IT Performance Monitoring and Reporting
DOMAIN 3: Information Systems Acquisition, Development and Implementation
  • What are the various Project Evaluation Methods
  • Understanding the Project Management Structure
  • What is the Agile System Development Methodology
  • What is the importance of Object Oriented system development methodology
  • What is Parity Bit, Checksum and CRC
  • What are the various Testing Methodologies that are used in auditing
  • How to do System Migration, Infrastructure Deployment and Data Conversion
DOMAIN 4: Information Systems Operations, Maintenance and Support
  • What is RFID and why is it used?
  • How to properly do IT Asset Management
  • Why it is important to have Job Scheduling and Production Process Automation
  • How to look at the Systems Performance Management
  • What are the various ways to apply Problem and Incident Management
  • How to do Database Normalization
  • Why Business Impact Analysis is important for us
DOMAIN 5: Protection of Information Assets
  • What are the tips and tricks for the Information Security Management Framework
  • Understanding the Privacy Principles
  • How to have the Physical Access and Environmental Controls
  • Understanding the Single Sign on
  • What are the advantages of the Factor of Authentication
  • What are Biometrics
  • What is the OSI Layer
Final Project

At the end of the course, the trainer summarizes all the material explained during the previous days and focuses on the most important points which are applicable in our daily life. Later, the trainer splits the class into several groups (teams) and distributes the final project which is a simulation of real life tasks and challenges. Every team starts applying what is requested in the final project. Meanwhile, the trainer passes through team members and tries to help them in case of any difficulty faced. At the end of the day, every team should present his final work in front of the class and an open discussion is held to assess the work.

Who Should Attend?

This highly practical and interactive course has been specifically designed for
→ IT Managers/ Security managers/ IT Project Managers
→ IS/IT Auditors
→ Public accountants and auditors
→ IS/IT Consultants
→ IT Quality management staff
→ IT technical staff who aspire to IT leadership
→ All aspirants for leading IT positions

Related Courses


What language will the course be taught in and what level of English do I need to take part in an LEORON training program?
Most of our public courses are delivered in English language. You need to be proficient in English to be able to fully participate in the workshop and network with other delegates. For in-house courses we have the capability to train in Arabic, Dutch, German and Portuguese.
Are LEORON Public courses certified by an official body/organization?
LEORON Institute partners with 20+ international bodies and associations.We also award continuing professional development credits (CPE/PDUs) for:1. NASBA (National Association of State Boards of Accountancy) 2. Project Management Institute PDUs 3. CISI credits 4. GARP credits 5. HRCI recertification credits 6. SHRM recertification credits
What is the deadline for registering to a public course?
The deadline to register for a public course is 14 days before the course starts. Kindly note that occasionally we do accept late registrations as well, but this needs to be confirmed with the project manager of the training program or with our registration desk that can be reached at +1071 4 1075 5711 or
What does the course fee cover?
The course fee covers a premium training experience in a 5-star hotel, learning materials, lunches & refreshments, and for some courses, the certification fee and membership with the accrediting bodies.
Does LEORON give discounts?
Yes, we can provide discounts for group bookings. If you would like to discuss a discount on a corporate level, we will be happy to talk to you.