Information Security Auditing Training Course - APG Learning
nav-closed

Register for interview

information security auditing training course

Write to us for more information

Information Security Auditing Training Course

The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created.…

  • Please Login..review_star 239
  • student_enrolled 95 Student's Enrolled
  • best_selling Best Selling
Write to us for more information

Course Detail

Duration

Modules

11

Hours

Start Date

Self paced

Course Provider:

Getcertgo

13,560.00 18,000.00

Training 5 or more people?

Get your team access to APG Learning top 200+ courses anytime, anywhere.

Try APG Learning for Business

About Course

The Certified Information Systems Auditor (CISA) credential demonstrates that the individual possesses a firm understanding of IS audit, control and security skills as set out in the five domains that the Information Systems Audit and Control Association (ISACA)group has created. The CISA credential it recognized worldwide as a high-level certification of proficiency in IS auditing. This learning path will aid learners to prepare for the Certified Information Systems Auditor (CISA) examination.

Key Features

  • Unlimited access to online content
  • Content updated as per evolving Industry requirements
  • Certification developed by Industry professionals and academicians
  • Career boost for students and professionals

Modules

  • The Process of Auditing Information Systems – Part 1
  • The Process of Auditing Information Systems – Part 2
  • Governance and Management of IT – Part 1
  • Governance and Management of IT – Part 2
  • IS Acquisition, Development, and Implementation – Part 1
  • IS Acquisition, Development and Implementation – Part 2
  • IS Operations, Maintenance and Support – Part 1
  • IS Operations, Maintenance, and Support – Part 2
  • Protection of Information Assets – Part 1
  • Protection of Information Assets – Part 2
  • IS Acquisition, Development and Implementation – Part 3

SIMILAR COURSES

nav-closed

Download Brochure