Login     Signup
   info@zetlantechnologies.com        +91-8680961847

  /   ISACA Certification   /   CISA Certification

In a world Full of Auditors, Be a CISA

Prove your experience and be among the most qualified in the Industry



What is the CISA difference?

Certified Information Systems Auditor® (CISA®), world-renowned as the standard of achievement for auditing, monitoring, and assessing IT and business systems, also acknowledges the importance of emerging technologies. Achieving a CISA certification showcases your expertise and asserts your ability to apply a risk-based approach to audit engagements. Addressing innovations like AI and blockchain, CISA ensures that IT audit professionals stay current on the latest technology trends and advancements.

ISACA credentials are among the top 10 highest-paying in IT, and CISA is recognized as the preferred credential for IT auditors.*





How does it benefit you?


70%

Experienced on-the-job improvement


22%

Received a pay boost


Validate your proficiencies for handling the challenges and responsibilities of a modern IT auditor with a CISA, which focuses on these domains:



Information Systems Auditing Process



Information Systems Acquisition, Development & Implementation



Protection of Information Assets



Governance and Management of Information Technology



Information Systems Operations and Business Resilience





Course Details

1. Information Systems Auditing Process

  • Planning
    • IS Audit Standards, Guidelines, and Codes of Ethics
    • Business Processes
    • Types of Controls
    • Risk-Based Audit Planning
    • Types of Audits and Assessments
  • Execution
    • Audit Project Management
    • Sampling Methodology
    • Audit Evidence Collection Techniques
    • Data Analytics
    • Reporting and Communication Techniques
    • Quality Assurance and Improvement of the Audit Process

  • It Governance
    • IT Governance and IT Strategy
    • IT-Related Frameworks
    • IT Standards, Policies, and Procedures
    • Organizational Structure
    • Enterprise Architecture
    • Enterprise Risk Management
    • Maturity Models
    • Laws, Regulations, and Industry Standards affecting the Organization
  • IT Management
    • IT Resource Management
    • IT Service Provider Acquisition and Management
    • IT Performance Monitoring and Reporting
    • Quality Assurance and Quality Management of IT

  • Information Systems Acquisition and Development
    • Project Governance and Management
    • Business Case and Feasibility Analysis
    • System Development Methodologies
    • Control Identification and Design
  • Information Systems Implementation
    • Testing Methodologies
    • Configuration and Release Management
    • System Migration, Infrastructure Deployment and Data Conversion
    • Post-implementation Review

  • Information Systems Operations
    • Common Technology Components
    • IT Asset Management
    • Job Scheduling and Production Process Automation
    • System Interfaces
    • End-User Computing
    • Data Governance
    • Systems Performance Management
    • Problem and Incident Management
    • Change, Configuration, Release, and Patch Management
    • IT Service Level Management
    • Database Management
  • Business Resilience
    • Business Impact Analysis (BIA)
    • System Resiliency
    • Data Backup, Storage, and Restoration
    • Business Continuity Plan (BCP)
    • Disaster Recovery Plans (DRP)

  • Information Asset Security and Control
    • Information Asset Security Frameworks, Standards, and Guidelines
    • Privacy Principles
    • Physical Access and Environmental Controls
    • Identity and Access Management
    • Network and End-Point Security
    • Data Classification
    • Data Encryption and Encryption-Related Techniques
    • Public Key Infrastructure (PKI)
    • Web-Based Communication Techniques
    • Virtualized Environments
    • Mobile, Wireless, and Internet-of-Things (IoT) Devices
  • Security Event Management
    • Security Awareness Training and Programs
    • Information System Attack Methods and Techniques
    • Security Testing Tools and Techniques
    • Security Monitoring Tools and Techniques
    • Incident Response Management
    • Evidence Collection and Forensics


Fees Structure : 15500 INR / 185 USD
Total No of Class : 42 Video Class
Class Duration : 38:00 Working Hours
Download Feature : Download Avalable
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Brochure       Buy Now       Sample Demo

Fees Structure : 30000 INR / 355 USD
Class Duration : 60 Days
Class Recording : Live Class Recording available
Class Time : Monday to Firday 1.5 hours per day / Weekend 3 Hours per day
Technical Support : Call / Whatsapp : +91 8680961847
Working Hours : Monday to Firday 9 AM to 6 PM
Payment Mode : Credit Card / Debit Card / NetBanking / Wallet (Gpay/Phonepay/Paytm/WhatsApp Pay)

Download Brochure       Pay Online