header-image

CISA – Certified Information Systems Auditor

African Advanced Level Telecommunication Institute

Institution Details:

Nairobi, Kenya

Course Category:

IT & Networking

Part-Time

Next Start Date: 18/05/2019

End Date: 31/08/2019

Application Closing Date: 18/05/2019

Course Description

The CISA designation is a globally recognized certification for IS audit control, assurance and information security professionals.

Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.

During this training you will undergo intensive training in all the CISA domains and acquire the knowledge, skills and best practices to successfully conduct a full external or internal information systems audit.

By the end of the programme you will have acquire sufficient knowledge to successfully complete the ISACA CISA exam, which gives you the status of a Certified Information Systems Auditor.

TARGET AUDIENCE AND PRE-REQUISITES:
Business and information systems management, audit, control and security professionals including the following:
1. Information systems professionals aspiring to build a career in information systems auditing
2. Internal and external auditors (both IT and financial)
3. Information security professionals
4. Finance/CPA professionals
5. Risk management professionals
6. Security managers / analysts
7. Software Managers
8. Infrastructure/Network Managers

The course is meant for IS and Business professionals specified in the target group as well as college graduates aspiring to become CISA certified.

COURSE DESCRIPTION:
Information technology, long considered as only an enabler of an organization’s strategy, is now regarded as an integral part of this business strategy. Strategic alignment between Information Technology and enterprise objectives is one of the critical success factors. With the changing landscape concerning security, corporate governance, IT service delivery and systems reliability as well as regulatory requirements, the CISA course becomes vital for information technology line and senior managers.

The course moulds information technology professionals into complete and competent individuals. The course covers the following current five CISA domain areas:
1. The Process of Auditing Information Systems (21%)
2. Governance and Management of IT (16%)
3. Information Systems Acquisition, Development and Implementation (18%)
4. Information Systems Operations, Maintenance & Service Management (20%)
5. Protection of Information Assets (25%)

TRAINING METHODOLOGY:
The course is delivered using a blended learning model of lectures, discussions, case studies, assessment and practical exercises using a highly-structured, learner-centred teaching methodology that ensures maximum learning. Helpful learning resources will be provided and access to the e-learning system.

COURSE OBJECTIVE:
The main objective of this course workshop is to provide a comprehensive understanding of Information Systems auditing. This course will equip participants with the knowledge and practical skills necessary to successfully perform a complete IS audit of any size of organization. This programme also adequately prepares the participant to successfully write the CISA certification exam.

COURSE OUTLINE:
The following topics are presented and discussed to increase your understanding and abilities. CISA candidates are expected to have detailed understanding in each of these areas.
1. The Process of Auditing Information Systems
Provide audit services in accordance with IT audit standards to assist the organization with protecting and controlling information systems.
The auditing process covers IS auditing standards; Risk-based approach; Controls; Audit objectives, planning & scope; Cobit; Field Work; Identifying conditions & defining reportable findings; Review of work; Audit Results Communication;
2. Governance and Management of IT
Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization’s strategy.
IT governance structure, IT organizational structure and HR management; Evaluating IT Strategies; Evaluating IT policies, standards & procedures; IT Resource Investment; Evaluating Risk-management, monitoring and assurance practices;
3. Information Systems Acquisition, Development and Implementation
Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization’s strategies and objectives.
Evaluation approach, Project Management; Functional Requirements, Feasibility Analysis; System Design; System Development; System; Acquisition, Implementation, Post-Implementation;
4. Information Systems Operations, Maintenance and Support
Provide assurance that the processes for information systems operations, maintenance and support meet the organization’s strategies and objectives.
Service Level Management; Evaluating Systems Software; Evaluating Hardware Acquisition & Installation; Evaluating network infrastructure (voice & data); Evaluating change, configuration and release management; Capacity and Performance monitoring tools & techniques; Data Administration practices; Problem & Incident management practices.
5. Protection of Information Assets
This module discusses the organization’s security policies, standards, procedures and controls that ensure the confidentiality, integrity and availability of information assets.
Evaluate the information security and privacy policies, standards and procedures for completeness, alignment with generally accepted practices and compliance with applicable external requirements.
Evaluate the design, implementation, maintenance, monitoring and reporting of physical and environmental controls to determine whether information assets are adequately safeguarded.
Evaluate the design, implementation, maintenance, monitoring and reporting of system and logical security controls to verify the confidentiality, integrity and availability of information.
Evaluate the design, implementation and monitoring of the data classification processes and procedures for alignment with the organization’s policies, standards, procedures and applicable external requirements.
Evaluate the processes and procedures used to store, retrieve, transport and dispose of assets to determine whether information assets are adequately safeguarded.
Evaluate the information security program to determine its effectiveness and alignment with the organization’s strategies and objectives.

  • Course Sub-Category IT
  • Course Level Tertiary
  • Qualification Awarded Certificate
  • Awarding Body AFRALTI
  • CostUSD 760
  • Length Of Course 4 Months
  • Class Size
  • Course Location/BranchOff Waiyaki Way

Course Requirements

Business and information systems management, audit, control and security professionals including the following:
1. Information systems professionals aspiring to build a career in information systems auditing
2. Internal and external auditors (both IT and financial)
3. Information security professionals
4. Finance/CPA professionals
5. Risk management professionals
6. Security managers / analysts
7. Software Managers
8. Infrastructure/Network Managers

Course Advertisement Details

  • Would you like to feature this course? No
  • Featured Course – Start Date
  • Email address to receive queries training@afralti.org

Institution Details

African Advanced Level Telecommunications Institute (AFRALTI) is an Inter-Governmental Institute established in 1993 to supplement and spearhead ICT development efforts mainly in English-speaking Africa. Currently the member States that have ratified the Intergovernmental Agreement (IGA) include Lesotho, Kenya, Malawi, Mozambique, Kingdom of Eswatini, Tanzania, Uganda and Zimbabwe, out of the 23 eligible members.

Vision:
“To be a leading and self-sustaining Centre of Excellence for ICT capacity building in Africa”.

Mission Statement:
“To provide quality training, consultancy and advisory services to the ICT Sector in Africa”.

AFRALTI’s Core Values:
1. Good Corporate Governance
2. Professionalism
3. Teamwork
4. Quality and Excellence
5. Equal opportunities
6. Creativity and innovation.

Governing Council:
The Governing Council (GC) is composed of a representative from each Member State. The Chair is on a rotational basis amongst the member States.

TRAINING AREAS:
The Institute offers training in the following areas:
1. Telecommunication Engineering
2. Spectrum Engineering and Management
3. Next Generation Networks
4. ISDN and Broadband Networks
5. VoIP Networks
6. Wireless Technologies (2G, 3G, LTE, WiMAX, CDMA, WiFi)
7. Optical Fibre Communication
8. Transmission Systems
9. Radio Communication
10. Satellite Communication
11. Information Technology
12. Cisco Certification: CCNA, CCNP
13. Quality Management and Systems Audit
14. Information Systems Auditing
15. IPV6
16. Linux Administration
17. Network Security
18. IP Networks
19. Certified Information Systems Auditor (CISA)
20. Cyber Security
21. Oracle
22. Huawei Certified Data Associate (HCDA)
23. Huawei Certified Data Professional (HCDP)
24. Management Training
25. Billing Systems and Management.
26. Costing and Tariffs (COSITU ITU Model)
27. Feasibility Studies and Market Analysis
28. Fraud and Revenue Assurance.
29. Interconnection Negotiations and Management
30. Marketing Strategy
31. Telecoms Policy and Regulations
32. Strategic Planning for Telecommunications Development
33. Telecommunication Standards and QoS testing

footer-pattern