Cisco-training

Insoft Services is een van de weinige aanbieders van opleidingen in EMEAR tot een volledige reeks van Cisco-certificering en gespecialiseerde technische opleiding aan te bieden.

Lees meer

Cisco-certificering

Ervaar een blended learning-aanpak die het beste van door een instructeur geleide training en e-learning in eigen tempo combineert om u te helpen zich voor te bereiden op uw certificeringsexamen.

Lees meer

Cisco Learning Credits

Cisco Learning Credits (CLCs) zijn prepaid trainingsvouchers die rechtstreeks bij Cisco worden ingewisseld en die het plannen van uw succes eenvoudiger maken bij de aankoop van Cisco-producten en -services.

Lees meer

Cisco Continuing Education

Het Cisco Continuing Education Program biedt alle actieve certificeringshouders flexibele opties om opnieuw te certificeren door een verscheidenheid aan in aanmerking komende trainingsitems te voltooien.

Lees meer

Cisco Digital Learning

Gecertificeerde medewerkers zijn GEWAARDEERDE activa. Verken de officiële Digital Learning Library van Cisco om uzelf te informeren via opgenomen sessies.

Lees meer

Cisco Business Enablement

Het Cisco Business Enablement Partner Program richt zich op het aanscherpen van de zakelijke vaardigheden van Cisco Channel Partners en klanten.

Lees meer

Cisco trainingscatalogus

Het Cisco Business Enablement Partner Program richt zich op het aanscherpen van de zakelijke vaardigheden van Cisco Channel Partners en klanten.

Lees meer

Fortinet-certificering

Het Fortinet Network Security Expert (NSE) -programma is een training- en certificeringsprogramma op acht niveaus om ingenieurs van hun netwerkbeveiliging te leren voor Fortinet FW-vaardigheden en -ervaring.

Technische trainingen

Fortinet-training

Insoft is erkend als Fortinet Authorized Training Center op geselecteerde locaties in EMEA.

Lees meer

Fortinet trainingscatalogus

Bekijk de volledige Fortinet trainingscatalogus. Het programma omvat een breed scala aan cursussen in eigen tempo en onder leiding van een instructeur.

Lees meer

ATC Status

Bekijk onze ATC-status in geselecteerde landen in Europa.

Lees meer

Fortinet Professionele Services

Wereldwijd erkend team van gecertificeerde experts helpt u een soepelere overgang te maken met onze vooraf gedefinieerde consultancy-, installatie- en migratiepakketten voor een breed scala aan Fortinet-producten.

Lees meer

Microsoft-training

Insoft Services biedt Microsoft-trainingen in EMEAR. We bieden technische trainingen en certificeringscursussen van Microsoft aan die worden geleid door instructeurs van wereldklasse.

Technische cursussen

Extreme-training

Find all the Extreme Networks online and instructor led class room based calendar here.

Technische cursussen

Technische-certificering

We provide comprehensive curriculum of technical competency skills on the certification accomplishment.

Lees meer

Extreme trainingscatalogus

Leer uitzonderlijke kennis en vaardigheden van Extreme Networks

Lees meer

ATP accreditatie

Als geautoriseerde trainingspartner (ATP) zorgt Insoft Services ervoor dat u de hoogste onderwijsnormen krijgt die beschikbaar zijn.

Lees meer

Services Oplossingen

Wij bieden innovatieve en geavanceerde ondersteuning bij het ontwerpen, implementeren en optimaliseren van IT-oplossingen.Ons klantenbestand omvat enkele van de grootste Telco's ter wereld.

Oplossingen

Wereldwijd erkend team van gecertificeerde experts helpt u een soepelere overgang te maken met onze vooraf gedefinieerde consultancy-, installatie- en migratiepakketten voor een breed scala aan Fortinet-producten.

Over ons

Insoft biedt geautoriseerde trainings- en consultancydiensten voor geselecteerde IP-leveranciers. Ontdek hoe we een revolutie teweegbrengen in de industrie.

Lees meer
  • +31 71 799 6230
  • CISA - Certified Information Systems Auditor

    Duration
    4 Dagen
    Delivery
    (Online and onsite)
    Price
    Price Upon Request
    CISA Certified System Auditor is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security. During this CISA training course, delegates will be exposed to the Five Domains of Information Security Auditing. These domains comprise the foundations of CISA and it is imperative that delegates grasp a complete understanding of these aspects in order to pass the CISA exam and use their certification within the workplace. Within each of these domains exists multiple topics, which when combined, provide a comprehensive overview of the domain of focus. Due to the breadth of information imparted with each topic over a period of just four days, this course is considered intensive and candidates must study hard to obtain the certification. The five domains are as follows:
    1. The Process of Auditing Information Systems
    2. Governance & Management of IT
    3. Information Systems Acquisition, Development, and Implementation
    4. Information Systems Operations, Maintenance, and Support
    5. Protection of Information Assets

    This CISA Certified System Auditor training course is not suitable for beginners. It is required that delegates possess at least five years of exposure in the field of Information Systems Auditing. With this information in mind, it is expected that CISA qualified candidates have an outstanding level of professional experience, commitment, and extensive knowledge of IS Auditing. Thus, a CISA qualification is likely to open many doors and propel certified individuals into a high ranking position within the enterprise.

    The five domains within the course are as follows:

    • The Process of Auditing Information Systems
    • Governance & Management of IT
    • Information Systems Acquisition, Development, and Implementation
    • Information Systems Operations, Maintenance, and Support
    • Protection of Information Assets

    The course content surrounds the pivotal Five Domains. The information imparted within each domain is as follows:

    Domain 1: Information Systems Audit Process:

    • Developing a risk-based IT audit strategy
    • Planning specific audits
    • Conducting audits to IS audit standards
    • Implementation of risk management and control practices

    Domain 2: IT Governance and Management:

    • Effectiveness of IT Governance structure
    • IT organizational structure and human resources (personnel) management
    • Organisations IT policies, standards, and procedures
    • Adequacy of the Quality Management System
    • IT management and monitoring controls
    • IT resource investment
    • IT contracting strategies and policies
    • Management of organizations IT-related risks
    • Monitoring and assurance practices
    • Organization business continuity plan

    Domain 3: Information Systems Acquisition, Development, and Implementation:

    • Business case development for IS acquisition, development, maintenance, and retirement
    • Project management practices and controls
    • Conducting reviews of project management practices
    • Controls for requirements, acquisition, development, and testing phases
    • Readiness for Information Systems
    • Project Plan Reviewing
    • Post Implementation System Reviews

    Domain 4: Information Systems Operations, Maintenance, and Support:

    • Conduct periodic reviews of organizations objectives
    • Service level management
    • Third-party management practices
    • Operations and end-user procedures
    • Process of information systems maintenance
    • Data administration practices determine the integrity and optimization of databases
    • Use of capacity and performance monitoring tools and techniques
    • Problem and incident management practices
    • Change, configuration, and release management practices
    • Adequacy of backup and restore provisions
    • Organizations disaster recovery plan in the event of a disaster

    Domain 5: Protection of Information Assets:

    • Information security policies, standards and procedures
    • Design, implementing, monitoring of system and logical security controls
    • Design, implementing, monitoring of data classification processes and procedures
    • Design, implementing, monitoring of physical access and environmental controls
    • Processes and procedures to store, retrieve, transport and dispose of information assets

    The CISA essential for professionals dealing with controlling, monitoring, and assessing an organizations information technology and business systems. This includes:

    • IS/IT auditors/consultants
    • IT compliance managers
    • Chief Compliance Officers
    • Chief risk & privacy officers
    • Security heads/directors
    • Security managers/architects

    The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.

    There are no prerequisites to learn CISA from this tutorial. However, to get the CISA certification you need to:

    • Pass the CISA examination
    • Submit an application for CISA certification
    • Adhere to the Code of Professional Ethics
    • Dedicate to the Continuing Professional Education Program
    • Compliance with the Information Systems Auditing Standards

    The examination is open to all individuals who have an interest in information systems audit, control, and security. A minimum of 5 years of professional information systems auditing, control or security work experience is required for the CISA certification.

    CISA Certified System Auditor is a globally acknowledged certification, which builds upon the previous experience of IS professionals, to produce valuable employees who possess exceptional knowledge of Information Systems Auditing, Control, and Security. During this CISA training course, delegates will be exposed to the Five Domains of Information Security Auditing. These domains comprise the foundations of CISA and it is imperative that delegates grasp a complete understanding of these aspects in order to pass the CISA exam and use their certification within the workplace. Within each of these domains exists multiple topics, which when combined, provide a comprehensive overview of the domain of focus. Due to the breadth of information imparted with each topic over a period of just four days, this course is considered intensive and candidates must study hard to obtain the certification. The five domains are as follows:
    1. The Process of Auditing Information Systems
    2. Governance & Management of IT
    3. Information Systems Acquisition, Development, and Implementation
    4. Information Systems Operations, Maintenance, and Support
    5. Protection of Information Assets

    This CISA Certified System Auditor training course is not suitable for beginners. It is required that delegates possess at least five years of exposure in the field of Information Systems Auditing. With this information in mind, it is expected that CISA qualified candidates have an outstanding level of professional experience, commitment, and extensive knowledge of IS Auditing. Thus, a CISA qualification is likely to open many doors and propel certified individuals into a high ranking position within the enterprise.

    The five domains within the course are as follows:

    • The Process of Auditing Information Systems
    • Governance & Management of IT
    • Information Systems Acquisition, Development, and Implementation
    • Information Systems Operations, Maintenance, and Support
    • Protection of Information Assets

    The course content surrounds the pivotal Five Domains. The information imparted within each domain is as follows:

    Domain 1: Information Systems Audit Process:

    • Developing a risk-based IT audit strategy
    • Planning specific audits
    • Conducting audits to IS audit standards
    • Implementation of risk management and control practices

    Domain 2: IT Governance and Management:

    • Effectiveness of IT Governance structure
    • IT organizational structure and human resources (personnel) management
    • Organisations IT policies, standards, and procedures
    • Adequacy of the Quality Management System
    • IT management and monitoring controls
    • IT resource investment
    • IT contracting strategies and policies
    • Management of organizations IT-related risks
    • Monitoring and assurance practices
    • Organization business continuity plan

    Domain 3: Information Systems Acquisition, Development, and Implementation:

    • Business case development for IS acquisition, development, maintenance, and retirement
    • Project management practices and controls
    • Conducting reviews of project management practices
    • Controls for requirements, acquisition, development, and testing phases
    • Readiness for Information Systems
    • Project Plan Reviewing
    • Post Implementation System Reviews

    Domain 4: Information Systems Operations, Maintenance, and Support:

    • Conduct periodic reviews of organizations objectives
    • Service level management
    • Third-party management practices
    • Operations and end-user procedures
    • Process of information systems maintenance
    • Data administration practices determine the integrity and optimization of databases
    • Use of capacity and performance monitoring tools and techniques
    • Problem and incident management practices
    • Change, configuration, and release management practices
    • Adequacy of backup and restore provisions
    • Organizations disaster recovery plan in the event of a disaster

    Domain 5: Protection of Information Assets:

    • Information security policies, standards and procedures
    • Design, implementing, monitoring of system and logical security controls
    • Design, implementing, monitoring of data classification processes and procedures
    • Design, implementing, monitoring of physical access and environmental controls
    • Processes and procedures to store, retrieve, transport and dispose of information assets

    The CISA essential for professionals dealing with controlling, monitoring, and assessing an organizations information technology and business systems. This includes:

    • IS/IT auditors/consultants
    • IT compliance managers
    • Chief Compliance Officers
    • Chief risk & privacy officers
    • Security heads/directors
    • Security managers/architects

    The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals, or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs.

    There are no prerequisites to learn CISA from this tutorial. However, to get the CISA certification you need to:

    • Pass the CISA examination
    • Submit an application for CISA certification
    • Adhere to the Code of Professional Ethics
    • Dedicate to the Continuing Professional Education Program
    • Compliance with the Information Systems Auditing Standards

    The examination is open to all individuals who have an interest in information systems audit, control, and security. A minimum of 5 years of professional information systems auditing, control or security work experience is required for the CISA certification.

      Datum op aanvraag

    Follow Up Courses

    Filter
    • 3 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 3 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 5 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 5 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 3 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 4 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 5 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 5 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 4 Dagen
      Datum op aanvraag
      Price on Request
      Book Now
    • 2 Dagen
      Datum op aanvraag
      Price on Request
      Book Now

    Know someone who´d be interested in this course?
    Let them know...

    Use the hashtag #InsoftLearning to talk about this course and find students like you on social media.