Certified Information Systems Auditor (CISA) Course Overview:
Certified Information Systems Auditor (CISA) is a prestigious certification for information systems auditors. The CISA certification serves as a concrete validation of an individual’s expertise in skillfully auditing, controlling, monitoring, and evaluating the information technology and business systems within an organization.
This project-based course offers a comprehensive learning experience for individuals aspiring to become Certified Information Systems Auditors. Students will gain practical knowledge through real-world case studies, hands-on exercises, and simulations. The course covers a wide range of topics, from fundamental auditing concepts to advanced techniques in IT governance and risk management. Students will engage in practical projects and assignments to reinforce their learning and acquire the necessary skills to excel in their roles as Information Systems Auditors.
Certified Information Systems Auditor (CISA) Course Outline:
Module 1: Introduction to Cybersecurity
- Understanding the fundamentals of cybersecurity
- Overview of different types of security threats and attacks
- Introduction to security policies, procedures, and standards
- Role and Responsibilities of a cybersecurity professional
Module 2: Network Security
- Understanding network security concepts and protocols
- Securing network devices, such as routers, switches, and firewalls
- Network segmentation and isolation techniques
- Wireless network security and best practices
Module 3: Security Infrastructure and Access Management
- Implementing secure network architecture and design principles
- Access control models and methods
- Identity and access management (IAM) concepts
- Secure authentication and authorization mechanisms
Module 4: Cryptography and Public Key Infrastructure (PKI)
- Introduction to Cryptography and encryption algorithms
- Public key infrastructure (PKI) and certificate authorities (CAs)
- Securing communications with VPNs and secure protocols
- Cryptographic attacks and countermeasures
Module 5: Threats and Vulnerabilities
- Common types of cybersecurity threats and attacks
- Identifying and assessing system vulnerabilities
- Malware types, characteristics, and mitigation strategies
- Social engineering attacks and defensive techniques
Module 6: Risk Management and Incident Response
- Risk assessment and management principles
- Incident response planning and procedures
- Business continuity and disaster recovery planning
- Security awareness and training programs
Module 7: Security Operations and Monitoring
- Security operations and monitoring processes
- Security event and information management (SIEM)
- Intrusion detection and prevention systems (IDS/IPS)
- Vulnerability scanning and management
Module 8: Application, Data, and Host Security
- Secure software development lifecycle (SDLC)
- Web application security and best practices
- Data classification and protection methods
- Host security, including endpoint protection and hardening
Module 9: Cloud and Virtualization Security
- Introduction to cloud computing and Virtualization
- Cloud security considerations and controls
- Securing virtual environments and hypervisors
- Cloud service models and deployment models
Module 10: Compliance and Operational Security
- Legal and regulatory compliance requirements
- Security policies, procedures, and documentation
- Incident handling and investigations
- Physical security and environmental controls
- Become Job Ready
- Become an expert in the field.
- Increase earning potential.
Certified Information Systems Auditor (CISA) Course Fees & Dates for Upcoming Classroom Classes In 2024
Classroom | Virtual | |
Date | 16th Apr – 8th Jun, 2024 | 16th Apr – 8th Jun, 2024 |
Fees | ₦350,000 | ₦350,000 |
Training Days | Tues & Wed | Tues & Wed |
Training Time | 1pm – 4pm | 1pm – 4pm |
Location | 123a Obadina street Lagos | Zoom & Microsoft Teams |