Course: Certified Information Systems Auditor (CISA)
Class Sessions: Saturdays
Duration: Four Months
Time: 8.00 AM – 1.00 PM
Tuition Fee: KSh. 52,000
Exam Fee: USD 710 Payable directly to ISACA
TARGET AUDIENCE AND PRE-REQUISITES:
Information systems management, audit, control and security professionals including the following:
- Aspiring IS auditors
- IT/IS Professionals
- Security managers / analysts
- Software Managers
- Infrastructure/Network Managers
The course is meant for IS and Business professionals specified in the target group as well as college graduates aspiring to become CISA certified.
Information technology, long considered as only an enabler of an organization’s strategy, is now regarded as an integral part of this business strategy. Strategic alignment between Information Technology and enterprise objectives is one of the critical success factors. With the changing landscape concerning security, corporate governance, IT service delivery and systems reliability as well as regulatory requirements, the CISA course becomes vital for information technology line and senior managers.
The course moulds information technology professionals into complete and competent individuals. The course covers the following five new CISA domain areas:
- The Process of Auditing Information Systems
- Governance and Management of IT
- Information Systems Acquisition, Development and Implementation
- Information Systems Operations, Maintenance and Support
- Protection of Information Assets
The course is delivered using a blended learning model of lectures, discussions, case studies, assessment and practical exercises using a highly-structured, learner-centered teaching methodology that ensures maximum learning. Helpful learning resources will be provided to fully prepare the student to pass the ISACA CISA certification exam.
The main objective of this course workshop is to provide a comprehensive understanding of Information Systems auditing. This course will equip participants with the knowledge and practical skills necessary to successfully perform an audit process. This programme also adequately prepares the participant to successfully write the CISA certification exam.
The following topics are presented and discussed to increase your understanding and abilities. CISA candidates are expected to have detailed understanding in each of these areas.
1. The Process of Auditing Information Systems
Provide audit services in accordance with IT audit standards to assist the organization with protecting and controlling information systems. The auditing process covers IS auditing standards; Risk-based approach; Controls; Audit objectives, planning & scope; Cobit; Field Work; Identifying conditions & defining reportable findings; Review of work; Audit Results Communication;
2. Governance and Management of IT
Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization’s strategy. IT governance structure, IT organizational structure and HR management; Evaluating IT Strategies; Evaluating IT policies, standards & procedures; IT Resource Investment; Evaluating Risk-management, monitoring and assurance practices;
3. Information Systems Acquisition, Development and Implementation
Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization’s strategies and objectives. Evaluation approach, Project Management; Functional Requirements, Feasibility Analysis; System Design; System Development; System; Acquisition, Implementation, Post-Implementation;
4. Information Systems Operations, Maintenance and Support
Provide assurance that the processes for information systems operations, maintenance and support meet the organization’s strategies and objectives. Service Level Management; Evaluating Systems Software; Evaluating Hardware Acquisition & Installation; Evaluating network infrastructure (voice & data); Evaluating change, configuration and release management; Capacity and Performance monitoring tools & techniques; Data Administration practices; Problem & Incident management practices.
5. Protection of Information Assets
Provide assurance that the organization’s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.
For candidates intending to sit for the CISA examinations with ISACA, more information is available from www.isaca.org/cisa
(1) MR. STEPHEN GACHOGU
Mr. Stephen Gachogu holds a Master of Science degree in Information Systems from the University of Nairobi, Bachelor of Science degree in Computing and Information Systems from the University of Portsmouth, United Kingdom and a Diploma in Education and has over 15 years experience in the ICT industry.
Mr. Gachogu has undergone extensive ICT training and undertaken a lot of research work on the design and implementation of enterprise IP networks. He holds certificates on Network Security, Wireless LANs and Security, WIMAX, VoIP, Backbone Routing, Internet Development Tools awarded by various institutions including USTTI-USA, IIT-Canada. He has attended other ICT courses in Kenya, South Africa, United Kingdom and the USA.
Mr. Gachogu is a qualified Information Systems Auditor (CISA-ISACA), Certified Ethical Hacker (CEH), Certified EC-Council Instructor (CEI), Certified Secure Computer User (CSCU), ECCouncil Certified Incident Handler (ECIH), and holds other active certifications in Cisco Certified Network Professional (CCNP), Cisco Certified Network Associate (CCNA), CCNA Security, Cisco Quality of Service Certified and is Cisco Networking Academy Instructor Trainer. His area of specialization information systems security and enterprise IP networks.