Certified Information Systems Auditor (CISA) Online Certificate Course

Prepare For The CISA Certification Exam

Certified Information Systems Auditor (CISA) Online Certificate Course

NOW ONLY

£179

Save £520 (74%)
OFF RRP £699
Get Info Pack

Study CISA Online Course and Prepare for the CISA Certification Exam

The CISA Online Course (CISA) covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.

CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA Course is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.

What you will learn with our CISA Online Course

  • Introduction to CISA
  • The Process of Auditing Information Systems
  • Governance and Management of IT
  • Information Systems Acquisition, Development, and Implementation
  • Information Systems Operations, Maintenance and Support

How will the CISA course be delivered?

Courses are accessed online by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

  1. Learn the fundamentals of Certified Information Systems Auditor (CISA)
  2. Comprehensive 6 module Accredited Certificate in Certified Information Systems Auditor (CISA) Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Certified Information Systems Auditor (CISA) experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

CISA Course - Requirements

The CISA Course is delivered 100 percent online 24/7.

To successfully complete this course, a student must:

  • Have access to the internet and the necessary technical skills to navigate the online learning resources
  • Have access to any mobile device with internet connectivity (laptop, desktop, tablet)
  • Be a self-directed learner
  • Possess sound language and literacy skills

Quick Course Facts

  1. Course content is structured for easy comprehension
  2. Registered students gain unrestricted access to the CISA Course
  3. All course material is available online 24/7 and can be accessed using any device
  4. Study online from anywhere in your own time at your own pace
  5. All students who complete the course will be awarded with a certificate of completion

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Course Introduction

  • Introduction
  • Course Introduction

Module 01 -The Process of Auditing Information Systems

  • Introduction
  • Lesson 1: Management of the Audit Function
  • Organization of the IS Audit Function
  • IS Audit Resource Management
  • Audit Planning Part1
  • Audit Planning Part2
  • Audit Planning Part3
  • Audit Planning Part4
  • Audit Planning Part5
  • Effect of Laws and Regulations on IS Audit Planning Part1
  • Effect of Laws and Regulations on IS Audit Planning Part2
  • Effect of Laws and Regulations on IS Audit Planning Part3
  • Effect of Laws and Regulations on IS Audit Planning Part4
  • Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1
  • ISACA IT Audit and Assurance Standards and Guidelines Part2
  • ISACA IT Audit and Assurance Standards and Guidelines Part3
  • ISACA IT Audit and Assurance Standards and Guidelines Part4
  • ISACA IT Audit And Assurance Standards Framework
  • Auditing Standards Part1
  • Auditing Standards Part2
  • Auditing Standards Part3
  • Auditing Standards Part4
  • Auditing Standards Part5
  • Auditing Standards Part6
  • Auditing Standards Part7
  • Auditing Standards Part8
  • Auditing Standards Part9
  • Audit Guidelines Part1
  • Audit Guidelines Part2
  • Audit Guidelines Part3
  • Audit Guidelines Part4
  • Audit Guidelines Part5
  • Audit Guidelines Part6
  • Audit Guidelines Part7
  • Audit Guidelines Part8
  • Audit Guidelines Part9
  • Audit Guidelines Part10
  • Audit Guidelines Part11
  • Audit Guidelines Part12
  • Audit and Assurance Tools and Techniques
  • Relationship Among Standards, Guidelines, and Tools and Techniques
  • Information Technology Assurance Framework
  • Information Technology Assurance Framework Components
  • ITAF General Standards (Section 2200) Part1
  • ITAF General Standards (Section 2200) Part2
  • ITAF Performance Standards (Section 2400) Part1
  • ITAF Performance Standards (Section 2400) Part2
  • ITAF Performance Standards (Section 2400) Part3
  • ITAF Performance Standards (Section 2400) Part4
  • Reporting Standards (Section 2600) Part1
  • Reporting Standards (Section 2600) Part2
  • Reporting Standards (Section 2600) Part3
  • IT Assurance Guidelines (Section 3000) Part1
  • IT Assurance Guidelines (Section 3000) Part2
  • IT Assurance Guidelines (Section 3000) Part3
  • IT Assurance Guidelines (Section 3000) Part4
  • IT Assurance Guidelines (Section 3000) Part5
  • IT Assurance Guidelines (Section 3000) Part6
  • IT Assurance Guidelines (Section 3000) Part7
  • IT Assurance Guidelines (Section 3000) Part8
  • IT Assurance Guidelines (Section 3000) Part9
  • IT Assurance Guidelines (Section 3000) Part10
  • IT Assurance Guidelines (Section 3000) Part11
  • Lesson 3: Risk Analysis
  • Risk Analysis Part1
  • Risk Analysis Part2
  • Risk Analysis Part3
  • Risk Analysis Part4
  • Risk Analysis Part5
  • Risk Analysis Part6
  • Risk Analysis Part7
  • Lesson 4: Internal Controls
  • Internal Control Objectives
  • IS Control Objectives Part1
  • IS Control Objectives Part2
  • IS Control Objectives Part3
  • COBIT
  • General Controls Part1
  • General Controls Part2
  • IS Controls
  • Lesson 5: Performing An IS Audit
  • Performing an IS Audit
  • Classification of Audits
  • Audit Programs Part1
  • Audit Programs Part2
  • Audit Methodology Part1
  • Audit Methodology Part2
  • Audit Methodology Part3
  • Fraud Detection Part1
  • Fraud Detection Part2
  • Risk-Based Auditing Part1
  • Risk-Based Auditing Part2
  • Risk-Based Auditing Part3
  • Audit Risk and Materiality Part1
  • Audit Risk and Materiality Part2
  • Audit Risk and Materiality Part3
  • Audit Risk and Materiality Part4
  • Audit Risk and Materiality Part5
  • Risk Assessment and Treatment Part1
  • Risk Assessment and Treatment Part2
  • Risk Assessment and Treatment Part3
  • Risk Assessment and Treatment Part4
  • Risk Assessment and Treatment Part5
  • Risk Assessment Techniques Part1
  • Risk Assessment Techniques Part2
  • Risk Assessment Techniques Part3
  • Risk Assessment Techniques Part4
  • Audit Objectives Part1
  • Audit Objectives Part2
  • Compliance Versus Substantive Testing Part1
  • Compliance Versus Substantive Testing Part2
  • Compliance Versus Substantive Testing Part3
  • Evidence Part1
  • Evidence Part2
  • Evidence Part3
  • Interviewing and Observing Personnel in the Performance Of Their Duties
  • Sampling Part1
  • Sampling Part2
  • Sampling Part3
  • Using The Services Of Other Auditors And Experts Part1
  • Using The Services Of Other Auditors And Experts Part2
  • Computer-Assisted Audit Techniques (CAAT) Part1
  • Computer-Assisted Audit Techniques (CAAT) Part2
  • Evaluation Of Audit Strengths And Weaknesses Part1
  • Evaluation Of Audit Strengths And Weaknesses Part2
  • Evaluation Of Audit Strengths And Weaknesses Part3
  • Communicating Audit Results Part1
  • Communicating Audit Results Part2
  • Communicating Audit Results Part3
  • Management Implementation Of Recommendations
  • Audit Documentation
  • Lesson 6: Control Self-Assessment Part1
  • Control Self-Assessment Part2
  • Control Self-Assessment Part3
  • Objectives of CSA
  • Benefits of CSA
  • Disadvantages of CSA
  • Auditor Role in CSA
  • Technology Drivers for CSA
  • Traditional Versus CSA Approach
  • Lesson 7: The Evolving IS Audit Process
  • Automated Work Papers Part1
  • Automated Work Papers Part2
  • Integrated Auditing Part1
  • Integrated Auditing Part2
  • Integrated Auditing Part3
  • Continuous Auditing Part1
  • Continuous Auditing Part2
  • Continuous Auditing Part3
  • Continuous Auditing Part4
  • Continuous Auditing Part5
  • Section Review

Module 02 - Governance and Management of IT

  • Introduction
  • Lesson 1: Corporate Governance
  • Corporate Governance Part1
  • Corporate Governance Part2
  • Corporate Governance Part3
  • Lesson 2: IT Governance
  • IT Governance Part1
  • IT Governance Part2
  • Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
  • IT Monitoring and Assurance Practices for Board and Senior Management Part1
  • IT Monitoring and Assurance Practices for Board and Senior Management Part2
  • IT Monitoring and Assurance Practices for Board and Senior Management Part3
  • Best Practices for IT Governance Part1
  • Best Practices for IT Governance Part2
  • Best Practices for IT Governance Part3
  • Best Practices for IT Governance Part4
  • IT Governance Frameworks
  • Audit Role in IT Governance Part1
  • Audit Role in IT Governance Part2
  • Audit Role in IT Governance Part3
  • Audit Role in IT Governance Part4
  • IT Strategy Committee
  • IT Balanced Scorecard Part1
  • IT Balanced Scorecard Part2
  • Information Security Governance Part1
  • Information Security Governance Part2
  • Information Security Governance Part3
  • Information Security Governance Part4
  • Importance of Information Security Governance Part1
  • Importance of Information Security Governance Part2
  • Outcomes of Security Governance Part1
  • Outcomes of Security Governance Part2
  • Effective Information Security Governance
  • Roles and Responsibilities of Senior Management and Board of Directors Part1
  • Roles and Responsibilities of Senior Management and Board of Directors Part2
  • Enterprise Architecture
  • Lesson 4: Information Systems Strategy
  • Strategic Planning Part1
  • Strategic Planning Part2
  • Steering Committee
  • Lesson 5: Maturity and Process Improvement Models
  • Maturity and Process Improvement Models
  • Lesson 6: IT Investment and Allocation Practices
  • IT Investment and Allocation Practices Part1
  • IT Investment and Allocation Practices Part2
  • IT Investment and Allocation Practices Part3
  • IT Investment and Allocation Practices Part4
  • Implement IT Portfolio Management
  • IT Portfolio Management Versus Balanced Scorecard
  • Lesson 7: Policies and Procedures
  • Policies Part1
  • Policies Part2
  • Policies Part3
  • Information Security Policy Part1
  • Information Security Policy Part2
  • Information Security Policy Part3
  • Information Security Policy Part4
  • Information Security Policy Part5
  • Information Security Policy Part6
  • Information Security Policy Part7
  • Procedures Part1
  • Procedures Part2
  • Lesson 8: Risk Management
  • Risk Management
  • Developing a Risk Management Program
  • Risk Management Process Part1
  • Risk Management Process Part2
  • Risk Management Process Part3
  • Risk Management Process Part4
  • Risk Management Process Part5
  • Risk Management Process Part6
  • Risk Analysis Methods Part1
  • Risk Analysis Methods Part2
  • Risk Analysis Methods Part3
  • Risk Analysis Methods Part4
  • Risk Analysis Methods Part5
  • Lesson 9: IS Management Practices
  • Human Resource Management Part1
  • Human Resource Management Part2
  • Human Resource Management Part3
  • Human Resource Management Part4
  • Human Resource Management Part5
  • Human Resource Management Part6
  • Human Resource Management Part7
  • Human Resource Management Part8
  • Human Resource Management Part9
  • Human Resource Management Part10
  • Human Resource Management Part11
  • Human Resource Management Part12
  • Human Resource Management Part13
  • Human Resource Management Part14
  • Organizational Change Management
  • Financial Management Practices
  • Quality Management Part1
  • Quality Management Part2
  • Quality Management Part3
  • Information Security Management
  • Performance Optimization Part1
  • Performance Optimization Part2
  • Performance Optimization Part3
  • Lesson 10: IS Organizational Structure and Responsibilities
  • IS Roles and Responsibilities Part1
  • IS Roles and Responsibilities Part2
  • IS Roles and Responsibilities Part3
  • Segregation of Duties
  • Segregation of Duties Controls Part1
  • Segregation of Duties Controls Part2
  • Compensating Controls for Lack of Segregation
  • Lesson 11: Auditing IT Governance Structure and Implementation
  • Reviewing Documentation Part1
  • Reviewing Documentation Part2
  • Reviewing Contractual Commitments
  • Lesson 12: Business Continuity Planning Part1
  • Business Continuity Planning Part2
  • Business Continuity Planning Part3
  • IS Business Continuity Planning
  • Disasters and Other Disruptive Events Part1
  • Disasters and Other Disruptive Events Part2
  • Business Continuity Planning Process
  • Business Continuity Policy
  • Business Impact Analysis Part1
  • Business Impact Analysis Part2
  • Classification of Operations and Criticality Analysis
  • Development of Business Continuity Plans
  • Other Issues and Plan Development
  • Components of a BCP Part1
  • Components of a BCP Part2
  • BCP Testing Part1
  • BCP Testing Part2
  • BCP Testing Part3
  • BCP Maintenance
  • Summary of BCP
  • Section Review

Module 03 - Information Systems Acquisition, Development and Implementation

  • Lesson 1: Business Realization Part1
  • Business Realization Part2
  • Portfolio/Program Management Part1
  • Portfolio/Program Management Part2
  • Portfolio/Program Management Part3
  • Portfolio/Program Management Part4
  • Portfolio/Program Management Part5
  • Business Case Development and Approval Part1
  • Business Case Development and Approval Part2
  • Benefits Realization Techniques
  • Lesson 2: Project Management Structure
  • Project Context and Environment
  • Project Organizational Forms Part1
  • Project Organizational Forms Part2
  • Project Communication and Culture
  • Project Objectives Part1
  • Project Objectives Part2
  • Project Objectives Part3
  • Roles and Responsibilities of Groups and Individuals Part1
  • Roles and Responsibilities of Groups and Individuals Part2
  • Roles and Responsibilities of Groups and Individuals Part3
  • Lesson 3: Project Management Practices
  • Initiation of a Project
  • Project Planning
  • Example of Project Management for New Software
  • Software Size Estimation
  • Lines of Source Code
  • Function Point Analysis (FPA)
  • Function Points
  • Cost Budgets
  • Software Cost Estimation
  • Scheduling and Establishing the Timeframe
  • Critical Path Methodology
  • Gantt Charts
  • Program Evaluation Review Technique (PERT)
  • Time Box Management
  • General Project Management
  • Project Controlling Part1
  • Project Controlling Part2
  • Management of Resource Usage
  • Management of Risk Part1
  • Management of Risk Part2
  • Closing a Project
  • Lesson 4: Business Application Development Part1
  • Business Application Development Part2
  • Business Application Development Part3
  • Business Application Development Part4
  • Business Application Development Part5
  • Traditional SDLC Approach
  • SDLC Phases
  • SDLC
  • Integrated Resource Management Systems Part1
  • Integrated Resource Management Systems Part2
  • Integrated Resource Management Systems Part3
  • Description of SDLC Phases Part1
  • Description of SDLC Phases Part2
  • Description of SDLC Phases Part3
  • Description of SDLC Phases Part4
  • Description of SDLC Phases Part5
  • Description of SDLC Phases Part6
  • Description of SDLC Phases Part7
  • Description of SDLC Phases Part8
  • Description of SDLC Phases Part9
  • Description of SDLC Phases Part10
  • Description of SDLC Phases Part11
  • Description of SDLC Phases Part12
  • Description of SDLC Phases Part13
  • Description of SDLC Phases Part14
  • Description of SDLC Phases Part15
  • Description of SDLC Phases Part16
  • Description of SDLC Phases Part17
  • Description of SDLC Phases Part18
  • Description of SDLC Phases Part19
  • Description of SDLC Phases Part20
  • Description of SDLC Phases Part21
  • Description of SDLC Phases Part22
  • Description of SDLC Phases Part23
  • Risks Associated with Software Development Part1
  • Risks Associated with Software Development Part2
  • Lesson 5: Business Application Systems
  • Electronic Commerce
  • E-Commerce Models
  • E-Commerce Architectures
  • E-Commerce Risks
  • E-Commerce Requirements
  • E-Commerce Audit and Control Issues or Best Practices
  • Components of PKI
  • Electronic Data Interchange
  • General Requirements of EDI
  • Traditional EDI
  • Web Based EDI
  • EDI Risks and Controls
  • Controls in EDI Environment Part1
  • Controls in EDI Environment Part2
  • Controls in EDI Environment Part3
  • Controls in EDI Environment Part4
  • E-Mail
  • E-Mail Security Issues
  • Standards for E-Mail Security Part1
  • Standards for E-Mail Security Part2
  • Standards for E-Mail Security Part3
  • Point-Of-Sale Systems (POS)
  • Electronic Banking Part1
  • Electronic Banking Part2
  • Risk Management Challenges in E-Banking
  • Risk Management Controls for E-Banking Part1
  • Risk Management Controls for E-Banking Part2
  • Electronic Finance
  • Payment Systems
  • Electronic Money Model
  • Electronic Checks Model
  • Electronic Transfer Model
  • Electronic Funds Transfer
  • Controls in an EFT Environment Part1
  • Controls in an EFT Environment Part2
  • Automated Teller Machines Part1
  • Automated Teller Machines Part2
  • Image Processing Part1
  • Image Processing Part2
  • Business Intelligence
  • Decision Support System (DSS)
  • DSS Frameworks
  • Customer Relation Management (CRM)
  • Supply Chain Management (SCM)
  • Lesson 6: Alternative Forms of Software Project Organization Part1
  • Alternative Forms of Software Project Organization Part2
  • Alternative Forms of Software Project Organization Part3
  • Agile Development
  • Prototyping
  • Rapid Application Development (RAD)
  • Lesson 7: Alternative Development Methods
  • Data Oriented System Development
  • Object Oriented System Development Part1
  • Object Oriented System Development Part2
  • Component-Based Development
  • Web-Based Application Development
  • Software Reengineering
  • Reverse Engineering
  • Lesson 8: Infrastructure Development/Acquisition Practices Part1
  • Infrastructure Development/Acquisition Practices Part2
  • Infrastructure Development/Acquisition Practices Part3
  • Project Phases of Physical Architecture Analysis Part1
  • Planning Implementation of Infrastructure Part1
  • Planning Implementation of Infrastructure Part2
  • Critical Success Factors
  • Hardware Acquisition
  • Acquisition Steps Part1
  • Acquisition Steps Part2
  • System Software Acquisition
  • System Software Implementation
  • System Software Change Control Procedures
  • Lesson 9: Information Systems Maintenance Practices
  • Change Management Process Overview
  • Deploying Changes
  • Documentation
  • Testing Changed Programs
  • Auditing Program Changes
  • Emergency Changes
  • Change Exposures (Unauthorized Changes)
  • Configuration Management Part1
  • Configuration Management Part2
  • Lesson 10: System Development Tools And Productivity Aids
  • Code Generators
  • Computer Aided Software Engineering Part1
  • Computer Aided Software Engineering Part2
  • Computer Aided Software Engineering Part3
  • Fourth-Generation Languages (4GL) Part1
  • Fourth-Generation Languages (4GL) Part2
  • Lesson 11: Business Process Reengineering And Process Change Projects
  • Business Process Reengineering And Process Change Projects Continued
  • Benchmarking Process Part1
  • Benchmarking Process Part2
  • The Benchmarking Process
  • ISO 9126
  • Software Capability Maturity Model
  • ISO 15504
  • Lesson 12: Application Controls
  • Inputs Controls Part1
  • Inputs Controls Part2
  • Inputs Controls Part3
  • Inputs Controls Part4
  • Processing Procedures And Controls
  • Processing Controls
  • Data File Control Procedures
  • Output Controls Part1
  • Output Controls Part2
  • Business Process Control Assurance
  • Lesson 13: Auditing Application Controls Part1
  • Auditing Application Controls Part2
  • Risk Assessment Model To Analyze Application Controls
  • Observing And Testing User Performing Procedures
  • Data Integrity Testing
  • Example Of Referential And Relational Integrity
  • Data Integrity In Online Transaction Processing Systems
  • Test Application Systems
  • Continuous Online Auditing
  • Online Auditing Techniques
  • Lesson 14: Auditing Systems Development, Acquisition And Maintenance
  • Project Management
  • Feasibility Study
  • Requirements Definition
  • Software Acquisition Process
  • Detailed Design And Development
  • Testing
  • Implementation Phase
  • Post Implementation Review
  • System Change Procedures And The Program Migration Process
  • Section Review

Module 04 - Information Systems Operations, Maintenance and Support

  • Introduction
  • Lesson 1: Information Systems Operations
  • Management of IS Operations
  • Service Management Part1
  • Service Management Part2
  • Service Management Part3
  • Service Management Part4
  • Service Management Part5
  • Service Level Part1
  • Service Level Part2
  • Infrastructure Operations
  • Scheduling Part1
  • Scheduling Part2
  • Monitoring Use of Resources
  • Process of Incident Handling
  • Problem Management
  • Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions
  • Support/Helpdesk Part1
  • Support/Helpdesk Part2
  • Change Management Process Part1
  • Change Management Process Part2
  • Release Management Part1
  • Release Management Part2
  • Information Security Management
  • Media Sanitization
  • Lesson 2: Information Systems Hardware
  • Computer Hardware Components and Architecture
  • Common Enterprise Backend Devices
  • Specialized Devices
  • Risks
  • Security Control
  • Radiofrequency Identification
  • RFID Applications
  • RFID Risks
  • RFID Security Control
  • Hardware Maintenance Program
  • Hardware Monitoring Procedures
  • Capacity Management Part1
  • Capacity Management Part2
  • Lesson 3: IS Architecture and Software Part1
  • IS Architecture and Software Part2
  • Operating Systems
  • Software Integrity Issues Part1
  • Software Integrity Issues Part2
  • Activity Logging and Reporting Options
  • Data Communication Software
  • Data Management
  • File Organization
  • Database Management Systems Part1
  • Database Management Systems Part2
  • Example of Data in DBMSrchitecture
  • DBMS Metadata Architecture
  • Database Structure
  • Relational Database
  • Database Models
  • Relational Database Model
  • Database Controls
  • Tape and Disk Management Systems
  • Utility Programs
  • Software Licensing Issues Part1
  • Software Licensing Issues Part2
  • Software Licensing Issues Part3
  • Digital Rights Management
  • Lesson 4: Network Infrastructure
  • Enterprise Network Architecture
  • Types of Networks
  • Network Services
  • Network Standards and Protocols
  • OSI Architecture
  • OSI Layers
  • Application of the OSI Model in Network Architectures
  • Local Area Network
  • Network Physical Media Specifications
  • Implementation of WANs
  • LAN Media Access Technologies
  • LAN Components
  • OSI Layer Diagram
  • LAN Technology Selection Criteria
  • Wide Area Networks Part1
  • Wide Area Networks Part2
  • WAN Devices
  • WAN Technologies
  • Wireless Networks
  • Wireless Wide Area Networks
  • Wireless Local Area Networks Part1
  • Wireless Local Area Networks Part2
  • Wireless Security
  • Wireless Application Protocol
  • Risks of Wireless Communications Part1
  • Risks of Wireless Communications Part2
  • World Wide Web Services
  • General Internet Terminology
  • Network Administration and Control
  • Network Performance Metrics
  • Network Management Issues
  • Network Management Tools
  • Client/Server Technology Part1
  • Client/Server Technology Part2
  • Client/Server Technology Part3
  • Client/Server Technology Part4
  • Client/Server Technology Part5
  • Lesson 5: Disaster Recovery Planning
  • Recovery Point Objective and Recovery Time Objective Part1
  • Recovery Point Objective and Recovery Time Objective Part2
  • Recovery Strategies Part1
  • Recovery Strategies Part2
  • Recovery Strategies Part3
  • Application Disaster Recovery Methods Part1
  • Application Disaster Recovery Methods Part2
  • Data Storage Disaster Recovery Methods
  • Telecommunication Networks Disaster Recovery Methods
  • Methods for Network Protection
  • Development of Disaster Recovery Plans
  • Organization and Assignment Of Responsibilities Part1
  • Organization and Assignment Of Responsibilities Part2
  • Organization and Assignment Of Responsibilities Part3
  • Backup and Restoration
  • Off-Site Library Controls
  • Types of Backup Devices and Media Part1
  • Types of Backup Devices and Media Part2
  • Periodic Backup Procedures
  • Frequency of Rotation
  • Backup Schemes
  • Module 04 Review

Module 05 - Protection of Information Assets

  • Introduction
  • Lesson 1: Importance Of Information Security
  • Key Elements of Information Security Management
  • Information Security Management Roles and Responsibilities
  • Inventory and Classification of Information Assets Part1
  • Inventory and Classification of Information Assets Part2
  • System Access Permission Part1
  • System Access Permission Part2
  • Mandatory and Discretionary Access Controls
  • Privacy Management Issue and the Role of IS Auditors Part1
  • Privacy Management Issue and the Role of IS Auditors Part2
  • Critical Success Factors to Information Security Management
  • Information Security and External Parties
  • Identification of Risks Related to External Parties
  • Addressing Security When Dealing with Customers
  • Addressing Security and Third-Party Agreements Part1
  • Addressing Security and Third-Party Agreements Part2
  • Human Resources Security and Third Parties Part1
  • Human Resources Security and Third Parties Part2
  • Computer Crime Issues and Exposures Part1
  • Computer Crime Issues and Exposures Part2
  • Types of Computer Crimes Part1
  • Types of Computer Crimes Part2
  • Peer to Peer, Instant Messaging, Data Leakage and Web-Based Technologies
  • Security Incident Handling and Response Part1
  • Security Incident Handling and Response Part2
  • Lesson 2: Logical Access
  • Logical Access Exposures
  • Familiarization with the Enterprise IT Environment
  • Paths of Logical Access
  • General Points of Entry
  • Logical Access Control Software
  • Identification and Authentication
  • Features of Passwords Part1
  • Features of Passwords Part2
  • Identification and Authentication Best Practices
  • Token Devices, One-Time Passwords
  • Management of Biometrics
  • Single Sign-On Part1
  • Single Sign-On Part2
  • Authorization Issues
  • Access Control Lists
  • Logical Access Security Administration
  • Remote Access Security Part1
  • Remote Access Security Part2
  • Common Connectivity Methods Part1
  • Common Connectivity Methods Part2
  • Remote Access Using PDAs
  • Access Issues with Mobile Technology
  • Access Rights to System Logs
  • Tools for Audit Trail Analysis
  • Use of Intrusion Detection
  • Storing, Retrieving, Transporting and Disposing of Confidential Information
  • Lesson 3: Network Infrastructure Security
  • LAN Security
  • Virtualization
  • Client/Server Security Part1
  • Client/Server Security Part2
  • Client/Server Security Part3
  • Wireless Security Threats and Risks Mitigation Part1
  • Wireless Security Threats and Risks Mitigation Part2
  • Internet Threats and Security
  • Network Security Threats
  • Internet Security Control Audits
  • Firewall Security Systems
  • Common Attacks Against a Firewall
  • Examples of Firewall Implementation
  • Intrusion Detection
  • Describing IDS and IPS Deployment
  • Encryption Part1
  • Encryption Part2
  • Uses of Encryption
  • Viruses
  • Technical Controls Against Viruses
  • AV Software
  • Voice Over IP
  • Private Branch Exchange
  • Lesson 4: Auditing Information Security Management Framework Part1
  • Auditing Information Security Management Framework Part2
  • Auditing Logical Access
  • Techniques for Testing Security
  • Lesson 5: Auditing Network Infrastructure Security
  • Auditing Remote Access
  • Network Penetration Test
  • Types of Penetration Tests
  • Full Network Assessment Reviews
  • Development and Authorization of Network Changes
  • Unauthorized Changes
  • Computer Forensics
  • Chain of Evidence
  • Lesson 6: Environmental Exposures and Controls Part1
  • Environmental Exposures and Controls Part2
  • Lesson 7: Physical Access Exposures and Controls
  • Physical Access Exposures
  • Physical Access Controls
  • Auditing Physical Access
  • Lesson 8: Mobile Computing Part1
  • Mobile Computing Part2
  • Module 05 Review
  • Course Closure

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

1.  Who are Courses For Success?

Courses For Success is a global course platform that started in 2008 with 5 courses, since then we have grown to over 10,000 online courses. As our courses are delivered online via the internet, we sell our courses worldwide.

Our courses span across many categories including Academic, Animal, Beauty, Business, Career, Counseling, Creative & Media, Health & Therapy, Hobbies & Trades, IT, Personal Development, Sports & Fitness.

Some of the companies we work with include Groupon, Living Social, CNN, Entrepreneur, Mashable, Reed UK, Stack Social and many more.

2.  Is there a refund/cancellation policy?

Yes, we have a 7-day money-back refund guarantee. Just send us an email to email/info)(coursesforsuccess.com with the subject Courses For Success Refund so we can accommodate your request.

3.  What is the FREE Personal Success Training Program?

The Personal Success Training Program was developed by Courses For Success to help our customers achieve success. Currently, we are offering this program for FREE with every course or bundle purchase this month. This is a limited time offer! We have received thousands of reviews for this program, please see: Personal Success Training Program Reviews

4.  Are there any requirements to study this course?

No, anyone who has an interest in learning more about this subject matter is encouraged to take our course. There are no entry requirements to take this course.

5.  Do I require to have finished high school to complete this course?

No, you do not require a High School Diploma or to have finished school to study this course, this course is open to anyone who would like to take this course.

6.  What if English is not my first language?

This course is provided in English, however, due to the digital nature of our training, you can take your time studying the material and make use of tools such as google translate and Grammarly.

7.  Is this course online or conducted in person?

All our courses are accessible online on any device. You may complete them at your own pace and at your own time.

8.  How do I receive my course?

After you have completed the payment, you will receive a confirmation email and tax receipt. You will also receive an email containing your course login details (username and password), as well as instructions on how to access and log in to your course via the internet with any device, please check your junk/spam folder in the event that you do not receive the email.

9.  When does this course start?

Providing you have internet access you can start this course whenever you like, just go to the login page and insert your username and password and you can access the online material.

10.  What is online learning like?

Online learning is easy, if not easier than a traditional academic situation. By studying an online course, the usual boundaries caused by location and time constraints are eliminated, meaning you are free to study where and when you want at your own pace. Of course, you will need to be able to self-manage your time and be organized, but with our help, you’ll soon find yourself settling into a comfortable rhythm of study.

11.  What computer skills do I need for my course?

You don't need to be a computer expert to succeed with our online training, but you should be comfortable typing, using the internet and be capable of using common software (such as Microsoft word).

12.  How long will you have access to the online course?

There is no time limit for completing this course, it can be studied in your own time at your own pace. Once you have purchased this course you will have unlimited lifetime access, meaning you can access this course whenever you want.

13.  How long will my course take?

Please see number of Hours to complete on Course Duration, under course summary.

14.  What is included with the course?

The onetime fee includes all training materials, including online content, diagrams, videos if included, interactive instructions and quizzes, plus you will receive a certificate upon completion.

15.  Do I need to buy textbooks?

All the required material for your course is included in the online system, you do not need to buy anything else.

16.  Is the course interactive?

Yes, all our courses are interactive.

17.  Is there an assessment or exam?

Yes, you will be required to complete a multiple-choice test online at the end of your course, you can do this test as many times as you require.

18.  What type of certificate will I receive?

You will receive a Certificate of Completion that is applicable worldwide, which demonstrates your commitment to learning new skills. You can share the certificate with your friends, relatives, co-workers and potential employers. Also, include it in your resume/CV, professional social media profiles and job applications.

Wendy Sue Hunt - 5 STAR REVIEW
"If you are considering taking any “Courses for Success”, I would highly recommend it. I have always been a firm believer it’s important to always sharpen your skills. You are never too old to learn more. I found the courses very helpful, interesting and easy to understand.
The term “Courses for Success” helped me in my current position to succeed. After completing the courses, I gave my manager the completion certificates. Recently I received a promotion too."
Valencia Marie Aviles - 5 STAR REVIEW
"I had a very good experience with my course. It has helped me to get multiple jobs and prepared me for almost everything I would need to know. The course was very informative and easy to understand and broken up perfectly to be done in a short amount of time while still learning a good amount! I would recommend Courses for Success to anyone trying to get abs certifications for job advancements, it is well worth it!"
ELENA GRIFFIN - 5 STAR REVIEW
"I have absolutely enjoyed the materials from Courses for Success. The materials are easy to understand which makes learning enjoyable. Courses for Success have great topics of interest which make you come back for more.
Thank you Courses for Success for being part of my learning journey and making education affordable!"

Our completion certificates are very valuable and will help you progress in your work environment and show employers how committed you are to learn new skills, you might even get a promotion.

19.  Will this course be credited by universities?

No, it is not equivalent to a college or university credit.

20.  Am I guaranteed to get a job with this certificate?

This course will give you the skills you need to help you obtain employment, but it’s up to you if you get the job or not.

21.  How will this course assist me with my career?

Studying and completing this course will show employers that you have the knowledge in this field, additionally you will gain more confidence in this area of expertise.

22.  How long is the certificate valid for?

The Certificates are valid for life and do not need renewing. 

23.  Can I take more than one course at a time?

Courses are studied online at your own pace and you are free to study as many or as few courses as you wish, we also offer online course bundles that allow you to save on additional courses so that you may get all the topics related to your training goals in one go.

24.  What are the Payment Methods available? Is there a payment plan?

We accept payments via PayPal, Credit Card, Bank Transfer and Amazon Pay for the USA. For payment plans, we offer Sezzle for USA & Canada, Afterpay for Australia & New Zealand. *For faster transaction Credit Card payments are preferred. Please purchase online via our website course product page or contact us at email/info)(coursesforsuccess.com, to pay via bank transfer.

25.  Can I purchase for multiple people?

Yes, you can do this by purchasing individually via website or send us a request via email at email/info)(coursesforsuccess.com

26.  Can I request for an invoice before purchase?

Yes, you can request for an invoice via email at email/info)(coursesforsuccess.com

27.  Purchase for a gift?

Yes, you can purchase this course as a gift, simply send an email to email/info)(coursesforsuccess.com, with the course details and we can accommodate this.

28.  Can I create my own course bundle?

Yes, you can customize your own bundle. Please send us the complete list with the exact course link of the courses you'd like to bundle up via email email/info)(coursesforsuccess.com and we will create them for you. *Each course access, time of completion and certification varies depending on the course type.

29.  How will I contact Courses For Success if I have any questions?

You can contact our support team, at any time through live chat on our website, or email at email/info)(coursesforsuccess.com, or by calling one of our phone numbers depending on which country you are in.  

About this Course

Study CISA Online Course and Prepare for the CISA Certification Exam

The CISA Online Course (CISA) covers all the six domains of the CISA exam offered by the Information Systems Audit and Control Association (ISACA). CISA exam has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams to prepare for the CISA certification exam.

CISA is one of the most popular and high-demand IT certifications available in the market, approximately, more than 60,000 professionals hold CISA certification. The CISA Course is also consistently named one of the best professional certifications to have by the leading analysts around the world. The course offers the students to gain comprehensive knowledge and concepts that are required to pass the CISA certification exam.

What you will learn with our CISA Online Course

  • Introduction to CISA
  • The Process of Auditing Information Systems
  • Governance and Management of IT
  • Information Systems Acquisition, Development, and Implementation
  • Information Systems Operations, Maintenance and Support

How will the CISA course be delivered?

Courses are accessed online by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

  1. Learn the fundamentals of Certified Information Systems Auditor (CISA)
  2. Comprehensive 6 module Accredited Certificate in Certified Information Systems Auditor (CISA) Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Certified Information Systems Auditor (CISA) experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

CISA Course - Requirements

The CISA Course is delivered 100 percent online 24/7.

To successfully complete this course, a student must:

  • Have access to the internet and the necessary technical skills to navigate the online learning resources
  • Have access to any mobile device with internet connectivity (laptop, desktop, tablet)
  • Be a self-directed learner
  • Possess sound language and literacy skills

Quick Course Facts

  1. Course content is structured for easy comprehension
  2. Registered students gain unrestricted access to the CISA Course
  3. All course material is available online 24/7 and can be accessed using any device
  4. Study online from anywhere in your own time at your own pace
  5. All students who complete the course will be awarded with a certificate of completion

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Course Introduction

  • Introduction
  • Course Introduction

Module 01 -The Process of Auditing Information Systems

  • Introduction
  • Lesson 1: Management of the Audit Function
  • Organization of the IS Audit Function
  • IS Audit Resource Management
  • Audit Planning Part1
  • Audit Planning Part2
  • Audit Planning Part3
  • Audit Planning Part4
  • Audit Planning Part5
  • Effect of Laws and Regulations on IS Audit Planning Part1
  • Effect of Laws and Regulations on IS Audit Planning Part2
  • Effect of Laws and Regulations on IS Audit Planning Part3
  • Effect of Laws and Regulations on IS Audit Planning Part4
  • Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1
  • ISACA IT Audit and Assurance Standards and Guidelines Part2
  • ISACA IT Audit and Assurance Standards and Guidelines Part3
  • ISACA IT Audit and Assurance Standards and Guidelines Part4
  • ISACA IT Audit And Assurance Standards Framework
  • Auditing Standards Part1
  • Auditing Standards Part2
  • Auditing Standards Part3
  • Auditing Standards Part4
  • Auditing Standards Part5
  • Auditing Standards Part6
  • Auditing Standards Part7
  • Auditing Standards Part8
  • Auditing Standards Part9
  • Audit Guidelines Part1
  • Audit Guidelines Part2
  • Audit Guidelines Part3
  • Audit Guidelines Part4
  • Audit Guidelines Part5
  • Audit Guidelines Part6
  • Audit Guidelines Part7
  • Audit Guidelines Part8
  • Audit Guidelines Part9
  • Audit Guidelines Part10
  • Audit Guidelines Part11
  • Audit Guidelines Part12
  • Audit and Assurance Tools and Techniques
  • Relationship Among Standards, Guidelines, and Tools and Techniques
  • Information Technology Assurance Framework
  • Information Technology Assurance Framework Components
  • ITAF General Standards (Section 2200) Part1
  • ITAF General Standards (Section 2200) Part2
  • ITAF Performance Standards (Section 2400) Part1
  • ITAF Performance Standards (Section 2400) Part2
  • ITAF Performance Standards (Section 2400) Part3
  • ITAF Performance Standards (Section 2400) Part4
  • Reporting Standards (Section 2600) Part1
  • Reporting Standards (Section 2600) Part2
  • Reporting Standards (Section 2600) Part3
  • IT Assurance Guidelines (Section 3000) Part1
  • IT Assurance Guidelines (Section 3000) Part2
  • IT Assurance Guidelines (Section 3000) Part3
  • IT Assurance Guidelines (Section 3000) Part4
  • IT Assurance Guidelines (Section 3000) Part5
  • IT Assurance Guidelines (Section 3000) Part6
  • IT Assurance Guidelines (Section 3000) Part7
  • IT Assurance Guidelines (Section 3000) Part8
  • IT Assurance Guidelines (Section 3000) Part9
  • IT Assurance Guidelines (Section 3000) Part10
  • IT Assurance Guidelines (Section 3000) Part11
  • Lesson 3: Risk Analysis
  • Risk Analysis Part1
  • Risk Analysis Part2
  • Risk Analysis Part3
  • Risk Analysis Part4
  • Risk Analysis Part5
  • Risk Analysis Part6
  • Risk Analysis Part7
  • Lesson 4: Internal Controls
  • Internal Control Objectives
  • IS Control Objectives Part1
  • IS Control Objectives Part2
  • IS Control Objectives Part3
  • COBIT
  • General Controls Part1
  • General Controls Part2
  • IS Controls
  • Lesson 5: Performing An IS Audit
  • Performing an IS Audit
  • Classification of Audits
  • Audit Programs Part1
  • Audit Programs Part2
  • Audit Methodology Part1
  • Audit Methodology Part2
  • Audit Methodology Part3
  • Fraud Detection Part1
  • Fraud Detection Part2
  • Risk-Based Auditing Part1
  • Risk-Based Auditing Part2
  • Risk-Based Auditing Part3
  • Audit Risk and Materiality Part1
  • Audit Risk and Materiality Part2
  • Audit Risk and Materiality Part3
  • Audit Risk and Materiality Part4
  • Audit Risk and Materiality Part5
  • Risk Assessment and Treatment Part1
  • Risk Assessment and Treatment Part2
  • Risk Assessment and Treatment Part3
  • Risk Assessment and Treatment Part4
  • Risk Assessment and Treatment Part5
  • Risk Assessment Techniques Part1
  • Risk Assessment Techniques Part2
  • Risk Assessment Techniques Part3
  • Risk Assessment Techniques Part4
  • Audit Objectives Part1
  • Audit Objectives Part2
  • Compliance Versus Substantive Testing Part1
  • Compliance Versus Substantive Testing Part2
  • Compliance Versus Substantive Testing Part3
  • Evidence Part1
  • Evidence Part2
  • Evidence Part3
  • Interviewing and Observing Personnel in the Performance Of Their Duties
  • Sampling Part1
  • Sampling Part2
  • Sampling Part3
  • Using The Services Of Other Auditors And Experts Part1
  • Using The Services Of Other Auditors And Experts Part2
  • Computer-Assisted Audit Techniques (CAAT) Part1
  • Computer-Assisted Audit Techniques (CAAT) Part2
  • Evaluation Of Audit Strengths And Weaknesses Part1
  • Evaluation Of Audit Strengths And Weaknesses Part2
  • Evaluation Of Audit Strengths And Weaknesses Part3
  • Communicating Audit Results Part1
  • Communicating Audit Results Part2
  • Communicating Audit Results Part3
  • Management Implementation Of Recommendations
  • Audit Documentation
  • Lesson 6: Control Self-Assessment Part1
  • Control Self-Assessment Part2
  • Control Self-Assessment Part3
  • Objectives of CSA
  • Benefits of CSA
  • Disadvantages of CSA
  • Auditor Role in CSA
  • Technology Drivers for CSA
  • Traditional Versus CSA Approach
  • Lesson 7: The Evolving IS Audit Process
  • Automated Work Papers Part1
  • Automated Work Papers Part2
  • Integrated Auditing Part1
  • Integrated Auditing Part2
  • Integrated Auditing Part3
  • Continuous Auditing Part1
  • Continuous Auditing Part2
  • Continuous Auditing Part3
  • Continuous Auditing Part4
  • Continuous Auditing Part5
  • Section Review

Module 02 - Governance and Management of IT

  • Introduction
  • Lesson 1: Corporate Governance
  • Corporate Governance Part1
  • Corporate Governance Part2
  • Corporate Governance Part3
  • Lesson 2: IT Governance
  • IT Governance Part1
  • IT Governance Part2
  • Lesson 3: IT Monitoring and Assurance Practices for Board and Senior Management
  • IT Monitoring and Assurance Practices for Board and Senior Management Part1
  • IT Monitoring and Assurance Practices for Board and Senior Management Part2
  • IT Monitoring and Assurance Practices for Board and Senior Management Part3
  • Best Practices for IT Governance Part1
  • Best Practices for IT Governance Part2
  • Best Practices for IT Governance Part3
  • Best Practices for IT Governance Part4
  • IT Governance Frameworks
  • Audit Role in IT Governance Part1
  • Audit Role in IT Governance Part2
  • Audit Role in IT Governance Part3
  • Audit Role in IT Governance Part4
  • IT Strategy Committee
  • IT Balanced Scorecard Part1
  • IT Balanced Scorecard Part2
  • Information Security Governance Part1
  • Information Security Governance Part2
  • Information Security Governance Part3
  • Information Security Governance Part4
  • Importance of Information Security Governance Part1
  • Importance of Information Security Governance Part2
  • Outcomes of Security Governance Part1
  • Outcomes of Security Governance Part2
  • Effective Information Security Governance
  • Roles and Responsibilities of Senior Management and Board of Directors Part1
  • Roles and Responsibilities of Senior Management and Board of Directors Part2
  • Enterprise Architecture
  • Lesson 4: Information Systems Strategy
  • Strategic Planning Part1
  • Strategic Planning Part2
  • Steering Committee
  • Lesson 5: Maturity and Process Improvement Models
  • Maturity and Process Improvement Models
  • Lesson 6: IT Investment and Allocation Practices
  • IT Investment and Allocation Practices Part1
  • IT Investment and Allocation Practices Part2
  • IT Investment and Allocation Practices Part3
  • IT Investment and Allocation Practices Part4
  • Implement IT Portfolio Management
  • IT Portfolio Management Versus Balanced Scorecard
  • Lesson 7: Policies and Procedures
  • Policies Part1
  • Policies Part2
  • Policies Part3
  • Information Security Policy Part1
  • Information Security Policy Part2
  • Information Security Policy Part3
  • Information Security Policy Part4
  • Information Security Policy Part5
  • Information Security Policy Part6
  • Information Security Policy Part7
  • Procedures Part1
  • Procedures Part2
  • Lesson 8: Risk Management
  • Risk Management
  • Developing a Risk Management Program
  • Risk Management Process Part1
  • Risk Management Process Part2
  • Risk Management Process Part3
  • Risk Management Process Part4
  • Risk Management Process Part5
  • Risk Management Process Part6
  • Risk Analysis Methods Part1
  • Risk Analysis Methods Part2
  • Risk Analysis Methods Part3
  • Risk Analysis Methods Part4
  • Risk Analysis Methods Part5
  • Lesson 9: IS Management Practices
  • Human Resource Management Part1
  • Human Resource Management Part2
  • Human Resource Management Part3
  • Human Resource Management Part4
  • Human Resource Management Part5
  • Human Resource Management Part6
  • Human Resource Management Part7
  • Human Resource Management Part8
  • Human Resource Management Part9
  • Human Resource Management Part10
  • Human Resource Management Part11
  • Human Resource Management Part12
  • Human Resource Management Part13
  • Human Resource Management Part14
  • Organizational Change Management
  • Financial Management Practices
  • Quality Management Part1
  • Quality Management Part2
  • Quality Management Part3
  • Information Security Management
  • Performance Optimization Part1
  • Performance Optimization Part2
  • Performance Optimization Part3
  • Lesson 10: IS Organizational Structure and Responsibilities
  • IS Roles and Responsibilities Part1
  • IS Roles and Responsibilities Part2
  • IS Roles and Responsibilities Part3
  • Segregation of Duties
  • Segregation of Duties Controls Part1
  • Segregation of Duties Controls Part2
  • Compensating Controls for Lack of Segregation
  • Lesson 11: Auditing IT Governance Structure and Implementation
  • Reviewing Documentation Part1
  • Reviewing Documentation Part2
  • Reviewing Contractual Commitments
  • Lesson 12: Business Continuity Planning Part1
  • Business Continuity Planning Part2
  • Business Continuity Planning Part3
  • IS Business Continuity Planning
  • Disasters and Other Disruptive Events Part1
  • Disasters and Other Disruptive Events Part2
  • Business Continuity Planning Process
  • Business Continuity Policy
  • Business Impact Analysis Part1
  • Business Impact Analysis Part2
  • Classification of Operations and Criticality Analysis
  • Development of Business Continuity Plans
  • Other Issues and Plan Development
  • Components of a BCP Part1
  • Components of a BCP Part2
  • BCP Testing Part1
  • BCP Testing Part2
  • BCP Testing Part3
  • BCP Maintenance
  • Summary of BCP
  • Section Review

Module 03 - Information Systems Acquisition, Development and Implementation

  • Lesson 1: Business Realization Part1
  • Business Realization Part2
  • Portfolio/Program Management Part1
  • Portfolio/Program Management Part2
  • Portfolio/Program Management Part3
  • Portfolio/Program Management Part4
  • Portfolio/Program Management Part5
  • Business Case Development and Approval Part1
  • Business Case Development and Approval Part2
  • Benefits Realization Techniques
  • Lesson 2: Project Management Structure
  • Project Context and Environment
  • Project Organizational Forms Part1
  • Project Organizational Forms Part2
  • Project Communication and Culture
  • Project Objectives Part1
  • Project Objectives Part2
  • Project Objectives Part3
  • Roles and Responsibilities of Groups and Individuals Part1
  • Roles and Responsibilities of Groups and Individuals Part2
  • Roles and Responsibilities of Groups and Individuals Part3
  • Lesson 3: Project Management Practices
  • Initiation of a Project
  • Project Planning
  • Example of Project Management for New Software
  • Software Size Estimation
  • Lines of Source Code
  • Function Point Analysis (FPA)
  • Function Points
  • Cost Budgets
  • Software Cost Estimation
  • Scheduling and Establishing the Timeframe
  • Critical Path Methodology
  • Gantt Charts
  • Program Evaluation Review Technique (PERT)
  • Time Box Management
  • General Project Management
  • Project Controlling Part1
  • Project Controlling Part2
  • Management of Resource Usage
  • Management of Risk Part1
  • Management of Risk Part2
  • Closing a Project
  • Lesson 4: Business Application Development Part1
  • Business Application Development Part2
  • Business Application Development Part3
  • Business Application Development Part4
  • Business Application Development Part5
  • Traditional SDLC Approach
  • SDLC Phases
  • SDLC
  • Integrated Resource Management Systems Part1
  • Integrated Resource Management Systems Part2
  • Integrated Resource Management Systems Part3
  • Description of SDLC Phases Part1
  • Description of SDLC Phases Part2
  • Description of SDLC Phases Part3
  • Description of SDLC Phases Part4
  • Description of SDLC Phases Part5
  • Description of SDLC Phases Part6
  • Description of SDLC Phases Part7
  • Description of SDLC Phases Part8
  • Description of SDLC Phases Part9
  • Description of SDLC Phases Part10
  • Description of SDLC Phases Part11
  • Description of SDLC Phases Part12
  • Description of SDLC Phases Part13
  • Description of SDLC Phases Part14
  • Description of SDLC Phases Part15
  • Description of SDLC Phases Part16
  • Description of SDLC Phases Part17
  • Description of SDLC Phases Part18
  • Description of SDLC Phases Part19
  • Description of SDLC Phases Part20
  • Description of SDLC Phases Part21
  • Description of SDLC Phases Part22
  • Description of SDLC Phases Part23
  • Risks Associated with Software Development Part1
  • Risks Associated with Software Development Part2
  • Lesson 5: Business Application Systems
  • Electronic Commerce
  • E-Commerce Models
  • E-Commerce Architectures
  • E-Commerce Risks
  • E-Commerce Requirements
  • E-Commerce Audit and Control Issues or Best Practices
  • Components of PKI
  • Electronic Data Interchange
  • General Requirements of EDI
  • Traditional EDI
  • Web Based EDI
  • EDI Risks and Controls
  • Controls in EDI Environment Part1
  • Controls in EDI Environment Part2
  • Controls in EDI Environment Part3
  • Controls in EDI Environment Part4
  • E-Mail
  • E-Mail Security Issues
  • Standards for E-Mail Security Part1
  • Standards for E-Mail Security Part2
  • Standards for E-Mail Security Part3
  • Point-Of-Sale Systems (POS)
  • Electronic Banking Part1
  • Electronic Banking Part2
  • Risk Management Challenges in E-Banking
  • Risk Management Controls for E-Banking Part1
  • Risk Management Controls for E-Banking Part2
  • Electronic Finance
  • Payment Systems
  • Electronic Money Model
  • Electronic Checks Model
  • Electronic Transfer Model
  • Electronic Funds Transfer
  • Controls in an EFT Environment Part1
  • Controls in an EFT Environment Part2
  • Automated Teller Machines Part1
  • Automated Teller Machines Part2
  • Image Processing Part1
  • Image Processing Part2
  • Business Intelligence
  • Decision Support System (DSS)
  • DSS Frameworks
  • Customer Relation Management (CRM)
  • Supply Chain Management (SCM)
  • Lesson 6: Alternative Forms of Software Project Organization Part1
  • Alternative Forms of Software Project Organization Part2
  • Alternative Forms of Software Project Organization Part3
  • Agile Development
  • Prototyping
  • Rapid Application Development (RAD)
  • Lesson 7: Alternative Development Methods
  • Data Oriented System Development
  • Object Oriented System Development Part1
  • Object Oriented System Development Part2
  • Component-Based Development
  • Web-Based Application Development
  • Software Reengineering
  • Reverse Engineering
  • Lesson 8: Infrastructure Development/Acquisition Practices Part1
  • Infrastructure Development/Acquisition Practices Part2
  • Infrastructure Development/Acquisition Practices Part3
  • Project Phases of Physical Architecture Analysis Part1
  • Planning Implementation of Infrastructure Part1
  • Planning Implementation of Infrastructure Part2
  • Critical Success Factors
  • Hardware Acquisition
  • Acquisition Steps Part1
  • Acquisition Steps Part2
  • System Software Acquisition
  • System Software Implementation
  • System Software Change Control Procedures
  • Lesson 9: Information Systems Maintenance Practices
  • Change Management Process Overview
  • Deploying Changes
  • Documentation
  • Testing Changed Programs
  • Auditing Program Changes
  • Emergency Changes
  • Change Exposures (Unauthorized Changes)
  • Configuration Management Part1
  • Configuration Management Part2
  • Lesson 10: System Development Tools And Productivity Aids
  • Code Generators
  • Computer Aided Software Engineering Part1
  • Computer Aided Software Engineering Part2
  • Computer Aided Software Engineering Part3
  • Fourth-Generation Languages (4GL) Part1
  • Fourth-Generation Languages (4GL) Part2
  • Lesson 11: Business Process Reengineering And Process Change Projects
  • Business Process Reengineering And Process Change Projects Continued
  • Benchmarking Process Part1
  • Benchmarking Process Part2
  • The Benchmarking Process
  • ISO 9126
  • Software Capability Maturity Model
  • ISO 15504
  • Lesson 12: Application Controls
  • Inputs Controls Part1
  • Inputs Controls Part2
  • Inputs Controls Part3
  • Inputs Controls Part4
  • Processing Procedures And Controls
  • Processing Controls
  • Data File Control Procedures
  • Output Controls Part1
  • Output Controls Part2
  • Business Process Control Assurance
  • Lesson 13: Auditing Application Controls Part1
  • Auditing Application Controls Part2
  • Risk Assessment Model To Analyze Application Controls
  • Observing And Testing User Performing Procedures
  • Data Integrity Testing
  • Example Of Referential And Relational Integrity
  • Data Integrity In Online Transaction Processing Systems
  • Test Application Systems
  • Continuous Online Auditing
  • Online Auditing Techniques
  • Lesson 14: Auditing Systems Development, Acquisition And Maintenance
  • Project Management
  • Feasibility Study
  • Requirements Definition
  • Software Acquisition Process
  • Detailed Design And Development
  • Testing
  • Implementation Phase
  • Post Implementation Review
  • System Change Procedures And The Program Migration Process
  • Section Review

Module 04 - Information Systems Operations, Maintenance and Support

  • Introduction
  • Lesson 1: Information Systems Operations
  • Management of IS Operations
  • Service Management Part1
  • Service Management Part2
  • Service Management Part3
  • Service Management Part4
  • Service Management Part5
  • Service Level Part1
  • Service Level Part2
  • Infrastructure Operations
  • Scheduling Part1
  • Scheduling Part2
  • Monitoring Use of Resources
  • Process of Incident Handling
  • Problem Management
  • Detection,Documentation,Control,Resolution and Reporting of Abnormal Conditions
  • Support/Helpdesk Part1
  • Support/Helpdesk Part2
  • Change Management Process Part1
  • Change Management Process Part2
  • Release Management Part1
  • Release Management Part2
  • Information Security Management
  • Media Sanitization
  • Lesson 2: Information Systems Hardware
  • Computer Hardware Components and Architecture
  • Common Enterprise Backend Devices
  • Specialized Devices
  • Risks
  • Security Control
  • Radiofrequency Identification
  • RFID Applications
  • RFID Risks
  • RFID Security Control
  • Hardware Maintenance Program
  • Hardware Monitoring Procedures
  • Capacity Management Part1
  • Capacity Management Part2
  • Lesson 3: IS Architecture and Software Part1
  • IS Architecture and Software Part2
  • Operating Systems
  • Software Integrity Issues Part1
  • Software Integrity Issues Part2
  • Activity Logging and Reporting Options
  • Data Communication Software
  • Data Management
  • File Organization
  • Database Management Systems Part1
  • Database Management Systems Part2
  • Example of Data in DBMSrchitecture
  • DBMS Metadata Architecture
  • Database Structure
  • Relational Database
  • Database Models
  • Relational Database Model
  • Database Controls
  • Tape and Disk Management Systems
  • Utility Programs
  • Software Licensing Issues Part1
  • Software Licensing Issues Part2
  • Software Licensing Issues Part3
  • Digital Rights Management
  • Lesson 4: Network Infrastructure
  • Enterprise Network Architecture
  • Types of Networks
  • Network Services
  • Network Standards and Protocols
  • OSI Architecture
  • OSI Layers
  • Application of the OSI Model in Network Architectures
  • Local Area Network
  • Network Physical Media Specifications
  • Implementation of WANs
  • LAN Media Access Technologies
  • LAN Components
  • OSI Layer Diagram
  • LAN Technology Selection Criteria
  • Wide Area Networks Part1
  • Wide Area Networks Part2
  • WAN Devices
  • WAN Technologies
  • Wireless Networks
  • Wireless Wide Area Networks
  • Wireless Local Area Networks Part1
  • Wireless Local Area Networks Part2
  • Wireless Security
  • Wireless Application Protocol
  • Risks of Wireless Communications Part1
  • Risks of Wireless Communications Part2
  • World Wide Web Services
  • General Internet Terminology
  • Network Administration and Control
  • Network Performance Metrics
  • Network Management Issues
  • Network Management Tools
  • Client/Server Technology Part1
  • Client/Server Technology Part2
  • Client/Server Technology Part3
  • Client/Server Technology Part4
  • Client/Server Technology Part5
  • Lesson 5: Disaster Recovery Planning
  • Recovery Point Objective and Recovery Time Objective Part1
  • Recovery Point Objective and Recovery Time Objective Part2
  • Recovery Strategies Part1
  • Recovery Strategies Part2
  • Recovery Strategies Part3
  • Application Disaster Recovery Methods Part1
  • Application Disaster Recovery Methods Part2
  • Data Storage Disaster Recovery Methods
  • Telecommunication Networks Disaster Recovery Methods
  • Methods for Network Protection
  • Development of Disaster Recovery Plans
  • Organization and Assignment Of Responsibilities Part1
  • Organization and Assignment Of Responsibilities Part2
  • Organization and Assignment Of Responsibilities Part3
  • Backup and Restoration
  • Off-Site Library Controls
  • Types of Backup Devices and Media Part1
  • Types of Backup Devices and Media Part2
  • Periodic Backup Procedures
  • Frequency of Rotation
  • Backup Schemes
  • Module 04 Review

Module 05 - Protection of Information Assets

  • Introduction
  • Lesson 1: Importance Of Information Security
  • Key Elements of Information Security Management
  • Information Security Management Roles and Responsibilities
  • Inventory and Classification of Information Assets Part1
  • Inventory and Classification of Information Assets Part2
  • System Access Permission Part1
  • System Access Permission Part2
  • Mandatory and Discretionary Access Controls
  • Privacy Management Issue and the Role of IS Auditors Part1
  • Privacy Management Issue and the Role of IS Auditors Part2
  • Critical Success Factors to Information Security Management
  • Information Security and External Parties
  • Identification of Risks Related to External Parties
  • Addressing Security When Dealing with Customers
  • Addressing Security and Third-Party Agreements Part1
  • Addressing Security and Third-Party Agreements Part2
  • Human Resources Security and Third Parties Part1
  • Human Resources Security and Third Parties Part2
  • Computer Crime Issues and Exposures Part1
  • Computer Crime Issues and Exposures Part2
  • Types of Computer Crimes Part1
  • Types of Computer Crimes Part2
  • Peer to Peer, Instant Messaging, Data Leakage and Web-Based Technologies
  • Security Incident Handling and Response Part1
  • Security Incident Handling and Response Part2
  • Lesson 2: Logical Access
  • Logical Access Exposures
  • Familiarization with the Enterprise IT Environment
  • Paths of Logical Access
  • General Points of Entry
  • Logical Access Control Software
  • Identification and Authentication
  • Features of Passwords Part1
  • Features of Passwords Part2
  • Identification and Authentication Best Practices
  • Token Devices, One-Time Passwords
  • Management of Biometrics
  • Single Sign-On Part1
  • Single Sign-On Part2
  • Authorization Issues
  • Access Control Lists
  • Logical Access Security Administration
  • Remote Access Security Part1
  • Remote Access Security Part2
  • Common Connectivity Methods Part1
  • Common Connectivity Methods Part2
  • Remote Access Using PDAs
  • Access Issues with Mobile Technology
  • Access Rights to System Logs
  • Tools for Audit Trail Analysis
  • Use of Intrusion Detection
  • Storing, Retrieving, Transporting and Disposing of Confidential Information
  • Lesson 3: Network Infrastructure Security
  • LAN Security
  • Virtualization
  • Client/Server Security Part1
  • Client/Server Security Part2
  • Client/Server Security Part3
  • Wireless Security Threats and Risks Mitigation Part1
  • Wireless Security Threats and Risks Mitigation Part2
  • Internet Threats and Security
  • Network Security Threats
  • Internet Security Control Audits
  • Firewall Security Systems
  • Common Attacks Against a Firewall
  • Examples of Firewall Implementation
  • Intrusion Detection
  • Describing IDS and IPS Deployment
  • Encryption Part1
  • Encryption Part2
  • Uses of Encryption
  • Viruses
  • Technical Controls Against Viruses
  • AV Software
  • Voice Over IP
  • Private Branch Exchange
  • Lesson 4: Auditing Information Security Management Framework Part1
  • Auditing Information Security Management Framework Part2
  • Auditing Logical Access
  • Techniques for Testing Security
  • Lesson 5: Auditing Network Infrastructure Security
  • Auditing Remote Access
  • Network Penetration Test
  • Types of Penetration Tests
  • Full Network Assessment Reviews
  • Development and Authorization of Network Changes
  • Unauthorized Changes
  • Computer Forensics
  • Chain of Evidence
  • Lesson 6: Environmental Exposures and Controls Part1
  • Environmental Exposures and Controls Part2
  • Lesson 7: Physical Access Exposures and Controls
  • Physical Access Exposures
  • Physical Access Controls
  • Auditing Physical Access
  • Lesson 8: Mobile Computing Part1
  • Mobile Computing Part2
  • Module 05 Review
  • Course Closure

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

1.  Who are Courses For Success?

Courses For Success is a global course platform that started in 2008 with 5 courses, since then we have grown to over 10,000 online courses. As our courses are delivered online via the internet, we sell our courses worldwide.

Our courses span across many categories including Academic, Animal, Beauty, Business, Career, Counseling, Creative & Media, Health & Therapy, Hobbies & Trades, IT, Personal Development, Sports & Fitness.

Some of the companies we work with include Groupon, Living Social, CNN, Entrepreneur, Mashable, Reed UK, Stack Social and many more.

2.  Is there a refund/cancellation policy?

Yes, we have a 7-day money-back refund guarantee. Just send us an email to email/info)(coursesforsuccess.com with the subject Courses For Success Refund so we can accommodate your request.

3.  What is the FREE Personal Success Training Program?

The Personal Success Training Program was developed by Courses For Success to help our customers achieve success. Currently, we are offering this program for FREE with every course or bundle purchase this month. This is a limited time offer! We have received thousands of reviews for this program, please see: Personal Success Training Program Reviews

4.  Are there any requirements to study this course?

No, anyone who has an interest in learning more about this subject matter is encouraged to take our course. There are no entry requirements to take this course.

5.  Do I require to have finished high school to complete this course?

No, you do not require a High School Diploma or to have finished school to study this course, this course is open to anyone who would like to take this course.

6.  What if English is not my first language?

This course is provided in English, however, due to the digital nature of our training, you can take your time studying the material and make use of tools such as google translate and Grammarly.

7.  Is this course online or conducted in person?

All our courses are accessible online on any device. You may complete them at your own pace and at your own time.

8.  How do I receive my course?

After you have completed the payment, you will receive a confirmation email and tax receipt. You will also receive an email containing your course login details (username and password), as well as instructions on how to access and log in to your course via the internet with any device, please check your junk/spam folder in the event that you do not receive the email.

9.  When does this course start?

Providing you have internet access you can start this course whenever you like, just go to the login page and insert your username and password and you can access the online material.

10.  What is online learning like?

Online learning is easy, if not easier than a traditional academic situation. By studying an online course, the usual boundaries caused by location and time constraints are eliminated, meaning you are free to study where and when you want at your own pace. Of course, you will need to be able to self-manage your time and be organized, but with our help, you’ll soon find yourself settling into a comfortable rhythm of study.

11.  What computer skills do I need for my course?

You don't need to be a computer expert to succeed with our online training, but you should be comfortable typing, using the internet and be capable of using common software (such as Microsoft word).

12.  How long will you have access to the online course?

There is no time limit for completing this course, it can be studied in your own time at your own pace. Once you have purchased this course you will have unlimited lifetime access, meaning you can access this course whenever you want.

13.  How long will my course take?

Please see number of Hours to complete on Course Duration, under course summary.

14.  What is included with the course?

The onetime fee includes all training materials, including online content, diagrams, videos if included, interactive instructions and quizzes, plus you will receive a certificate upon completion.

15.  Do I need to buy textbooks?

All the required material for your course is included in the online system, you do not need to buy anything else.

16.  Is the course interactive?

Yes, all our courses are interactive.

17.  Is there an assessment or exam?

Yes, you will be required to complete a multiple-choice test online at the end of your course, you can do this test as many times as you require.

18.  What type of certificate will I receive?

You will receive a Certificate of Completion that is applicable worldwide, which demonstrates your commitment to learning new skills. You can share the certificate with your friends, relatives, co-workers and potential employers. Also, include it in your resume/CV, professional social media profiles and job applications.

Wendy Sue Hunt - 5 STAR REVIEW
"If you are considering taking any “Courses for Success”, I would highly recommend it. I have always been a firm believer it’s important to always sharpen your skills. You are never too old to learn more. I found the courses very helpful, interesting and easy to understand.
The term “Courses for Success” helped me in my current position to succeed. After completing the courses, I gave my manager the completion certificates. Recently I received a promotion too."
Valencia Marie Aviles - 5 STAR REVIEW
"I had a very good experience with my course. It has helped me to get multiple jobs and prepared me for almost everything I would need to know. The course was very informative and easy to understand and broken up perfectly to be done in a short amount of time while still learning a good amount! I would recommend Courses for Success to anyone trying to get abs certifications for job advancements, it is well worth it!"
ELENA GRIFFIN - 5 STAR REVIEW
"I have absolutely enjoyed the materials from Courses for Success. The materials are easy to understand which makes learning enjoyable. Courses for Success have great topics of interest which make you come back for more.
Thank you Courses for Success for being part of my learning journey and making education affordable!"

Our completion certificates are very valuable and will help you progress in your work environment and show employers how committed you are to learn new skills, you might even get a promotion.

19.  Will this course be credited by universities?

No, it is not equivalent to a college or university credit.

20.  Am I guaranteed to get a job with this certificate?

This course will give you the skills you need to help you obtain employment, but it’s up to you if you get the job or not.

21.  How will this course assist me with my career?

Studying and completing this course will show employers that you have the knowledge in this field, additionally you will gain more confidence in this area of expertise.

22.  How long is the certificate valid for?

The Certificates are valid for life and do not need renewing. 

23.  Can I take more than one course at a time?

Courses are studied online at your own pace and you are free to study as many or as few courses as you wish, we also offer online course bundles that allow you to save on additional courses so that you may get all the topics related to your training goals in one go.

24.  What are the Payment Methods available? Is there a payment plan?

We accept payments via PayPal, Credit Card, Bank Transfer and Amazon Pay for the USA. For payment plans, we offer Sezzle for USA & Canada, Afterpay for Australia & New Zealand. *For faster transaction Credit Card payments are preferred. Please purchase online via our website course product page or contact us at email/info)(coursesforsuccess.com, to pay via bank transfer.

25.  Can I purchase for multiple people?

Yes, you can do this by purchasing individually via website or send us a request via email at email/info)(coursesforsuccess.com

26.  Can I request for an invoice before purchase?

Yes, you can request for an invoice via email at email/info)(coursesforsuccess.com

27.  Purchase for a gift?

Yes, you can purchase this course as a gift, simply send an email to email/info)(coursesforsuccess.com, with the course details and we can accommodate this.

28.  Can I create my own course bundle?

Yes, you can customize your own bundle. Please send us the complete list with the exact course link of the courses you'd like to bundle up via email email/info)(coursesforsuccess.com and we will create them for you. *Each course access, time of completion and certification varies depending on the course type.

29.  How will I contact Courses For Success if I have any questions?

You can contact our support team, at any time through live chat on our website, or email at email/info)(coursesforsuccess.com, or by calling one of our phone numbers depending on which country you are in.  

We provide a 7 Day Money Back Refund on all Courses

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value £300)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Training 2 Or More People?


Empower your business with access to 500+ job & soft skills online training courses.

SUCCESS PRO - For Business

Course Summary

Course ID: 009SRCISA
Delivery Mode: Online
Access: Unlimited lifetime
Tutor Support: Yes
Time: Study at your own pace
Duration: 15 Hours
Assessments: Yes
Qualification: Certificate of Completion

Popular Courses and Bundles

Get a FREE Career Planner