Training & Certifications

Certified Information Systems Auditor (CISA®)

Offered by ISACA®, Certified Information Systems Auditor (CISA®) is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s IT and business systems. The CISA® training program offered by Multimatics is designed to showcase your expertise and assert your ability to apply a risk-based approach to planning, executing and reporting on audit engagements. The training material is prepared based on the latest edition of CISA® exam outline, accompanied by discussions and exercises to work on the questions.

Multimatics is an Authorized Training Partner for the CISA® training and certification program accredited by the ISACA®.

At the end of the program, the participants will be able to :

  • Provide audit services in accordance with standards to assist organizations in protecting and controlling information systems
  • Identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies
  • Understand about IT controls and how IT relates to business
  • Understand about cybersecurity in information systems role, and its principles, best practices and pitfalls

IS/IT Auditors, Security Professionals, IS/IT Consultants, IS/IT Audit Managers and other professionals with work experience in information systems auditing, control or security.

The program provided by Multimatics will be delivered through interactive presentation by professional instructor(s), group debriefs, individual and team exercises, behavior modelling and roleplays, one-to-one and group discussion, case studies, and projects.

This program is 5 days of intensive training class.

Have a minimum five years of experience with audit, IT system, and security of information systems, systems administration experience, familiarity with TCP/IP and an understanding of UNIX, Linux, and windows.

Participants will take CISA® Exam which consists of 150 multiple choice questions. They will be given 4 hours to finish the exam. Participants who successfully passed the exam will be given an official Certified Information Systems Auditor (CISA®) certification from ISACA®.

  1. Planning

    1. IS Audit Standards, Guidelines, and Codes of Ethics
    2. Business Processes
    3. Types of Controls
    4. Risk-Based Audit Planning
    5. Types of Audits and Assessments
  2. Execution

    1. Audit Project Management
    2. Sampling Methodology
    3. Audit Evidence Collection Techniques
    4. Data Analytics
    5. Reporting and Communication Techniques
    6. Quality Assurance and Improvement of the Audit Process
  1. IT Governance

    1. IT Governance and IT Strategy
    2. IT-Related Frameworks
    3. IT Standards, Policies, and Procedures
    4. Organizational Structure
    5. Enterprise Architecture
    6. Enterprise Risk Management
    7. Maturity Models
    8. Laws, Regulations, and Industry Standards affecting the Organization
  2. IT Management

    1. IT Resource Management
    2. IT Service Provider Acquisition and Management
    3. IT Performance Monitoring and Reporting
    4. Quality Assurance and Quality Management of IT
  1. Information Systems Acquisition and Development

    1. Project Governance and Management
    2. Business Case and Feasibility Analysis
    3. System Development Methodologies
    4. Control Identification and Design
  2. Information Systems Implementation

    1. Testing Methodologies
    2. Configuration and Release Management
    3. System Migration, Infrastructure Deployment and Data Conversion
    4. Post-implementation Review
  1. Information Systems Operations

    1. Common Technology Components
    2. IT Asset Management
    3. Job Scheduling and Production Process Automation
    4. System Interfaces
    5. End-User Computing
    6. Data Governance
    7. Systems Performance Management
    8. Problem and Incident Management
    9. Change, Configuration, Release, and Patch Management
    10. IT Service Level Management
    11. Database Management
  2. Business Resilience

    1. Business Impact Analysis (BIA)
    2. System Resiliency
    3. Data Backup, Storage, and Restoration
    4. Business Continuity Plan (BCP)
    5. Disaster Recovery Plans (DRP)
  1. Information Asset Security and Control

    1. Information Asset Security Frameworks, Standards, and Guidelines
    2. Privacy Principles
    3. Physical Access and Environmental Controls
    4. Identity and Access Management
    5. Network and End-Point Security
    6. Data Classification
    7. Data Encryption and Encryption-Related Techniques
    8. Public Key Infrastructure (PKI)
    9. Web-Based Communication Techniques
    10. Virtualized Environments
    11. Mobile, Wireless, and Internet-of-Things (IoT) Devices
  2. Security Event Management

    1. Security Awareness Training and Programs
    2. Information System Attack Methods and Techniques
    3. Security Testing Tools and Techniques
    4. Security Monitoring Tools and Techniques
    5. Incident Response Management
    6. Evidence Collection and Forensics

Scroll to Top