Certified Information Systems Auditor - TH
PRICE LIST
35,500 Baht (Exclusive of VAT 7%)
Special Offer : ติดต่อเรา
This 5-days course is not an official ISACA training course; however, it is led by a Certified Information Systems Auditor (CISA) with over a decade of experience and familiarity with the ISACA resources. The training material is built from the latest version of review manual and QAE books but reorganized into an easy to-understand format.
To prepare for the ISACA's CISA examination
Day 1
- About ISACA
- Knowledge structure
- Domain 1 – Information System Auditing Process
- IS Audit Standards, Guidelines, Functions and Codes of Ethics
- Types of Audits, Assessments and Reviews
- Risk-Based Audit Planning
- Types of Controls and Considerations
- Audit Project Management
- Audit Testing and Sampling Methodology
- Audit Evidence Collection Techniques
- Audit Data Analytics
- Reporting and Communication Techniques
- Quality Assurance and Improvement of the Audit Process
- Sample questions
- Case study
Day 2
- Domain 2 – Governance and Management of IT
- Laws, Regulations and Industry Standards
- Organizational Structure, IT Governance and IT Strategy
- IT Policies, Standards, Procedures and Guidelines
- Enterprise Architecture and Considerations
- Enterprise Risk Management
- Data Privacy Program and Principles
- Data Governance and Classification
- IT Resource Management
- IT Vendor Management
- IT Performance Monitoring and Reporting
- Quality Assurance and Quality Management of IT
- Sample questions
- Case study
Day 3
- Domain 3 – Information Systems Acquisition and Development
- Project Governance and Management
- Business Case and Feasibility Analysis
- System Development Methodologies
- Control Identification and Design
- System Readiness and Implementation Testing
- Implementation Configuration and Release Management
- System Migration, Infrastructure Deployment and Data Conversion
- Postimplementation Review
- Sample questions
- Case study
Day 4
- Domain 4 – Information Systems Operations and Business Resilience
- IT Components
- IT Asset Management
- Job Scheduling and Production Process Automation
- System Interfaces
- End-User Computing and Shadow IT
- Systems Availability and Capacity Management
- Problem and Incident Management
- IT Change, Configuration and Patch Management
- Operational Log Management
- IT Service Level Management
- Database Management
- Business Impact Analysis
- System and Operational Resilience
- Data Backup, Storage and Restoration
- Business Continuity Plan
- Disaster Recovery Plans
- Sample questions
- Case study
Day 5
- Domain 5 – Protection of Information Assets
- Information Asset Security Policies, Frameworks, Standards and Guidelines
- Physical and Environmental Controls
- Identity and Access Management
- Network and Endpoint Security
- Data Loss Prevention
- Data Encryption
- Public Key Infrastructure
- Cloud and Virtualized Environments
- Mobile, Wireless and Internet of Things Devices
- Security Awareness Training and Programs
- Information System Attack Methods and Techniques
- Security Testing Tools and Techniques
- Security Monitoring Logs, Tools and Techniques
- Security Incident Response Management
- Evidence Collection and Forensics
- Sample questions
- Case study
- Recommendation on exam preparation

