Compass Technical Training in Quincy, Massachusetts1-617-481-9141 Compass Technical Training in Quincy, Massachusettsinfo@compasstechnicaltraining.com

ISACA Certifications

Now Offering
Student Loans


✔ 1-617-481-9141

Call Now
For More Information!

Now Offering
Student Loans


✔ 1-617-481-9141

Call Now
For More Information!

Special Financing Available
Payments as low as $100 per month

Information Systems Audit and Control Association (ISACA) Certifications

ISACA Certification: IT Audit, Security, Governance and Risk. Earn an ISACA certification and enhance your professional credibility. A CISA, CISM, and/or CRISC after your name confirms to employers that you possess the experience and knowledge to meet challenges the modern enterprise may confront.

Certified Information Systems Auditor (CISA) Training Course

An ISACA Certified Information Systems Auditor is recognized as one of the leading authorities in the areas of IS auditing, control, and information security. This official CISA training course provides you with in-depth coverage of the five CISA domains that are covered on the CISA exam. These domains include auditing information systems; IT governance and management of IT; information systems acquisition, development, and implementation; information systems operations, maintenance, and support; and protection of information assets.

This course is designed specifically for experienced information security professionals who are preparing to take the CISA exam.

Key Features of this CISA Training:
About the course:
  • Official ISACA Curriculum
  • Instructor led training and coaching benefit
  • Quiet classroom environment
  • Exam voucher included with course tuition
You will learn:
  • To prepare for and pass the Certified Information Systems Auditor (CISA) Exam
  • How to develop and implement a risk-based IT audit strategy in compliance with standards
  • Evaluate the effectiveness of an IT governance structure
  • Ensure the IT organizational structure and human resources (personnel) management support the organization's strategies and objectives
  • Review the information security policies, standards, and procedures for completeness and alignment with generally accepted practices
Registration:
  • Note: registration for ISACA classes must be completed at least 10 days prior to start date
CISA Course Outline

Certified Information Systems Auditor is issued by ISACA directed at people who are in charge of ensuring that an organization's IT and business systems are monitored, managed & protected.

The Certified Information Systems Auditor course will cover a variety of topics, including:

  • The Process of Auditing Information Systems
    • Develop and implement a risk-based IT audit strategy
    • Plan specific audits
    • Conduct audits in accordance with IT audit standards
    • Report audit findings and make recommendations to key stakeholders
    • Conduct follow-ups or prepare status reports
  • IT Governance and Management of IT
    • Evaluate the effectiveness of the IT governance structure
    • Evaluate IT organizational structure and human resources (personnel) management
    • Evaluate the organization's IT policies, standards, and procedures
    • Evaluate the adequacy of the quality management system
    • Evaluate IT management and monitoring of controls
    • Evaluate IT contracting strategies and policies, and contract management practices
    • Evaluate the organization's business continuity plan
    • Evaluate risk management practices
  • Information Systems Acquisition, Development, and Implementation
    • Evaluate the business case for proposed investments in information
    • Evaluate the project management practices and controls
    • Conduct reviews to determine whether a project is progressing in accordance with project plans
    • Evaluate controls for information systems
    • Evaluate the readiness of information systems for implementation and migration into production
    • Conduct post implementation reviews of systems
  • Information Systems Operations, Maintenance, and Support
    • Conduct periodic reviews of information systems
    • Evaluate service level management practices
    • Evaluate third-party management practices
    • Evaluate data administration practices
    • Evaluate the use of capacity and performance monitoring tools and techniques
    • Evaluate change, configuration, and release management practices
  • Protection of Information Assets
    • Conduct periodic reviews of information systems
    • Evaluate service level management practices
    • Evaluate third-party management practices
    • Evaluate data administration practices
    • Evaluate the use of capacity and performance monitoring tools and techniques
    • Evaluate change, configuration, and release management practices

Certified Information Security Manager (CISM) Training & Certification

Achieve CISM certification with this official ISACA course. Gain an in-depth knowledge of the four CISM domains: security governance; risk management and compliance; security program development and management; and security incident management.

This Certified Information Security Manager course is designed specifically for information security professionals who are preparing to take the CISM certification exam.

Key Features of this CISM Training:
About the course:
  • Official ISACA Curriculum
  • Instructor led training and coaching benefit
  • Quiet classroom environment
  • Exam voucher included with course tuition
You will learn:
  • To prepare for and pass the Certified Information Security Manager (CISM) exam
  • Develop an information security strategy and plan of action to implement the strategy
  • Manage and monitor information security risks
  • Build and maintain an information security plan both internally and externally
  • Implement policies and procedures to respond to and recover from disruptive and destructive information security events
Registration:
  • Note: registration for ISACA classes must be completed at least 10 days prior to start date
CISM Course Outline

The Certified Information Security Manager Exam is offered by ISACA, and recognizes individuals who manage, oversee and assess an enterprise's information security.

The Certified Information Security Manager course will cover a variety of topics, including:

  • Information Security Governance
    • Establish and maintain an information security strategy, and align the strategy with corporate governance
    • Establish and maintain an information security governance framework
    • Establish and maintain information security policies
    • Develop a business case
    • Identify internal and external influences to the organization
    • Obtain management commitment
    • Define roles and responsibilities
    • Establish, monitor, evaluate, and report metrics
  • Information Risk Management and Compliance
    • stablish a process for information asset classification and ownership
    • Identify legal, regulatory, organizational, and other applicable requirements
    • Ensure that risk assessments, vulnerability assessments, and threat analyses are conducted periodically
    • Determine appropriate risk treatment options
    • Evaluate information security controls
    • Identify the gap between current and desired risk levels
    • Integrate information risk management into business and IT processes
    • Monitor existing risk
    • Report noncompliance and other changes in information risk
  • Information Security Program Development and Management
    • Establish and maintain the information security program
    • Ensure alignment between the information security program and other business functions
    • Identify, acquire, manage, and define requirements for internal and external resources
    • Establish and maintain information security architectures
    • Establish, communicate, and maintain organizational information security standards, procedures, and guidelines
    • Establish and maintain a program for information security awareness and training
    • Integrate information security requirements into organizational processes
    • Integrate information security requirements into contracts and activities of third parties
    • Establish, monitor, and periodically report program management and operational metrics
  • Information Security Incident Management
    • Establish and maintain an organizational definition of, and severity hierarchy for, information security incidents
    • Establish and maintain an incident response plan
    • Develop and implement processes to ensure the timely identification of information security incidents
    • Establish and maintain processes to investigate and document information security incidents
    • Establish and maintain incident escalation and notification processes
    • Organize, train, and equip teams to effectively respond to information security incidents
    • Test and review the incident response plan periodically
    • Establish and maintain communication plans and processes
    • Conduct post-incident reviews
    • Establish and maintain integration among the incident response plan, disaster recovery plan, and business continuity plan

Certified Risk and Information Systems Control (CRISC) Training

This official ISACA CRISC certification course provides you with in-depth coverage on the four CRISC domains: risk identification; IT risk assessment; risk response and mitigation; risk and control monitoring and reporting.

IT and enterprise risk management is key to an organization's operations and strategy. If you are an IT professional, risk and control professional, business analyst, project manager or compliance professional, this Certified Risk and Information Systems Control training course will teach you to defend, protect and future-proof your enterprise.

Key Features of this CISM Training:
About the course:
  • Official ISACA Curriculum
  • Instructor led training and coaching benefit
  • Quiet classroom environment
  • Exam voucher included with course tuition
You will learn:
  • Prepare for and pass the Certified Risk and Information System Controls (CRISC) exam
  • Identify the universe of IT risk to contribute to the execution of the IT risk management strategy
  • Analyze and evaluate IT risk to determine the likelihood and impact on business objectives
  • Determine risk response options and evaluate their efficiency and effectiveness to manage risk
  • Continuously monitor and report on IT risk and controls
Registration:
  • Note: registration for ISACA classes must be completed at least 10 days prior to start date
CRISC Course Outline

The Certified Risk and Information Systems Control course prepares and enables IT professionals for the challenges of IT risk management.

This course will cover a variety of topics, including:

  • IT Risk Identification
    • 1.1: Collect and review information, including existing documentation, regarding the organization's internal and external business and IT environments to identify potential or realized impacts of IT risk to the organization's business objectives and operations.
    • 1.2: Identify potential threats and vulnerabilities to the organization's people, processes and technology to enable IT risk analysis.
    • 1.3: Develop a comprehensive set of IT risk scenarios based on available information to determine the potential impact to business objectives and operations.
    • 1.4: Identify key stakeholders for IT risk scenarios to help establish accountability.
    • 1.5: Establish an IT risk register to help ensure that identified IT risk scenarios are accounted for and incorporated into the enterprise-wide risk profile.
    • 1.6: Identify risk appetite and tolerance defined by senior leadership and key stakeholders to ensure alignment with business objectives.
    • 1.7: Collaborate in the development of a risk awareness program, and conduct training to ensure that stakeholders understand risk and to promote a risk-aware culture.
  • IT Risk Assessment
    • 2.1: Analyze risk scenarios based on organizational criteria (e.g., organizational structure, policies, standards, technology, architecture, controls) to determine the likelihood and impact of an identified risk.
    • 2.2: Identify the current state of existing controls and evaluate their effectiveness for IT risk mitigation.
    • 2.3: Review the results of risk and control analysis to assess any gaps between current and desired states of the IT risk environment.
    • 2.4: Ensure that risk ownership is assigned at the appropriate level to establish clear lines of accountability.
    • 2.5: Communicate the results of risk assessments to senior management and appropriate stakeholders to enable risk-based decision making.
    • 2.6: Update the risk register with the results of the risk assessment.
  • Risk Response and Mitigation
    • 3.1: Consult with risk owners to select and align recommended risk responses with business objectives and enable informed risk decisions.
    • 3.2: Consult with, or assist, risk owners on the development of risk action plans to ensure that plans include key elements (e.g., response, cost, target date).
    • 3.3: Consult on the design and implementation or adjustment of mitigating controls to ensure that the risk is managed to an acceptable level.
    • 3.4: Ensure that control ownership is assigned to establish clear lines of accountability.
    • 3.5: Assist control owners in developing control procedures and documentation to enable efficient and effective control execution.
    • 3.6: Update the risk register to reflect changes in risk and management's risk response.
    • 3.7: Validate that risk responses have been executed according to the risk action plans.
  • Risk and Control Monitoring and Reporting
    • 4.1: Define and establish key risk indicators (KRIs) and thresholds based on available data, to enable monitoring of changes in risk.
    • 4.2: Monitor and analyze key risk indicators (KRIs) to identify changes or trends in the IT risk profile.
    • 4.3: Report on changes or trends related to the IT risk profile to assist management and relevant stakeholders in decision making.
    • 4.4: Facilitate the identification of metrics and key performance indicators (KPIs) to enable the measurement of control performance.
    • 4.5: Monitor and analyze key performance indicators (KPIs) to identify changes or trends related to the control environment and determine the efficiency and effectiveness of controls.
    • 4.6: Review the results of control assessments to determine the effectiveness of the control environment.
    • 4.7: Report on the performance of, changes to, or trends in the overall risk profile and control environment to relevant stakeholders to enable decision making.

Request Course
Information

Need more information before you make a decision? Use our contact form to request additional details about our courses!


Request Information about this course


Upcoming Schedule



Please call to schedule this bootcamp style training course

1-617-481-9141

↑ Top
Comodo Positive SSL Certified