ISACA CISA Certificering - Slechts 4 dagen

Zeven redenen waarom jij voor jouw CISA cursus voor Firebrand kiest:

Bekijk deze video en zie waarom je met Firebrand geld en tijd bespaart

  1. Jij zal in slechts 4 dagen CISA gecertificeerd zijn. Doordat onze cursussen residentieel zijn kunnen wij langere lesdagen aanbieden en zal je tijdens je verblijf volledig gefocust zijn op jouw cursus
  2. Onze CISA cursus is all-inclusive. Cursusmaterialen, accommodatie en maaltijden zijn inbegrepen.
  3. Slaag de eerste keer voor CISA of train gratis opnieuw. Vraag naar de voorwaarden van onze certificeringsgarantie bij onze Education Consultants.
  4. Je zal meer over CISA leren. Waar opleidingen elders doorgaans van 9:00 tot 17:00 duren, kan je bij Firebrand Training rekenen op 12 uur training per dag!

  5. Je zal CISA sneller beheersen. Doordat onze cursussen residentieel zijn word je in korte tijd ondergedompeld in de theorie. Hierdoor zal je volledig gefocust zijn op de cursus en zal je sneller de theorie en praktijk beheersen.
  6. Je zal voor CISA studeren bij de beste training provider. Firebrand heeft het Q-For kwaliteitlabel, waarmee onze standaarden en professionaliteit op het gebied van training erkend worden. We hebben inmiddels 64.495 professionals getraind en gecertificeerd!
  7. Je gaat meer doen dan alleen de cursusstof van CISA bestuderen. We maken gebruik van laboratoria, case-studies en oefentests, om ervoor te zorgen dat jij jouw nieuwe kennis direct in jouw werkomgeving kan toepassen.

Denk jij klaar te zijn voor deze opleiding? Doe een GRATIS oefentest om je kennis te testen!

Wanneer wilt u deelnemen aan een versnelde opleiding?

Start datum

Eind datum

Status

Nu boeken

Wachtlijst

 

Open

Nu boeken

Wereldwijd heeft Firebrand in haar 10-jarig bestaan al 64.495 studenten opgeleid! We hebben ze allemaal gevraagd onze versnelde opleidingen te evalueren. De laatste keer dat we onze resultaten analyseerden, bleek 96.53% ons te beoordelen als ‘boven verwachting’

"- People give good Customer Service to the clients. - Good resources. - Good location."
Anoniem - ISACA CISA Certificering (4 Dagen) (18/11/2013 t/m 20/11/2013)

"When time is expensive, you get worth for your money on these bootcamp trainings. Never ever had class from 8 AM till 9 PM before. I enjoyed every minute of it thanks to the excellent teacher."
Johan Sleeckx, SoIT. - ISACA CISA Certificering (4 Dagen) (27/5/2013 t/m 29/5/2013)

"Intensieve training, lange dagen, erg veel stof voor drie dagen, uistekende docent. Prachtige locatie, uitstekend eten, eenvoudige kleine kamer. Samenvattend: een prima training!"
D.P.. - ISACA CISA Certificering (4 Dagen) (27/5/2013 t/m 29/5/2013)

"Het concept van een bootcamp krijgt een heel nieuwe dimensie bij Firebrand. Kwalitatief en inhoudelijk een ruime voldoende."
T.V.. - ISACA CISA Certificering (4 Dagen) (27/5/2013 t/m 29/5/2013)

"Veel stof in een korte tijd kunnen verwerken door de kennis en ervaring van de docent."
Jack van der Goes . - ISACA CISA Certificering (4 Dagen) (27/5/2013 t/m 29/5/2013)

"The course is a good preparation and reflects the philosophy of ISACA very well."
Anoniem - ISACA CISA Certificering (4 Dagen) (5/12/2016 t/m 7/12/2016)

"The course covered everything I need for preparation and motivation for the exam."
Anoniem - ISACA CISA Certificering (4 Dagen) (5/12/2016 t/m 7/12/2016)

"The teaching received was first class, will recommend and look to Firebrand for further training."
James Clements, N/A. - ISACA CISA Certificering (4 Dagen) (6/6/2016 t/m 8/6/2016)

"Loved it!!!"
Fiona Linton, Leicestershire Police. - ISACA CISA Certificering (4 Dagen) (6/6/2016 t/m 8/6/2016)

"Professional, thorough, immersive - taught by experts who can bring the content to life!"
Charlie Timblin, IFDS. - ISACA CISA Certificering (4 Dagen) (6/6/2016 t/m 8/6/2016)

"Isolated training area is the best approach to keep focus on material and preparing for exam."
Anoniem - ISACA CISA Certificering (4 Dagen) (6/6/2016 t/m 8/6/2016)

"Take a week, come to the CISA course and no way you won´t pass!"
Anoniem - ISACA CISA Certificering (4 Dagen) (6/6/2016 t/m 8/6/2016)

"Thanks for the training - it was tough, lot of new topics introduced during just 3 days, a lot of enthusiasm, good jokes and friendly atmosphere created by the trainer. Respect!"
Anoniem - ISACA CISA Certificering (4 Dagen) (6/6/2016 t/m 8/6/2016)

"I always look forward to the training at Firebrand."
Anoniem - ISACA CISA Certificering (4 Dagen) (6/6/2016 t/m 8/6/2016)

"Great food!"
Johan De Neergaard , Vattenfall. - ISACA CISA Certificering (4 Dagen) (9/11/2015 t/m 11/11/2015)

"A high level fast paced learning in a good environment."
Petter Hintze , Ica. - ISACA CISA Certificering (4 Dagen) (9/11/2015 t/m 11/11/2015)

"Professional all through. No fancy facilities but as good as it needs to be."
Jakob Lundberg, Coresec. - ISACA CISA Certificering (4 Dagen) (9/11/2015 t/m 11/11/2015)

"If you need to cram a lot of info into your head in a short time ...Firebrand are experts."
Jonathan Newton Griffiths, Mars Information Services. - ISACA CISA Certificering (4 Dagen) (2/9/2015 t/m 4/9/2015)

"Very good training with Firebrand."
Olu Akinrolabu, Reed Elsevier PLC. - ISACA CISA Certificering (4 Dagen) (8/6/2015 t/m 10/6/2015)

"Enjoyable and hectic course."
Eirik Standal, Nordland Fylkeskommune. - ISACA CISA Certificering (4 Dagen) (8/6/2015 t/m 10/6/2015)

"Enjoyed the fast-paced concentrated learning."
Aled Hughes, NMi Metrology & Gaming Ltd. - ISACA CISA Certificering (4 Dagen) (8/6/2015 t/m 10/6/2015)

"Thoroughly enjoyed my CISA course and felt it was very well delivered and managed, the location & accommodation were very good! I would use Firebrand again for future training."
S.G. - ISACA CISA Certificering (4 Dagen) (24/11/2014 t/m 26/11/2014)

"Professional. Fun and fast paced."
Anoniem - ISACA CISA Certificering (4 Dagen) (24/11/2014 t/m 26/11/2014)

"Intensive training in a very supportive environment."
Anoniem - ISACA CISA Certificering (4 Dagen) (24/11/2014 t/m 26/11/2014)

"The Firebrand Training was High pace and a great final preparation for my test"
Anoniem - ISACA CISA Certificering (4 Dagen) (24/11/2014 t/m 26/11/2014)

"Course informative Facilities good This will make a difference when i go back to my company."
Barry Burgess, Barclays. - ISACA CISA Certificering (4 Dagen) (3/6/2013 t/m 5/6/2013)

"Helps clear your mind and soak up the knowledge"
Mark Allen, Compass Group. - ISACA CISA Certificering (4 Dagen) (3/6/2013 t/m 5/6/2013)

"I would recommend floowing any firebrand training as it is proffesional and well organised"
Veronique Hautelin, JPMorgan Bank Luxembourg. - ISACA CISA Certificering (4 Dagen) (3/6/2013 t/m 5/6/2013)

"I've completed numerous courses at Firebrand and keep coming back! Firebrand has great campus facilities and learning setup, plus a vast selection of recognized courses and a convenient test facility on site. The endless supply of coffee, drinks, chocolate and fruit helps to keep you going during a hard days learning."
J.S. - ISACA CISA Certificering (4 Dagen) (3/12/2012 t/m 5/12/2012)

"Just as much as humanly possible to absorb."
Peter Strom , SOS Int.. - ISACA CISA Certificering (4 Dagen) (3/12/2012 t/m 5/12/2012)

"Great course, the instructor was very engaging and not only took us through the course portfolio but also provided personal experience."
Jason Durham, Vodafone UK. - ISACA CISA Certificering (4 Dagen) (3/12/2012 t/m 5/12/2012)

"A good course if you hasve an understanding before hand, But should allow passing of exam"
Mike Gough, Abbott Laboratories. - ISACA CISA Certificering (4 Dagen) (19/11/2012 t/m 21/11/2012)

"Professional, providing an ideal study envioment, fully supported by friendly and helpful staff"
Matthew Mills, Pharm Olam. - ISACA CISA Certificering (4 Dagen) (19/11/2012 t/m 21/11/2012)

"Great instructor superb facilities"
Gareth Hayward, NA. - ISACA CISA Certificering (4 Dagen) (19/11/2012 t/m 21/11/2012)

"Very good, teacher very skilled and professional."
Anoniem, SDC - ISACA CISA Certificering (4 Dagen) (29/5/2012 t/m 31/5/2012)

"Firebrand facilities mean you really can focus on the course. The instructors really know their subject."
P.L. - ISACA CISA Certificering (4 Dagen) (5/12/2011 t/m 7/12/2011)

"Firebrand gave me the confidence and to knowledge to sit the exam."
R.N. - ISACA CISA Certificering (4 Dagen) (5/12/2011 t/m 7/12/2011)

"This was learning on steroids. :) Good fast and efficient. "
E.M., Stena. - ISACA CISA Certificering (4 Dagen) (28/11/2011 t/m 30/11/2011)

"Provided the correct atmosphere for focused learning."
Silvia Bondoc , Ericsson. - ISACA CISA Certificering (4 Dagen) (28/11/2011 t/m 30/11/2011)

"Punchy, concise, well delivered courses. "
M. A. - ISACA CISA Certificering (4 Dagen) (6/6/2011 t/m 8/6/2011)

"Have gained an in-depth knowledge in Information systems auditing in just 3 days. Materials and presentations tailored to my needs. Fantastic"
P. N. - ISACA CISA Certificering (4 Dagen) (23/5/2011 t/m 25/5/2011)

"Very good teacher, a pleasant site with high class food. Long but very useful training days that works out really well."
Håkan Gunnarsson , Unisys AB. - ISACA CISA Certificering (4 Dagen) (9/5/2011 t/m 11/5/2011)

"Knowledgeable instructor. Good enviroment + excellent materials = Recipe for success!"
P.N. - ISACA CISA Certificering (4 Dagen) (24/5/2010 t/m 26/5/2010)

"My expectations were exceeded and the staff FANTASTIC would definitely recommend."
George Georgiou. - ISACA CISA Certificering (4 Dagen) (4/5/2010 t/m 6/5/2010)

"I liked the hotel"
R.P. - ISACA CISA Certificering (4 Dagen) (7/12/2009 t/m 9/12/2009)

"The instructor and CISA course themselves were very good. Thank you."
Steve Fitzpatrick. - ISACA CISA Certificering (4 Dagen) (7/12/2009 t/m 9/12/2009)

"Intense, long training hours, focused on the topic at hand but highly and thoroughly enjoyable and worth while. Highly recommended!"
Craig Thomas, pioneer investments. - ISACA CISA Certificering (4 Dagen) (23/11/2009 t/m 25/11/2009)

"As an approved training partner of major certification organizations, such as ICS2 and ISACA, global leaders in security programs, and vendors like Microsoft, Firebrand are ideally placed to satisfy most training requirements in comfortable easily accessible facilities. And because of this relationship they have access to the very best instructors whose knowledge expertise and real world experience is second to none."
Tony Richardson, Octree. - ISACA CISA Certificering (4 Dagen) (23/11/2009 t/m 25/11/2009)

"Be prepared to work and you will benefit."
Gordon Caffrey , Atmel. - ISACA CISA Certificering (4 Dagen) (23/11/2009 t/m 25/11/2009)

"I think the CISA course needs to be 5 days long and more practice questions to encourage interaction. The instructor was good and shared experiences. Too many power point slides. Overall i enjoyed learning here"
Michael Peet. - ISACA CISA Certificering (4 Dagen) (23/11/2009 t/m 25/11/2009)

Het doel van ons vierdaags versneld programma voor CISA certificering, is om information professionals te voorzien van de kennis en technische vaardigheden voor deskundigheid in Information Systems audit, besturings- en beveiligingsvaardigheden.

Sinds 1978, wordt het Certified Information Systems Auditor programma, gesponsord door de Information Systems Audit and Control Association (ISACA), en wordt gezien als de wereldwijd geaccepteerde standaard voor prestatie onder IS audit, en besturings- en beveiligingsprofessionals.

De technische vaardigheden en praktijken die CISA promoteert en evalueert is de fundatie voor succes in het vak. Bezit van de CISA titel getuigt van deskundigheid en wordt gezien als de norm in het vak. Met een toenemende vraag naar professionals in het bezit van Information Systems audit, besturings- en beveiligingsvaardigheden, wordt wereldwijd de voorkeur gegeven aan het CISA certificeringsprogramma.

Tijdens het programma, zullen studenten leven, leren, en zich voorbereiden om de certificeringsexamens op locatie te maken.

Ons Certified Information Systems Auditor programma

  • Vergroot behoud van kennis door gebruik te maken van versnelde leerstijlen gericht op overdragen van informatie naar het lange-termijn geheugen
  • Zorgt ervoor dat je de certificering behaalt in de helft van de tijd van 'traditionele training programma's' en presenteert gelijktijdig toonaangevende slagingspercentages

Neem nu je CISA examen af gedurende onze cursus.

Firebrand is een officiële leveringspartner van ISACA examens. Dit betekend dat je de mogelijkheid hebt om je CISA examen af te nemen op onze locatie, aan het einde van de cursus.

Je zult het examen direct bij ISACA moeten boeken en betalen. Je contactpersoon bij Firebrand kan je helpen bij dit proces.

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Professionele certificering voorziet jou en jouw organisatie van een concurrentievoordeel in het bedrijfsleven. Hoewel certificering misschien niet verplicht is voor jou, vereisen een toenemend aantal organisaties dat hun werknemers gecertificeerd worden. Om te helpen bij het garanderen van succes in het bedrijfsleven, is het essentieel om voor een certificeringsprogramma te kiezen dat gebaseerd is op universeel geaccepteerde technische praktijken. CISA levert een dergelijk programma. CISA wordt wereldwijd erkend, door alle sectoren, als de geprefereerde benoeming voor Information Systems audit, besturings- en beveiligingsprofessionals.

Meer dan 114.000 professionals hebben de CISA behaald sinds het ontstaan, dus het is begrijpelijk dat veel mensen het erover eens zijn: CISA behalen is een goede carrièrekeuze.

Het versnelde Firebrand concept

Onze versnelde Firebrand cursussen zijn residentieel, wat betekent dat je tijdens de gehele training op ons trainingcentrum verblijft. Hierdoor word je ondergedompeld in de theorie en praktijk en hoef je tijdens je training alleen op de te bestuderen materie te focussen: de rest regelen wij. Door dit vernieuwde concept kunnen we tevens langere lesdagen aanbieden: dagelijks of wekelijks op en neer reizen naar de leslocatie is namelijk niet nodig en alles met betrekking tot uw accomodatie, eten en drinken wordt door ons verzorgd.

Wat je verder kan verwachten van een Firebrand training:

  • Intensieve groepslessen
  • Een op een review sessies met de docent, ook buiten de lestijden
  • Praktijkoefeningen samen met een andere student
  • 24 uur per dag toegang tot het oefenlab
  • Het afleggen van het examen tijdens de trainingsweek

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Curriculum

Deze cursus bereidt je voor op het nieuwe CISA examen. Hieronder worden alle onderdelen beschreven en het respectievelijk percentage aan examenvragen over deze onderwerpen.

Domein 1—The Process of Auditing Information Systems (21%)
Domein 2—Governance and Management of IT (16%)
Domein 3—Information Systems Acquisition, Development and Implementation (18%)
Domein 4—Information Systems Operations, Maintenance and Support (20%)
Domein 5—Protection of Information Assets (25%)

Domein 1 - The Process of Auditing Information Systems (21%)

Provide audit services in accordance with IS audit standards to assist the organization in protecting and controlling information systems.

Domain 1 - Task Statements:

  • 1.1  Execute a risk-based IS audit strategy in compliance with IS audit standards to ensure that key risk areas are audited. 
  • 1.2 Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization. 
  • 1.3 Conduct audits in accordance with IS audit standards to achieve planned audit objectives. 
  • 1.4 Communicate audit results and make recommendations to key stakeholders through meetings and audit reports to promote change when necessary. 
  • 1.5 Conduct audit follow-ups to determine whether appropriate actions have been taken by management in a timely manner.

Domein 1 - Knowledge Statements:

  • 1.1 Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards 
  • 1.2 Knowledge of the risk assessment concepts and tools and techniques used in planning, examination, reporting and follow-up 
  • 1.3 Knowledge of fundamental business processes (e.g., purchasing, payroll, accounts payable, accounts receivable) and the role of IS in these processes 
  • 1.4 Knowledge of the control principles related to controls in information systems 
  • 1.5 Knowledge of risk-based audit planning and audit project management techniques, including follow-up 
  • 1.6 Knowledge of the applicable laws and regulations that affect the scope, evidence collection and preservation, and frequency of audits 
  • 1.7 Knowledge of the evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis, forensic investigation techniques, computer-assisted audit techniques [CAATs]) used to gather, protect and preserve audit evidence 
  • 1.8 Knowledge of different sampling methodologies and other substantive/data analytical procedures 
  • 1.9 Knowledge of reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution, audit report structure, issue writing, management summary, result verification) 
  • 1.10 Knowledge of audit quality assurance (QA) systems and frameworks 
  • 1.11 Knowledge of various types of audits (e.g., internal, external, financial) and methods for assessing and placing reliance on the work of other auditors or control entities

Domein 2 - Governance and Management of IT (16%)

Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy.

Domein 2 - Task Statements:

  • 2.1 Evaluate the IT strategy, including IT direction, and the processes for the strategy’s development, approval, implementation and maintenance for alignment with the organization’s strategies and objectives. 
  • 2.2 Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization’s strategies and objectives. 
  • 2.3 Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organization’s strategies and objectives. 
  • 2.4 Evaluate the organization’s IT policies, standards and procedures, and the processes for their development, approval, release/publishing, implementation and maintenance to determine whether they support the IT strategy and comply with regulatory and legal requirements. 
  • 2.5 Evaluate IT resource management, including investment, prioritization, allocation and use, for alignment with the organization’s strategies and objectives. 
  • 2.6 Evaluate IT portfolio management, including investment, prioritization and allocation, for alignment with the organization’s strategies and objectives. 
  • 2.7 Evaluate risk management practices to determine whether the organization’s IT-related risk is identified, assessed, monitored, reported and managed. 
  • 2.8 Evaluate IT management and monitoring of controls (e.g., continuous monitoring, quality assurance [QA]) for compliance with the organization’s policies, standards and procedures. 
  • 2.9 Evaluate monitoring and reporting of IT key performance indicators (KPIs) to determine whether management receives sufficient and timely information. 
  • 2.10 Evaluate the organization’s business continuity plan (BCP), including alignment of the IT disaster recovery plan (DRP) with the BCP, to determine the organization’s ability to continue essential business operations during the period of an IT disruption.

Domein 2 - Knowledge Statements:

  • 2.1 Knowledge of the purpose of IT strategy, policies, standards and procedures for an organization and the essential elements of each 
  • 2.2 Knowledge of IT governance, management, security and control frameworks, and related standards, guidelines and practices 
  • 2.3 Knowledge of the organizational structure, roles and responsibilities related to IT, including segregation of duties (SoD) 
  • 2.4 Knowledge of the relevant laws, regulations and industry standards affecting the organization 
  • 2.5 Knowledge of the organization’s technology direction and IT architecture and their implications for setting long-term strategic directions 
  • 2.6 Knowledge of the processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures 
  • 2.7 Knowledge of the use of capability and maturity models 
  • 2.8 Knowledge of process optimization techniques 
  • 2.9 Knowledge of IT resource investment and allocation practices, including prioritization criteria (e.g., portfolio management, value management, personnel management) 
  • 2.10 Knowledge of IT supplier selection, contract management, relationship management and performance monitoring processes, including third-party outsourcing relationships 
  • 2.11 Knowledge of enterprise risk management (ERM) 
  • 2.12 Knowledge of the practices for monitoring and reporting of controls performance (e.g., continuous monitoring, quality assurance [QA]) 
  • 2.13 Knowledge of quality management and quality assurance (QA) systems 
  • 2.14 Knowledge of the practices for monitoring and reporting of IT performance (e.g., balanced scorecard [BSC], key performance indicators [KPIs]) 
  • 2.15 Knowledge of business impact analysis (BIA) 
  • 2.16 Knowledge of the standards and procedures for the development, maintenance and testing of the business continuity plan (BCP) 
  • 2.17 Knowledge of the procedures used to invoke and execute the business continuity plan (BCP) and return to normal operations

Domein 3 - Information Systems Acquisition, Development and Implementation (18%)

Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization’s strategies and objectives.

Domein 3 - Task Statements:

  • 3.1  Evaluate the business case for the proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether the business case meets business objectives. 
  • 3.2 Evaluate IT supplier selection and contract management processes to ensure that the organization’s service levels and requisite controls are met. 
  • 3.3 Evaluate the project management framework and controls to determine whether business requirements are achieved in a cost-effective manner while managing risk to the organization. 
  • 3.4 Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation, and has timely and accurate status reporting. 
  • 3.5 Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organization's policies, standards, procedures and applicable external requirements. 
  • 3.6 Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and the organization's requirements are met. 
  • 3.7 Conduct post-implementation reviews of systems to determine whether project deliverables, controls and the organization's requirements are met.

Domein 3 - Knowledge Statements:

  • 3.1 Knowledge of benefits realization practices, (e.g., feasibility studies, business cases, total cost of ownership [TCO], return on investment [ROI]) 
  • 3.2 Knowledge of IT acquisition and vendor management practices (e.g., evaluation and selection process, contract management, vendor risk and relationship management, escrow, software licensing), including third-party outsourcing relationships, IT suppliers and service providers. 
  • 3.3 Knowledge of project governance mechanisms (e.g., steering committee, project oversight board, project management office) 
  • 3.4 Knowledge of project management control frameworks, practices and tools 
  • 3.5 Knowledge of the risk management practices applied to projects 
  • 3.6 Knowledge of requirements analysis and management practices (e.g., requirements verification, traceability, gap analysis, vulnerability management, security requirements) 
  • 3.7 Knowledge of the enterprise architecture (EA) related to data, applications and technology (e.g., web-based applications, web services, n-tier applications, cloud services, virtualization) 
  • 3.8 Knowledge of system development methodologies and tools, including their strengths and weaknesses (e.g., agile development practices, prototyping, rapid application development [RAD], object-oriented design techniques, secure coding practices, system version control) 
  • 3.9 Knowledge of the control objectives and techniques that ensure the completeness, accuracy, validity and authorization of transactions and data 
  • 3.10 Knowledge of the testing methodologies and practices related to the information system development life cycle (SDLC) 
  • 3.11 Knowledge of the configuration and release management relating to the development of information systems 
  • 3.12 Knowledge of system migration and infrastructure deployment practices and data conversion tools, techniques and procedures. 
  • 3.13 Knowledge of project success criteria and project risk 
  • 3.14 Knowledge of post-implementation review objectives and practices (e.g., project closure, control implementation, benefits realization, performance measurement)

Domein 4 - Information Systems Operations, Maintenance and Service Management (20%)

Provide assurance that the processes for information systems operations, maintenance and service management meet the organization’s strategies and objectives.

Domein 4 - Task Statements:

  • 4.1 Evaluate the IT service management framework and practices (internal or third party) to determine whether the controls and service levels expected by the organization are being adhered to and whether strategic objectives are met. 
  • 4.2 Conduct periodic reviews of information systems to determine whether they continue to meet the organization’s objectives within the enterprise architecture (EA). 
  • 4.3 Evaluate IT operations (e.g., job scheduling, configuration management, capacity and performance management) to determine whether they are controlled effectively and continue to support the organization’s objectives. 
  • 4.4 Evaluate IT maintenance (patches, upgrades) to determine whether they are controlled effectively and continue to support the organization’s objectives. 
  • 4.5 Evaluate database management practices to determine the integrity and optimization of databases. 
  • 4.6 Evaluate data quality and life cycle management to determine whether they continue to meet strategic objectives. 
  • 4.7 Evaluate problem and incident management practices to determine whether problems and incidents are prevented, detected, analyzed, reported and resolved in a timely manner to support the organization´s objectives. 
  • 4.8 Evaluate change and release management practices to determine whether changes made to systems and applications are adequately controlled and documented. 
  • 4.9 Evaluate end-user computing to determine whether the processes are effectively controlled and support the organization’s objectives. 
  • 4.10 Evaluate IT continuity and resilience (backups/restores, disaster recovery plan [DRP]) to determine whether they are controlled effectively and continue to support the organization’s objectives.

Domein 4 - Knowledge Statements:

  • 4.1 Knowledge of service management frameworks 
  • 4.2 Knowledge of service management practices and service level management 
  • 4.3 Knowledge of the techniques for monitoring third-party performance and compliance with service agreements and regulatory requirements 
  • 4.4 Knowledge of enterprise architecture (EA) 
  • 4.5 Knowledge of the functionality of fundamental technology (e.g., hardware and network components, system software, middleware, database management systems) 
  • 4.6 Knowledge of system resiliency tools and techniques (e.g., fault-tolerant hardware, elimination of single point of failure, clustering) 
  • 4.7 Knowledge of IT asset management, software licensing, source code management and inventory practices  
  • 4.8 Knowledge of job scheduling practices, including exception handling 
  • 4.9 Knowledge of the control techniques that ensure the integrity of system interfaces 
  • 4.10 Knowledge of capacity planning and related monitoring tools and techniques 
  • 4.11 Knowledge of systems performance monitoring processes, tools and techniques (e.g., network analyzers, system utilization reports, load balancing) 
  • 4.12 Knowledge of data backup, storage, maintenance and restoration practices 
  • 4.13 Knowledge of database management and optimization practices 
  • 4.14 Knowledge of data quality (completeness, accuracy, integrity) and life cycle management (aging, retention) 
  • 4.15 Knowledge of problem and incident management practices 
  • 4.16 Knowledge of change management, configuration management, release management and patch management practices 
  • 4.17 Knowledge of the operational risk and controls related to end-user computing 
  • 4.18 Knowledge of the regulatory, legal, contractual and insurance issues related to disaster recovery 
  • 4.19 Knowledge of business impact analysis (BIA) related to disaster recovery planning 
  • 4.20 Knowledge of the development and maintenance of disaster recovery plans (DRPs) 
  • 4.21 Knowledge of the benefits and drawbacks of alternate processing sites (e.g., hot sites, warm sites, cold sites) 
  • 4.22 Knowledge of disaster recovery testing methods 
  • 4.23 Knowledge of the processes used to invoke the disaster recovery plans (DRPs)

Domein 5—Protection of Information Assets(25%)

Provide assurance that the organization’s policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.

Domain 5 - Task Statements:

  • 5.1  Evaluate the information security and privacy policies, standards and procedures for completeness, alignment with generally accepted practices and compliance with applicable external requirements. 
  • 5.2 Evaluate the design, implementation, maintenance, monitoring and reporting of physical and environmental controls to determine whether information assets are adequately safeguarded. 
  • 5.3 Evaluate the design, implementation, maintenance, monitoring and reporting of system and logical security controls to verify the confidentiality, integrity and availability of information. 
  • 5.4 Evaluate the design, implementation and monitoring of the data classification processes and procedures for alignment with the organization’s policies, standards, procedures and applicable external requirements. 
  • 5.5 Evaluate the processes and procedures used to store, retrieve, transport and dispose of assets to determine whether information assets are adequately safeguarded. 
  • 5.6 Evaluate the information security program to determine its effectiveness and alignment with the organization’s strategies and objectives.

Domein 5 - Knowledge Statements:

  • 5.1 Knowledge of the generally accepted practices and applicable external requirements (e.g., laws, regulations) related to the protection of information assets 
  • 5.2 Knowledge of privacy principles 
  • 5.3 Knowledge of the techniques for the design, implementation, maintenance, monitoring and reporting of security controls 
  • 5.4 Knowledge of the physical and environmental controls and supporting practices related to the protection of information assets 
  • 5.5 Knowledge of the physical access controls for the identification, authentication and restriction of users to authorized facilities and hardware 
  • 5.6 Knowledge of the logical access controls for the identification, authentication and restriction of users to authorized functions and data 
  • 5.7 Knowledge of the security controls related to hardware, system software (e.g., applications, operating systems) and database management systems. 
  • 5.8 Knowledge of the risk and controls associated with virtualization of systems 
  • 5.9 Knowledge of the risk and controls associated with the use of mobile and wireless devices, including personally owned devices (bring your own device [BYOD]) 
  • 5.10 Knowledge of voice communications security (e.g., PBX, Voice-over Internet Protocol [VoIP]) 
  • 5.11 Knowledge of network and Internet security devices, protocols and techniques 
  • 5.12 Knowledge of the configuration, implementation, operation and maintenance of network security controls 
  • 5.13 Knowledge of encryption-related techniques and their uses 
  • 5.14 Knowledge of public key infrastructure (PKI) components and digital signature techniques 
  • 5.15 Knowledge of the risk and controls associated with peer-to-peer computing, instant messaging, and web-based technologies (e.g., social networking, message boards, blogs, cloud computing) 
  • 5.16 Knowledge of the data classification standards related to the protection of information assets 
  • 5.17 Knowledge of the processes and procedures used to store, retrieve, transport and dispose of confidential information assets 
  • 5.18 Knowledge of the risk and controls associated with data leakage 
  • 5.19 Knowledge of the security risk and controls related to end-user computing 
  • 5.20 Knowledge of methods for implementing a security awareness program 
  • 5.21 Knowledge of information system attack methods and techniques 
  • 5.22 Knowledge of prevention and detection tools and control techniques 
  • 5.23 Knowledge of security testing techniques (e.g., penetration testing, vulnerability scanning) 
  • 5.24 Knowledge of the processes related to monitoring and responding to security incidents (e.g., escalation procedures, emergency incident response team) 
  • 5.25 Knowledge of the processes followed in forensics investigation and procedures in collection and preservation of the data and evidence (i.e., chain of custody). 
  • 5.26 Knowledge of the fraud risk factors related to the protection of information assets

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Neem nu je CISA examen af gedurende onze cursus.

Firebrand is een officiële leveringspartner van ISACA examens. Dit betekend dat je de mogelijkheid hebt om je CISA examen af te nemen op onze locatie, aan het einde van de cursus.

Je zult het examen direct bij ISACA moeten boeken en betalen. Je contactpersoon bij Firebrand kan je helpen bij dit proces.

Extra informatie over het CISA examen:

Vanaf 2017, wordt Computer-Based Testing (CBT) aangeboden door ISACA voor de CISA, CRISC, CISM en de CGEIT certificeringen. Deze examen kunnen nu afgenomen worden in 3 periodes van 8 weken:

Eerstvolgende examenperiode: 1 augustus – 30 september 2017

  • Inschrijven mogelijk vanaf: 1 mei 2017
  • Inschrijving sluit op: 22 september 2017

Hulp nodig? Bel ons voor het juiste advis rondom de inschrijving van je examen.

Om je CISA titel te behouden dien je een minimum aantal CPE punten (120 in drie jaar, met een minimum van 20 per jaar) te behalen. Na het volgen van de training ontvang je een certificaat van deelname. Dit certificaat is goed voor 40 CPE punten.

Het CISA examen bevat vijf information security auditing domeinen, Ieder domein is verder gedefinieerd en opgedeeld in taken en kennisdomeinen. Deze domeinen zijn ontwikkelend door het CISA Certification Board bevatten het werk van information security auditors zoals gevalideerd door experts en professionals. Hieronder worden deze domeinen kort beschreven, gevolgd door het percentage aan examenvragen dat je over een bepaald domein kan verwachten.

Jouw CISA examen bevat de volgende onderdelen:

  • The Process of Auditing Information Systems (21%) - Conducting comprehensive auditing services in line with industry standards
  • Governance and Management of IT (16%) - Assuring appropriate structural and organisational IT measures are in place to achieve company aims
  • Information Systems Acquisition, Development and Implementation (18%) - Ensuring the acquisition, development and implementation operations in the business are focused toward meeting company aims
  • Information Systems Operations, Maintenance and Support (20%) - Ensuring IT operations and maintenance infrastructure meets the demands and aims of the business
  • Protection of Information Assets (25%) - Ensuring the security procedures, controls and overall infrastructure provide sufficient protection of the company's information assets

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Oficieel ISACA Cursusmateriaal, welke is inbegrepen bij de training:

  • CISA Review Handboek
  • CISA Review Questions, Answers & Explanations Manual Supplement

In onze certificeringsprogramma's is het volgende inbegrepen:

  • Dagelijks theorie, praktijk en oefensessies
  • Intensieve hands-on training, volgens onze unieke (Lab | Lecture | Review)TM leverings methode
  • Uitgebreide presentatie- en cursusmaterialen: Firebrand maakt gebruikt van officieel cursusmateriaal, aangepast aan ons versneld leren concept
  • De mogelijkheid tot het afleggen van proefexamens
  • Intensief contact met instructeurs en 24/7 toegang tot het practicum
  • Het examen maakt deel uit van de cursus (voor sommige opleidingen geldt een uitzondering, vraag hiernaar)
  • Accommodatie, alle maaltijden, dranken en snacks zijn inbegrepen (voor sommige opleidingen geldt een uitzondering, vraag hiernaar)
  • Onze certificerings garantie: mocht je de eerste keer niet slagen, dan train je binnen 1 jaar na beeindiging van de cursus nogmaals gratis! Het enige dat je betaalt zijn de accommodatie kosten en je examen vouchers.

Certificeringsgarantie

Indien je als cursist een Firebrand Training afrondt zonder succesvol je certificering(en) af te sluiten, mag je binnen 12 maanden na afronden van de cursus deze nog eens bijwonen. Je betaalt dan alleen de kosten voor accommodatie en examen vouchers.

* LET OP:

  • Dit geldt niet voor alle opleidingen
  • Bij de volgende opleidingen zijn tegoedbonnen voor examens niet inbegrepen: PMI, CISA, CISM, CGEIT, CRISC en CISSP CBK Review. Je examen voor (ISC)2 zal wel worden doorlopen als onderdeel van je cursus.
  • Voor de volgende cursussen zal het examen niet op de leslocatie worden afgenomen: ISACA en PMI certificering. Je PMI certificering zal worden afgenomen in een officieel Prometric test centrum in de buurt van onze trainingslokatie, op de 5-de dag van de cursus.
  • Oefen examens zijn niet beschikbaar voor Microsoft MCTS System Center Configuration Manager 2007 cursus
  • Ons (ISC)2 CISSP CBK Review programma verschilt van onze standaard levering. Voor meer informatie hier over, neem dan contact met ons op, op nummer +31 (0)24-8457770.

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Een minimum van vijf jaar werkervaring in professionele informatiesystemen auditen, besturen of beveiligen (zoals beschreven in de vakinhoud domeinen) is vereist voor CISA certificering. Vervanging en vrijstelling van die ervaring wordt als volgt gegeven:

  • Een maximum van één jaar informatiesysteem ervaring OF één jaar financiële/operationele audit ervaring kan als substituut dienen voor één jaar ervaring in informatiesystemen auditen, besturen of beveiligen
  • 60 tot 120 volbrachte studie uren op een universiteit (het equivalent van een Bachelorgraad) kan als substituut dienen voor één of twee jaar ervaring in informatiesystemen auditen, besturen of beveiligen
  • Twee jaar als een voltijd docent op universiteit, in een gerelateerd vakgebied (b.v. computerwetenschappen, accounting, informatiesystemen auditen) kan als substituut dienen voor één jaar ervaring in informatiesystemen auditen, besturen of beveiligen

Ervaring moet opgedaan zijn binnen een periode van 10 jaar voorafgaand aan de datum van aanvraag voor certificering of binnen vijf vanaf de datum van het aanvankelijke slagen voor het examen. Opnieuw deelnemen aan, en slagen voor het examen is vereist, als de aanvraag voor de certificering niet binnen vijf jaar plaats vindt vanaf het slagen voor het examen. Alle ervaring zal zelfstandig met de werkgevers geverifieerd worden.

Weet je niet zeker of je voldoet aan de vereisten?

Firebrand levert in een afleidingsvrije omgeving waardoor je je volledig kan focussen op de te bestuderen materie. We bespreken graag jouw technische achtergrond, ervaring en kwalificaties om vast te stellen of deze versnelde cursus voor jou geschikt is.

Belangstelling? Zie onze prijzen of bel ons op 024-8457770