ISACA CISA Certificering - Kun 3 dage

Hvad siger vores kunder?

"Highly efficient way of Learning. Very skilled instructor"
Soren Andersen, Stralfors - ISACA CISA Certificering (3 dage), 25/11/2013 til 27/11/2013

Her er der 8 grunde til at du skal tage CISA hos Firebrand Training:

Se Hvordan Vi Hjælper Dig Med at Få Nye Færdigheder Hurtigt

  1. Du bliver uddannet på kun 3 dage. Hos os får du din uddannelse på rekordtid.
  2. Alt er inkluderet. Et éngangsbeløb dækker alle kursusmaterialer, overnatninger og forplejning, og tilbyder den mest omkostningseffektive måde at få din CISA uddannelse på. Og det uden nogen skjulte ekstraomkostninger.
  3. Bestå CISA første gang eller gå kurset om, gratis. Det er vores garanti. Vi er sikre på, at du vil bestå første gang. Men hvis du mod forventning ikke skulle gøre det, kan du indenfor et år komme tilbage, deltage på hele kurset, og kun betale for eventuelle overnatninger og dine eksamener (Testvoucher skal betales separat og købes direkte hos testudbyderen). Alt andet er gratis.
  4. Du vil lære mere.Traditionelle uddannelsesdage foregår fra 9.00 – 16.00, med en dejlig lang frokostpause. Hos Firebrand får du mindst 12 timers effektiv og fokuseret kvalitetsuddannelse uden hverken private eller arbejdsrelaterede forstyrrelser - hver dag - sammen med din instruktør.
  5. Du vil lære CISA hurtigere. Vi kombinerer de 3 indlæringsstile (Præsentation|Øvelse|Diskussion), så vi derigennem gennemfører kurset på en måde som sikrer, at du lærer hurtigere og nemmere.
  6. Du er i sikre hænder.Vi har uddannet og certificeret 55.136 personer. Vi er partner med alle de store navne i branchen og har desuden vundet adskillige udmærkelser blandt andet ”Årets Learning Partner 2010, 2011, 2012 og 2013” fra Microsoft og med en vækst på 1430% siden 2009, er Firebrand også Børsen Gazelle vinder på Sjælland 2013.
  7. Du lærer ikke bare teorien. Vi har videreudviklet CISA kurset med flere hands-on labs og praktiske øvelser, som giver dig det ekstra du behøver for at kunne løse praktiske problemstillinger og klare din certificering.
  8. Du lærer fra de bedste. Vores instruktører på CISA er de bedste i branchen, og tilbyder en helt unik blanding af viden, praktisk erfaring og passion for at lære fra sig.

Er du klar til kurset? Tag en GRATIS test som hjælper dig med at bedømme din nuværende viden.

Hvornår vil du tage dit accelererede kursus?

Starter

Slutter

Tilgængelighed

Tilmelding

Tilgængelige pladser

Tilmelding

Vi har uddannet over 55.136 personer i løbet af 12 år. Vi har bedt dem alle om at bedømme vores accelererede kurser. Aktuelt har 96,39% sagt, at Firebrand oversteg deres forventninger:

"Highly efficient way of Learning. Very skilled instructor"
Soren Andersen, Stralfors. - ISACA CISA Certificering (3 dage) (25/11/2013 til 27/11/2013)

"Professional. Fun and fast paced."
Anonym - ISACA CISA Certificering (3 dage) (24/11/2014 til 26/11/2014)

"Intensive training in a very supportive environment."
Anonym - ISACA CISA Certificering (3 dage) (24/11/2014 til 26/11/2014)

"The Firebrand Training was High pace and a great final preparation for my test"
Anonym - ISACA CISA Certificering (3 dage) (24/11/2014 til 26/11/2014)

"Just as much as humanly possible to absorb."
Peter Strom , SOS Int.. - ISACA CISA Certificering (3 dage) (3/12/2012 til 5/12/2012)

"Very good, teacher very skilled and professional."
Anonym, SDC - ISACA CISA Certificering (3 dage) (29/5/2012 til 31/5/2012)

"This was learning on steroids. :) Good fast and efficient. "
E.M., Stena. - ISACA CISA Certificering (3 dage) (28/11/2011 til 30/11/2011)

"Provided the correct atmosphere for focused learning."
Silvia Bondoc , Ericsson. - ISACA CISA Certificering (3 dage) (28/11/2011 til 30/11/2011)

"Very good teacher, a pleasant site with high class food. Long but very useful training days that works out really well."
Håkan Gunnarsson , Unisys AB. - ISACA CISA Certificering (3 dage) (9/5/2011 til 11/5/2011)

"Very good training with Firebrand."
Olu Akinrolabu, Reed Elsevier PLC. - ISACA CISA Certificering (3 dage) (8/6/2015 til 10/6/2015)

"Enjoyable and hectic course."
Eirik Standal, Nordland Fylkeskommune. - ISACA CISA Certificering (3 dage) (8/6/2015 til 10/6/2015)

"Enjoyed the fast-paced concentrated learning."
Aled Hughes, NMi Metrology & Gaming Ltd. - ISACA CISA Certificering (3 dage) (8/6/2015 til 10/6/2015)

"The training was well structured and presented. Facilities fantastic and trainer first class...Keep it up Firebrand."
Anonym, Unknown - ISACA CISA Certificering (3 dage) (11/5/2015 til 13/5/2015)

"Thoroughly enjoyed my CISA course and felt it was very well delivered and managed, the location & accommodation were very good! I would use Firebrand again for future training."
S.G. - ISACA CISA Certificering (3 dage) (24/11/2014 til 26/11/2014)

"Course informative Facilities good This will make a difference when i go back to my company."
Barry Burgess, Barclays. - ISACA CISA Certificering (3 dage) (3/6/2013 til 5/6/2013)

"Helps clear your mind and soak up the knowledge"
Mark Allen, Compass Group. - ISACA CISA Certificering (3 dage) (3/6/2013 til 5/6/2013)

"I would recommend floowing any firebrand training as it is proffesional and well organised"
Veronique Hautelin, JPMorgan Bank Luxembourg. - ISACA CISA Certificering (3 dage) (3/6/2013 til 5/6/2013)

"I've completed numerous courses at Firebrand and keep coming back! Firebrand has great campus facilities and learning setup, plus a vast selection of recognized courses and a convenient test facility on site. The endless supply of coffee, drinks, chocolate and fruit helps to keep you going during a hard days learning."
J.S. - ISACA CISA Certificering (3 dage) (3/12/2012 til 5/12/2012)

"Great course, the instructor was very engaging and not only took us through the course portfolio but also provided personal experience."
Jason Durham, Vodafone UK. - ISACA CISA Certificering (3 dage) (3/12/2012 til 5/12/2012)

"A good course if you hasve an understanding before hand, But should allow passing of exam"
Mike Gough, Abbott Laboratories. - ISACA CISA Certificering (3 dage) (19/11/2012 til 21/11/2012)

"Professional, providing an ideal study envioment, fully supported by friendly and helpful staff"
Matthew Mills, Pharm Olam. - ISACA CISA Certificering (3 dage) (19/11/2012 til 21/11/2012)

"Great instructor superb facilities"
Gareth Hayward, NA. - ISACA CISA Certificering (3 dage) (19/11/2012 til 21/11/2012)

"Firebrand facilities mean you really can focus on the course. The instructors really know their subject."
P.L. - ISACA CISA Certificering (3 dage) (5/12/2011 til 7/12/2011)

"Firebrand gave me the confidence and to knowledge to sit the exam."
R.N. - ISACA CISA Certificering (3 dage) (5/12/2011 til 7/12/2011)

"Punchy, concise, well delivered courses. "
M. A. - ISACA CISA Certificering (3 dage) (6/6/2011 til 8/6/2011)

"Have gained an in-depth knowledge in Information systems auditing in just 3 days. Materials and presentations tailored to my needs. Fantastic"
P. N. - ISACA CISA Certificering (3 dage) (23/5/2011 til 25/5/2011)

"Knowledgeable instructor. Good enviroment + excellent materials = Recipe for success!"
P.N. - ISACA CISA Certificering (3 dage) (24/5/2010 til 26/5/2010)

"My expectations were exceeded and the staff FANTASTIC would definitely recommend."
George Georgiou. - ISACA CISA Certificering (3 dage) (4/5/2010 til 6/5/2010)

"I liked the hotel"
R.P. - ISACA CISA Certificering (3 dage) (7/12/2009 til 9/12/2009)

"The instructor and CISA course themselves were very good. Thank you."
Steve Fitzpatrick. - ISACA CISA Certificering (3 dage) (7/12/2009 til 9/12/2009)

"Intense, long training hours, focused on the topic at hand but highly and thoroughly enjoyable and worth while. Highly recommended!"
Craig Thomas, pioneer investments. - ISACA CISA Certificering (3 dage) (23/11/2009 til 25/11/2009)

"As an approved training partner of major certification organizations, such as ICS2 and ISACA, global leaders in security programs, and vendors like Microsoft, Firebrand are ideally placed to satisfy most training requirements in comfortable easily accessible facilities. And because of this relationship they have access to the very best instructors whose knowledge expertise and real world experience is second to none."
Tony Richardson, Octree. - ISACA CISA Certificering (3 dage) (23/11/2009 til 25/11/2009)

"Be prepared to work and you will benefit."
Gordon Caffrey , Atmel. - ISACA CISA Certificering (3 dage) (23/11/2009 til 25/11/2009)

"I think the CISA course needs to be 5 days long and more practice questions to encourage interaction. The instructor was good and shared experiences. Too many power point slides. Overall i enjoyed learning here"
Michael Peet. - ISACA CISA Certificering (3 dage) (23/11/2009 til 25/11/2009)

"Being away to study and prepare for the exam was a very good method to concentrate and cleanse the mind ready for the course. "
Ayo Akinkunle, Metronet. - ISACA CISA Certificering (3 dage) (8/12/2008 til 10/12/2008)

"Although intensive course, helps me to be confident about the exam."
LS. - ISACA CISA Certificering (3 dage) (8/12/2008 til 10/12/2008)

"A good introduction to the organization. The 3 day CISA course is very intense. Expect to start early and continue well into the evening. "
Stephen Blomley. - ISACA CISA Certificering (3 dage) (8/12/2008 til 10/12/2008)

"Without a doubt, the 3 day residential gave me the opportunity to focus on the subject and to understand how the exam process works. "
John Adegoke, GroupM. - ISACA CISA Certificering (3 dage) (24/11/2008 til 26/11/2008)

"Its the third training I do here and was never disappointed. I changed my jobs and girlfriends more frequently. The camp improved, jobs and girfriends rarely do."
Marco Ermini, Vodafone Group Services GMBH. - ISACA CISA Certificering (3 dage) (9/6/2008 til 11/6/2008)

"I fully enjoyed my training. The staff were knowledable, curteous and friendly. I have an unusual food allergy, which usually makes life difficult for the kitchen staff but I did not have a problem with any meal that I ate and the staff coped with my allergy and special food requests without complaint and seamlessly. The working day was long 8-8 but was well rewarding and the instructor was available late into the evening for questions and help."
Christine Elizabeth Morecroft, AXA insurance. - ISACA CISA Certificering (3 dage) (9/6/2008 til 11/6/2008)

"It is the third training I have on Firebrand and the first after they renamed from the Training Camp. Im glad they only changed their name! It is overall a nice experience and I especially like that I can forget about the business-as-usual and concentrate on the training. Instructors are always great and world-class. Looking forward to the next one."
Marco Ermini, Vodafone Group GmbH. - ISACA CISA Certificering (3 dage) (9/6/2008 til 11/6/2008)

"If I have passed the CISA exam it will be entirely down to the training and environment provided to be by Firebrand Training."
Henry Wellesley. - ISACA CISA Certificering (3 dage) (9/6/2008 til 11/6/2008)

"The location and seclusion of the training centre allows you the time and space to focus totally on your studies. The knowledge and experience of the training instructors means that they can demonstrate how the training material fits into the real world."
E.B.. - ISACA CISA Certificering (3 dage) (26/11/2007 til 28/11/2007)

"A well organised, very effective, learning environment. "
Martin Potter. - ISACA CISA Certificering (3 dage) (26/11/2007 til 28/11/2007)

"I had never been on one of these intensive courses before so i didnt know what to expect, but the staff made every effort to help us and allow us to get the most out of our time. It was great to be able to focus on the material and learn in great surroundings."
Andrew Ellerton. - ISACA CISA Certificering (3 dage) (26/11/2007 til 28/11/2007)

"Firebrand* without an iota of doubt is a place to be!"
Oyekunle Oyeneye, LSC. - ISACA CISA Certificering (3 dage) (4/6/2007 til 6/6/2007)

"Firebrand* is a great place, wonderful environment, peaceful and quiet, focusing on what we are going there for....to study, study and again study to get ready for the exam. When i had done my course I felt stronger and more confident to sit the exam. I will be back!"
SL, First Data International. - ISACA CISA Certificering (3 dage) (4/6/2007 til 6/6/2007)

"The course material was very good and combined with the explanation from the lecturer, I was able to learn a lot during the training."
Zach Anucha, NCH. - ISACA CISA Certificering (3 dage) (30/4/2007 til 2/5/2007)

"Firebrand* promoted a calm working environment that assisted me in the learing process."
Andy Gray. - ISACA CISA Certificering (3 dage) (30/4/2007 til 2/5/2007)

"The best aspect of Firebrand* was the mixed environment, allowing skills to be shared with colleagues from different walks of life and careers. The instructor encouraged us to share experience and understanding, and knowledge from our own areas."
Guy Lomas, AEGON UK. - ISACA CISA Certificering (3 dage) (30/4/2007 til 2/5/2007)

Målet med vores tre dages accelereret CISA kursus er at udstyre IT-folk med viden og tekniske færdigheder til at beherske IS revision, kontrol og sikkerhed.

Certified Information Systems Auditor, som er sponsoreret af Information Systems Audit og Control Association (ISACA), har siden 1978 været en globalt anerkendt standard for IS revision, kontrol og sikkerhed.

De tekniske færdigheder, som CISA vurderer og fremmer, er byggestenene for succes på området. Gennemførelse af CISA kurset dokumenterer kompetence indenfor området og er førende i branchen. Med en stigende efterspørgsel efter kandidater med kompetence indenfor IS revision, kontrol og sikkerhed, er CISA blevet et foretrukket certificeringskursus for medarbejdere og organisationer over hele verden.

I løbet af kurset, vil de studerende fordybe sig, lære og forberede sig på at tage CISA certificeringen på vores kursuscentre.

Vores Certified Information Systems Auditor kursus

  • Sørger for at du forankrer din viden ved at bruge accelereret indlæring
  • Giver dig mulighed for at gennemføre din certificering 50% hurtigere end traditionel undervisning.

Læs mere ...

Interesseret? Se vores priser her eller ring 88 18 43 20

Vores accelererede CISA certificerings kursus er den mest effektive måde at blive uddannet og certificeret på.

Vi har designet vores kursusmateriale så det forbereder dig til din eksamen.

Du vil lære det følgende:

During this accelerated course, you'll get instructor-led training to ensure that you learn the fundamentals, obtain hands-on skills and earn your certification.

The course curriculum prepares you for the latest exam

Domain 1—The Process of Auditing Information Systems (14%)
Domain 2—Governance and Management of IT (14%)
Domain 3—Information Systems Acquisition, Development and Implementation (19%)
Domain 4—Information Systems Operations, Maintenance and Support (23%)
Domain 5—Protection of Information Assets (30%)

Domain 1—The Process of Auditing Information Systems (14%)

Provide audit services in accordance with IT audit standards to assist the organization in protecting and controlling information systems.

Domain 1—Task Statements:

  • 1.1 Develop and implement a risk-based IT audit strategy in compliance with IT audit standards to ensure that key areas are included.
  • 1.2 Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization.
  • 1.3 Conduct audits in accordance with IT audit standards to achieve planned audit objectives.
  • 1.4 Report audit findings and make recommendations to key stakeholders to communicate results and effect change when necessary.
  • 1.5 Conduct follow-ups or prepare status reports to ensure appropriate actions have been taken by management in a timely manner.

Domain 1—Knowledge Statements:

  • 1.1 ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards
  • 1.2 Risk assessment concepts, tools and techniques in an audit context
  • 1.3 Control objectives and controls related to information systems
  • 1.4 Audit planning and audit project management techniques, including follow-up
  • 1.5 Fundamental business processes (e.g., purchasing, payroll, accounts payable, accounts receivable) including relevant IT
  • 1.6 Applicable laws and regulations which affect the scope, evidence collection and preservation, and frequency of audits
  • 1.7 Evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis, fraud investigation) used to gather, protect and preserve audit evidence
  • 1.8 Different sampling methodologies
  • 1.9 Reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution, audit report structure)
  • 1.10 Audit quality assurance systems and frameworks

Domain 2—Governance and Management of IT (14%)

Provide assurance that the necessary leadership and organization structure and processes are in place to achieve objectives and to support the organization's strategy.

Domain 2—Task Statements:

  • 2.1 Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization’s strategies and objectives.
  • 2.2 IT organizational structure and human resources (personnel) management to determine whether they support the organization’s strategies and objectives.
  • 2.3 IT strategy, including the IT direction, and the processes for the strategy’s development, approval, implementation and maintenance for alignment with the organization’s strategies and objectives.
  • 2.4 The organization’s IT policies, standards, and procedures, and the processes for their development, approval, implementation, maintenance, and monitoring, to determine whether they support the IT strategy and comply with regulatory and legal requirements.
  • 2.5 Evaluate the adequacy of the quality management system to determine whether it supports the organization’s strategies and objectives in a cost-effective manner.
  • 2.6 IT management and monitoring of controls (e.g., continuous monitoring, QA) for compliance with the organization’s policies, standards and procedures.
  • 2.7 IT resource investment, use and allocation practices, including prioritization criteria, for alignment with the organization’s strategies and objectives.
  • 2.8 Evaluate IT contracting strategies and policies, and contract management practices to determine whether they support the organization’s strategies and objectives.
  • 2.9 Evaluate risk management practices to determine whether the organization’s IT-related risks are properly managed.
  • 2.10 Evaluate monitoring and assurance practices to determine whether the board and executive management receive sufficient and timely information about IT performance.
  • 2.11 Evaluate the organization’s business continuity plan to determine the organization’s ability to continue essential business operations during the period of an IT disruption.

Domain 2—Knowledge Statements:

  • 2.1 IT governance, management, security and control frameworks, and related standards, guidelines, and practices
  • 2.2 The purpose of IT strategy, policies, standards and procedures for an organization and the essential elements of each
  • 2.3 Organizational structure, roles and responsibilities related to IT
  • 2.4 The processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures
  • 2.5 The organization’s technology direction and IT architecture and their implications for setting long-term strategic directions
  • 2.6 Relevant laws, regulations and industry standards affecting the organization
  • 2.7 Quality management systems
  • 2.8 The use of maturity models
  • 2.9 Process optimization techniques
  • 2.10 IT resource investment and allocation practices, including prioritization criteria (e.g., portfolio management, value management, project management)
  • 2.11 IT supplier selection, contract management, relationship management and performance monitoring processes including third party outsourcing relationships
  • 2.12 Enterprise risk management
  • 2.13 Practices for monitoring and reporting of IT performance (e.g., balanced scorecards, key performance indicators [KPI])
  • 2.14 IT human resources (personnel) management practices used to invoke the business continuity plan
  • 2.15 Business impact analysis (BIA) related to business continuity planning
  • 2.16 The standards and procedures for the development and maintenance of the business continuity plan and testing methods

Domain 3—Information Systems Acquisition, Development, and Implementation (19%)

Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization’s strategies and objectives.

Domain 3—Task Statements:

  • 3.1 Evaluate the business case for the proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether it meets business objectives.
  • 3.2 Evaluate the project management practices and controls to determine whether business requirements are achieved in a cost-effective manner while managing risks to the organization.
  • 3.3 Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation and status reporting is accurate.
  • 3.4 Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organization's policies, standards, procedures and applicable external requirements.
  • 3.5 Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and organization's requirements are met.
  • 3.6 Conduct post-implementation reviews of systems to determine whether project deliverables, controls and organization's requirements are met.

Domain 3—Knowledge Statements:

  • 3.1 Benefits realization practices, (e.g., feasibility studies, business cases, total cost of ownership [TCO], ROI)
  • 3.2 Project governance mechanisms (e.g., steering committee, project oversight board, project management office)
  • 3.3 Project management control frameworks, practices and tools
  • 3.4 Risk management practices applied to projects
  • 3.5 IT architecture related to data, applications and technology (e.g., distributed applications, web-based applications, web services, n-tier applications)
  • 3.6 Acquisition practices (e.g., evaluation of vendors, vendor management, escrow)
  • 3.7 Requirements analysis and management practices (e.g., requirements verification, traceability, gap analysis, vulnerability management, security requirements)
  • 3.8 Project success criteria and risks
  • 3.9 Control objectives and techniques that ensure the completeness, accuracy, validity and authorization of transactions and data
  • 3.10 System development methodologies and tools including their strengths and weaknesses (e.g., agile development practices, prototyping, rapid application development [RAD], object-oriented design techniques)
  • 3.11 Testing methodologies and practices related to information systems development
  • 3.12 Configuration and release management relating to the development of information systems
  • 3.13 System migration and infrastructure deployment practices and data conversion tools, techniques and procedures.
  • 3.14 Post-implementation review objectives and practices (e.g., project closure, control implementation, benefits realization, performance measurement)

Domain 4—Information Systems Operations, Maintenance and Support (23%)

Provide assurance that the processes for information systems operations, maintenance and support meet the organization’s strategies and objectives.

Domain 4—Task Statements:

  • 4.1 Conduct periodic reviews of information systems to determine whether they continue to meet the organization’s objectives.
  • 4.2 Evaluate service level management practices to determine whether the level of service from internal and external service providers is defined and managed.
  • 4.3 Evaluate third party management practices to determine whether the levels of controls expected by the organization are being adhered to by the provider.
  • 4.4 Evaluate operations and end-user procedures to determine whether scheduled and non-scheduled processes are managed to completion.
  • 4.5 Evaluate the process of information systems maintenance to determine whether they are controlled effectively and continue to support the organization’s objectives.
  • 4.6 Evaluate data administration practices to determine the integrity and optimization of databases.
  • 4.7 Evaluate the use of capacity and performance monitoring tools and techniques to determine whether IT services meet the organization’s objectives.
  • 4.8 Evaluate problem and incident management practices to determine whether incidents, problems or errors are recorded, analyzed and resolved in a timely manner.
  • 4.9 Evaluate change, configuration and release management practices to determine whether scheduled and non-scheduled changes made to the organization’s production environment are adequately controlled and documented.
  • 4.10 Evaluate the adequacy of backup and restore provisions to determine the availability of information required to resume processing.
  • 4.11 Evaluate the organization’s disaster recovery plan to determine whether it enables the recovery of IT processing capabilities in the event of a disaster.

Domain 4—Knowledge Statements:

  • 4.1 Service level management practices and the components within a service level agreement
  • 4.2 Techniques for monitoring third party compliance with the organization’s internal controls
  • 4.3 Operations and end-user procedures for managing scheduled and non-scheduled processes
  • 4.4 The technology concepts related to hardware and network components, system software and database management systems
  • 4.5 Control techniques that ensure the integrity of system interfaces
  • 4.6 Software licensing and inventory practices
  • 4.7 System resiliency tools and techniques (e.g., fault tolerant hardware, elimination of single point of failure, clustering)
  • 4.8 Database administration practices
  • 4.9 Capacity planning and related monitoring tools and techniques
  • 4.10 Systems performance monitoring processes, tools and techniques (e.g., network analyzers, system utilization reports, load balancing)
  • 4.11 Problem and incident management practices (e.g., help desk, escalation procedures, tracking)
  • 4.12 Processes, for managing scheduled and non-scheduled changes to the production systems and/or infrastructure including change, configuration, release and patch management practices
  • 4.13 Data backup, storage, maintenance, retention and restoration practices
  • 4.14 Regulatory, legal, contractual and insurance issues related to disaster recovery
  • 4.15 Business impact analysis (BIA) related to disaster recovery planning
  • 4.16 The development and maintenance of disaster recovery plans
  • 4.17 Types of alternate processing sites and methods used to monitor the contractual agreements (e.g., hot sites, warm sites, cold sites)
  • 4.18 Processes used to invoke the disaster recovery plans
  • 4.19 Disaster recovery testing methods

Domain 5—Protection of Information Assets (30%)

Provide assurance that the organization’s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.

Domain 5—Task Statements:

  • 5.1 Evaluate the information security policies, standards and procedures for completeness and alignment with generally accepted practices.
  • 5.2 Evaluate the design, implementation and monitoring of system and logical security controls to verify the confidentiality, integrity and availability of information.
  • 5.3 Evaluate the design, implementation, and monitoring of the data classification processes and procedures for alignment with the organization’s policies, standards, procedures, and applicable external requirements.
  • 5.4 Evaluate the design, implementation and monitoring of physical access and environmental controls to determine whether information assets are adequately safeguarded.
  • 5.5 Evaluate the processes and procedures used to store, retrieve, transport and dispose of information assets (e.g., backup media, offsite storage, hard copy/print data, and softcopy media) to determine whether information assets are adequately safeguarded.

Domain 5—Knowledge Statements:

  • 5.1 The techniques for the design, implementation, and monitoring of security controls, including security awareness programs
  • 5.2 Processes related to monitoring and responding to security incidents (e.g., escalation procedures, emergency incident response team)
  • 5.3 Logical access controls for the identification, authentication and restriction of users to authorized functions and data
  • 5.4 The security controls related to hardware, system software (e.g., applications, operating systems), and database management systems.
  • 5.5 Risks and controls associated with virtualization of systems
  • 5.6 The configuration, implementation, operation and maintenance of network security controls
  • 5.7 Network and Internet security devices, protocols, and techniques
  • 5.8 Information system attack methods and techniques
  • 5.9 Detection tools and control techniques (e.g., malware, virus detection, spyware)
  • 5.10 Security testing techniques (e.g., intrusion testing, social engineering testing, vulnerability scanning)
  • 5.11 Risks and controls associated with data leakage
  • 5.12 Encryption-related techniques
  • 5.13 Public key infrastructure (PKI) components and digital signature techniques
  • 5.14 Risks and controls associated with peer-to-peer computing, instant messaging, and web-based technologies (e.g., social networking, message boards, blogs)
  • 5.15 Controls and risks associated with the use of mobile & wireless devices
  • 5.16 Voice communications security (e.g., PBX, VoIP)
  • 5.17 The evidence preservation techniques and processes followed in forensics investigations (e.g., IT, process, chain of custody, fraud evidence collection)
  • 5.18 Data classification standards and supporting procedures
  • 5.19 Physical access controls for the identification, authentication and restriction of users to authorized facilities
  • 5.20 Environmental protection devices and supporting practices
  • 5.21 The processes and procedures used to store, retrieve, transport and dispose of confidential information assets

Læs mere ...

Interesseret? Se vores priser her eller ring 88 18 43 20

I løbet af kurset forbereder vi dig for den følgende eksamen som gennemføres separat efter kurset hos en ekstern testleverandør (Testvoucher skal betales separat og købes direkte hos testudbyderen):

  • ISACA: Certified Information Systems Auditor™ (CISA®)

Seneste dato for eksamenstilmelding er den 23. oktober 2015

Eksamensdato er den 12. december 2015

Læs mere ...

Interesseret? Se vores priser her eller ring 88 18 43 20

Firebrand Training tilbyder kvalificerede uddannelses- og certificeringsprogram som inkluderer alt, er enkelt for kunden og udviklet med fokus på de specifikke behov som vores deltagere har. Vi sørger for, at alle detaljer er på plads, så du kun skal fokusere på dine indlærings- og certificeringsmål.

Vores kursus- og certificeringsprogram inkluderer alt* med;

  • Praktisk orienteret undervisning som anvender vores Præsentation|Øvelse|Diskussion metodik
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program med 24 timers adgang til både undervisningslokale, labudstyr og instruktøren
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the
  • Vores certificeringsgaranti som indebærer, at vi giver en uvilkårlig garanti for at du opnår din certificering. Du har ret til at komme tilbage til kurset så mange gange du ønsker, indenfor de første 12 måneder, indtil du har fået din certificering. Det eneste du skal betale er eventuelle nye eksamens- og logiomkostninger
  • Transport til og fra nærmeste lufthavn/togstation både før og efter kurset

* Testvoucher skal betales separat og købes direkte hos testudbyderen

Læs mere ...

Interesseret? Se vores priser her eller ring 88 18 43 20

Deltagere som med succes gennemfører vores CISA kursus har følgende forkundskaber:

CISA certificeringen kræver minimum fem års arbejde indenfor revision af informationssystemer på højt niveau, og erfaring indenfor styring eller sikkerhedsbranchen (som beskrevet i områderne med jobindhold). Dispensationer eller erstatninger for sådan erfaring får man som følger:

  • Maksimalt et års erfaring indenfor informationssystemer ELLER et års erfaring indenfor finansiel og operationel revision kan erstatte et års erfaring i revision af informationssystemer, styring og sikkerhedserfaring
  • 60 til 120 afsluttede universitetstimer (hvad der svarer til en bachelorgrad) kan henholdsvis erstatte et eller to års erfaring indenfor revision af informationssystemer, styring eller sikkerhedserfaring
  • To år som universitetsunderviser i et beslægtet felt (f. eks. datalogi, bogholderi eller revision af informationssystemer) kan erstatte et års erfaring med revision af informationssystemer, styring eller sikkerhedserfaring

Man skal have fået sin erfaring indenfor en 10-årig periode op til ansøgningsdatoen for certificeringen eller indenfor fem år fra at man oprindeligt blev eksamineret. Ansøger man ikke om certificering indenfor fem år efter man bestod sin eksamen, er man nødt til at bestå eksamen en gang til. Al erfaring vil blive verificeret hos arbejdsgivere.

Er du klar til at blive uddannet og certificeret på rekordtid?

Vi interviewer alle potentielle deltagere angående deres baggrund, uddannelser, certificeringer og personlig indstilling. Hvis du kommer igennem denne screeningsprocedure, betyder det, at du har rigtig gode chancer for at bestå.

Firebrand Training tilbyder et ambitiøst uddannelsesmiljø, som forudsætter at du dedikerer dig til kurset. Ovenstående forkundskaber er vejledende; mange deltagere med mindre erfaring, men med en anden baggrund eller færdigheder, har haft succes med accelereret uddannelse hos Firebrand Training.

Hvis du funderer på hvorvidt du opfylder de anbefalede forkundskaber, er du meget velkommen til at ringe til os på 88 18 43 20 og tale med en af vores uddannelsesrådgivere, som kan hjælpe dig.

Interesseret? Se vores priser her eller ring 88 18 43 20