Certified Information Systems Auditor (CISA) Self-Paced Boot Camp


Share The Knowledge


In a perfect world every one of us would prefer to attend a live boot camp. That being said, not everybody can afford either the cost or the time to attend one. ITU University Online created the Self-Paced Bootcamp in an effort to maximize efficiency while minimizing cost.

Every element of a live class is now incorporated into these products. From renown instructors providing their expert insight through a series of informational lectures, to a series of practice exams designed to ensure your certification, the self-paced bootcamp is a one of a kind experience that will carefully cover every element that you would experience in a live classroom environment.

CISA is to Audit what CPA and CA are to Accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the CISA exam administration in June 2011. For purposes of these statements, the terms “enterprise” and “organization” or “organizational” are considered synonymous.

This course is led by Chrys Thorsen, founder of IT without Borders:

This Course Includes:

  • 13 Hours of Instructor Led Videos, covering all exam domains.
  • Electronic Copy of Certified Information Systems Auditor (CISA) Cert Guide (Certification Guide)
  • 700 Practice Questions
  • 300 Electronic Flash Cards
  • Student Forums
  • Instructor Support
  • Our ITU Pass Guarantee






Lesson 1
1.1 Introduction
1.2 Audit Process
1.3 Auditing Standards
1.4 Auditing Guidelines
1.5 Cobit Model
1.6 Audit Management
1.7 Internal Control Classifications
1.8 Planning
1.9 Program
1.10 Evidence
1.11 Audit Control Evaluation
1.12 C S A Control Self- Assessment

Lesson 2
2.1 IT Governance
2.2 Outsourcing And Governance
2.3 IT Strategy
2.4 Governance And Security Policies
2.5 Organizational Compliance
2.6 Outsourcing And Globalization
2.7 Outsourcing
2.8 IT Performance

Lesson 3
3.1 System And Infrastructure
3.2 Requirements
3.3 Project Management Tools- Part 1
3.4 Project Management Tools- Part 2
3.5 Applications
3.6 Agile Development
3.7 Monitoring And Controlling
3.8 Acquisition Process
3.9 Testing Process
3.10 Information Systems Maintenance Practices
3.11 Data Conversion Tools

Lesson 4
4.1 Media Disposal Process
4.2 Post Implementation Review
4.3 Periodic Review
4.4 System Maintenance

Lesson 5
5.1 IT Service Delivery And Support
5.2 How To Evalutate Service Level Management Practices
5.3 Operations Management
5.4 Databases
5.5 Structured Query Language
5.6 Monitoring Performance
5.7 Source Code And Performance Monitoring
5.8 Patch Management
5.9 Incident Management
5.10 Hardware Component Types
5.11 Network Component Types

Lesson 6
6.1 I S Auditor Technical Overview
6.2 Security Design
6.3 Monitoring Systems
6.4 Types Of Attacks
6.5 Cryptography
6.6 Encryption
6.7 Asymmetric Encryption
6.8 Digital Certificate
6.9 Different Kinds Of Attacks
6.10 Access Controls
6.11 Identification And Authenication
6.12 Physical Access Exposure
6.13 Environmental Security
6.14 Network Security Devices And Network Components
6.15 Network Address Translation
6.16 Virtual Private Networks
6.17 Voice System Risks
6.18 Intrusion Detection
6.19 Firewalls
6.20 Firewall Implementation
6.21 Network Access Protection
6.22 Honey Pot
6.23 Risks To Portable And Wireless Devices
6.24 Bluetooth
6.25 OSI Networking
6.26 Managing Data

Lesson 7
7.1 Business Continuity And Disaster Recovery
7.2 Fault Tolerance
7.3 Business Continuity And Disaster Recovery Regulations