Phone (416) 332-8727 ; Add to Favorites
Home Programs Admission Financial Aid e-Learning Events & News Career Services Contact
Certified Information Systems Auditor (CISA) certification
Certified Information Systems Auditor (CISA) certification


Validate your expertise and get the leverage you need to move up in your career. With ISACA’s Certified Information Systems Auditor (CISA) certification, you can do just that. CISA is world-renowned as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems.   



1. The Process of Auditing Information Systems


1.      Management of  the IS Audit Function

2.      ISACA IT Audi and Assurance Standards and Guidelines

3.      Risk Analysis

4.      Internal Controls

5.      Performing an IS Audit

6.      Control Self-Assessment

7.      The Evolving IS Audit Process



2. Governance and Management of IT


1.      Corporate Governance

2.      IT Governance (ITG)

3.      Information Technology Monitoring and Assurance Practices for Board and Senior Management

4.      Information Systems Strategy

5.      Maturity and Process Improvement Models

6.      IT Investment and Allocation Practices

7.      Policies and Procedures

8.      Risk Management

9.      IS management Practices (and 5 sub-areas under this as well)

10.  IS Organizational Structure and Responsibilities

11.  Auditing IT Governance Structure and Implementation

12.  Business Continuity Planning

13.  Auditing Business Continuity



3. IS Acquisition, Development, and Implementation


1.      Business Realization

2.      Project Management Structure

3.      Project Management Practices

4.      Business Application Development

5.      Business Application Systems

6.      Alternative Forms of Software Project Organization

7.      Alternative Development Methods

8.      Infrastructure Development/ Acquisition Practices

9.      Information Systems Maintenance Practices

10.  System Development Tools and Productivity Aids

11.  Process Improvement Practices

12.  Application Controls

13.  Auditing Application Controls

14.  Auditing Systems Development, Acquisition and Maintenance



4. IS Operations, Maintenance, and Support


1.      Information Systems Operations

2.      Information Systems Hardware

3.      IS Architecture and Software

4.      IS Network Infrastructure

5.      Auditing Infrastructure and Operations

6.      Disaster Recovery Planning



5. Protection of Information Assets


1.      Importance of Information Security Management

2.      Logical Access

3.      Network Infrastructure Security

4.      Auditing Information Security Management Framework

5.      Auditing Network Infrastructure Security

6.      Environmental Exposures and Controls

7.      Physical Access Exposures and Controls

8.      Mobile Computing



The Trainers
Dr. Joan Lin
Ph.D. in Computer Application
Senior Scientisit
Senior Statistian
The Achievements

Fill out and submit this Form to ask any questions about this program. Our counsellor will get back to you shortly.


The Resources
Data Warehousing

Data Mining

OCOT Advantages

100 %Instructor-Led Class
State-of-the-Art Facilities
Unlimited Lab Time
Labs Open 7-days a Week
Free Repeat
Free Job Placement
Financial Aid Possible
Resume Writing
Interview Skills

© 2008 Ontario College of Technology