Course Details

  • Teacher
  • Category
    IT Programmes
  • Course Price
    GHC6000.00

Certified Information Systems Auditing - CISA

The Certified Information Systems Auditing (CISA) course is a specialized program designed for information technology professionals seeking expertise in information systems auditing, control, and security. Developed by ISACA, the CISA certification is globally recognized and signifies a high level of proficiency in assessing and managing information systems.

Course Details

The Certified Information Systems Auditing (CISA) course is a specialized program designed for information technology professionals seeking expertise in information systems auditing, control, and security. Developed by ISACA, the CISA certification is globally recognized and signifies a high level of proficiency in assessing and managing information systems. This course covers key areas such as IT governance, risk management, information systems acquisition, development, and implementation, as well as information systems operations, maintenance, and service management. Participants will learn to conduct comprehensive information systems audits, evaluate controls, and ensure the security and integrity of organizational information assets. The CISA certification is ideal for professionals aiming to advance their careers in information systems auditing, security, and governance.

Requirements

    PRIMARY TARGET AUDIENCE • Information Systems Auditors • Internal and external auditors who focus on IT systems and processes. • IT Auditors and Assurance Professionals • Individuals responsible for assessing risks and internal controls related to information systems. • IT Security Professionals • Cybersecurity professionals who want to broaden their knowledge into audit and governance. • Compliance and Risk Officers • Professionals responsible for regulatory compliance, governance, and enterprise risk management (ERM). • Information Security Managers and Officers • Individuals overseeing IT security policies, programs, and procedures. • IT Consultants and Advisors • Professionals providing advisory services related to IT governance, risk, and compliance. • Chief Information Officers (CIOs), IT Managers & Heads of IT • Senior IT executives seeking to understand audit requirements and controls. • Finance and Audit Committee Members • Board-level professionals who oversee internal controls and audit functions. • Aspiring CISA Candidates and Career Switchers • Individuals planning to pursue a career in IT audit and governance. SECONDARY AUDIENCE • Internal Control Officers • Data Protection Officers (DPOs) • Quality Assurance Professionals (with a focus on IT systems) • Regulatory Affairs Officers (especially in banking, telecom, or healthcare) • System Administrators and Database Managers (seeking to understand audit implications)

Course Syllabus

    Information Systems Auditing Process: Overview of the information systems auditing process, including planning, execution, and reporting. Governance and Management of IT: Understanding IT governance frameworks, organizational structure, and the role of IT in business strategy. Information Systems Acquisition, Development, and Implementation: Auditing the processes related to the acquisition, development, and implementation of information systems. Information Systems Operations, Maintenance, and Service Management: Auditing the ongoing operations, maintenance, and service management of information systems to ensure effectiveness and efficiency. Protection of Information Assets: Evaluating controls and measures for protecting information assets, including data security and privacy.

Course Information

  • Course Price: GHC6,000 (USD800 For Foreign Applicants)
  • Class Start: July 26, 2025
  • Course Duration: 10 Saturdays
  • Course Capacity: Max 30 Students
  • Class Schedule: Weekend (Saturday's Only)
  • Class Time: 9 a.m.

Location & Cohorts

  • Location: Gimpa Main
  • Cohort: Second Half Cohort

Course Reviews

Average Rating:4.6

5 Stars24
4 Stars5
3 Stars2
2 Stars0
1 Star0

Comments


    No comments yet

    Be the first to write a commnet

Leave a Comment