In This Issue
Upcoming Events
Growing an Early Stage Company – Execution is Everything
it@cork Member Christmas Drinks
it@cork Skillnet
Applied Data Science and Big Data Analytics
LPIC-1 Part 1 LINUX CERTIFICATION (Linux Administrator)
Certified Information Security Auditor (CISA)
Other Industry Events
Business Analyst Event
Artificial Intelligence for Sustainability
Support Manager Class
Member News
Pilz Ireland, welcomes German Ambassador Deike Potzel to tour their new Software Development Centre
Intellicom ranks in Deloitte Technology Fast 50 for Fourth Consecutive Year
Contact Us

Sarah Walsh admin@itcork.ie


Certified Information Security Auditor (CISA)

To book a place on this course or to register your interest, email Annette Coburn skillnet@itcork.ie

 

Pre-requisites

 

Students taking this course should have a minimum of five years of professional information systems auditing, control, or security work experience as described in the CISA job practice domain areas:

  • The Process of Auditing Information Systems
  • Governance and Management of IT
  • Information Systems Acquisition, Development, and Implementation
  • Information Systems Operations, Maintenance and Support
  • Protection of Information Assets

 

TARGET AUDIENCE

The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification.

 

COURSE OBJECTIVES

Upon successful completion of this course, students will be able to:

– establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations.

– identify and manage information security risks to achieve business objectives.

– create a program to implement the information security strategy.

– implement an information security program.

– oversee and direct information security activities to execute the information security program.

– plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents.

 

Click Here to see full course content

Facebook Twitter LinkedIn