Packt

CISA – Certified Information Systems Auditor Study Guide

Ends soon: Grow your skills with Coursera Plus for $239/year (usually $399). Save now.

Packt

CISA – Certified Information Systems Auditor Study Guide

Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Beginner level

Recommended experience

2 weeks to complete
at 10 hours a week
Flexible schedule
Learn at your own pace

What you'll learn

  • Learn to conduct thorough audit planning and execution for information systems.

  • Understand IT governance, management, and their critical role in auditing.

  • Gain skills in securing and controlling information systems and networks.

  • Master the knowledge required for implementing business resilience strategies and addressing emerging technologies.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

April 2026

Assessments

12 assignments

Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 12 modules in this course

In this section, we delve into the intricacies of information system (IS) audit planning, emphasizing its role in IT governance and alignment with business objectives. We explore strategies for designing risk-based audit plans to identify IT vulnerabilities, ensuring that audit functions support business goals and enhance IT system security and compliance.

What's included

2 videos10 readings1 assignment

In this section, we delve into the execution of audit plans, emphasizing the importance of audit project management, evidence collection, and data analytics. We explore techniques for managing audit projects efficiently, developing robust evidence-gathering methods, and leveraging data analytics to enhance audit processes, all crucial for maintaining audit integrity and protecting organizational assets.

What's included

1 video8 readings1 assignment

In this section, we explore the implementation of Enterprise Governance of IT (EGIT) to align IT with business objectives, focusing on maximizing value and managing risks. We also discuss designing IT governance frameworks for effective risk management and analyzing enterprise architecture to provide strategic support, which are crucial for IS auditors in ensuring organizational success.

What's included

1 video5 readings1 assignment

In this section, we explore IT management strategies to align IT assets with business goals, focusing on resource management, performance metrics, and third-party risk analysis. We aim to optimize IT performance and ensure quality service delivery through effective monitoring and reporting techniques.

What's included

1 video2 readings1 assignment

In this section, we delve into the processes of acquiring and developing information systems, emphasizing project management structures, business case design, and feasibility analysis. We also explore various system development methodologies and control mechanisms to ensure effective implementation and risk mitigation.

What's included

1 video4 readings1 assignment

In this section, we delve into the implementation of information systems, emphasizing the importance of testing methodologies and system migration strategies to mitigate risks and ensure successful operations. We also explore post-implementation reviews to evaluate system effectiveness, providing essential insights for information systems auditors.

What's included

1 video3 readings1 assignment

In this section, we delve into the critical aspects of information systems operations, emphasizing the importance of aligning IT processes with business objectives to enhance efficiency and service delivery. We explore key topics such as IT asset management, job scheduling, and system performance management, providing insights into optimizing resource utilization and minimizing downtime for continuous service delivery.

What's included

1 video8 readings1 assignment

In this section, we delve into the critical aspects of business resilience, focusing on developing strategies such as Business Continuity Plans (BCP) and Disaster Recovery Plans (DRP) to ensure ongoing operations during disruptions. We also analyze Recovery Time Objective (RTO) and Recovery Point Objective (RPO) to optimize recovery strategies, highlighting the importance of these measures in preventing costly downtimes and ensuring swift recovery from unforeseen events.

What's included

1 video6 readings1 assignment

In this section, we explore the implementation of security frameworks for information assets, focusing on designing physical and environmental access controls and analyzing identity and access management strategies. These practices are crucial for protecting sensitive data, ensuring business continuity, and preventing financial and reputational damage.

What's included

1 video6 readings1 assignment

In this section, we explore the critical aspects of network security, focusing on implementing various firewall types and understanding their roles within the OSI layers. We also design secure VPNs, assess their security risks, and analyze VoIP security measures and common attack methods to ensure data integrity and availability.

What's included

1 video7 readings1 assignment

In this section, we explore the implementation of public key infrastructure (PKI) to enhance information asset security and analyze cloud computing models for secure deployment. We also evaluate security measures for the Internet of Things (IoT) to ensure effective data protection, providing IS auditors with the necessary knowledge to assess and implement robust security systems.

What's included

1 video5 readings1 assignment

In this section, we explore security event management by implementing security awareness training, analyzing attack methods, and designing incident response plans to protect information systems effectively. We focus on identifying risks and applying strategic security measures to safeguard organizational data and operations.

What's included

1 video4 readings1 assignment

Instructor

Packt - Course Instructors
Packt
1,695 Courses479,206 learners

Offered by

Packt

Why people choose Coursera for their career

Felipe M.

Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."

Jennifer J.

Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."

Larry W.

Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."

Chaitanya A.

"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions