Get in Touch

Course Outline

Domain 1—The Process of Auditing Information Systems (14%)

Deliver audit services in line with IT audit standards to help the organization protect and control its information systems.

  • 1.1 Develop and implement a risk-based IT audit strategy compliant with IT audit standards, ensuring all key areas are covered.
  • 1.2 Plan specific audits to verify that information systems are protected, controlled, and deliver value to the organization.
  • 1.3 Execute audits in accordance with IT audit standards to meet planned objectives.
  • 1.4 Report audit findings and provide recommendations to key stakeholders to communicate results and facilitate necessary changes.
  • 1.5 Perform follow-ups or prepare status reports to ensure management takes appropriate actions in a timely manner.

Domain 2—Governance and Management of IT (14%)

Assure that adequate leadership, organizational structure, and processes are in place to achieve objectives and support the organization's strategy.

  • 2.1 Assess the effectiveness of the IT governance structure to ensure IT decisions, direction, and performance align with organizational strategies and objectives.
  • 2.2 Assess the IT organizational structure and human resource management to ensure they support organizational strategies and objectives.
  • 2.3 Assess the IT strategy, including direction and processes for development, approval, implementation, and maintenance, for alignment with organizational strategies and objectives.
  • 2.4 Assess IT policies, standards, and procedures, along with their development, approval, implementation, maintenance, and monitoring processes, to ensure they support IT strategy and comply with regulatory and legal requirements.
  • 2.5 Assess the quality management system to determine if it supports organizational strategies and objectives cost-effectively.
  • 2.6 Assess IT management and control monitoring (e.g., continuous monitoring, QA) for compliance with organizational policies, standards, and procedures.
  • 2.7 Assess IT resource investment, usage, and allocation practices, including prioritization criteria, for alignment with organizational strategies and objectives.
  • 2.8 Assess IT contracting strategies, policies, and contract management practices to ensure they support organizational strategies and objectives.
  • 2.9 Assess risk management practices to ensure IT-related risks are properly managed.
  • 2.10 Assess monitoring and assurance practices to ensure the board and executive management receive sufficient and timely IT performance information.
  • 2.11 Assess the business continuity plan to determine the organization's ability to maintain essential operations during an IT disruption.

Domain 3—Information Systems Acquisition, Development, and Implementation (19%)

Assure that practices for acquiring, developing, testing, and implementing information systems meet organizational strategies and objectives.

  • 3.1 Assess the business case for proposed investments in information systems acquisition, development, maintenance, and retirement to ensure alignment with business objectives.
  • 3.2 Assess project management practices and controls to ensure business requirements are met cost-effectively while managing organizational risks.
  • 3.3 Conduct reviews to verify project progress against plans, adequate documentation, and accurate status reporting.
  • 3.4 Assess controls during the requirements, acquisition, development, and testing phases for compliance with organizational policies, standards, procedures, and external requirements.
  • 3.5 Assess readiness for implementation and migration to production to ensure project deliverables, controls, and organizational requirements are met.
  • 3.6 Conduct post-implementation reviews to verify that project deliverables, controls, and organizational requirements have been met.

Domain 4—Information Systems Operations, Maintenance and Support (23%)

Assure that processes for information systems operations, maintenance, and support meet organizational strategies and objectives.

  • 4.1 Conduct periodic reviews to ensure information systems continue to meet organizational objectives.
  • 4.2 Assess service level management practices to ensure service levels from internal and external providers are defined and managed.
  • 4.3 Assess third-party management practices to ensure providers adhere to expected control levels.
  • 4.4 Assess operations and end-user procedures to ensure scheduled and unscheduled processes are completed effectively.
  • 4.5 Assess information systems maintenance processes to ensure they are controlled effectively and continue to support organizational objectives.
  • 4.6 Assess data administration practices to ensure database integrity and optimization.
  • 4.7 Assess the use of capacity and performance monitoring tools and techniques to ensure IT services meet organizational objectives.
  • 4.8 Assess problem and incident management practices to ensure incidents, problems, and errors are recorded, analyzed, and resolved promptly.
  • 4.9 Assess change, configuration, and release management practices to ensure scheduled and unscheduled changes to the production environment are controlled and documented adequately.
  • 4.10 Assess backup and restore provisions to ensure information required to resume processing is available.
  • 4.11 Assess the disaster recovery plan to ensure IT processing capabilities can be recovered in the event of a disaster.

Domain 5—Protection of Information Assets (30%)

Assure that the organization’s security policies, standards, procedures, and controls ensure the confidentiality, integrity, and availability of information assets.

  • 5.1 Assess information security policies, standards, and procedures for completeness and alignment with generally accepted practices.
  • 5.2 Assess the design, implementation, and monitoring of system and logical security controls to verify the confidentiality, integrity, and availability of information.
  • 5.3 Assess the design, implementation, and monitoring of data classification processes and procedures for alignment with organizational policies, standards, procedures, and external requirements.
  • 5.4 Assess the design, implementation, and monitoring of physical access and environmental controls to ensure information assets are adequately safeguarded.
  • 5.5 Assess processes and procedures for storing, retrieving, transporting, and disposing of information assets (e.g., backup media, offsite storage, hard copy/print data, and softcopy media) to ensure adequate safeguarding.

Requirements

This non-certification course has no specific prerequisites.

 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories