P R O F E S S I O N A L
C E R T I F I C A T E S
Certified Information System
Auditor (CISA)
Program
Objectives
The CISA program is designed to
assess and certify individuals in
the IS audit, control or security
profession who demonstrate
exceptional skill, judgment and
proficiency in IS audit, control and
security practices. It also aids top
management in developing a sound
information systems audit function
by providing criteria for personnel
selection and development.
Pre-requisites and Requirements
Min 5 years of professional IS
auditing, control, assurance or
security experience or A maximum of
one year of information systems
experience OR one year of financial
or operational auditing experience
can be substituted for one year of
information systems auditing,
control or security experience.
60 to 120 completed college semester
credit hours (the equivalent of an
Associate or Bachelor degree) can be
substituted for one or two years,
respectively, of information systems
auditing, control or security
experience.
Two years as a full-time university
instructor in a related field (e.g.,
computer science, accounting,
information systems auditing) can be
substituted for one year of
information systems auditing,
control or security experience
Exam Window (s)
The American Chamber of Commerce
is the sole center in Egypt offering
the exam. Exams are taken at the
Chamber's premises during the
following windows:
June
December
For more information on registration
deadlines for Exam, please visit
CISA Exam Registration.
Course Date (s)
February-May
August-November
Continuing Professional Education (CPE)
Upon completing the requirements
for initial certification, the CISA
will be provided with the CPE policy
booklet for detailed criteria to be
used in developing a personal CPE
program.
For more details, please visit
CISA CPE Policy.
Program Contents
Part 1 – Process Based Area
-
IS Audit Process (10%) -
Provide IS audit services in
accordance with IS audit
standards, guidelines, and best
practices to assist the
organization in ensuring that
its information technology and
business systems are protected
and controlled.
-
IT Governance (15%) -
Provide assurance that the
organization has the structure,
policies, accountability,
mechanisms and monitoring
practices in place to achieve
the requirements of corporate
governance of IT.
-
IT service Delivery & Support
(14%) -
Provide assurance that the IT
service management practices
will ensure the delivery of the
level of services required to
meet the organization’s
objectives.
-
Technical Infrastructure &
Operational Practices (16%)
-
Provide assurance that the
management practices for the
development/acquisition,
testing, implementation,
maintenance and disposal of
systems and infrastructure will
meet the organization’s
objectives.
-
Protection of Information
Assets (31%) -
Provide assurance that the
security architecture (policies,
standards, procedures and
controls) ensures the
confidentiality, integrity and
availability of information
assets.
-
Disaster Recover and Business
Continuity (14%) -
Provide assurance that, in the
event of a disruption, the
business continuity and disaster
recovery processes will ensure
the timely resumption of IT
services, while minimizing the
business impact. Business
Application System Development,
Acquisition, Implementation and
Maintenance. Business Process
Evaluation and Risk Management.
Part 2 - Content Areas
Management, Planning and
Organization of IS
For more information on CISA, please
visit
www.isaca.org |