Home      Membership      Contact us      Sitemap    
 

Site Search :   

Members Only

   Username:
 
   Password:
 
 
   Forgot Password?
 
 
 

 
 
P R O F E S S I O N A L     C E R T I F I C A T E S 

   Certified Information System Auditor (CISA)

  Program Objectives
The CISA program is designed to assess and certify individuals in the IS audit, control or security profession who demonstrate exceptional skill, judgment and proficiency in IS audit, control and security practices. It also aids top management in developing a sound information systems audit function by providing criteria for personnel selection and development.


  Pre-requisites and Requirements
Min 5 years of professional IS auditing, control, assurance or security experience or A maximum of one year of information systems experience OR one year of financial or operational auditing experience can be substituted for one year of information systems auditing, control or security experience.

60 to 120 completed college semester credit hours (the equivalent of an Associate or Bachelor degree) can be substituted for one or two years, respectively, of information systems auditing, control or security experience.

Two years as a full-time university instructor in a related field (e.g., computer science, accounting, information systems auditing) can be substituted for one year of information systems auditing, control or security experience

  Exam Window (s)
The American Chamber of Commerce is the sole center in Egypt offering the exam. Exams are taken at the Chamber's premises during the following windows:

June
December

For more information on registration deadlines for Exam, please visit
CISA Exam Registration.

  Course Date (s)
February-May
August-Novemb
er

  Continuing Professional Education (CPE)
Upon completing the requirements for initial certification, the CISA will be provided with the CPE policy booklet for detailed criteria to be used in developing a personal CPE program.

For more details, please visit
CISA CPE Policy.

  Program Contents
Part 1 – Process Based Area

  • IS Audit Process (10%) - Provide IS audit services in accordance with IS audit standards, guidelines, and best practices to assist the organization in ensuring that its information technology and business systems are protected and controlled.

  • IT Governance (15%) - Provide assurance that the organization has the structure, policies, accountability, mechanisms and monitoring practices in place to achieve the requirements of corporate governance of IT.

  • IT service Delivery & Support (14%) - Provide assurance that the IT service management practices will ensure the delivery of the level of services required to meet the organization’s objectives.

  • Technical Infrastructure & Operational Practices (16%) - Provide assurance that the management practices for the development/acquisition, testing, implementation, maintenance and disposal of systems and infrastructure will meet the organization’s objectives.

  • Protection of Information Assets (31%) - Provide assurance that the security architecture (policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets.

  • Disaster Recover and Business Continuity (14%) - Provide assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact. Business Application System Development, Acquisition, Implementation and Maintenance. Business Process Evaluation and Risk Management.

Part 2 - Content Areas
Management, Planning and Organization of IS

For more information on CISA, please visit www.isaca.org

 
Rehaf