ISACA Training

Home » ISACA Training

Certified Information Systems Auditor (CISA)

The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise.

Certified Information Security Manager (CISM)

CISM means higher earning potential and career advancement. Recent independent studies consistently rank CISM as one of the highest paying and sought after IT certifications.

The uniquely management-focused CISM certification promotes international security practices and recognizes the individual who manages, designs, and oversees and assesses an enterprise’s information security.

COBIT 5 Foundation

COBIT 5 is the only business framework for the governance and management of enterprise IT. Launched in April 2012, COBIT 5 helps maximize the value of information by incorporating the latest thinking in enterprise governance and management techniques, and provides globally accepted principles, practices, analytical tools and models to help increase the trust in, and value from, information systems.

Learn the importance of an effective framework to enable business value. Delve into the elements of ISACA’s evolutionary framework to understand how COBIT 5 covers the business end-to-end and helps you effectively govern and manage enterprise IT. Developed for anyone interested in obtaining foundation-level knowledge of COBIT, the course explains the COBIT framework and supporting materials in a logical and example-driven approach.

Target Audience: IT auditors, IT managers, IT quality professionals, IT leadership, IT developers, process practitioners and managers in IT service providing firms

At the conclusion of this course, attendees will understand

  • How IT management issues are affecting organizations
  • The need for an effective framework to govern and manage enterprise IT
  • How COBIT meets the requirement for an IT governance framework
  • How COBIT is used with other standards and best practices
  • The functions that COBIT provides and the benefits of using COBIT
  • The COBIT Framework and all the components of COBIT
  • How to apply COBIT in a practical situation

COBIT 5 Implementation

Get a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events and risk scenarios within the organization. Learn how to implement and apply COBIT 5 into your enterprise and how to effectively use it for client initiatives. Attendees will walk away with an appreciation of how to effectively use COBIT 5 for different organizational scenarios.

The course material is supported by practical exercises and case-based scenarios. Candidates learn how to apply the COBIT 5 continual improvement lifecycle approach to address requirements and establish and maintain a sustainable approach to governing and managing enterprise IT as “normal business practice”.

Target Audience: IT auditors, IT managers, IT quality professionals, IT leadership, IT developers, process practitioners and managers in IT service providing firms, business managers

At the conclusion of this course, attendees will understand

  • How to analyze enterprise drivers
  • Implementation challenges, root causes and success factors
  • How to determine and assess current process capability
  • How to scope and plan improvements
  • Potential implementation pitfalls