Course Outline
Domain 1—The Process of Auditing Information Systems (14%)
Deliver audit services in compliance with IT audit standards to help organizations protect and control their information systems.
- 1.1 Create and execute a risk-based IT audit strategy that adheres to IT audit standards, ensuring all critical areas are covered.
- 1.2 Plan targeted audits to assess whether information systems are adequately protected, controlled, and delivering value to the organization.
- 1.3 Perform audits in line with IT audit standards to meet planned objectives.
- 1.4 Communicate audit findings and recommendations to key stakeholders to drive necessary changes.
- 1.5 Follow up on findings or prepare status reports to confirm that management has taken timely and appropriate actions.
Domain 2—Governance and Management of IT (14%)
Assure that the required leadership, organizational structure, and processes are in place to achieve objectives and support the organization’s strategy.
- 2.1 Assess the effectiveness of the IT governance structure to ensure IT decisions, direction, and performance align with organizational strategies and objectives.
- 2.2 Evaluate the IT organizational structure and human resources management to ensure they support the organization’s strategies and objectives.
- 2.3 Review the IT strategy, including direction and the processes for development, approval, implementation, and maintenance, for alignment with organizational goals.
- 2.4 Assess IT policies, standards, and procedures, along with their development, approval, implementation, maintenance, and monitoring processes, to ensure they support the IT strategy and comply with legal and regulatory requirements.
- 2.5 Evaluate the quality management system to determine if it supports organizational strategies and objectives cost-effectively.
- 2.6 Review IT management and control monitoring (e.g., continuous monitoring, QA) for compliance with organizational policies, standards, and procedures.
- 2.7 Assess IT resource investment, utilization, and allocation practices, including prioritization criteria, for alignment with organizational strategies and objectives.
- 2.8 Evaluate IT contracting strategies, policies, and contract management practices to ensure they support organizational strategies and objectives.
- 2.9 Assess risk management practices to verify that IT-related risks are properly managed.
- 2.10 Review monitoring and assurance practices to ensure the board and executive management receive sufficient and timely information on IT performance.
- 2.11 Evaluate the business continuity plan to determine the organization’s ability to maintain essential operations during an IT disruption.
Domain 3—Information Systems Acquisition, Development, and Implementation (19%)
Assure that practices for acquiring, developing, testing, and implementing information systems align with the organization’s strategies and objectives.
- 3.1 Assess the business case for proposed investments in information systems acquisition, development, maintenance, and retirement to ensure alignment with business objectives.
- 3.2 Evaluate project management practices and controls to determine if business requirements are met cost-effectively while managing organizational risks.
- 3.3 Conduct reviews to verify that projects progress according to plans, are supported by adequate documentation, and have accurate status reporting.
- 3.4 Evaluate controls for information systems during requirements, acquisition, development, and testing phases for compliance with organizational policies, standards, procedures, and external requirements.
- 3.5 Assess the readiness of information systems for implementation and migration to production to ensure project deliverables, controls, and organizational requirements are met.
- 3.6 Perform post-implementation reviews to determine if project deliverables, controls, and organizational requirements have been met.
Domain 4—Information Systems Operations, Maintenance and Support (23%)
Assure that processes for information systems operations, maintenance, and support align with the organization’s strategies and objectives.
- 4.1 Conduct periodic reviews of information systems to ensure they continue to meet organizational objectives.
- 4.2 Evaluate service level management practices to determine if service levels from internal and external providers are defined and managed.
- 4.3 Assess third-party management practices to verify adherence to the controls expected by the organization.
- 4.4 Review operations and end-user procedures to ensure scheduled and unscheduled processes are completed.
- 4.5 Evaluate information systems maintenance processes to ensure they are effectively controlled and continue to support organizational objectives.
- 4.6 Assess data administration practices to determine database integrity and optimization.
- 4.7 Evaluate the use of capacity and performance monitoring tools and techniques to ensure IT services meet organizational objectives.
- 4.8 Assess problem and incident management practices to ensure incidents, problems, and errors are recorded, analyzed, and resolved promptly.
- 4.9 Evaluate change, configuration, and release management practices to ensure scheduled and unscheduled changes to the production environment are adequately controlled and documented.
- 4.10 Assess the adequacy of backup and restore provisions to ensure the availability of information required for resuming processing.
- 4.11 Evaluate the disaster recovery plan to determine if it enables the recovery of IT processing capabilities in the event of a disaster.
Domain 5—Protection of Information Assets (30%)
Assure that the organization’s security policies, standards, procedures, and controls ensure the confidentiality, integrity, and availability of information assets.
- 5.1 Evaluate information security policies, standards, and procedures for completeness and alignment with generally accepted practices.
- 5.2 Assess the design, implementation, and monitoring of system and logical security controls to verify the confidentiality, integrity, and availability of information.
- 5.3 Evaluate the design, implementation, and monitoring of data classification processes and procedures for alignment with organizational policies, standards, procedures, and external requirements.
- 5.4 Assess the design, implementation, and monitoring of physical access and environmental controls to ensure information assets are adequately safeguarded.
- 5.5 Review processes and procedures for storing, retrieving, transporting, and disposing of information assets (e.g., backup media, offsite storage, hard copy/print data, and softcopy media) to ensure adequate safeguarding.
Requirements
This non-certification course has no specific prerequisites.
Testimonials (3)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Overview of Risk topics and preparing for exam