ISACA CISA Certification - Only 4 Days

Seven reasons why you should sit your CISA course with Firebrand Training

Find Out How We Help You To Learn New Skills Quickly

  1. You’ll be CISA trained in just 4 days. With us, you’ll be CISA trained in record time
  2. Our CISA course is all-inclusive. A one-off fee covers all course materials, accommodation and meals
  3. Pass CISA first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  4. You’ll learn more CISA. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get up to 12 hours/day quality learning time, with your instructor
  5. You’ll learn CISA faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  6. You’ll be studying CISA with the best. We have won the Learning and Performance Institute (LPI) "Training Company of the Year" a record three times. As well as winning many more awards, we’ve trained and certified 62,858 professionals, and we’re partners with all of the big names in the business
  7. You'll do more than study CISA courseware. We use labs, case studies and practice tests to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

When do you want to sit your accelerated course?

Start

Finish

Status

Book now

Open

Book now

Open

Book now

Open

Book now

Here's the Firebrand Training review section. Since 2001 we've trained exactly 62,858 students and asked them all to review our Accelerated Learning. Currently, 96.45% have said Firebrand exceeded their expectations:



"The teaching received was first class, will recommend and look to Firebrand for further training."
James Clements, N/A. - ISACA CISA Certification (4 days) (6/6/2016 to 8/6/2016)

"Loved it!!!"
Fiona Linton, Leicestershire Police. - ISACA CISA Certification (4 days) (6/6/2016 to 8/6/2016)

"Professional, thorough, immersive - taught by experts who can bring the content to life!"
Charlie Timblin, IFDS. - ISACA CISA Certification (4 days) (6/6/2016 to 8/6/2016)

"If you need to cram a lot of info into your head in a short time ...Firebrand are experts."
Jonathan Newton Griffiths, Mars Information Services. - ISACA CISA Certification (4 days) (2/9/2015 to 4/9/2015)

"Very good training with Firebrand."
Olu Akinrolabu, Reed Elsevier PLC. - ISACA CISA Certification (4 days) (8/6/2015 to 10/6/2015)

"Enjoyable and hectic course."
Eirik Standal, Nordland Fylkeskommune. - ISACA CISA Certification (4 days) (8/6/2015 to 10/6/2015)

"Enjoyed the fast-paced concentrated learning."
Aled Hughes, NMi Metrology & Gaming Ltd. - ISACA CISA Certification (4 days) (8/6/2015 to 10/6/2015)

"Thoroughly enjoyed my CISA course and felt it was very well delivered and managed, the location & accommodation were very good! I would use Firebrand again for future training."
S.G. - ISACA CISA Certification (4 days) (24/11/2014 to 26/11/2014)

"Course informative Facilities good This will make a difference when i go back to my company."
Barry Burgess, Barclays. - ISACA CISA Certification (4 days) (3/6/2013 to 5/6/2013)

"Helps clear your mind and soak up the knowledge"
Mark Allen, Compass Group. - ISACA CISA Certification (4 days) (3/6/2013 to 5/6/2013)

"I would recommend floowing any firebrand training as it is proffesional and well organised"
Veronique Hautelin, JPMorgan Bank Luxembourg. - ISACA CISA Certification (4 days) (3/6/2013 to 5/6/2013)

"I've completed numerous courses at Firebrand and keep coming back! Firebrand has great campus facilities and learning setup, plus a vast selection of recognized courses and a convenient test facility on site. The endless supply of coffee, drinks, chocolate and fruit helps to keep you going during a hard days learning."
J.S. - ISACA CISA Certification (4 days) (3/12/2012 to 5/12/2012)

"Great course, the instructor was very engaging and not only took us through the course portfolio but also provided personal experience."
Jason Durham, Vodafone UK. - ISACA CISA Certification (4 days) (3/12/2012 to 5/12/2012)

"A good course if you hasve an understanding before hand, But should allow passing of exam"
Mike Gough, Abbott Laboratories. - ISACA CISA Certification (4 days) (19/11/2012 to 21/11/2012)

"Professional, providing an ideal study envioment, fully supported by friendly and helpful staff"
Matthew Mills, Pharm Olam. - ISACA CISA Certification (4 days) (19/11/2012 to 21/11/2012)

"Great instructor superb facilities"
Gareth Hayward, NA. - ISACA CISA Certification (4 days) (19/11/2012 to 21/11/2012)

"Firebrand facilities mean you really can focus on the course. The instructors really know their subject."
P.L. - ISACA CISA Certification (4 days) (5/12/2011 to 7/12/2011)

"Firebrand gave me the confidence and to knowledge to sit the exam."
R.N. - ISACA CISA Certification (4 days) (5/12/2011 to 7/12/2011)

"Punchy, concise, well delivered courses. "
M. A. - ISACA CISA Certification (4 days) (6/6/2011 to 8/6/2011)

"Have gained an in-depth knowledge in Information systems auditing in just 3 days. Materials and presentations tailored to my needs. Fantastic"
P. N. - ISACA CISA Certification (4 days) (23/5/2011 to 25/5/2011)

"Knowledgeable instructor. Good enviroment + excellent materials = Recipe for success!"
P.N. - ISACA CISA Certification (4 days) (24/5/2010 to 26/5/2010)

"My expectations were exceeded and the staff FANTASTIC would definitely recommend."
George Georgiou. - ISACA CISA Certification (4 days) (4/5/2010 to 6/5/2010)

"I liked the hotel"
R.P. - ISACA CISA Certification (4 days) (7/12/2009 to 9/12/2009)

"The instructor and CISA course themselves were very good. Thank you."
Steve Fitzpatrick. - ISACA CISA Certification (4 days) (7/12/2009 to 9/12/2009)

"Intense, long training hours, focused on the topic at hand but highly and thoroughly enjoyable and worth while. Highly recommended!"
Craig Thomas, pioneer investments. - ISACA CISA Certification (4 days) (23/11/2009 to 25/11/2009)

"As an approved training partner of major certification organizations, such as ICS2 and ISACA, global leaders in security programs, and vendors like Microsoft, Firebrand are ideally placed to satisfy most training requirements in comfortable easily accessible facilities. And because of this relationship they have access to the very best instructors whose knowledge expertise and real world experience is second to none."
Tony Richardson, Octree. - ISACA CISA Certification (4 days) (23/11/2009 to 25/11/2009)

"Be prepared to work and you will benefit."
Gordon Caffrey , Atmel. - ISACA CISA Certification (4 days) (23/11/2009 to 25/11/2009)

"I think the CISA course needs to be 5 days long and more practice questions to encourage interaction. The instructor was good and shared experiences. Too many power point slides. Overall i enjoyed learning here"
Michael Peet. - ISACA CISA Certification (4 days) (23/11/2009 to 25/11/2009)

"Being away to study and prepare for the exam was a very good method to concentrate and cleanse the mind ready for the course. "
Ayo Akinkunle, Metronet. - ISACA CISA Certification (4 days) (8/12/2008 to 10/12/2008)

"Although intensive course, helps me to be confident about the exam."
LS. - ISACA CISA Certification (4 days) (8/12/2008 to 10/12/2008)

"A good introduction to the organization. The 3 day CISA course is very intense. Expect to start early and continue well into the evening. "
Stephen Blomley. - ISACA CISA Certification (4 days) (8/12/2008 to 10/12/2008)

"Without a doubt, the 3 day residential gave me the opportunity to focus on the subject and to understand how the exam process works. "
John Adegoke, GroupM. - ISACA CISA Certification (4 days) (24/11/2008 to 26/11/2008)

"Its the third training I do here and was never disappointed. I changed my jobs and girlfriends more frequently. The camp improved, jobs and girfriends rarely do."
Marco Ermini, Vodafone Group Services GMBH. - ISACA CISA Certification (4 days) (9/6/2008 to 11/6/2008)

"I fully enjoyed my training. The staff were knowledable, curteous and friendly. I have an unusual food allergy, which usually makes life difficult for the kitchen staff but I did not have a problem with any meal that I ate and the staff coped with my allergy and special food requests without complaint and seamlessly. The working day was long 8-8 but was well rewarding and the instructor was available late into the evening for questions and help."
Christine Elizabeth Morecroft, AXA insurance. - ISACA CISA Certification (4 days) (9/6/2008 to 11/6/2008)

"It is the third training I have on Firebrand and the first after they renamed from the Training Camp. Im glad they only changed their name! It is overall a nice experience and I especially like that I can forget about the business-as-usual and concentrate on the training. Instructors are always great and world-class. Looking forward to the next one."
Marco Ermini, Vodafone Group GmbH. - ISACA CISA Certification (4 days) (9/6/2008 to 11/6/2008)

"If I have passed the CISA exam it will be entirely down to the training and environment provided to be by Firebrand Training."
Henry Wellesley. - ISACA CISA Certification (4 days) (9/6/2008 to 11/6/2008)

"The location and seclusion of the training centre allows you the time and space to focus totally on your studies. The knowledge and experience of the training instructors means that they can demonstrate how the training material fits into the real world."
E.B.. - ISACA CISA Certification (4 days) (26/11/2007 to 28/11/2007)

"A well organised, very effective, learning environment. "
Martin Potter. - ISACA CISA Certification (4 days) (26/11/2007 to 28/11/2007)

"I had never been on one of these intensive courses before so i didnt know what to expect, but the staff made every effort to help us and allow us to get the most out of our time. It was great to be able to focus on the material and learn in great surroundings."
Andrew Ellerton. - ISACA CISA Certification (4 days) (26/11/2007 to 28/11/2007)

"Firebrand* without an iota of doubt is a place to be!"
Oyekunle Oyeneye, LSC. - ISACA CISA Certification (4 days) (4/6/2007 to 6/6/2007)

"Firebrand* is a great place, wonderful environment, peaceful and quiet, focusing on what we are going there for....to study, study and again study to get ready for the exam. When i had done my course I felt stronger and more confident to sit the exam. I will be back!"
SL, First Data International. - ISACA CISA Certification (4 days) (4/6/2007 to 6/6/2007)

"The course material was very good and combined with the explanation from the lecturer, I was able to learn a lot during the training."
Zach Anucha, NCH. - ISACA CISA Certification (4 days) (30/4/2007 to 2/5/2007)

"Firebrand* promoted a calm working environment that assisted me in the learing process."
Andy Gray. - ISACA CISA Certification (4 days) (30/4/2007 to 2/5/2007)

"The best aspect of Firebrand* was the mixed environment, allowing skills to be shared with colleagues from different walks of life and careers. The instructor encouraged us to share experience and understanding, and knowledge from our own areas."
Guy Lomas, AEGON UK. - ISACA CISA Certification (4 days) (30/4/2007 to 2/5/2007)

"This is my first time on any sort of Firebrand* and this experience was one I would recommend to anyone who needs to prepare for exams in a short space of time."
Paul White, Between jobs at present. - ISACA CISA Certification (4 days) (4/12/2006 to 6/12/2006)

"The course is a good preparation and reflects the philosophy of ISACA very well."
Anonymous - ISACA CISA Certification (4 days) (5/12/2016 to 7/12/2016)

"The course covered everything I need for preparation and motivation for the exam."
Anonymous - ISACA CISA Certification (4 days) (5/12/2016 to 7/12/2016)

"Isolated training area is the best approach to keep focus on material and preparing for exam."
Anonymous - ISACA CISA Certification (4 days) (6/6/2016 to 8/6/2016)

"Take a week, come to the CISA course and no way you won´t pass!"
Anonymous - ISACA CISA Certification (4 days) (6/6/2016 to 8/6/2016)

"Thanks for the training - it was tough, lot of new topics introduced during just 3 days, a lot of enthusiasm, good jokes and friendly atmosphere created by the trainer. Respect!"
Anonymous - ISACA CISA Certification (4 days) (6/6/2016 to 8/6/2016)

The goal of our four day accelerated Program for CISA Certification is to equip information professionals with the knowledge and technical skills for proficiency in IS audit, control and security skills.

Since 1978, the Certified Information Systems Auditor program, sponsored by the Information Systems Audit and Control Association (ISACA), has been the globally accepted standard of achievement among IS audit, and control and security professionals.

The technical skills and practices that CISA promotes and evaluates are the building blocks of success in the field. Possessing the CISA designation demonstrates proficiency and is the basis for measurement in the profession. With a growing demand for professionals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organisations around the world.

During the program, students will live, learn, and prepare to take certification examinations on-site.

Our Certified Information Systems Auditor Program

  • Enhances retention by employing accelerated learning techniques focused on committing information to long-term memory
  • Allows you to prepare for your certification in half the time of 'traditional training' while delivering industry-leading exam passing percentages

Read more ...

Interested? See prices or call 080 80 800 888

Professional certification gives you and your organisation a competitive advantage in the marketplace. Although certification may not be mandatory for you at this time, a growing number of organisations are requiring that employees become certified. To help ensure success in the global marketplace, it is vital to select a certification program based on universally accepted technical practices. CISA delivers such a program. CISA is recognised worldwide, by all industries, as the preferred designation for IS audit, control and security professionals.

More than 114,000 professionals have earned the CISA since inception, so clearly many people agree: earning the CISA is a good career move.

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

This information has been provided as a helpful tool for candidates considering training. Courses that include certification come with a Certification Guarantee. Pass first time or train again for free (just pay for accommodation, exams and incidental costs). We do not make any guarantees about personal successes or benefits of obtaining certification. Benefits of certification determined through studies do not guarantee any particular personal successes.

Read more ...

Interested? See prices or call 080 80 800 888

During this accelerated course, you'll get instructor-led training to ensure that you learn the fundamentals, obtain hands-on skills and earn your certification.

The course curriculum prepares you for this latest CISA exam:

Domain 1—The Process of Auditing Information Systems (21%)
Domain 2—Governance and Management of IT (16%)
Domain 3—Information Systems Acquisition, Development and Implementation (18%)
Domain 4—Information Systems Operations, Maintenance and Support (20%)
Domain 5—Protection of Information Assets (25%)

Domain 1 - The Process of Auditing Information Systems (21%)

Provide audit services in accordance with IS audit standards to assist the organization in protecting and controlling information systems.

Domain 1 - Task Statements:

  • 1.1  Execute a risk-based IS audit strategy in compliance with IS audit standards to ensure that key risk areas are audited. 
  • 1.2 Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization. 
  • 1.3 Conduct audits in accordance with IS audit standards to achieve planned audit objectives. 
  • 1.4 Communicate audit results and make recommendations to key stakeholders through meetings and audit reports to promote change when necessary. 
  • 1.5 Conduct audit follow-ups to determine whether appropriate actions have been taken by management in a timely manner.

Domain 1 - Knowledge Statements:

  • 1.1 Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards 
  • 1.2 Knowledge of the risk assessment concepts and tools and techniques used in planning, examination, reporting and follow-up 
  • 1.3 Knowledge of fundamental business processes (e.g., purchasing, payroll, accounts payable, accounts receivable) and the role of IS in these processes 
  • 1.4 Knowledge of the control principles related to controls in information systems 
  • 1.5 Knowledge of risk-based audit planning and audit project management techniques, including follow-up 
  • 1.6 Knowledge of the applicable laws and regulations that affect the scope, evidence collection and preservation, and frequency of audits 
  • 1.7 Knowledge of the evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis, forensic investigation techniques, computer-assisted audit techniques [CAATs]) used to gather, protect and preserve audit evidence 
  • 1.8 Knowledge of different sampling methodologies and other substantive/data analytical procedures 
  • 1.9 Knowledge of reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution, audit report structure, issue writing, management summary, result verification) 
  • 1.10 Knowledge of audit quality assurance (QA) systems and frameworks 
  • 1.11 Knowledge of various types of audits (e.g., internal, external, financial) and methods for assessing and placing reliance on the work of other auditors or control entities

Domain 2 - Governance and Management of IT (16%)

Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy.

Domain 2 - Task Statements:

  • 2.1 Evaluate the IT strategy, including IT direction, and the processes for the strategy’s development, approval, implementation and maintenance for alignment with the organization’s strategies and objectives. 
  • 2.2 Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization’s strategies and objectives. 
  • 2.3 Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organization’s strategies and objectives. 
  • 2.4 Evaluate the organization’s IT policies, standards and procedures, and the processes for their development, approval, release/publishing, implementation and maintenance to determine whether they support the IT strategy and comply with regulatory and legal requirements. 
  • 2.5 Evaluate IT resource management, including investment, prioritization, allocation and use, for alignment with the organization’s strategies and objectives. 
  • 2.6 Evaluate IT portfolio management, including investment, prioritization and allocation, for alignment with the organization’s strategies and objectives. 
  • 2.7 Evaluate risk management practices to determine whether the organization’s IT-related risk is identified, assessed, monitored, reported and managed. 
  • 2.8 Evaluate IT management and monitoring of controls (e.g., continuous monitoring, quality assurance [QA]) for compliance with the organization’s policies, standards and procedures. 
  • 2.9 Evaluate monitoring and reporting of IT key performance indicators (KPIs) to determine whether management receives sufficient and timely information. 
  • 2.10 Evaluate the organization’s business continuity plan (BCP), including alignment of the IT disaster recovery plan (DRP) with the BCP, to determine the organization’s ability to continue essential business operations during the period of an IT disruption.

Domain 2 - Knowledge Statements:

  • 2.1 Knowledge of the purpose of IT strategy, policies, standards and procedures for an organization and the essential elements of each 
  • 2.2 Knowledge of IT governance, management, security and control frameworks, and related standards, guidelines and practices 
  • 2.3 Knowledge of the organizational structure, roles and responsibilities related to IT, including segregation of duties (SoD) 
  • 2.4 Knowledge of the relevant laws, regulations and industry standards affecting the organization 
  • 2.5 Knowledge of the organization’s technology direction and IT architecture and their implications for setting long-term strategic directions 
  • 2.6 Knowledge of the processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures 
  • 2.7 Knowledge of the use of capability and maturity models 
  • 2.8 Knowledge of process optimization techniques 
  • 2.9 Knowledge of IT resource investment and allocation practices, including prioritization criteria (e.g., portfolio management, value management, personnel management) 
  • 2.10 Knowledge of IT supplier selection, contract management, relationship management and performance monitoring processes, including third-party outsourcing relationships 
  • 2.11 Knowledge of enterprise risk management (ERM) 
  • 2.12 Knowledge of the practices for monitoring and reporting of controls performance (e.g., continuous monitoring, quality assurance [QA]) 
  • 2.13 Knowledge of quality management and quality assurance (QA) systems 
  • 2.14 Knowledge of the practices for monitoring and reporting of IT performance (e.g., balanced scorecard [BSC], key performance indicators [KPIs]) 
  • 2.15 Knowledge of business impact analysis (BIA) 
  • 2.16 Knowledge of the standards and procedures for the development, maintenance and testing of the business continuity plan (BCP) 
  • 2.17 Knowledge of the procedures used to invoke and execute the business continuity plan (BCP) and return to normal operations

Domain 3 - Information Systems Acquisition, Development and Implementation (18%)

Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organization’s strategies and objectives.

Domain 3 - Task Statements:

  • 3.1  Evaluate the business case for the proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether the business case meets business objectives. 
  • 3.2 Evaluate IT supplier selection and contract management processes to ensure that the organization’s service levels and requisite controls are met. 
  • 3.3 Evaluate the project management framework and controls to determine whether business requirements are achieved in a cost-effective manner while managing risk to the organization. 
  • 3.4 Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation, and has timely and accurate status reporting. 
  • 3.5 Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organization's policies, standards, procedures and applicable external requirements. 
  • 3.6 Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and the organization's requirements are met. 
  • 3.7 Conduct post-implementation reviews of systems to determine whether project deliverables, controls and the organization's requirements are met.

Domain 3 - Knowledge Statements:

  • 3.1 Knowledge of benefits realization practices, (e.g., feasibility studies, business cases, total cost of ownership [TCO], return on investment [ROI]) 
  • 3.2 Knowledge of IT acquisition and vendor management practices (e.g., evaluation and selection process, contract management, vendor risk and relationship management, escrow, software licensing), including third-party outsourcing relationships, IT suppliers and service providers. 
  • 3.3 Knowledge of project governance mechanisms (e.g., steering committee, project oversight board, project management office) 
  • 3.4 Knowledge of project management control frameworks, practices and tools 
  • 3.5 Knowledge of the risk management practices applied to projects 
  • 3.6 Knowledge of requirements analysis and management practices (e.g., requirements verification, traceability, gap analysis, vulnerability management, security requirements) 
  • 3.7 Knowledge of the enterprise architecture (EA) related to data, applications and technology (e.g., web-based applications, web services, n-tier applications, cloud services, virtualization) 
  • 3.8 Knowledge of system development methodologies and tools, including their strengths and weaknesses (e.g., agile development practices, prototyping, rapid application development [RAD], object-oriented design techniques, secure coding practices, system version control) 
  • 3.9 Knowledge of the control objectives and techniques that ensure the completeness, accuracy, validity and authorization of transactions and data 
  • 3.10 Knowledge of the testing methodologies and practices related to the information system development life cycle (SDLC) 
  • 3.11 Knowledge of the configuration and release management relating to the development of information systems 
  • 3.12 Knowledge of system migration and infrastructure deployment practices and data conversion tools, techniques and procedures. 
  • 3.13 Knowledge of project success criteria and project risk 
  • 3.14 Knowledge of post-implementation review objectives and practices (e.g., project closure, control implementation, benefits realization, performance measurement)

Domain 4 - Information Systems Operations, Maintenance and Service Management (20%)

Provide assurance that the processes for information systems operations, maintenance and service management meet the organization’s strategies and objectives.

Domain 4 - Task Statements:

  • 4.1 Evaluate the IT service management framework and practices (internal or third party) to determine whether the controls and service levels expected by the organization are being adhered to and whether strategic objectives are met. 
  • 4.2 Conduct periodic reviews of information systems to determine whether they continue to meet the organization’s objectives within the enterprise architecture (EA). 
  • 4.3 Evaluate IT operations (e.g., job scheduling, configuration management, capacity and performance management) to determine whether they are controlled effectively and continue to support the organization’s objectives. 
  • 4.4 Evaluate IT maintenance (patches, upgrades) to determine whether they are controlled effectively and continue to support the organization’s objectives. 
  • 4.5 Evaluate database management practices to determine the integrity and optimization of databases. 
  • 4.6 Evaluate data quality and life cycle management to determine whether they continue to meet strategic objectives. 
  • 4.7 Evaluate problem and incident management practices to determine whether problems and incidents are prevented, detected, analyzed, reported and resolved in a timely manner to support the organization´s objectives. 
  • 4.8 Evaluate change and release management practices to determine whether changes made to systems and applications are adequately controlled and documented. 
  • 4.9 Evaluate end-user computing to determine whether the processes are effectively controlled and support the organization’s objectives. 
  • 4.10 Evaluate IT continuity and resilience (backups/restores, disaster recovery plan [DRP]) to determine whether they are controlled effectively and continue to support the organization’s objectives.

Domain 4 - Knowledge Statements:

  • 4.1 Knowledge of service management frameworks 
  • 4.2 Knowledge of service management practices and service level management 
  • 4.3 Knowledge of the techniques for monitoring third-party performance and compliance with service agreements and regulatory requirements 
  • 4.4 Knowledge of enterprise architecture (EA) 
  • 4.5 Knowledge of the functionality of fundamental technology (e.g., hardware and network components, system software, middleware, database management systems) 
  • 4.6 Knowledge of system resiliency tools and techniques (e.g., fault-tolerant hardware, elimination of single point of failure, clustering) 
  • 4.7 Knowledge of IT asset management, software licensing, source code management and inventory practices  
  • 4.8 Knowledge of job scheduling practices, including exception handling 
  • 4.9 Knowledge of the control techniques that ensure the integrity of system interfaces 
  • 4.10 Knowledge of capacity planning and related monitoring tools and techniques 
  • 4.11 Knowledge of systems performance monitoring processes, tools and techniques (e.g., network analyzers, system utilization reports, load balancing) 
  • 4.12 Knowledge of data backup, storage, maintenance and restoration practices 
  • 4.13 Knowledge of database management and optimization practices 
  • 4.14 Knowledge of data quality (completeness, accuracy, integrity) and life cycle management (aging, retention) 
  • 4.15 Knowledge of problem and incident management practices 
  • 4.16 Knowledge of change management, configuration management, release management and patch management practices 
  • 4.17 Knowledge of the operational risk and controls related to end-user computing 
  • 4.18 Knowledge of the regulatory, legal, contractual and insurance issues related to disaster recovery 
  • 4.19 Knowledge of business impact analysis (BIA) related to disaster recovery planning 
  • 4.20 Knowledge of the development and maintenance of disaster recovery plans (DRPs) 
  • 4.21 Knowledge of the benefits and drawbacks of alternate processing sites (e.g., hot sites, warm sites, cold sites) 
  • 4.22 Knowledge of disaster recovery testing methods 
  • 4.23 Knowledge of the processes used to invoke the disaster recovery plans (DRPs)

Domain 5—Protection of Information Assets(25%)

Provide assurance that the organization’s policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.

Domain 5 - Task Statements:

  • 5.1  Evaluate the information security and privacy policies, standards and procedures for completeness, alignment with generally accepted practices and compliance with applicable external requirements. 
  • 5.2 Evaluate the design, implementation, maintenance, monitoring and reporting of physical and environmental controls to determine whether information assets are adequately safeguarded. 
  • 5.3 Evaluate the design, implementation, maintenance, monitoring and reporting of system and logical security controls to verify the confidentiality, integrity and availability of information. 
  • 5.4 Evaluate the design, implementation and monitoring of the data classification processes and procedures for alignment with the organization’s policies, standards, procedures and applicable external requirements. 
  • 5.5 Evaluate the processes and procedures used to store, retrieve, transport and dispose of assets to determine whether information assets are adequately safeguarded. 
  • 5.6 Evaluate the information security program to determine its effectiveness and alignment with the organization’s strategies and objectives.

Domain 5 - Knowledge Statements:

  • 5.1 Knowledge of the generally accepted practices and applicable external requirements (e.g., laws, regulations) related to the protection of information assets 
  • 5.2 Knowledge of privacy principles 
  • 5.3 Knowledge of the techniques for the design, implementation, maintenance, monitoring and reporting of security controls 
  • 5.4 Knowledge of the physical and environmental controls and supporting practices related to the protection of information assets 
  • 5.5 Knowledge of the physical access controls for the identification, authentication and restriction of users to authorized facilities and hardware 
  • 5.6 Knowledge of the logical access controls for the identification, authentication and restriction of users to authorized functions and data 
  • 5.7 Knowledge of the security controls related to hardware, system software (e.g., applications, operating systems) and database management systems. 
  • 5.8 Knowledge of the risk and controls associated with virtualization of systems 
  • 5.9 Knowledge of the risk and controls associated with the use of mobile and wireless devices, including personally owned devices (bring your own device [BYOD]) 
  • 5.10 Knowledge of voice communications security (e.g., PBX, Voice-over Internet Protocol [VoIP]) 
  • 5.11 Knowledge of network and Internet security devices, protocols and techniques 
  • 5.12 Knowledge of the configuration, implementation, operation and maintenance of network security controls 
  • 5.13 Knowledge of encryption-related techniques and their uses 
  • 5.14 Knowledge of public key infrastructure (PKI) components and digital signature techniques 
  • 5.15 Knowledge of the risk and controls associated with peer-to-peer computing, instant messaging, and web-based technologies (e.g., social networking, message boards, blogs, cloud computing) 
  • 5.16 Knowledge of the data classification standards related to the protection of information assets 
  • 5.17 Knowledge of the processes and procedures used to store, retrieve, transport and dispose of confidential information assets 
  • 5.18 Knowledge of the risk and controls associated with data leakage 
  • 5.19 Knowledge of the security risk and controls related to end-user computing 
  • 5.20 Knowledge of methods for implementing a security awareness program 
  • 5.21 Knowledge of information system attack methods and techniques 
  • 5.22 Knowledge of prevention and detection tools and control techniques 
  • 5.23 Knowledge of security testing techniques (e.g., penetration testing, vulnerability scanning) 
  • 5.24 Knowledge of the processes related to monitoring and responding to security incidents (e.g., escalation procedures, emergency incident response team) 
  • 5.25 Knowledge of the processes followed in forensics investigation and procedures in collection and preservation of the data and evidence (i.e., chain of custody). 
  • 5.26 Knowledge of the fraud risk factors related to the protection of information assets

Read more ...

Interested? See prices or call 080 80 800 888

CISA Exam Information

In 2017, Computer-Based Testing for the CISA, CRISC, CISM, and CGEIT certifications will be offered by ISACA during three testing windows of eight-week durations. The windows will be:

  • 1 May – 30 June 2017
  • 1 August – 30 September 2017
  • 1 November – 31 December 2017

Not sure how to register for the exam? Call us for advice.

The CISA exam covers five information security auditing areas, each of which is further defined and detailed through task and knowledge statements. These areas and statements were developed by the CISA Certification Board and represent a job practice analysis of the work performed by information security auditors as validated by prominent industry leaders, subject matter experts and industry practitioners. The following is a brief description of these areas, their definitions, and approximate percentage of test questions allocated to each area.

Select a title for a list of specific task and knowledge statements that represent a current market perspective of what is performed and what should be known by information security auditors. This information provides the basis for the CISA exam.

CISA will encompass the following areas

  • The Process of Auditing Information Systems (21%) - Conducting comprehensive auditing services in line with industry standards
  • Governance and Management of IT (16%) - Assuring appropriate structural and organisational IT measures are in place to achieve company aims
  • Information Systems Acquisition, Development and Implementation (18%) - Ensuring the acquisition, development and implementation operations in the business are focused toward meeting company aims
  • Information Systems Operations, Maintenance and Support (20%) - Ensuring IT operations and maintenance infrastructure meets the demands and aims of the business
  • Protection of Information Assets (25%) - Ensuring the security procedures, controls and overall infrastructure provide sufficient protection of the company's information assets

Read more ...

Interested? See prices or call 080 80 800 888

ISACA Courseware

  • CISA Review Manual
  • CISA Review Questions, Answers & Explanations Manual Supplement

Firebrand Training offers top-quality technical education and certification training in an all-inclusive course package specifically designed for the needs and ease of our students. We attend to every detail so our students can focus solely on their studies and certification goals.

Our Accelerated Learning Programmes include:

  • Intensive Hands-on Training Utilising our (Lecture | Lab | Review)TM Delivery
  • Comprehensive Study Materials, Program Courseware and Self-Testing Software including MeasureUp *
  • Fully instructor-led program with 24 hour lab access
  • Examination vouchers **
  • On site testing ***
  • Accommodation, all meals, unlimited beverages, snacks and tea / coffee****
  • Transportation to/from designated local railway stations
  • Examination Passing Policy

Our instructors teach to accommodate every student's learning needs through individualised instruction, hands-on labs, lab partner and group exercises, independent study, self-testing, and question/answer drills.

Firebrand Training has dedicated, well-equipped educational facilities where you will attend instruction and labs and have access to comfortable study and lounging rooms. Our students consistently say our facilities are second-to-none.

Firebrand goes digital

We’re currently migrating from printed to digital courseware. Some courseware is already available in digital, while other books remain in printed form. To find out if this course is digital, call us on 080 80 800 888.

There are several benefits of easy-to-use digital courseware: downloads are immediate, and you’ll always have your courseware available wherever you are. You won’t need to wait for a printed book to be delivered before you start learning – and it’s better for the environment. You can choose to download the courseware to your own device, or borrow one of ours.

Considering a Microsoft course? Always have the most up-to-date Microsoft digital courseware with ‘Fresh Editions’. This gives you access to all versions of digital courseware – you’ll receive updates and revisions of your textbook, at no charge, for the life of that course.

Examination Passing Policy

Should a student complete a Firebrand Training Program without having successfully passed all vendor examinations, the student may re-attend that program for a period of one year.  Students will only be responsible for accommodations and vendor exam fees.

Please note

  • * Not on all courses
  • ** Examination vouchers are not included for the following courses: PMI, CISA, CISM, CGEIT, CRISC, CISSP CBK Review and CSX Practitioner Level 1,2 and 3
  • *** On site testing is not included in our PMI, CISA, CISM, CGEIT, CRISC, CSX Practitioner or ITIL Managers and Revision Certifications
  • **** Accommodation not included on the CISSP CBK Review Seminar

Read more ...

Interested? See prices or call 080 80 800 888

A minimum of five years of professional information systems auditing, control or security work experience (as described in the job content areas) is required for CISA certification. Substitutions and waivers of such experience may be obtained as follows:

  • A maximum of one year of information systems experience OR one year of financial or operational auditing experience can be substituted for one year of information systems auditing, control or security experience
  • 60 to 120 completed university/college semester credit hours (the equivalent of a Bachelor degree) can be substituted for one or two years, respectively, of information systems auditing, control or security experience
  • Two years as a full-time university instructor in a related field (e.g., computer science, accounting, information systems auditing) can be substituted for one year of information systems auditing, control or security experience

Experience must have been gained within the 10-year period preceding the application date for certification or within five years from the date of initially passing the examination. Retaking and passing the examination will be required if the application for certification is not submitted within five years from the passing date of the examination. All experience will be verified independently with employers.

Unsure whether you meet the prerequisites?

Don’t worry - we’ll discuss your technical background, experience and qualifications to determine whether this accelerated course suits you.

Just call us on 080 80 800 888 and speak to one of our enrolment consultants.

Firebrand is an immersive environment and requires commitment. Some prerequisites are simply guidelines; you may find your unique experience, attitude and determination enables you to succeed on your accelerated course.

Interested? See prices or call 080 80 800 888