Beranda » AAPM Certified » (AAPM) Training Information System Auditor CIISA

(AAPM) Training Information System Auditor CIISA

T Diposting oleh pada 21 May 2017
F Kategori ,
b 3 komentar
@ Dilihat 3075 kali

Training Certified International Information System Auditor (CIISA) Sertifikasi AAPM

Course: Certified International Information System Auditor/CIISA


The credential of a professionals I.S auditor is valuable. This course delves into the unique challenges of managing an audit and the knowledge necessary to complete the task.

Information system auditors take up where the financial auditors do not tread-into the design and implementation effectiveness and operation effectiveness of information system. The course will focus on general computer control, application level control auditing as well introducing of risk based management approach.

The course is also designed to help candidates familiar with IT audit concepts and rules for regulatory compliance under Sarbanes-Oxely (corporations), Gramm-Leach-Biley and FFIEC (both financial), FISMA (government), HIPAA (medical records), SCADA (utilities) and other regulators.

The course will also help you to become a true management consultant in IT audit filed and will help you well prepared for the American Academy examination, which offered by American I.S Audit and control Association.

The instructor-led classroom training covers the CIISA body of knowledge to build a working understanding of the material.

The training course will cover topics such as auditor responsibilities, scope, audit charter, technical material, privacy requirements, for CIISA exam preparation. The course has updated the contens to reflect the new subject material of   the CIISA exam.


At the completion of this course, the participants shall have comprehensive undertandingand knowledge in Information System and Technology Audit and encompassing such as:

  • Participants shall obtain an expanded understanding the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization
  • Participants shall obtain the capability in conducting IT audit and implement techniques in performing assurance, attestation, and audit engagements
  • Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
  • Participants shall obtain the working ability to plan, conduct, and report on information Technology audits
  • Participants shall obtain an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards
  • Participants shall be prepared and throughly confident upon themselves to take CIISA professional certificate examination

Target Audience:

  • IT Managers
  • Security Managers
  • Auditing Staffs
  • IT Operation Staffs

1. Audit Process: Course Content and Descriptions

2. IT Governance

The class session will focus on IT audit concepts and processes, which includes: review of some of the key fundamentals of IT auditing, including general auditing standards, risk-based auditing, pre-audit objectives, determining scope and audit objectives, and the process of performing an IT audit.

The class session will include discussion on IT performance, controls, control self-assessment, risk analysis, and the objectives of the IT audit or assurance report.

3. System and Infrastructure Life Cycle

The class session shall describe on practical methodology in conducting the effective and efficient IT audit, expand upon the need for appropriate controls and assurance processes for business and IT environment. The participants will be geared toward gaining a working understanding of the content and value of the management guidelines and assurance methodology.

Discussion will focus on the importance of measurement in achieving organizational and IT objectives. The session will also focus on the business and IT environments subject to operational and control assessments (audit).

4. IT Service Delivery and Support

Provide assurance that the IT service management practices will ensure delivery of the level of service required to meet the organization’s objectives. The module describes as follows:

  • Evaluate service level management practices to ensure that the level of service from internal and external service providers is defined and managed
  • Evaluate operations management to ensure that IT support functions effectively meet business needs
  • Evaluate data administration practices to ensure the integrity and optimization of databases
  • Evaluate the use of capacity and performance monitoring tools and techniques to ensure that IT services meet the organization’s objectives
  • Evaluate change, configuration and release management practices to ensure that changes made to the organization’s production environment are adequately controlled and documented
  • Evaluate problem and incident management practices to ensure that incidents, problems or errors are recorded, analyzed and resolved in a timely manner
  • Evaluate the functionality of the IT infrastructure (e.g., network components, hardware, system software) to ensure that it supports the organization’s objectives

5. Protection of Information Asset

Provide assurance that the security architecture policies, standards, procedures and controls) ensures the confidentiality, integrity and availability of information assets. The module descriptions are as follows:

  • Evaluate the design, implementation and monitoring of logical access controls to ensure the confidentiality, integrity, availability and authorized use of information assets
  • Evaluate network infrastructure security to ensure confidentiality, integrity, availability and authorized use of the network and the information transmitted
  • Evaluate the design, implementation and monitoring of environmental controls to prevent or minimize loss
  • Evaluate the design, implementation and monitoring of physical access controls to ensure that information assets are adequately safeguarded
  • Evaluate the processes and procedures used to store, retrieve, transport and dispose of confidential information assets

6. Business Continuity Plan

Provide assurance that in the event of a disruption the business continuity and disaster recovery processes will ensure the timely resumption of IT service, while minimizing the business impacts. The module covers as described below:

  • Evaluate the adequacy of backup and restore provisions to ensure the availability of information required to resume processing
  • Evaluate the organization’s disaster recovery plan to ensure that it enables the recovery of IT processing capabilities in the event of a disaster
  • Evaluate the organization’s business continuity plan to ensure the organization’s ability to continue essential business operations during the period of an IT disruption

Case Stories:

Case-based discussions will be conducted with topics related to the subjects of training. Exam exercises and questions evaluation

Durasi Training: 3 Hari

Tempat Training:

  • Hotel Izi Bogor

Biaya Training: 

  • Biaya Training: Rp. 4,500,000,- (Empat Juta Lima Ratus Ribu Rupiah)
  • Biaya Sertifikasi AAPM: USD. 300,- (Tiga Ratus US Dollar)

Contact Information

SBKI Training Center

Hand Phone: 0812 9713 1551



3 Komentar untuk (AAPM) Training Information System Auditor CIISA

  • Rosario McCathie says:

    Want more free traffic for your site? Post some free ads on these sites:

  • Casino del sol closure says:

    <a href="https://imggtopsuptown aces casino no deposit bonus

    Best slots at casino rama

    How to claim a free spins offer. To keep things simple, I’m going to
    estimate these odds without taking into account the cards that
    have already been dealt. There are 4 suits, so the probability of getting
    a card of any particular suit is ¼. Genesis Casino Bonus Code Offers.
    Disclaimer: The following is not intended as investment advice.
    Do your own research. You can play them on and some of the old
    and new slot sites like, slotomania, playtika,,, Gametwist, Slotomania,
    Double u,, mrgamez,
    Some you can find on Facebook and youtube video guides. GALA CASINO MOBILE.
    The Mathematical Aspect of Slot Machines. Morongo Casino, Resort &
    Spa: What to Expect.Captain cooks online casino app.
    При выписке оплачиваетcя счет
    отеля, и сумма депозита полностью возвращается.
    Исходя из практики Российских банков,
    эта сумма будет разблокирована только через 3.
    Наличные деньги для депозита принимают
    далеко не все отели. Единицы измерения.
    Security & Fairness. Today, the game pretty much observes the same rules as in the past.
    Even though it is popular amongst players, the game is primarily a game
    of chance and therefore has no specific Big Six Wheel strategy that one can follow except staying away from it.
    Players are advised against playing the game as the winning
    odds are high for the house. To learn more here is:
    The game portfolio at the Big Dollar mobile casino is slightly smaller than what you get at the desktop casino.
    However, the full complement of promotions is available, including the welcome bonus.
    Bear in mind, if you do accidentally break one of these rules, no one is going to scold you or
    kick you out of the casino. The dealer will
    simply remind you of the proper way to play. New Players Only.
    T&Cs Apply. 18+. Please Gamble Responsibly. You will find 3, as
    well as 5 reel slots. There are also progressive jackpot slots to choose from.
    At the casino listed on our page, you will get the opportunity to play
    even the most new slot in the market. Since all the slots are mobile-friendly, you can do everything on your
    handheld device, starting from making the transaction to playing the game.
    Deposits are generally processed instantly and will show in the player’s casino
    account within a few minutes. Deposits can be
    made in CAD, GBP, Euro or USD. The following methods can be
    used to deposit at Blackjack Ballroom: #4 – Ocean’s 3.
    Betsson Sportsbook Bonus. Card counters can even go broke if they don’t have a large enough bankroll to take
    into account statistical deviation. RTP rates of slots titles are pre-determined,
    so you won’t find BetVictor interfering with those.
    RTP rates are displayed on the site, and these are enforced
    and regulated by independent auditors (eCOGRA) frequently.
    If it weren’t the case, BetVictor wouldn’t be able to get the necessary
    licence from the UK Gambling Commission. In other words, you can trust that the RTP
    rates displayed are correct, otherwise BetVictor wouldn’t be able to operate.

    Unfortunately, casinos haven’t really picked up on this trend yet, and although you can find Betsoft casino
    games on almost any casino that offers games from multiple providers they won’t in general give
    frees pins for these games as first deposit bonus. Of course launch parties and new additions to the slot collections are a different matter, and regular free
    spins that can be played in any slot work just as well in Betsoft games
    as they do anywhere else. As the company and its games gain popularity this will no doubt change, and there are several choices already for games that could well entice new and old players alike to take a few free spins.
    Games like Greedy Goblin, Rook’s Revenge or Tipsy Tourist might very well
    compete for the position of favorite slot in the near future.
    Spenden Wir freuen uns jederzeit über eine Spende von Ihnen, die Sie uns
    gerne über Paypal zukommen lassen können. Spenden sind steuerlich
    absetzbar. Ab einer Spende von 25 Euro stellen wir eine Spendenquittung aus.

Silahkan tulis komentar Anda

Your email address will not be published.


a Artikel Terkait (AAPM) Training Information System Auditor CIISA

Master Quality Manager AAPM Certified

Training Master Quality Manager MQM

T 18 April 2017 F , , A admin_sbki

Training Master Quality Manager (MQM) AAPM Certified Overview This is an executive program exploring the world of quality management . The program is designed to facilitate a framework for providing management counsel to clients, institutions in the public and private... Selengkapnya

Training Information Security Manager CIISM™

Training Information Security Manager CIISM™

T 27 April 2017 F , A admin_sbki

Training Certified Information Security Manager (CIISM™) AAFM IT Project Management Description The Certified Information Security Manager (CIISM™) certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. The CIISM certification is for the individual... Selengkapnya

CITSM Based on ITIL – Intermediate

CITSM Based on ITIL – Intermediate

T 4 May 2017 F , , A admin_sbki

CITSM Based on ITIL – Intermediate Certification Description The CITSM Based on ITIL Intermediate certifications are available to anyone that has passed the ITIL Foundation exam. It has a modular structure with each module providing a different focus on IT... Selengkapnya


Ada Pertanyaan? Silahkan hubungi Marketing kami untuk mendapatkan informasi lebih lengkap mengenai jasa/produk kami.

WhatsApp chat