CISA certification

CISA certification

KisakoKivuyo.

NImekupata sana.... mwaka jana tuliendesha madarasa hapo Chuo cha uhasibu Njiro ..mwaka huu tume plan kufanya pia arusha ila tunajaribu kupata idadi ya wanafunzi japo 10 ili darasa lianze...na kama uko interested nicheki kwa number hiyo hapo juu kisha tutakutaarifu kadri muda utakavyoruhusu...
 
Last edited by a moderator:
Ni paper ngapi unafanya mpaka uwe certified?, naomba pia kupata contact za kujiandikisha
 
SirC
Mtihani wa CISA ni mmoja tu. una maswali 200 na pass mark ni 450.......ingawa total mark ni 800...
Darasa la CISA limeanza juzi pale Raha Tower (Sophia House) Floor ya 4 Insititute of Internal Auditors.
Tunakukaribisha sana hujachelewa..
Kwa mawasiliano na kuji andikisha piga number zifuatzo.


0713 451713...0764 978313--Sam Mujinja
 
Last edited by a moderator:
LEO NI SIKU YA TATU TOKA TUANZE REVIEW CLASSES YA CISA..Tumeanza na Module I...

[h=6]Module 1—CISA: The Process of Auditing Information Systems[/h]This module provides a review of the knowledge required to comply with the information systems (IS) audit standards, guidelines and best practices in the provision of IS audit services. These services help organizations protect and control their information and business systems.

Topics include:


  • ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques
  • Risk assessment in an audit context
  • Control Objectives related to in formation systems
  • Audit planning and management techniques
  • Gathering information and preserving evidence
  • Reporting and communication techniques
  • Control Objectives and IS-Related Controls
  • Risk Assessment in an Audit Context
  • Audit Planning and Management Techniques
  • Reporting and Communication Techniques
  • Control Self-Assessment

For more information please contact us through


      • +255 713451713.
        or 0764 978313
      Mr. Sam Mujinja




 
KisakoKivuyo
Asante kwa swali zuri..kuhusu arusha tumeshawasiliana na mwenzetu aliyeko chuo cha uhasibu Njiro kuona idadi ya watu wanaohitaji kusoma CISA.. mwaka jana tuli conduct twice, na naamini mwaka huu tutafanya pia, keep intouch kabla ya mwisho wa mwezi huu nitaleta mrejesho wa lini tutafanya training arusha..
nakutakia siku njema..

Sam Mujinja
 
Last edited by a moderator:
mzee wa ndonga;

shukrani sana ume elaborate vya kutosha na umetembea kwenye maswali yangu niliyouliza (thank you a lot for let me know in details!!)

swali lingine.
Do they provide any kind of exemptions??

thank you.
 
Last edited by a moderator:

  • Jana Tumemaliza Module I na tumefanya practical examples regarding the process of auditing information system..
    Next week tunaanza Module II..ambayo tutafundisha mambo yafuatayo..


    Module 2-CISA's Role in IT Governance


    This module provides a review of the development of sound control practices and mechanisms for management oversight and review required of an information systems (IS) audit/assurance professional who is responsible for providing assurance that an organization has the structure, policies, accountability mechanisms and monitoring practices in place to achieve the requirements of IT governance.

    Topics include:

    • IT Governance Frameworks
    • IT strategy, policies, standards and procedures
    • Organizational structure roles and responsibilities related to IT
    • Quality Management systems
    • Maturity and business process re-engineering models
    • IT contracting strategies
    • Enterprise risk management
    • Process Improvement Models
    • IT Contracting Strategies
    • Monitoring and Reporting IT Performance
    • IT Human Resource Management
    • Business impact analysis
    • Business continuity planning


    Tunawakaribisha wote..

    Kwa mawasiliano please tupigie ..0713 451713 or 0764978313

    Sam Mujinja



 
Leo Tunaanza Module II...Areas of concentration...


Module 2-CISA's Role in IT Governance


This module provides a review of the development of sound control practices and mechanisms for management oversight and review required of an information systems (IS) audit/assurance professional who is responsible for providing assurance that an organization has the structure, policies, accountability mechanisms and monitoring practices in place to achieve the requirements of IT governance.

Topics include:



  • IT Governance Frameworks
  • IT strategy, policies, standards and procedures
  • Organizational structure roles and responsibilities related to IT
  • Quality Management systems
  • Maturity and business process re-engineering models
  • IT contracting strategies
  • Enterprise risk management
  • Process Improvement Models
  • IT Contracting Strategies
  • Monitoring and Reporting IT Performance
  • IT Human Resource Management
  • Business impact analysis
  • Business continuity planning


Tunawakaribisha wote..

Kwa mawasiliano please tupigie ..0713 451713 or 0764978313

Sam Mujinja
 
Jana tumemaliza review class ya CISA Chapter II. Jumatatu ya tarehe 04/05/2015 tunaanza chapter III..

Areas to be covered..

[h=6]Module 3-CISA's Role in Systems and Infrastructure Life Cycle Management[/h]This module provides a review of the methodologies and processes organizations employ when they develop and change application systems and infrastructure components.

Topics include:


  • Benefits realization practices
  • Project governance mechanisms
  • Project management control frameworks, practices and tools
  • Risk management practices
  • Requirements analysis and management practices
  • System development methodologies and tools
  • Configuration and release management
  • System migration and infrastructure deployment practices
  • Post-implementation review objectives and practices..

For more information contact us through 0713 451713 or 0764 978313
 
Habari.
Jumatatu 11/05/2015 tunaanza chapter 4 ya CISA certification.

Module 4-CISA's Role in IT Service Delivery and Support
Topic that will be covered includes:

This module provides a review of some of the methodologies and processes organizations employ when they develop and change application systems and infrastructure components. Also, this module will cover the practices and knowledge required of an information systems (IS) audit/assurance professional who is responsible for providing assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.

Topics include:


  • Service level management practices
  • Operations management
  • Technology concepts related to networks, system software and database management systems
  • System resiliency tools and techniques
  • Database administration practices
  • Capacity planning and monitoring techniques
  • Problem and incident management practices
  • Disaster recovery plans and testing methods

Kwa taarifa zaidi wasiliana nasi kupitia : 0713 451713 or 0764 978313
 
Registration for the June exam is now closed.
[FONT=Arial, Helvetica, sans-serif] Now Register for September 12, 2015 [/FONT]
[TABLE="width: 99%"]
[TR]
[TD="colspan: 2"][h=4]12 September 2015 Exam[/h][/TD]
[/TR]
[TR]
[TD="width: 22%"]14 April 2015[/TD]
[TD="width: 32%"]Registration Opens[/TD]
[/TR]
[TR]
[TD="width: 22%"]17 June 2015[/TD]
[TD="width: 32%"]Early Registration Deadline[/TD]
[/TR]
[TR]
[TD="width: 22%"]24 July 2015[/TD]
[TD="width: 32%"]Final Registration Deadline[/TD]
[/TR]
[/TABLE]

I wish all the best for my students who are going to sit for June CISA/CISM Exams.
Concentration is need as we approach the final exams days.
 
Leo tunamalizia Chapter III ya CISA review. Jumatatu trh 18/05/2015 tunaanza Chapter IV..
Na ita cover details zilizopo hapo chini...

[h=6]Module 4-CISA's Role in IT Service Delivery and Support[/h]This module provides a review of some of the methodologies and processes organizations employ when they develop and change application systems and infrastructure components. Also, this module will cover the practices and knowledge required of an information systems (IS) audit/assurance professional who is responsible for providing assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.

Topics include:


  • Service level management practices
  • Operations management
  • Technology concepts related to networks, system software and database management systems
  • System resiliency tools and techniques
  • Database administration practices
  • Capacity planning and monitoring techniques
  • Problem and incident management practices
  • Disaster recovery plans and testing methods
Karibuni wote..
 
[h=1]5 Top-Paying Certifications for 2015[/h]With each certification, you'll find the average (mean) salary and a brief description.

The IT Skills and Salary Survey is a nationwide survey. Variations exist based on respondents' work location, years of experience, and company type (government, nonprofit, etc.).

1. Certified in Risk and Information Systems Control (CRISC)
$119,227
The nonprofit group ISACA offers CRISC certification, much in the way that CompTIA manages the A+ and Network+ certifications. Formerly, "ISACA" stood for Information Systems Audit and Control Association, but now they've gone acronym only.

The CRISC certification is designed for IT professionals, project managers, and others whose job it is to identify and manage risks through appropriate Information Systems (IS) controls, covering the entire lifecycle, from design to implementation to ongoing maintenance. It measures two primary areas: risk and IS controls. Similar to the IS control lifecycle, the risk area spans the gamut from identification and assessment of the scope and likelihood of a particular risk to monitoring for it and responding to it if/when it occurs.

2. Certified Information Security Manager (CISM)
$118,348
ISACA also created CISM certification. It's aimed at management more than the IT professional and focuses on security strategy and assessing the systems and policies in place more than it focuses on the person who actually implements those policies using a particular vendor's platform.

3. Certified Information Systems Security Professional (CISSP)
$110,603
Offered by the International Information Systems Security Certification Consortium (ISC)2, CISSP is designed to provide vendor-neutral security expertise, similar to the certifications ISACA offers. Launched in 1994, CISSP consists of an exam based around ten different areas in computer security, including risk analysis, cloud computing, security when developing applications, mobile, cryptography, physical security, business continuity and disaster recovery planning, and legal and compliance issues.

CISSP candidates must have at least five years of full-time experience in at least two of the ten areas tested. If you don't have the work experience, you can earn an Associate of (ISC)2 designation while working toward the full certification.

4. Project Management Professional (PMP®)
$109,405
The fourth highest paying and the first that is not security related, the PMP certification was created and is administered by the Project Management Institute (PMI®). It is the most recognized project management certification available. There are more than 630,000 PMPs worldwide.

The PMP certification exam tests five areas relating to the lifecycle of a project: initiating, planning, executing, monitoring and controlling, and closing. PMP certification is for running any kind of project, and it is not specialized into sub types, such as manufacturing, construction, or IT.

5. Certified Information Systems Auditor (CISA)
$106,181
The fifth highest-paying certification is also from ISACA, and this one is for IS auditors. CISA certification is ISACA's oldest, dating back to 1978, with more than 106,000 people certified since its inception. CISA certification requires at least five years of experience in IS auditing, control, or security in addition to passing an exam that is only offered three times per year.

The CISA certification is usually obtained by those whose job responsibilities include auditing, monitoring, controlling, and/or assessing IT and/or business systems. It is designed to test the candidate's ability to manage vulnerabilities, ensure compliance with standards, and propose controls, processes, and updates to a company's policies to ensure compliance with accepted IT and business standards
 
mzee wa ndonga,kwa wale tulioko mikoani tunapataje huzo huduma za review classes?
 
Mwananjengo.
Asante kwa swali zuri..kwanza wewe iunapatikana mkoa gani?

Kwa watu wa mikoani tumeshaanza kuengeneza mpango mkakati wa kuwafikia, kwa sasa tutaanza na arusha, tunaongea na Insitutute of Accountant Arusha pale njiro tuwe tunaendesha madarasa pale, tunaanza rasmi mwezi wa 7 mwishoni,,,tunaenda sehemu kulingana na uhitaji. na baada ya Arusha kabla ya Dec tutakuwa mwanza na mbeya.
Kwa sasahivi tunaweza kukusaidia material ukayapata kwa bei nafuu, na ukawa na manual, questions answers and explanations revies, ukawa na database ya maswali zaidi ya maswali 1,000 na pia other supplimentary materials. kwa bei nafuu, ili baadae tutakapoanza review classes iwe kama crush program hivi ya siku kadhaa.
Kwa maelezo zaidi unaweza kuwasiliana na sisi kwa kupitia number zifuatazo,..0713 451713 or 0764 978313
 
Last edited by a moderator:
HOW TO BECOME A CISA CERTIFIED
The CISA designation is awarded to individuals with an interest in Information Systems auditing, control and security who meet the following requirements:
[TABLE="class: subtitle-layout, width: 678"]
[TR]
[TD="class: subtitle-side"]
[/TD]
[TD="class: subtitle-main"][/TD]
[/TR]
[/TABLE]


  1. Successful completion of the CISA examination
  2. Submit an Application for CISA Certification
  3. Adherence to the Code of Professional Ethics
  4. Adherence to the Continuing Professional Education Program
  5. Compliance with the Information Systems Auditing Standards
[h=4]1. Successful completion of the CISA Examination[/h]The examination is open to all individuals who have an interest in information systems audit, control and security. All are encouraged to work toward and take the examination. Successful examination candidates will be sent all information required to apply for certification with their notification of a passing score. For a more detailed description of the exam see CISA Certification Job Practice. Also, CISA Exam Preparation resources are available through the association and many chapters host CISA Exam Review Courses (contact your local chapter).
[h=4]2. Submit an Application for CISA Certification[/h]Once a CISA candidate has passed the CISA certification exam and has met the work experience requirements, the final step is to complete and submit a CISA Application for Certification. A minimum of 5 years of professional information systems auditing, control or security work experience (as described in the CISA job practice areas) is required for certification. Substitutions and waivers of such experience, to a maximum of 3 years, may be obtained as follows:

  • A maximum of 1 year of information systems experience OR 1 year of non-IS auditing experience can be substituted for 1 year of experience.
  • 60 to 120 completed university semester credit hours (the equivalent of an 2-year or 4-year degree) not limited by the 10-year preceding restriction, can be substituted for 1 or 2 years, respectively, of experience.
  • A bachelor's or master's degree from a university that enforces the ISACA-sponsored Model Curricula can be substituted for 1 year of experience. To view a list of these schools, please visit www.isaca.org/modeluniversities. This option cannot be used if 3 years of experience substitution and educational waiver have already been claimed.
  • A master's degree in information security or information technology from an accredited university can be substituted for 1 year of experience.
Exception: 2 years as a full-time university instructor in a related field (e.g., computer science, accounting, information systems auditing) can be substituted for 1 year of experience.
As an example, at a minimum (assuming a 2-year waiver of experience by substituting 120 university credits), an applicant must have 3 years of actual work experience. This experience can be completed by:

  • 3 years of IS audit, control, assurance or security experience
OR

  • 2 years of IS audit, control assurance or security experience and 1 full year non-IS audit or IS experience or 2 years as a full-time university instructor.
It is important to note that many individuals choose to take the CISA exam prior to meeting the experience requirements.
This practice is acceptable and encouraged although the CISA designation will not be awarded until all requirements are met.
The work experience for CISA certification must be gained within the 10-year period preceding the application date for certification or within 5 years from the date of originally passing the exam. The CISA Application for Certification is available atwww.isaca.org/cisaapp. Note that candidates have 5 years from the passing date to apply for certification.
[h=4]3. Adherence to the Code of Professional Ethics[/h]Members of ISACA and/or holders of the CISA designation agree to a Code of Professional Ethics to guide professional and personal conduct.
[h=4]4. Adherence to the Continuing Professional Education (CPE) Program[/h]The objectives of the continuing education program are to:

  • Maintain an individual's competency by requiring the update of existing knowledge and skills in the areas of information systems auditing, control or security.
  • Provide a means to differentiate between qualified CISAs and those who have not met the requirements for continuation of their certification
  • Provide a mechanism for monitoring information systems audit, control and security professionals' maintenance of their competency
  • Aid top management in developing sound information systems audit, control and security functions by providing criteria for personnel selection and development
Maintenance fees and a minimum of 20 contact hours of CPE are required annually. In addition, a minimum of 120 contact hours is required during a fixed 3-year period.
View the complete Continuing Professional Education Policy.
[h=4]5. Compliance with the Information Systems Auditing Standards[/h]Individuals holding the CISA designation agree to adhere to the Information Systems Auditing Standards as adopted by ISACA.

For more information please contact us through 0764 978313 or 0713451713



 
Juzi Friday tumemaliza CISA review Chapter IV.//kesho trh 25/05/2015 tunaanza Chapter V na ya mwisho kabla ya kuwa na week moja kwa ajili ya intensive training na review ya maswali..
[h=6][/h][h=6]Module 5-CISA's Role in Protection of Information Assets[/h]This module provides a review of the key components an auditor must be aware of to evaluate and ensure an organization's confidentiality, integrity, and availability (CIA) of information assets including logical and physical access controls, network infrastructure security, environmental controls and other processes and procedures used to maintain security of confidential information assets.

Topics include:


  • Security controls
  • Security incidents
  • Logical access controls
  • Network security controls
  • Network and Internet security
  • Attack methods and techniques
  • Security testing techniques
  • Encryption related technologies
  • PKI components and digital signature techniques
  • Security of mobile and wireless devices
  • Voice communications security
  • Data classification schemes
  • Physical access controls
  • Environmental protection devices
  • Process and procedures for information assets

Kwa maelezo zaidi tuwasiliane kupitia 0764 978313 or 0713451713.///karibuni sana..
 

  • News.

    Leo Ijumaa trh 29/05/2015 tunamalizia Review Class ya CISA...Next week tutakuwa na intensive training ya week moja ku wa brush wale wanaofanya mtihani wa mwezi wa June, na wakimaliza, darasa jipya litaanza trh 15/06/2015.
    Tunawakaribisha wale wote wanaotaka kuhudhuria review classes zetu.
    Kwa maelezo zaidi wasiliana nasi kupitia number zifuatazo.


    • 0764 978313 or 0713451713.



 
Back
Top Bottom