CISA (Certified Information Systems Auditor) Review Classes Starts on 31/08/2015

CISA (Certified Information Systems Auditor) Review Classes Starts on 31/08/2015

Kinyau.
Wala usiwe na wasiwasi. kati ya wanafunzi wangu 6 waliofanya mtihani mwezi june, 3 walifaulu, u can see it is almost 50%.

Na inatakiwa wewe uje uwe mfano kwa wenzako...kila mtu ana malengo yake na jitihada binafsi pia zinasaidia.

karibu bila kuogopa..CISA inafanyika kabisa.
 
Hello,
Thanks for the information. When will you be conducting the next review classes ?
 
Mbugot.
The next CISA Review class will start on October 12 2015 for those who want to sit for DEC CISA exams as well as June 2016 Exams.
Tunakukaribisha sana even kwa maongezi na kujua abc kuhusu CISA
karibu sana
 
Tumeanza kupokea wanafunzi wanaotaka kujiunga na darasa la cisa mwezi wa 10...kwa wale walio interested tafadhali wasiliana nasi kupitia number hizi

0713 451713 or 0764 978313

karibuni sana
 
tunaendelea kupokea wanafunzi wanaotaka kufanya review class ya CISA mwezi wa 10, karibuni sana
 
Dear All,
Greetings!,
Exam passers have 5 years to apply for certification once they have passed an exam. The 5-year period to apply for certification for those who passed a Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM) or Certified in the Governance of Enterprise IT (CGEIT) exam in 2010 will end on 31 December 2015. If you fall into this category and have not yet submitted your completed application, you must to do so prior to the deadline. Retaking and re-passing the examination will be required if the completed application for certification is not submitted within 5 years from the exam passing date.
Please note that individuals are not certified and cannot use the CISA, CISM, CGEIT or CRISC title designation until the completed application is received and approved by ISACA. Applications can be found on the Apply for CISA,CISM, CGEIT and CRISC Certification pages of the ISACA web site.
In case you have any questions or you need assistance in completing the application form don’t hesitate to contact us.

0713 451713 or 0764 978313


 
Ijumaa tulimaliza Module II.. na leo tunaanza Module III
Areas to be covered is as follows,

[h=6]Module 3—CISA's Role in Systems and Infrastructure Life Cycle Management[/h]This module provides a review of the methodologies and processes organizations employ when they develop and change application systems and infrastructure components.

Topics include:


  • Benefits realization practices
  • Project governance mechanisms
  • Project management control frameworks, practices and tools
  • Risk management practices
  • Requirements analysis and management practices
  • System development methodologies and tools
  • Configuration and release management
  • System migration and infrastructure deployment practices
  • Post-implementation review objectives and practices


Karibuni wote..

kwa maelezo zaidi wasiliana nasi kupitia 0713 451713 or 0764 978313
 
[TABLE="class: cms_table, width: 99%"]
[TR]
[TD="colspan: 2"]12 December 2015 Exam
[/TD]
[/TR]
[TR]
[TD="width: 22%"]19 May 2015[/TD]
[TD="width: 32%"]Registration Opens[/TD]
[/TR]
[TR]
[TD="width: 22%"]21 August 2015[/TD]
[TD="width: 32%"]Early Registration Deadline[/TD]
[/TR]
[TR]
[TD="width: 22%"]23 October 2015[/TD]
[TD="width: 32%"]Final Registration Deadline


Register now to get a discount...[/TD]
[/TR]
[/TABLE]
 
Ijumaa ya keshokutwa tunaendelea na chapter III. leo tumepumzika kupisha CISA candidates washerekee sikukuu vema na familia zao. kwani tunaheshimu dini ya mtu.
karibuni sana
 
Kwa wale wanaohitaji kuanza darasa jipya la CISA litaanza trh 12/10/2015.
Mnaombwa kuwasiliana nasi mapema iwezekanavyo, kwani nafasi ziko chache kwani tunapenda kuwa na darasa dogo lenye watu wachache ili tuweze ku deliver material inavotakikana.
kwa maelezo zaidi wasiliana nasi kupitia 0713 451713 ama 0764 978313
karibuni sana
 
Jumatatu tarehe 05/10/2015 tunaanza chapter 4.
areas to be covered ibcludes the following:

[h=6]Module 4-CISA's Role in IT Service Delivery and Support[/h]This module provides a review of some of the methodologies and processes organizations employ when they develop and change application systems and infrastructure components. Also, this module will cover the practices and knowledge required of an information systems (IS) audit/assurance professional who is responsible for providing assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.

Topics include:


  • Service level management practices
  • Operations management
  • Technology concepts related to networks, system software and database management systems
  • System resiliency tools and techniques
  • Database administration practices
  • Capacity planning and monitoring techniques
  • Problem and incident management practices
  • Disaster recovery plans and testing methods
Karibuni wote
 
Jumatatu tunaanza chapter $

Domain 4—Information Systems Operations, Maintenance and SupportProvide assurance that the processes for information systems operations, maintenance and supportmeet the organization’s strategies and objectives. Service level management practices and the components within a service level agreement Techniques for monitoring third party compliance with the organization’s internal controls Operations and end-user procedures for managing scheduled and non-scheduled processesThe technology concepts related to hardware and network components, system software anddatabase management systems Control techniques that ensure the integrity of system interfaces Software licensing and inventory practices System resiliency tools and techniques (e.g., fault tolerant hardware, elimination of single point offailure, clustering) Database administration practices Capacity planning and related monitoring tools and techniques Systems performance monitoring processes, tools and techniques (e.g., network analyzers, systemutilization reports, load balancing) Problem and incident management practices (e.g., help desk, escalation procedures, tracking) Processes, for managing scheduled and non-scheduled changes to the production systems and/orinfrastructure including change, configuration, release and patch management practices Data backup, storage, maintenance, retention and restoration practices Regulatory, legal, contractual and insurance issues related to disaster recovery Business impact analysis (BIA) related to disaster recovery planning The development and maintenance of disaster recovery plans Types of alternate processing sites and methods used to monitor the contractual agreements (e.g.,hot sites, warm sites, cold sites) Processes used to invoke the disaster recovery plans Disaster recovery testing methods

karibuni sana
 
We are expecting to have a MOCK CISA Exam on 23rd October, 2015, those who are interested please drop ur email or phone number for further communication.
otherwise check up with the below mobile

0713 451713 or 0764 978313
or mujinja@hotmail.com
 
Tunaendelea na chapter IV..
[h=6]Module 4—CISA's Role in IT Service Delivery and Support[/h]This module provides a review of some of the methodologies and processes organizations employ when they develop and change application systems and infrastructure components. Also, this module will cover the practices and knowledge required of an information systems (IS) audit/assurance professional who is responsible for providing assurance that, in the event of a disruption, the business continuity and disaster recovery processes will ensure the timely resumption of IT services, while minimizing the business impact.

Topics include:


  • Service level management practices
  • Operations management
  • Technology concepts related to networks, system software and database management systems
  • System resiliency tools and techniques
  • Database administration practices
  • Capacity planning and monitoring techniques
  • Problem and incident management practices
  • Disaster recovery plans and testing methods
Kwa mawasiliano tupigie 0713 451713 or 0764 978313
or Enail mujinja@hotmail.com
Sam Mujinja
 
Kesho tunaanza chapter V ya CISA Certification review classes.

[h=6]Module 5—CISA's Role in Protection of Information Assets[/h]This module provides a review of the key components an auditor must be aware of to evaluate and ensure an organization's confidentiality, integrity, and availability (CIA) of information assets including logical and physical access controls, network infrastructure security, environmental controls and other processes and procedures used to maintain security of confidential information assets.

Topics include:


  • Security controls
  • Security incidents
  • Logical access controls
  • Network security controls
  • Network and Internet security
  • Attack methods and techniques
  • Security testing techniques
  • Encryption related technologies
  • PKI components and digital signature techniques
  • Security of mobile and wireless devices
  • Voice communications security
  • Data classification schemes
  • Physical access controls
  • Environmental protection devices
  • Process and procedures for information assets
Karibuni wote.
Kwa mawasiliano 0713 451713 or 0764 978313

ama tuandikie email mujinja@hotmail.com

Sam Mujinja--
 
Leo na kesho tunamalizia chapter 5, na jumatatu ya tarehe 19/10/2015 tunaanza chapter ya mwisho na baada ya hapo tunafanya one week intensive review ya module zilizobakia.

Nawakaribisha wote..

[h=6]Module 5—CISA's Role in Protection of Information Assets[/h]This module provides a review of the key components an auditor must be aware of to evaluate and ensure an organization's confidentiality, integrity, and availability (CIA) of information assets including logical and physical access controls, network infrastructure security, environmental controls and other processes and procedures used to maintain security of confidential information assets.

Topics include:


  • Security controls
  • Security incidents
  • Logical access controls
  • Network security controls
  • Network and Internet security
  • Attack methods and techniques
  • Security testing techniques
  • Encryption related technologies
  • PKI components and digital signature techniques
  • Security of mobile and wireless devices
  • Voice communications security
  • Data classification schemes
  • Physical access controls
  • Environmental protection devices
  • Process and procedures for information assets
Kwa mawasiliano tupigie 0713 451713 or 0764 978313

ama mujinja@hotmail.com
Sam Mujinja- Founder and CEO True Ink Associates
 
Back
Top Bottom