Mwalimu wa CISA Anapatikana

mzee wa ndonga

JF-Expert Member
Apr 11, 2011
1,108
88
Mwalimu anayefundisha review classes za CISA anapatikana.. soma Tangazo hili hapo chini ili uweze kujiunga nasi.


True Ink Associates would like to Announce that the Sixth (6) CISA
(Certified Information Systems Auditor) Review Class is scheduled
to commence on Monday 14/03/2016, Dar Es Salaam City Center,
Raha Tower Building 4th Floor at the Institute of Internal Auditors (IIA)
Conference Room. For those who are interested to sit for
June/September 2016 CISA/CISM Exams are warmly welcomed.


The course Duration is 5 weeks, 3 hrs a day, from Monday to Friday,
starting from 17:00-20:00 HRS. Additional one week
will be provided for intensive review on sample questions and
in depth discussion on various areas as we have almost 1,200
questions covering the entire 5 modules.


The course Fee is TZS 700,000/= which includes Manuals, Database for questions, answers and explanations and other supplementary materials recommended by ISACA

Register to reserve your sit.
For more information please Contact us through +255 713451713 or 0764 978313
or Email us through mujinja@hotmail.com

Contact person: Sam Mujinja: Course Director
For Payment Detailsay through the below Account.


TRUE INK ASSOCIATES
ACCOUNT NUMBER: 00110203226501
BANK NAME: MKOMBOZI BANK
ST JOSEPH BRANCH.

Karibuni sana..
 
CISA Task Statements


Domain 1: The Process of Auditing Information Systems &[HASHTAG]#8211[/HASHTAG]; Provide audit services in accordance with
IT audit standards to assist the organization with protecting and controlling information systems.
Task Statements
T1.1 Develop and implement a risk-based IT audit strategy in compliance with IT audit standards to
ensure that key areas are included.
T1.2 Plan specific audits to determine whether information systems are protected, controlled and
provide value to the organization.
T1.3 Conduct audits in accordance with IT audit standards to achieve planned audit objectives.
T1.4 Report audit findings and make recommendations to key stakeholders to communicate results
and effect change when necessary.
T1.5 Conduct follow-ups or prepare status reports to ensure that appropriate actions have been taken
by management in a timely manner.
 
With a growing demand for individuals possessing IS audit, control and security skills, CISA has become a preferred certification program by individuals and organizations around the world.
CISA employees:

  • Are highly qualified, experienced professionals
  • Provide the enterprise with a certification for IT assurance that is recognized by multinational clients, lending credibility to the enterprise
  • Are excellent indicators of proficiency in technology controls
  • Demonstrate competence in five domains, including standards and practices; organization and management; processes; integrity, confidentiality and availability; and software development, acquisition and maintenance
  • Demonstrate a commitment to providing the enterprise with trust in and value from your information systems
  • Maintain ongoing professional development for successful on-the-job performance

For more information contact us through +255 713451713 or +255764978313
or through email address mujinja@hotmail.com contact person Sam Mujinja
 
How to become a CISA Certified
1. Successful completion of the CISA examination
2. Submit an Application for CISA Certification
3. Adherence to the Code of Professional Ethics
4. Adherence to the Continuing Professional Education Program
5. Compliance with the Information Systems Auditing Standards

1. Successful completion of the CISA Examination
The examination is open to all individuals who have an interest in information systems audit, control and security. All are encouraged to work toward and take the examination. Successful examination candidates will be sent all information required to apply for certification with their notification of a passing score. For a more detailed description of the exam seeCISA Certification Job Practice. Also, CISA Exam Preparation resources are available through the association and many chapters host CISA Exam Review Courses (contact your local chapter).

1. Successful completion of the CISA examination
The examination is open to all individuals who have an interest in information systems audit, control and security. All are encouraged to work toward and take the examination. Successful examination candidates will be sent all information required to apply for certification with their notification of a passing score.
[h=4]2. Submit an Application for CISA Certification[/h]Once a CISA candidate has passed the CISA certification exam and has met the work experience requirements, the final step is to complete and submit a CISA Application for Certification. A minimum of 5 years of professional information systems auditing, control or security work experience (as described in the CISA job practice areas) is required for certification.

3. Adherence to the Code of Professional Ethics
Members of ISACA and/or holders of the CISA designation agree to a Code of Professional Ethics to guide professional and personal conduct.

4. Adherence to the Continuing Professional Education (CPE) Program
The objectives of the continuing education program are to:

  • Maintain an individual's competency by requiring the update of existing knowledge and skills in the areas of information systems auditing, control or security.
  • 5. Compliance with the Information Systems Auditing Standards
Individuals holding the CISA designation agree to adhere to the Information Systems Auditing Standards as adopted by ISACA.
True Ink Associates, provides training on CISA by conducting CISA Review classes in Dar Es Salaam, mwanza and Arusha , other class in going on, and we are expecting to start the new CISa review class on 26/10/2015 at Dar Es Salaam.
Other class will be conducted in Arusha in collaboration with Institute of Accountants Arusha (Njiro).

For more information contact us through +255 713451713 or +255764978313
or though email address mujinja@hotmail.com contact person Sam Mujinja

karibuni Wote
 
An organization is always subjected to a set of risks in every business and project initiative it undertakes. These include Business Risk, Strategic Risk, Operational Risk and Risk of legal non-compliance. The information systems, while they play significant role in the strategic initiatives of organizations are also subjected to these risks. Threats can be internal or external to the organization on one hand and a result of deliberate or un-deliberate intrusion on the other. However, lack adequate skills regarding IT audit in Private, Public Authority and Other Bodies resulting to unable to cover IT risk audits. Therefore, it is important that internal auditors, risk and ICT professionals should maintain their competency through updating the existing skills and obtain training directed towards new audit techniques and technological areas.

This training is designed to provide professionals with the solid foundation need to effectively audit ICT systems. Through this workshop you will explore current critical aspects of the IT/IS environment, including IT/IS governance, ICT infrastructure controls, information security, physical security, business continuity, change management and management frameworks such as Control Objectives for the Information and Related Technology (COBIT). You will be equipped with the knowledge and technical skills required for skills in audit, control, monitoring, and assessing information systems. You will leave this workshop with audit programs and sample audit findings that you can put to use as soon as you return to your work place. A detailed case study with real-world examples will be given to perform IS audit.

Course Outcomes:
At the end of the course, participants will be able to:
i) Understand Information Systems Audit Concepts: IT/IS Audit Focus; Audit&[HASHTAG]#8217[/HASHTAG];s Role; Control Environment; Control Framework; IT Audit Certifications
ii) Information Systems Audit Process: This encompasses the entire practice of IS auditing, including procedures, and the thorough methodologies that allows an IS auditor to perform an audit on any given IT area in a professional manner.
iii) Audit Information Technology Governance: ICT Strategic Alignment; Resource Management; Risk Management; Performance Measurement; information security governance; IT policies and procedures; separation of duties and outsourcing
iv) Audit Information Systems Acquisition, Development and Implementation: Systems Development Life Cycle; Identifying Audit Risk in Systems Development Life Cycle, software licensing, change management and controls; Audit of ERPs purchases
v) Audit Business Continuity and Disaster Recovery: Business Continuity Planning; Disaster recovery strategy

Please join us..for more information call us on 0713 451713 or 0764 978313
 
tunaendelea kupokea wanafunzi wanaohitaji kujiunga na review classes za cisa zinazoanza trh 14/03/2016 DSM City Center,
Kwa maelezo zaidi wasiliana nasi kupitia 0713 451713 ama 0764 978313
karibuni sana
 
We are offering CISA Review Classes..read Below

What are the Course Objectives?


By the end of this training you will:
Be able to identify and assess vulnerabilities,
report on compliance and institute controls.
Acquire the relevant knowledge and skills required to
clear the CISA certification exam by ISACA.
Gain a better understanding of IS Audit and Assurance
Guidelines, Standards and best practices for IS audit and control,
governance of enterprise IT, acquisition, development, testing and implementation of information systems.
Develop a working knowledge in the five domains of CISA,
as prescribed by ISACA.


Who should do this course?


This training is an essential professional requirement
for professionals who are responsible for controlling, monitoring and
assessing an organization's information technology and business systems.
Applicable careers positions include:
IS / IT Auditor/Consultants
IT Compliance Manager
Chief Compliance Officer
Chief Risk & Privacy Officer
Security Head / Director
Security Manager / Architect


Karibuni Wote
For more information please contact us through
+255 713451713 or +255764978313
or through email address mujinja@hotmail.com contact person Sam Mujinja
 
Exam Date 11 June 2016

Exam Registration Changes

Changes to the exam site, test language, exam type and candidate name are subject to the following charges:

z On or before 8 April 2016................................... No charge

z 9 April through 22 April 2016............................. US $50

No exam registration changes will be granted after 22 April 2016. To request a change, email exam@isaca.org. Exam registration changes do not include

exam deferrals.

Refund and Deferrals of Fees

Refund: Candidates unable to take the exam are eligible for a refund of registration fees, less a US $100 processing fee, if such a request is received in

writing on or before 8 April 2016. All requests for a refund after this date will be denied. Exam candidates who have deferred their exam are not eligible for

a refund of their deferral fee and associated exam payment.

Deferrals: Exam registrants may elect to defer their registration to the following exam date. A deferral fee is required based on the following schedule:

z On or before 22 April.......................................... US $50

z 23 April through 27 May..................................... US $100

z 28 May through 8 June...................................... US $125

Kwa maelezo zaidi tupigie kwa 0713 451713 or 0764 978313
or Email. mujinja@hotmail.com
karibuni sana..
 
Tunaendelea kupokea wanafunzi wanaotaka kujiunga na review class ya CISA.. darasa linaanza next week trh 14/03/2016.

Kwa maelezo zaidi tupigie kwa 0713 451713 or 0764 978313
or Email. mujinja@hotmail.com
karibuni sana..
 
Ndugu wataalam.

Review Class ya CISA linaanza trh 14/03/2016 kama ilivyotangazwa. tunawaomba wale wote ambao hawajaweza kujiandikisha hadi sasa wafanye hivyo. kwani darasa ldadi ya watu inakaribia kuisha,,baada ya jumatatu hatutapokea wanafunzi wengine wa intake hii.
Otherwise kwa mawasiliano tupigie 0713 451713 or 0764 978313
ama tuandikie mujinja@hotmail.com
karibuni wote...na tunakuhakikishia kukupa elimu ya kutosha kukuwezesha kufaulu mitihani ya cisa..
 
Bado masaa mawili tuanze training ya CISA.. bado nafasi zimebaki mbili tu.. watakaokosa itabidi wasubiri intake ya mwezi wa 7...karibuni sana
 
Ndugu wadau wa Elimu..

Jana tumeanza Chapter One ya Review Class ya CISA.. The class was so interactive. areas that will be covered includes but not limited to the following,

Domain 1—The Process of Auditing Information Systems

Provide audit services in accordance with IS audit standards to assist the organization in protecting and controlling information systems. (21%)


Task Statements:

1.1 Execute a risk-based IS audit strategy in compliance with IS audit standards to ensure that key risk areas are audited.

1.2 Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization.

1.3 Conduct audits in accordance with IS audit standards to achieve planned audit objectives.

1.4 Communicate audit results and make recommendations to key stakeholders through meetings and audit reports to promote change when necessary.

1.5 Conduct audit follow-ups to determine whether appropriate actions have been taken by management in a timely manner.

Knowledge Statements:

1.1 Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards

1.2 Knowledge of the risk assessment concepts and tools and techniques used in planning, examination, reporting and follow-up

1.3 Knowledge of fundamental business processes (e.g., purchasing, payroll, accounts payable, accounts receivable) and the role of IS in these processes

1.4 Knowledge of the control principles related to controls in information systems

1.5 Knowledge of risk-based audit planning and audit project management techniques, including follow-up

1.6 Knowledge of the applicable laws and regulations that affect the scope, evidence collection and preservation, and frequency of audits

1.7 Knowledge of the evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis, forensic investigation techniques, computer-assisted audit techniques [CAATs]) used to gather, protect and preserve audit evidence

1.8 Knowledge of different sampling methodologies and other substantive/data analytical procedures

1.9 Knowledge of reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution, audit report structure, issue writing, management summary, result verification)

1.10 Knowledge of audit quality assurance (QA) systems and frameworks

Otherwise kwa mawasiliano tupigie 0713 451713 or 0764 978313
ama tuandikie mujinja@hotmail.com


Naamini kuwa wote mtafurahia training yetu tunayoitoa ..
karibuni wote
 
Tunaendelea na darasa la CISA review na leo ni siku ya tatu.
kwa wale ambao bado wanahitaji kujiunga hawajachelewa, mwisho wa kupokea wanafunzi ni leo.
Kwa maelezo zaidi tuwasiliane kwa kupitia 0713 451713 ama 0764 978313
ama kwa email mujinja@hotmail.com
 
The 5 Highest Paying IT Certifications 2016

5. CISA: Certified Information Systems Auditor - $106,181
Being CISA certified puts you on an international level to assess vulnerabilities, report on compliance and
institute controls within a business. Systems Development Life, Data Integrity Review, and Acquisitions
are just some of the topics you'll cover in the coursework..

4. PMP: Project Management Professional - $109,405
PMP is starting to become that "secret sauce" on many resumes. Another report
states that having a PMP certification on top of another certification such as a CCNA
or Microsoft cert can earn an extra $20k per year. Even on it's own, training for a PMP
certification puts you well over the $100k mark.

3. CISSP: Certified Information Systems Security Professional - $110,603
With your CISSP certification, you'll be heavily prepped with System Security Architecture, Cryptography,
Disaster Recovery, and more. Thousands of corporations are looking fill newly formed Information Security Officer
positions to be proactive against attacks.

2. CISM: Certified Information Security Manager - $118,348
Information security management is the name of this game. Employers are searching
for an improved alignment between the organization's information security program and its
long term goals.

1. CRISC: Certified in Risk and Information Systems Control - $119,227
CRISC is the only certification that prepares and enables IT professionals for the unique challenges of IT and
enterprise risk management, and positions them to become strategic partners to the enterprise. This certification
has a rigorous testing schedule but those that succeed have little problem finding a position they love.
 
Leo tunamalizia chapter I ya review class ya CISA.
Tunaanza module two jumatatu ijayo,.
karibuni sana..
kwa mawasiliano tutafute kupitia 0713 451713 ama 0764 978313
 
Leo tunaendelea na chapter No.II area to be covered includes the mentioned below;

Domain 2—Governance and Management of IT
Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization's strategy. (16%)

Task Statements:
2.1 Evaluate the IT strategy, including IT direction, and the processes for the strategy’s development, approval, implementation and maintenance for alignment with the organization’s strategies and objectives.
2.2 Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization’s strategies and objectives.
2.3 Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organization’s strategies and objectives.
2.4 Evaluate the organization’s IT policies, standards and procedures, and the processes for their development, approval, release/publishing, implementation and maintenance to determine whether they support the IT strategy and comply with regulatory and legal requirements.
2.5 Evaluate IT resource management, including investment, prioritization, allocation and use, for alignment with the organization’s strategies and objectives.
2.6 Evaluate IT portfolio management, including investment, prioritization and allocation, for alignment with the organization’s strategies and objectives.
2.7 Evaluate risk management practices to determine whether the organization’s IT-related risk is identified, assessed, monitored, reported and managed.
2.8 Evaluate IT management and monitoring of controls (e.g., continuous monitoring, quality assurance [QA]) for compliance with the organization’s policies, standards and procedures.
2.9 Evaluate monitoring and reporting of IT key performance indicators (KPIs) to determine whether management receives sufficient and timely information.
2.10 Evaluate the organization’s business continuity plan (BCP), including alignment of the IT disaster recovery plan (DRP) with the BCP, to determine the organization’s ability to continue essential business operations during the period of an IT disruption.
Knowledge Statements:
2.1 Knowledge of the purpose of IT strategy, policies, standards and procedures for an organization and the essential elements of each
2.2 Knowledge of IT governance, management, security and control frameworks, and related standards, guidelines and practices
2.3 Knowledge of the organizational structure, roles and responsibilities related to IT, including segregation of duties (SoD)
2.4 Knowledge of the relevant laws, regulations and industry standards affecting the organization
2.5 Knowledge of the organization’s technology direction and IT architecture and their implications for setting long-term strategic directions
2.6 Knowledge of the processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures
2.7 Knowledge of the use of capability and maturity models
2.8 Knowledge of process optimization techniques
2.9 Knowledge of IT resource investment and allocation practices, including prioritization criteria (e.g., portfolio management, value management, personnel management)
2.10 Knowledge of IT supplier selection, contract management, relationship management and performance monitoring processes, including third-party outsourcing relationships
2.11 Knowledge of enterprise risk management (ERM)
2.12 Knowledge of the practices for monitoring and reporting of controls performance (e.g., continuous monitoring, quality assurance [QA])
2.13 Knowledge of quality management and quality assurance (QA) systems
2.14 Knowledge of the practices for monitoring and reporting of IT performance (e.g., balanced scorecard [BSC], key performance indicators [KPIs])
2.15 Knowledge of business impact analysis (BIA)
2.16 Knowledge of the standards and procedures for the development, maintenance and testing of the business continuity plan (BCP)
2.17 Knowledge of the procedures used to invoke and execute the business continuity plan (BCP) and return to normal operations

karibuni.. wote..
Kwa maelezo zaidi tuwasiliane kwa kupitia 0713 451713 ama 0764 978313
 
Benefits of CISA Certification

• Recognition of attainment of advanced job skills as required for an information systems auditor

• Worldwide recognition as an information systems auditor

• Opportunity to build upon existing certifications/credentials already earned

• Provides tangible evidence of career growth

• Potential for a salary increase and/or promotion

Benefits of Training with True Ink Associates


True Ink is a specialist training company focused on providing quality education to IT professionals in business and government. Our courses offer some key benefits:


• Outstanding world-class instructors. Ultimately the caliber of the instructor is the key determinant of the effectiveness of training.

• Independence. Our courses are independently commissioned and developed to ensure maximum ongoing relevance.

• Pre-Exam Support. All participants gain exclusive access to our CISA Support Hotline as well as our online forums for questions, comments and resources.

• Exclusive Warranty. Extensive research, development and high-level expertise has gone into the creation of our CISA course. We back the quality of the course unreservedly, and provide a special warranty: if, for whatever reason, the unthinkable should happen and you do not pass the exam the first time, you are entitled to re-sit the entire course, or any part thereof, at no charge.

karibuni.. wote..
Kwa maelezo zaidi tuwasiliane kwa kupitia 0713 451713 ama 0764 978313
 
Today 29th march 2016 tunamaliza chapter II ya management of IT and IT Governance.
na Kesho tutaanza chapter III.
karibuni sana
 

Similar Discussions

Back
Top Bottom