Home > Articles

Like this article? We recommend Exam Objectives

Exam Objectives

The five domains are not covered equally in the CISA exam. Instead, the domains are covered according to ISACA’s analysis of IT auditors’ jobs. Their analysis has created the following proportion of domains to the IT auditor’s job. The domains, and their task and knowledge statements, are as follows:

Domain 1—The Process of Auditing Information Systems (14%)

Provide audit services in accordance with IT audit standards to assist the organization in protecting and controlling information systems.

Domain 1—Task Statements:

  • Develop and implement a risk-based IT audit strategy in compliance with IT audit standards to ensure that key areas are included.
  • Plan specific audits to determine whether information systems are protected, controlled and provide value to the organization.
  • Conduct audits in accordance with IS audit standards, guidelines and best practices to meet planned audit objectives.
  • Communicate emerging issues, potential risks, and audit results to key stakeholders.
  • Advise on the implementation of risk management and control practices within the organization, while maintaining independence.

Domain 1—Knowledge Statements:

  • Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards
  • Knowledge of risk assessment concepts, tools and techniques in an audit context
  • Knowledge of control objectives and controls related to information systems
  • Knowledge of audit planning and audit project management techniques, including follow-up
  • Knowledge of fundamental business processes (e.g., purchasing, payroll, accounts payable, accounts receivable) including relevant IT
  • Knowledge of applicable laws and regulations which affect the scope, evidence collection and preservation, and frequency of audits
  • Knowledge of evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis) used to gather, protect and preserve audit evidence
  • Knowledge of different sampling methodologies
  • Knowledge of reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution, audit report structure)
  • Knowledge of audit quality assurance systems and frameworks

Domain 2—Governance and Management of IT (14%)

Provide assurance that the necessary leadership and organization structure and processes are in place to achieve objectives and to support the organization's strategy.

Domain 2—Task Statements:

  • Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organization’s strategies and objectives.
  • Evaluate IT organizational structure and human resources (personnel) management to determine whether they support the organization’s strategies and objectives.
  • Evaluate the IT strategy, including the IT direction, and the processes for the strategy’s development, approval, implementation and maintenance for alignment with the organization’s strategies and objectives.
  • Evaluate the organization’s IT policies, standards, and procedures, and the processes for their development, approval, implementation, maintenance, and monitoring, to determine whether they support the IT strategy and comply with regulatory and legal requirements.
  • Evaluate the adequacy of the quality management system to determine whether it supports the organization’s strategies and objectives in a cost-effective manner.
  • Evaluate IT management and monitoring of controls (e.g., continuous monitoring, QA) for compliance with the organization’s policies, standards and procedures.
  • Evaluate IT resource investment, use and allocation practices, including prioritization criteria, for alignment with the organization’s strategies and objectives.
  • Evaluate IT contracting strategies and policies, and contract management practices to determine whether they support the organization’s strategies and objectives.
  • Evaluate risk management practices to determine whether the organization’s IT-related risks are properly managed.
  • Evaluate monitoring and assurance practices to determine whether the board and executive management receive sufficient and timely information about IT performance.
  • Evaluate the organization’s business continuity plan to determine the organization’s ability to continue essential business operations during the period of an IT disruption.

Domain 2—Knowledge Statements:

  • Knowledge of IT governance, management, security and control frameworks, and related standards, guidelines, and practices
  • Knowledge of the purpose of IT strategy, policies, standards and procedures for an organization and the essential elements of each
  • Knowledge of organizational structure, roles and responsibilities related to IT
  • Knowledge of the processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures
  • Knowledge of the organization’s technology direction and IT architecture and their implications for setting long-term strategic directions
  • Knowledge of relevant laws, regulations and industry standards affecting the organization
  • Knowledge of quality management systems
  • Knowledge of the use of maturity models
  • Knowledge of process optimization techniques
  • Knowledge of IT resource investment and allocation practices, including prioritization criteria (e.g., portfolio management, value management, project management)
  • Knowledge of IT supplier selection, contract management, relationship management and performance monitoring processes including third party outsourcing relationships
  • Knowledge of enterprise risk management
  • Knowledge of practices for monitoring and reporting of IT performance (e.g., balanced scorecards, key performance indicators [KPI])
  • Knowledge of IT human resources (personnel) management practices used to invoke the business continuity plan
  • Knowledge of business impact analysis (BIA) related to business continuity planning
  • Knowledge of the standards and procedures for the development and maintenance of the business continuity plan and testing methods

Domain 3—Information Systems Acquisition, Development, and Implementation (19%)

Provide assurance that the practices for the acquisition, development, testing, and implementation of information systems meet the organization’s strategies and objectives.

Domain 3—Task Statements:

  • Evaluate the business case for the proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether it meets business objectives.
  • Evaluate the project management practices and controls to determine whether business requirements are achieved in a cost-effective manner while managing risks to the organization.
  • Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation and status reporting is accurate.
  • Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organization's policies, standards, procedures and applicable external requirements.
  • Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and organization's requirements are met.
  • Conduct post-implementation reviews of systems to determine whether project deliverables, controls and organization's requirements are met.

Domain 3—Knowledge Statements:

  • Knowledge of benefits realization practices, (e.g., feasibility studies, business cases, total cost of ownership [TCO], ROI)
  • Knowledge of project governance mechanisms (e.g., steering committee, project oversight board, project management office)
  • Knowledge of project management control frameworks, practices and tools
  • Knowledge of risk management practices applied to projects
  • Knowledge of IT architecture related to data, applications and technology (e.g., distributed applications, web-based applications, web services, n-tier applications)
  • Knowledge of acquisition practices (e.g., evaluation of vendors, vendor management, escrow)
  • Knowledge of requirements analysis and management practices (e.g., requirements verification, traceability, gap analysis, vulnerability management, security requirements)
  • Knowledge of project success criteria and risks
  • Knowledge of control objectives and techniques that ensure the completeness, accuracy, validity and authorization of transactions and data
  • Knowledge of system development methodologies and tools including their strengths and weaknesses (e.g., agile development practices, prototyping, rapid application development [RAD], object-oriented design techniques)
  • Knowledge of testing methodologies and practices related to information systems development
  • Knowledge of configuration and release management relating to the development of information systems
  • Knowledge of system migration and infrastructure deployment practices and data conversion tools, techniques and procedures.
  • Knowledge of post-implementation review objectives and practices (e.g., project closure, control implementation, benefits realization, performance measurement)

Domain 4—Information Systems Operations, Maintenance and Support (23%)

Provide assurance that the processes for information systems operations, maintenance and support meet the organization’s strategies and objectives.

Domain 4—Task Statements:

  • Conduct periodic reviews of information systems to determine whether they continue to meet the organization’s objectives.
  • Evaluate service level management practices to determine whether the level of service from internal and external service providers is defined and managed.
  • Evaluate third party management practices to determine whether the levels of controls expected by the organization are being adhered to by the provider.
  • Evaluate operations and end-user procedures to determine whether scheduled and non-scheduled processes are managed to completion.
  • Evaluate the process of information systems maintenance to determine whether they are controlled effectively and continue to support the organization’s objectives.
  • Evaluate data administration practices to determine the integrity and optimization of databases.
  • Evaluate the use of capacity and performance monitoring tools and techniques to determine whether IT services meet the organization’s objectives.
  • Evaluate problem and incident management practices to determine whether incidents, problems or errors are recorded, analyzed and resolved in a timely manner.
  • Evaluate change, configuration and release management practices to determine whether scheduled and non-scheduled changes made to the organization’s production environment are adequately controlled and documented.
  • Evaluate the adequacy of backup and restore provisions to determine the availability of information required to resume processing.
  • Evaluate the organization’s disaster recovery plan to determine whether it enables the recovery of IT processing capabilities in the event of a disaster.

Domain 4—Knowledge Statements:

  • Knowledge of service level management practices and the components within a service level agreement
  • Knowledge of techniques for monitoring third party compliance with the organization’s internal controls
  • Knowledge of operations and end-user procedures for managing scheduled and non-scheduled processes
  • Knowledge of the technology concepts related to hardware and network components, system software and database management systems
  • Knowledge of control techniques that ensure the integrity of system interfaces
  • Knowledge of software licensing and inventory practices
  • Knowledge of system resiliency tools and techniques (e.g., fault tolerant hardware, elimination of single point of failure, clustering)
  • Knowledge of database administration practices
  • Knowledge of capacity planning and related monitoring tools and techniques
  • Knowledge of systems performance monitoring processes, tools and techniques (e.g., network analyzers, system utilization reports, load balancing)
  • Knowledge of problem and incident management practices (e.g., help desk, escalation procedures, tracking)
  • Knowledge of processes, for managing scheduled and non-scheduled changes to the production systems and/or infrastructure including change, configuration, release and patch management practices
  • Knowledge of data backup, storage, maintenance, retention and restoration practices
  • Knowledge of regulatory, legal, contractual and insurance issues related to disaster recovery
  • Knowledge of business impact analysis (BIA) related to disaster recovery planning
  • Knowledge of the development and maintenance of disaster recovery plans
  • Knowledge of types of alternate processing sites and methods used to monitor the contractual agreements (e.g., hot sites, warm sites, cold sites)
  • Knowledge of processes used to invoke the disaster recovery plans
  • Knowledge of disaster recovery testing methods

Domain 5—Protection of Information Assets (30%)

Provide assurance that the organization’s security policies, standards, procedures, and controls ensure the confidentiality, integrity and availability of information assets.

Domain 5—Task Statements:

  • Evaluate the information security policies, standards and procedures for completeness and alignment with generally accepted practices.
  • Evaluate the design, implementation and monitoring of system and logical security controls to verify the confidentiality, integrity and availability of information.
  • Evaluate the design, implementation, and monitoring of the data classification processes and procedures for alignment with the organization’s policies, standards, procedures, and applicable external requirements.
  • Evaluate the design, implementation and monitoring of physical access and environmental controls to determine whether information assets are adequately safeguarded.
  • Evaluate the processes and procedures used to store, retrieve, transport and dispose of information assets (e.g., backup media, offsite storage, hard copy/print data, and softcopy media) to determine whether information assets are adequately safeguarded.

Domain 5—Knowledge Statements:

  • Knowledge of the techniques for the design, implementation, and monitoring of security controls, including security awareness programs
  • Knowledge of processes related to monitoring and responding to security incidents (e.g., escalation procedures, emergency incident response team)
  • Knowledge of logical access controls for the identification, authentication and restriction of users to authorized functions and data
  • Knowledge of the security controls related to hardware, system software (e.g., applications, operating systems), and database management systems.
  • Knowledge of risks and controls associated with virtualization of systems
  • Knowledge of the configuration, implementation, operation and maintenance of network security controls
  • Knowledge of network and Internet security devices, protocols, and techniques
  • Knowledge of information system attack methods and techniques
  • Knowledge of detection tools and control techniques (e.g., malware, virus detection, spyware)
  • Knowledge of security testing techniques (e.g., intrusion testing, vulnerability scanning)
  • Knowledge of risks and controls associated with data leakage
  • Knowledge of encryption-related techniques
  • Knowledge of public key infrastructure (PKI) components and digital signature techniques
  • Knowledge of risks and controls associated with peer-to-peer computing, instant messaging, and web-based technologies (e.g., social networking, message boards, blogs)
  • Knowledge of controls and risks associated with the use of mobile & wireless devices
  • Knowledge of voice communications security (e.g., PBX, VoIP)
  • Knowledge of the evidence preservation techniques and processes followed in forensics investigations (e.g., IT, process, chain of custody)
  • Knowledge of data classification standards and supporting procedures
  • Knowledge of physical access controls for the identification, authentication and restriction of users to authorized facilities
  • Knowledge of environmental protection devices and supporting practices
  • Knowledge of the processes and procedures used to store, retrieve, transport and dispose of confidential information assets

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020