{"id":480,"date":"2022-07-29T11:30:26","date_gmt":"2022-07-29T11:30:26","guid":{"rendered":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/product\/certified-information-systems-auditor-cisa\/"},"modified":"2023-09-06T07:02:12","modified_gmt":"2023-09-06T07:02:12","slug":"certified-information-systems-auditor-cisa","status":"publish","type":"product","link":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/product\/certified-information-systems-auditor-cisa\/","title":{"rendered":"Certified Information Systems Auditor (CISA)"},"content":{"rendered":"<h3>Overview<\/h3>\n<p>CISA is to Audit what CPA and CA are to Accounting. CISAs are recognized internationally as professionals with the knowledge, skills, experience and credibility to leverage standards, manage vulnerabilities, ensure compliance, offer solutions, institute controls and deliver value to the enterprise. CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice which reflects the vital and evolving responsibilities of IT\u00a0auditors. The new CISA job practice was effective beginning with the\u00a0CISA exam administration in\u00a0June 2011. For purposes of these statements, the terms &#8220;enterprise&#8221; and &#8220;organization&#8221; or &#8220;organizational&#8221; are considered synonymous.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>| Total Course Video Hours:<\/strong>\u00a012 Hrs 37 Min<br \/>\n<strong>|\u00a0 Videos:<\/strong>\u00a074<br \/>\n<strong>|\u00a0 Course Access:<\/strong> 12 Months Unlimited Access<br \/>\n<strong>|\u00a0 Study Method:<\/strong> Online Video Lessons<br \/>\n<strong>|\u00a0 Course Type:<\/strong>\u00a0Certificate Course<br \/>\n<strong>|\u00a0 Award:<\/strong> Cyber Studies Institute<br \/>\n<b><strong>|\u00a0 International Certification (optional):<\/strong><\/b> Certified Information Systems Auditor (CISA)<\/p>\n","protected":false},"featured_media":293,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_brand":[],"product_cat":[18,41,19],"product_tag":[],"class_list":{"0":"post-480","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-cybersecurity","7":"product_cat-it-developing-networking","8":"product_cat-networking-software","10":"first","11":"instock","12":"sale","13":"virtual","14":"purchasable","15":"product-type-simple","16":"customify-col"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product\/480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/comments?post=480"}],"version-history":[{"count":2,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product\/480\/revisions"}],"predecessor-version":[{"id":1507,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product\/480\/revisions\/1507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/media\/293"}],"wp:attachment":[{"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/media?parent=480"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product_brand?post=480"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product_cat?post=480"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cyberstudiesinstitute.co.za\/index.php\/wp-json\/wp\/v2\/product_tag?post=480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}