Information Systems Acquisition, Development and Implementation
In this course you will learn the key processes and methodologies used by organizations in the areas of information systems acquisition, development and implementation. This includes testing methodologies, control identification and design, business case and feasibility analysis and system migration.
Information Systems Acquisition, Development and Implementation Overview
This is the third of five courses that helps prepare you for the ISACA Certified Information Systems Auditor certification. In this course you will learn the key processes and methodologies used by organizations in the areas of information systems acquisition, development and implementation. This includes testing methodologies, control identification and design, business case and feasibility analysis and system migration.
WEBVTT Welcome into Information Systems, Acquisition, Development, and Implementation. I'm your host, Lauren Diehl. I'm so excited to be here to welcome to the show, Chris Ward. So Chris, tell us a little bit about who you are and maybe some of your accomplishments and why you are extremely credible for this course. Well, Lauren, I am of course happy to be here joining you as we talk about this as well. My background primarily for those of you who haven't watched me and other courses here at ACI Learning and part of ITPro and AutoPro. I am an ITIL for Master, also C-Risk and Sysa Certified in the realm of ISACA, COVID 2019. A lot of project management background, a little bit more of the IT operations side of things back in the old days of Cisco and Microsoft training, most of the CompTIA certifications. And so that's kind of my background is coming in as IT and IT project management and service management in what I do. And so that's kind of my background and what I'm gonna be bringing to the table for this particular course. Which is of course aligns very closely with what ISACA expects people that might even be taking the Sysa, the CISA certification exam. And so that's kind of why we're gonna be doing what we're doing there, Lauren. Well, this is exciting because it kind of slides right into the next topic, which is who might enjoy watching this series with you and I? Well, anybody who is obviously number one, just trying to learn a little bit more about information systems auditing. Anyone who's trying to get maybe some CPEs as part of some other certification that they have or to help maintain their audit status or status as auditors. We also of course are looking at people who might want to get their Sysa certification. And so this would be one of the courses that they can take to help gain the knowledge necessary for it. And maybe just somebody who's just interested in finding out what the heck is this all about and are joining us just for fun. Well, that would be me right there, Chris. I have a little bit of history in audit and have worked with some really, really cool people in the auditing field. And so I am just hungry to learn more about what is available as an auditor. So what are we gonna be jumping into when we start this series? Well, we're talking about obviously information systems, right? So that's part of the IS in the IS Auditor. And this is where we're talking about things like acquiring, developing, managing and implementing the software, the hardware, the components that we have. And how does an organization do that? And as an auditor, you should be aware of these things. You should understand the process. You also have to understand a little bit of project management because a lot of times the implementation of these systems are treated like projects. And so if you are looking at it from an audit standpoint and taking that step back and checking the governance of this, the compliance, the risk, the controls, the policies and making sure we're doing what we're supposed to do. Whether it's because of regulatory requirements, whether it's because of standards that the organization states that they follow or if they're certified in something like an ISO 27001, where the information security certifications. Those are things that as auditors, we need to be aware of the processes, how things are implemented, how do we acquire? What are some of the processes that are typically in place for acquiring things from vendors and third parties? What are things to look out for? And so in this series here in this course, we are going to take a look primarily at those areas as well as making sure that we have a good understanding of the systems themselves that might be put into place. So an auditor should have a little bit of that knowledge as well. And by the way, when I say a little bit, not just you can define something. I can define what a network is and I can define what a server does. You really need to have an understanding of the systems, the equipment itself. So that way when you are performing your audits, you know exactly what to look for, what to watch out for when you are doing your final audit report. Fantastic, Chris. Well, I'm sure your interest is peaked. Good. Well, we're just getting started and we can't wait to see you in the first episode. So why don't you say we get started right now? See you soon.
Length of course
Here are the topics we'll cover
- IS Acquisition and Development
- IS Implementation
Options for this course
Train your team
Stay ahead of the curve and future-proof your business with training programs designed for you.
Transform your experience and integrate with our unique evolving library of Audit, Cybersecurity, and Information Technology courses.
Learn at your own pace and get your certification training.