logo

ISACA Course

course overview

download outline

Select Country and City to View dates & book now

Overview

This course introduces learners to key concepts and principles of software development. Candidates can gain insight into the key development methodologies, concepts of software development, standards, and software basics and learn through a hybrid of knowledge-based and hands-on training labs.

  • Continuing Professional Education (CPE): 16
  • Examvoucher: 1 voucher included (Valid for 12 months)

Audience

A wide-range of individuals, including:

  • Those new to IT, students, recent graduates and career changers.
  • Audit, risk, security and governance professionals looking to gain base-line IT knowledge and skills.
  • Current IT Professionals looking to reskill or upskill to broaden their IT knowledge and skills or keep up-to-date

Skills Gained

1- Software and its Evolution

  • Identify and explain basic software concepts and terms
  • Describe software types and their uses
  • Summarize the history of software (mainframe, personal computers and software-as-a-service eras)
  • 2- Software Basics

  • Describe algorithms (problem analysis, development, modeling, etc.)
  • Differentiate between syntax, semantics, and lexis
  • Differentiate between functional and object-oriented programming (OOP)
  • 3- Machine Language

    • Explain Describe CISC and RISC instruction set architecture (ISA) families and their differences
    • Identify machine-code concepts and language
    • Define ASCII and Unicode, and interpreters and compilers

    4- High-level Languages

    • Summarize scripting (e.g., Python, JavaScript, PowerShell and Bash)
    • Recognize virtual machines (e.g., NET, JAVA)
    • Describe the portability of code
    • Identify high-level languages (e.g., C, C++, Java, Python, HTML and .NET), procedural and nonprocedural languages, and graphical language
    • Describe an integrated development environment (IDE)

    5- Data Input

    • Describe input types (standard input [STDI], user input, process input, APIs)
    • Recall data types (integers, characters, strings, etc.)

    6- Programming Basics

    • Identify the basic structure of a program
    • Compare synchronous vs. asynchronous processing
    • Describe data processing
    • Explain the flow of control structures (if/else)

    7- Repetition Constructs and Data Structures

    • Explain the flow of control structures (while, do/while, etc.)
    • Identify data structures

    8- Output

    • Describe output types (peripherals, standard outputs [STDO])
    • Identify data storage types

    9- Software Development Standards

    • Recognize ISO/IEC/IEEE standards (e.g., 12207:2017, 15289:2011, 730-2014, 90003)

    10- Software Development Life Cycle

    • Describe SDLC management terms and concepts, including roles and responsibilities
    • Identify the phases of software development life cycle
    • Identify the phases of software development life cycle

    11- SDLC Models

    • Describe software management methodologies (waterfall and Agile)
    • Recognize Agile development methodologies (Scrum, XP, FDD, DevOps)
    • Illustrate how to choose a software methodology
    • Describe configuration management
    • Explain software versioning and release best practices
    • Describe code repositories and proper code branching

    12- SDLC Security and Management

    • Explain DevSecOps and Secure SDLC
    • Identify project management tools and techniques
    • Express software development ethics

Prerequisites

Not available. Please contact.

Outline

ISACA was established in 1969 and is a non-profit association of about 140000 professionals across 180 countries.

ISACA’s globally recognized accreditations provide professionals with the skills to lead, adapt and assure trust in an evolving digital world, by offering access to innovative and world-class knowledge, standards, networking, credentialing and career development.

Previously known as the Information Systems Audit and Control Association, ISACA now goes by its acronym only, to reflect the broad range of IT governance professionals it serves. By choosing to train at CourseMonster, you will be guaranteed to be equipped with the skills required to build a mature enterprise wide- Security governance program in conjunction with a Cyber-Risk Framework.

With CourseMonster you’ll get access to the full range of ISACA certifications. Uniquely with CourseMonster, you’ll sit your official exam during your course, just steps away from your classroom. Get certified in just days, not months.

ISACA is an independent and non-profitable organization that imparts necessary knowledge and practices to manage information systems. ISACA trainings were developed with the motive to provide the right guidance and practices to modern enterprises that deploy auditing controls for computer systems.


ISACA offers 4 credentials namely, CISA, CISM, CGEIT and CRISC certifications, each of these catering to its essential features i.e. systems auditing, governance, risk control and Security management.

By attending an accredited training course to prepare for your ISACA certification exam, you can be assured that the processes and procedures the training provider has in place for the management and delivery of training courses has been independently approved against rigorous assessment standards. The trainers are also approved and undergo an assessment of both their teaching skills and their product knowledge of the certification they are teaching.

Anyone interested in a career in IT governance, risk assessment, systems auditing and Security management should check out the certifications offered by ISACA. ISACA is a global nonprofit association focused on IT governance. The organization was formerly known as the Information Systems Audit and Control Association, but now goes by ISACA to "reflect the broad range of IT governance professionals it serves."

If you have experience as an information systems auditor and want to move up (or over), consider acquiring the Certified Information Systems Auditor (CISA) certification. The CISA credential recognizes individuals who are skilled in auditing, controlling and assurance of enterprise IT systems. The CISA is by far the most popular ISACA certification, with more than 115,000 credentials granted since the program began.

Popular courses are  CISM Certified Information Security Manager

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.