ISACA CISA Certificering - Kun 4 dage

Hvorfor

Hvad siger vores kunder?

"Highly efficient way of Learning. Very skilled instructor"
Soren Andersen, Stralfors - ISACA CISA Certificering (4 dage), 25/11/2013 til 27/11/2013

Her er 4 gode grunde til at du skal tage CISA hos Firebrand:

Se Hvordan Vi Hjælper Dig Med at Få Nye Færdigheder Hurtigt

  1. Du bliver CISA uddannet og certificeret hurtigere. Du lærer mere på vores 4 dages accelererede kursus og får mindst 12 timers daglig uddannelse i et distraktionsfrit miljø.
  2. Dit CISA kursus er alt-inklusiv. Du får en gennemskuelig pris, der dækker alle kursusmaterialer, eksamen, overnatning og forplejning. Du skal ikke tænke på andet end at lære.
  3. Bestå CISA den første gang eller kom tilbage, gratis. Din instruktør er ekspert, og træner dig ud fra accelererede metoder, så du lærer hurtigere og har de bedste muligheder for at bestå eksamen første gang. Men hvis du mod forventning ikke består, er du dækket af vores Certificeringsgaranti.
  4. Tag CISA hos en prisvindende uddannelsesleverandør. Vi har vundet adskillige udmærkelser heriblandt Microsofts "Årets Learning Partner" hele fem gange og to Børsen Gazelle priser. Firebrand er din hurtigste vej til uddannelse, og vi har sparet 70.652 deltagere for mere end en million spildte timer siden 2001.

Er du klar til kurset? Tag en GRATIS test som hjælper dig med at bedømme din nuværende viden.

Hvad

ISACA CISA

Målet med vores 4 dages accelererede program for CISA Certificeringen er at give IT-professionelle den nødvendige viden og færdighed til at arbejde med IS revision, kontrol og sikkerhed.

Få din ISACA CISA certificering på kun 4 dage.

De tekniske færdigheder og rutiner, som du lærer på CISA uddannelsesprogrammet giver dig fundamentet for succes indenfor området. Når du har en CISA certificering kan du dokumentere din viden og med en stadigt voksende efterspørgsel efter IT sikkerhedsfolk er CISA blevet en af de allermest efterspurgte og anerkendte uddannelses- og certificerings programmer.

Hos Firebrand ved vi, at din tid er værdifuld. Det er derfor, vi giver dig mulighed for at få din CISA certificering på kun 4 dage. Vi giver dig de bedste muligheder for at lære.

Med os på din side, mens vi opmuntrer og guider dig på rette vej, kan du glæde dig til 4 intense, fokuserede dage med kvalitets træning i et distraktionsfrit miljø. Din ekspert instruktør vil arbejde med Readynez's unikke accelererede indlæringsmetoder, som stiller dig bedst muligt i forhold til at lære og fastholde viden.

Når du tager Firebrand's CISA uddannelsesprogram, betyder det, at:

  • Du får flere timers uddannelse pr dag. Derfor bliver du uddannet hurtigere og mere omkostningseffektivt end du kan blive nogle andre steder. 
  • Du bliver uddannet af een af verdens førende eksperter. 
  • Du kan fokusere fuldstændig på din læring i vores distraktionsfrie miljø. 
  • Du får dedikeret onsite support og adgang til undervisningslokalet døgnet rundt. 

Exclusive: Sit your CISA exam on this accelerated course

Firebrand is an ISACA Accredited Training Organisation (ATO). This means you'll have access to official ISACA courseware and will sit your CISA exam at the Firebrand Training Centre during your accelerated course. If you don’t pass your CISA exam first time, don't worry, you'll be covered by your Certification Guarantee.

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Domain 1 - The Process of Auditing Information Systems (21%)

Provide audit services in accordance with IS audit standards to assist the organisation in protecting and controlling information systems.

Domain 1 - Task Statements:

  • 1.1 Execute a risk-based IS audit strategy in compliance with IS audit standards to ensure that key risk areas are audited. 
  • 1.2 Plan specific audits to determine whether information systems are protected, controlled and provide value to the organisation. 
  • 1.3 Conduct audits in accordance with IS audit standards to achieve planned audit objectives. 
  • 1.4 Communicate audit results and make recommendations to key stakeholders through meetings and audit reports to promote change when necessary. 
  • 1.5 Conduct audit follow-ups to determine whether appropriate actions have been taken by management in a timely manner.

Domain 1 - Knowledge Statements:

  • 1.1 Knowledge of ISACA IT Audit and Assurance Standards, Guidelines and Tools and Techniques, Code of Professional Ethics and other applicable standards 
  • 1.2 Knowledge of the risk assessment concepts and tools and techniques used in planning, examination, reporting and follow-up 
  • 1.3 Knowledge of fundamental business processes (e.g., purchasing, payroll, accounts payable, accounts receivable) and the role of IS in these processes 
  • 1.4 Knowledge of the control principles related to controls in information systems 
  • 1.5 Knowledge of risk-based audit planning and audit project management techniques, including follow-up 
  • 1.6 Knowledge of the applicable laws and regulations that affect the scope, evidence collection and preservation, and frequency of audits 
  • 1.7 Knowledge of the evidence collection techniques (e.g., observation, inquiry, inspection, interview, data analysis, forensic investigation techniques, computer-assisted audit techniques [CAATs]) used to gather, protect and preserve audit evidence 
  • 1.8 Knowledge of different sampling methodologies and other substantive/data analytical procedures 
  • 1.9 Knowledge of reporting and communication techniques (e.g., facilitation, negotiation, conflict resolution, audit report structure, issue writing, management summary, result verification) 
  • 1.10 Knowledge of audit quality assurance (QA) systems and frameworks 
  • 1.11 Knowledge of various types of audits (e.g., internal, external, financial) and methods for assessing and placing reliance on the work of other auditors or control entities

Domain 2 - Governance and Management of IT (16%)

Provide assurance that the necessary leadership and organisational structures and processes are in place to achieve objectives and to support the organisation's strategy.

Domain 2 - Task Statements:

  • 2.1 Evaluate the IT strategy, including IT direction, and the processes for the strategy’s development, approval, implementation and maintenance for alignment with the organisation’s strategies and objectives. 
  • 2.2 Evaluate the effectiveness of the IT governance structure to determine whether IT decisions, directions and performance support the organisation’s strategies and objectives. 
  • 2.3 Evaluate IT organisational structure and human resources (personnel) management to determine whether they support the organisation’s strategies and objectives. 
  • 2.4 Evaluate the organisation’s IT policies, standards and procedures, and the processes for their development, approval, release/publishing, implementation and maintenance to determine whether they support the IT strategy and comply with regulatory and legal requirements. 
  • 2.5 Evaluate IT resource management, including investment, prioritisation, allocation and use, for alignment with the organisation’s strategies and objectives. 
  • 2.6 Evaluate IT portfolio management, including investment, prioritisation and allocation, for alignment with the organisation’s strategies and objectives. 
  • 2.7 Evaluate risk management practices to determine whether the organisation’s IT-related risk is identified, assessed, monitored, reported and managed. 
  • 2.8 Evaluate IT management and monitoring of controls (e.g., continuous monitoring, quality assurance [QA]) for compliance with the organisation’s policies, standards and procedures. 
  • 2.9 Evaluate monitoring and reporting of IT key performance indicators (KPIs) to determine whether management receives sufficient and timely information. 
  • 2.10 Evaluate the organisation’s business continuity plan (BCP), including alignment of the IT disaster recovery plan (DRP) with the BCP, to determine the organisation’s ability to continue essential business operations during the period of an IT disruption.

Domain 2 - Knowledge Statements:

  • 2.1 Knowledge of the purpose of IT strategy, policies, standards and procedures for an organisation and the essential elements of each 
  • 2.2 Knowledge of IT governance, management, security and control frameworks, and related standards, guidelines and practices 
  • 2.3 Knowledge of the organisational structure, roles and responsibilities related to IT, including segregation of duties (SoD) 
  • 2.4 Knowledge of the relevant laws, regulations and industry standards affecting the organisation 
  • 2.5 Knowledge of the organisation’s technology direction and IT architecture and their implications for setting long-term strategic directions 
  • 2.6 Knowledge of the processes for the development, implementation and maintenance of IT strategy, policies, standards and procedures 
  • 2.7 Knowledge of the use of capability and maturity models 
  • 2.8 Knowledge of process optimisation techniques 
  • 2.9 Knowledge of IT resource investment and allocation practices, including prioritisation criteria (e.g., portfolio management, value management, personnel management) 
  • 2.10 Knowledge of IT supplier selection, contract management, relationship management and performance monitoring processes, including third-party outsourcing relationships 
  • 2.11 Knowledge of enterprise risk management (ERM) 
  • 2.12 Knowledge of the practices for monitoring and reporting of controls performance (e.g., continuous monitoring, quality assurance [QA]) 
  • 2.13 Knowledge of quality management and quality assurance (QA) systems 
  • 2.14 Knowledge of the practices for monitoring and reporting of IT performance (e.g., balanced scorecard [BSC], key performance indicators [KPIs]) 
  • 2.15 Knowledge of business impact analysis (BIA) 
  • 2.16 Knowledge of the standards and procedures for the development, maintenance and testing of the business continuity plan (BCP) 
  • 2.17 Knowledge of the procedures used to invoke and execute the business continuity plan (BCP) and return to normal operations

Domain 3 - Information Systems Acquisition, Development and Implementation (18%)

Provide assurance that the practices for the acquisition, development, testing and implementation of information systems meet the organisation’s strategies and objectives.

Domain 3 - Task Statements:

  • 3.1  Evaluate the business case for the proposed investments in information systems acquisition, development, maintenance and subsequent retirement to determine whether the business case meets business objectives. 
  • 3.2 Evaluate IT supplier selection and contract management processes to ensure that the organisation’s service levels and requisite controls are met. 
  • 3.3 Evaluate the project management framework and controls to determine whether business requirements are achieved in a cost-effective manner while managing risk to the organisation. 
  • 3.4 Conduct reviews to determine whether a project is progressing in accordance with project plans, is adequately supported by documentation, and has timely and accurate status reporting. 
  • 3.5 Evaluate controls for information systems during the requirements, acquisition, development and testing phases for compliance with the organisation's policies, standards, procedures and applicable external requirements. 
  • 3.6 Evaluate the readiness of information systems for implementation and migration into production to determine whether project deliverables, controls and the organisation's requirements are met. 
  • 3.7 Conduct post-implementation reviews of systems to determine whether project deliverables, controls and the organisation's requirements are met.

Domain 3 - Knowledge Statements:

  • 3.1 Knowledge of benefits realisation practices, (e.g., feasibility studies, business cases, total cost of ownership [TCO], return on investment [ROI]) 
  • 3.2 Knowledge of IT acquisition and vendor management practices (e.g., evaluation and selection process, contract management, vendor risk and relationship management, escrow, software licensing), including third-party outsourcing relationships, IT suppliers and service providers. 
  • 3.3 Knowledge of project governance mechanisms (e.g., steering committee, project oversight board, project management office) 
  • 3.4 Knowledge of project management control frameworks, practices and tools 
  • 3.5 Knowledge of the risk management practices applied to projects 
  • 3.6 Knowledge of requirements analysis and management practices (e.g., requirements verification, traceability, gap analysis, vulnerability management, security requirements) 
  • 3.7 Knowledge of the enterprise architecture (EA) related to data, applications and technology (e.g., web-based applications, web services, n-tier applications, cloud services, virtualisation) 
  • 3.8 Knowledge of system development methodologies and tools, including their strengths and weaknesses (e.g., agile development practices, prototyping, rapid application development [RAD], object-oriented design techniques, secure coding practices, system version control) 
  • 3.9 Knowledge of the control objectives and techniques that ensure the completeness, accuracy, validity and authorisation of transactions and data 
  • 3.10 Knowledge of the testing methodologies and practices related to the information system development life cycle (SDLC) 
  • 3.11 Knowledge of the configuration and release management relating to the development of information systems 
  • 3.12 Knowledge of system migration and infrastructure deployment practices and data conversion tools, techniques and procedures. 
  • 3.13 Knowledge of project success criteria and project risk 
  • 3.14 Knowledge of post-implementation review objectives and practices (e.g., project closure, control implementation, benefits realisation, performance measurement)

Domain 4 - Information Systems Operations, Maintenance and Service Management (20%)

Provide assurance that the processes for information systems operations, maintenance and service management meet the organisation’s strategies and objectives.

Domain 4 - Task Statements:

  • 4.1 Evaluate the IT service management framework and practices (internal or third party) to determine whether the controls and service levels expected by the organisation are being adhered to and whether strategic objectives are met. 
  • 4.2 Conduct periodic reviews of information systems to determine whether they continue to meet the organisation’s objectives within the enterprise architecture (EA). 
  • 4.3 Evaluate IT operations (e.g., job scheduling, configuration management, capacity and performance management) to determine whether they are controlled effectively and continue to support the organisation’s objectives. 
  • 4.4 Evaluate IT maintenance (patches, upgrades) to determine whether they are controlled effectively and continue to support the organisation’s objectives. 
  • 4.5 Evaluate database management practices to determine the integrity and optimisation of databases. 
  • 4.6 Evaluate data quality and life cycle management to determine whether they continue to meet strategic objectives. 
  • 4.7 Evaluate problem and incident management practices to determine whether problems and incidents are prevented, detected, analysed, reported and resolved in a timely manner to support the organisation's objectives. 
  • 4.8 Evaluate change and release management practices to determine whether changes made to systems and applications are adequately controlled and documented. 
  • 4.9 Evaluate end-user computing to determine whether the processes are effectively controlled and support the organisation’s objectives. 
  • 4.10 Evaluate IT continuity and resilience (backups/restores, disaster recovery plan [DRP]) to determine whether they are controlled effectively and continue to support the organisation’s objectives.

Domain 4 - Knowledge Statements:

  • 4.1 Knowledge of service management frameworks 
  • 4.2 Knowledge of service management practices and service level management 
  • 4.3 Knowledge of the techniques for monitoring third-party performance and compliance with service agreements and regulatory requirements 
  • 4.4 Knowledge of enterprise architecture (EA) 
  • 4.5 Knowledge of the functionality of fundamental technology (e.g., hardware and network components, system software, middleware, database management systems) 
  • 4.6 Knowledge of system resiliency tools and techniques (e.g., fault-tolerant hardware, elimination of single point of failure, clustering) 
  • 4.7 Knowledge of IT asset management, software licensing, source code management and inventory practices  
  • 4.8 Knowledge of job scheduling practices, including exception handling 
  • 4.9 Knowledge of the control techniques that ensure the integrity of system interfaces 
  • 4.10 Knowledge of capacity planning and related monitoring tools and techniques 
  • 4.11 Knowledge of systems performance monitoring processes, tools and techniques (e.g., network analysers, system utilisation reports, load balancing) 
  • 4.12 Knowledge of data backup, storage, maintenance and restoration practices 
  • 4.13 Knowledge of database management and optimisation practices 
  • 4.14 Knowledge of data quality (completeness, accuracy, integrity) and life cycle management (aging, retention) 
  • 4.15 Knowledge of problem and incident management practices 
  • 4.16 Knowledge of change management, configuration management, release management and patch management practices 
  • 4.17 Knowledge of the operational risk and controls related to end-user computing 
  • 4.18 Knowledge of the regulatory, legal, contractual and insurance issues related to disaster recovery 
  • 4.19 Knowledge of business impact analysis (BIA) related to disaster recovery planning 
  • 4.20 Knowledge of the development and maintenance of disaster recovery plans (DRPs) 
  • 4.21 Knowledge of the benefits and drawbacks of alternate processing sites (e.g., hot sites, warm sites, cold sites) 
  • 4.22 Knowledge of disaster recovery testing methods 
  • 4.23 Knowledge of the processes used to invoke the disaster recovery plans (DRPs)

Domain 5—Protection of Information Assets(25%)

Provide assurance that the organisation’s policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets.

Domain 5 - Task Statements:

  • 5.1  Evaluate the information security and privacy policies, standards and procedures for completeness, alignment with generally accepted practices and compliance with applicable external requirements. 
  • 5.2 Evaluate the design, implementation, maintenance, monitoring and reporting of physical and environmental controls to determine whether information assets are adequately safeguarded. 
  • 5.3 Evaluate the design, implementation, maintenance, monitoring and reporting of system and logical security controls to verify the confidentiality, integrity and availability of information. 
  • 5.4 Evaluate the design, implementation and monitoring of the data classification processes and procedures for alignment with the organisation’s policies, standards, procedures and applicable external requirements. 
  • 5.5 Evaluate the processes and procedures used to store, retrieve, transport and dispose of assets to determine whether information assets are adequately safeguarded. 
  • 5.6 Evaluate the information security program to determine its effectiveness and alignment with the organisation’s strategies and objectives.

Domain 5 - Knowledge Statements:

  • 5.1 Knowledge of the generally accepted practices and applicable external requirements (e.g., laws, regulations) related to the protection of information assets 
  • 5.2 Knowledge of privacy principles 
  • 5.3 Knowledge of the techniques for the design, implementation, maintenance, monitoring and reporting of security controls 
  • 5.4 Knowledge of the physical and environmental controls and supporting practices related to the protection of information assets 
  • 5.5 Knowledge of the physical access controls for the identification, authentication and restriction of users to authorised facilities and hardware 
  • 5.6 Knowledge of the logical access controls for the identification, authentication and restriction of users to authorised functions and data 
  • 5.7 Knowledge of the security controls related to hardware, system software (e.g., applications, operating systems) and database management systems. 
  • 5.8 Knowledge of the risk and controls associated with virtualisation of systems 
  • 5.9 Knowledge of the risk and controls associated with the use of mobile and wireless devices, including personally owned devices (bring your own device [BYOD]) 
  • 5.10 Knowledge of voice communications security (e.g., PBX, Voice-over Internet Protocol [VoIP]) 
  • 5.11 Knowledge of network and Internet security devices, protocols and techniques 
  • 5.12 Knowledge of the configuration, implementation, operation and maintenance of network security controls 
  • 5.13 Knowledge of encryption-related techniques and their uses 
  • 5.14 Knowledge of public key infrastructure (PKI) components and digital signature techniques 
  • 5.15 Knowledge of the risk and controls associated with peer-to-peer computing, instant messaging, and web-based technologies (e.g., social networking, message boards, blogs, cloud computing) 
  • 5.16 Knowledge of the data classification standards related to the protection of information assets 
  • 5.17 Knowledge of the processes and procedures used to store, retrieve, transport and dispose of confidential information assets 
  • 5.18 Knowledge of the risk and controls associated with data leakage 
  • 5.19 Knowledge of the security risk and controls related to end-user computing 
  • 5.20 Knowledge of methods for implementing a security awareness program 
  • 5.21 Knowledge of information system attack methods and techniques 
  • 5.22 Knowledge of prevention and detection tools and control techniques 
  • 5.23 Knowledge of security testing techniques (e.g., penetration testing, vulnerability scanning) 
  • 5.24 Knowledge of the processes related to monitoring and responding to security incidents (e.g., escalation procedures, emergency incident response team) 
  • 5.25 Knowledge of the processes followed in forensics investigation and procedures in collection and preservation of the data and evidence (i.e., chain of custody). 
  • 5.26 Knowledge of the fraud risk factors related to the protection of information assets

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Vi forbereder dig til følgende eksamen:

  • CISA Exam
    • Duration: 4 hours
    • Number of questions: 150
    • Languages: English, Chinese Traditional, Chinese Simplified, French, German, Hebrew, Italian, Japanese, Korean, Spanish and Turkish

CISA eksamen tester din viden indenfor følgende CISA domæner:

  • Domain 1 - The Process of Auditing Information Systems (21%)
  • Domain 2 - Governance and Management of IT (16%)
  • Domain 3 - Information Systems Acquisition, Development and Implementation (18%)
  • Domain 4 - Information Systems Operations, Maintenance and Service Management (20%)
  • Domain 5 - Protection of Information Assets (25%)

Firebrand er officiel partner for ISACA eksaminer. Det betyder, at du i løbet af dit kursus både bliver forberedt til eksamen og at du tager din eksamen på stedet som en del af dit Firebrand kursus. Plus, hvis du ikke består din eksamen første gang er du dækket af certificeringsgarantien.

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

On this accelerated CISA course, you'll get official ISACA Student Kits which include:

  • Certification Review Manual
  • 12 month access to official ISACA Resources including ISACA Exam Practice Questions, Answers and Explanations
  • Copy of Course Materials

You'll also access additional, exclusive CISA curriculum built by Firebrand.

Det hele er inkluderet! Du får en alt-inklusiv kursuspakke, som er målrettet til dine behov. Vi tager os af enhver detalje, så det eneste du skal fokusere på er dine lærings- og certificeringsmål.

  • Transport til/fra specifikke afhentningssteder
  • Overnatninger, samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • Intensiv Hands-on uddannelse med vores unikke (Lecture | Lab | Review)TM metode
  • Omfattende kursusmaterialer og labmanualer
  • Et helt igennem instruktørstyret program
  • 24 timers adgang til både undervisningslokale og instruktøren
  • Samtlige måltider samt adgang til forfriskninger, snacks, kaffe og the.
  • On site eksaminering som en del af dit kursus
  • Certificeringsgaranti

Læs mere ...

Interesseret? Se vores priser her eller ring 78 79 16 53

Deltagere som med succes gennemfører vores CISA kursus har følgende forkundskaber:
CISA certificeringen kræver minimum fem års arbejde indenfor revision af informationssystemer på højt niveau, og erfaring indenfor styring eller sikkerhedsbranchen (som beskrevet i områderne med jobindhold). Dispensationer eller erstatninger for sådan erfaring får man som følger:

  • Maksimalt et års erfaring indenfor informationssystemer ELLER et års erfaring indenfor finansiel og operationel revision kan erstatte et års erfaring i revision af informationssystemer, styring og sikkerhedserfaring
  • 60 til 120 afsluttede universitetstimer (hvad der svarer til en bachelorgrad) kan henholdsvis erstatte et eller to års erfaring indenfor revision af informationssystemer, styring eller sikkerhedserfaring
  • To år som universitetsunderviser i et beslægtet felt (f. eks. datalogi, bogholderi eller revision af informationssystemer) kan erstatte et års erfaring med revision af informationssystemer, styring eller sikkerhedserfaring

Man skal have fået sin erfaring indenfor en 10-årig periode op til ansøgningsdatoen for certificeringen eller indenfor fem år fra at man oprindeligt blev eksamineret. Ansøger man ikke om certificering indenfor fem år efter man bestod sin eksamen, er man nødt til at bestå eksamen en gang til. Al erfaring vil blive verificeret hos arbejdsgivere.

Er du klar til dit Firebrand Kursus?

Vi interviewer alle potentielle deltagere angående deres baggrund, uddannelser, certificeringer og personlig indstilling. Hvis du kommer igennem denne screeningsprocedure, betyder det, at du har rigtig gode chancer for at bestå.

Firebrand Training tilbyder et ambitiøst uddannelsesmiljø, som forudsætter at du dedikerer dig til kurset. Ovenstående forkundskaber er vejledende; mange deltagere med mindre erfaring, men med en anden baggrund eller færdigheder, har haft succes med accelereret uddannelse hos Firebrand Training.

Hvis du funderer på hvorvidt du opfylder de anbefalede forkundskaber, er du meget velkommen til at ringe til os på 78 79 16 53 og tale med en af vores uddannelsesrådgivere, som kan hjælpe dig.

Interesseret? Se vores priser her eller ring 78 79 16 53

Hvornår

Hvornår vil du tage dit accelererede kursus?

Starter

Slutter

Tilgængelighed

Tilmelding

Afsluttet

 

Venteliste

 

Venteliste

 

Tilgængelige pladser

Tilmelding

Kundereferencer

Vi har uddannet over 70.652 personer i løbet af 12 år. Vi har bedt dem alle om at bedømme vores accelererede kurser. Aktuelt har 96,75% sagt, at Firebrand oversteg deres forventninger:

"Highly efficient way of Learning. Very skilled instructor"
Soren Andersen, Stralfors. - ISACA CISA Certificering (4 dage) (25/11/2013 til 27/11/2013)

"Great food!"
Johan De Neergaard , Vattenfall. - ISACA CISA Certificering (4 dage) (9/11/2015 til 11/11/2015)

"A high level fast paced learning in a good environment."
Petter Hintze , Ica. - ISACA CISA Certificering (4 dage) (9/11/2015 til 11/11/2015)

"Professional all through. No fancy facilities but as good as it needs to be."
Jakob Lundberg, Coresec. - ISACA CISA Certificering (4 dage) (9/11/2015 til 11/11/2015)

"Professional. Fun and fast paced."
Anonym - ISACA CISA Certificering (4 dage) (24/11/2014 til 26/11/2014)

"Intensive training in a very supportive environment."
Anonym - ISACA CISA Certificering (4 dage) (24/11/2014 til 26/11/2014)

"The Firebrand Training was High pace and a great final preparation for my test"
Anonym - ISACA CISA Certificering (4 dage) (24/11/2014 til 26/11/2014)

"Just as much as humanly possible to absorb."
Peter Strom , SOS Int.. - ISACA CISA Certificering (4 dage) (3/12/2012 til 5/12/2012)

"Very good, teacher very skilled and professional."
Anonym, SDC - ISACA CISA Certificering (4 dage) (29/5/2012 til 31/5/2012)

"This was learning on steroids. :) Good fast and efficient. "
E.M., Stena. - ISACA CISA Certificering (4 dage) (28/11/2011 til 30/11/2011)

"Provided the correct atmosphere for focused learning."
Silvia Bondoc , Ericsson. - ISACA CISA Certificering (4 dage) (28/11/2011 til 30/11/2011)

"Very good teacher, a pleasant site with high class food. Long but very useful training days that works out really well."
Håkan Gunnarsson , Unisys AB. - ISACA CISA Certificering (4 dage) (9/5/2011 til 11/5/2011)

"I''ve gained more knowledge within 4 days than I have in the last 5 years."
Alexandra Kyamanywa, TFL. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"Detailed, fast paced course, not for the feint-hearted, but certainly for those looking for a challenge."
T.R.. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"Great relaxed environment designed to promote learning. Being with a group and learning at the same rate, able to share feelings and thoughts, all packed in a bite-size cram design."
D.C.. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"Excellent customer service. They were always willing to please and very available. Excellent food. Room wasnt that great. No good bedding or lighting to read and it was quite small. Overall a very good experience and would recommend highly."
J.A.. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"My experience at Firebrand had exceeded my expectations. The delivery was fast paced but engaging. The professionalism ensured that all I only had to concentrate on was learning. All other parts just happened."
David Johnson. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"Informed and insightful training, along with a comfortable and well managed environment resulting in a superb training experience. Well done to Firebrand!"
Ian Lockett. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"Great trainer, good energy and sense of humour, kept out attention and conveyed the key facts, and some not-so-key facts, in style. Classroom, materials and facilities, refreshments & accommodation all good, food very good."
Russ James, TFL. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"Great course to attend for all things IS. Trainer made it worth while with communication techniques."
T.J.. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"Had a great experience all round, course was very interesting, lots of support, food, accommodation was great too. Nothing was too much trouble."
Rosemarie Underhill, TFL. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"Firebrand Training for CISA is intense but very well delivered. Training materials are very good and the facilities are also adequate."
O.F.. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"Firebrand training is a fast paced highly engaging and informative training experience. The instructors are knowledgeable, creative and enthusiastic with the ability to transfer their passion and knowledge to the minds and hearts of participants. I highly recommend Firebrand Training to all organisations large, medium and small. All the best, Mike."
Michael Beaupre, Self Funder. - ISACA CISA Certificering (4 dage) (1/10/2018 til 4/10/2018)

"A very strong training, I''ve never seen this before."
A. M.. - ISACA CISA Certificering (4 dage) (20/8/2018 til 23/8/2018)

"Good experience. They look after the students."
S. S.. - ISACA CISA Certificering (4 dage) (20/8/2018 til 23/8/2018)

"Firebrand offer a well managed and delivered course. The CISA course was very good value for money."
O.R. - ISACA CISA Certificering (4 dage) (25/6/2018 til 28/6/2018)

"Excellently delivered course. Great examples and real-life examples used to emphasise to study material."
B.B. - ISACA CISA Certificering (4 dage) (25/6/2018 til 28/6/2018)

"Very condensed training in a small group of people I got along with well. I will choose Firebrand again. "
Martin Jeromin, Autoliv GmbH&Co.KG. - ISACA CISA Certificering (4 dage) (11/6/2018 til 14/6/2018)

"Intensive study, but made me very happy."
S. H.. - ISACA CISA Certificering (4 dage) (5/3/2018 til 8/3/2018)

"Firebrand training is an exceptional resource that I would recommend to anyone who is looking to obtain a professional certification."
J.D.. - ISACA CISA Certificering (4 dage) (30/10/2017 til 2/11/2017)

"If you are committed to learning and developing yourself and your career, Firebrand is your best choice."
Anonym - ISACA CISA Certificering (4 dage) (30/10/2017 til 2/11/2017)

"One of the best trainers I have experienced in 30 years - Top class!"
Mike Fox, FFRC. - ISACA CISA Certificering (4 dage) (29/8/2017 til 1/9/2017)

"I was so happy when I contacted the Firebrand sales rep. He helped me demystify cyber and information assurance courses and was extremely helpful in advising on the booking process, available locations and dates for your course. Thank you"
Jacqui Stevenson, FSO Services. - ISACA CISA Certificering (4 dage) (29/8/2017 til 1/9/2017)

"Great course."
C. W.. - ISACA CISA Certificering (4 dage) (28/8/2017 til 31/8/2017)

"The course is a good preparation and reflects the philosophy of ISACA very well."
Anonym - ISACA CISA Certificering (4 dage) (5/12/2016 til 7/12/2016)

"The course covered everything I need for preparation and motivation for the exam."
Anonym - ISACA CISA Certificering (4 dage) (5/12/2016 til 7/12/2016)

"The teaching received was first class, will recommend and look to Firebrand for further training."
James Clements, N/A. - ISACA CISA Certificering (4 dage) (6/6/2016 til 8/6/2016)

"Loved it!!!"
Fiona Linton, Leicestershire Police. - ISACA CISA Certificering (4 dage) (6/6/2016 til 8/6/2016)

"Professional, thorough, immersive - taught by experts who can bring the content to life!"
Charlie Timblin, IFDS. - ISACA CISA Certificering (4 dage) (6/6/2016 til 8/6/2016)

"Isolated training area is the best approach to keep focus on material and preparing for exam."
Anonym - ISACA CISA Certificering (4 dage) (6/6/2016 til 8/6/2016)

"Take a week, come to the CISA course and no way you won´t pass!"
Anonym - ISACA CISA Certificering (4 dage) (6/6/2016 til 8/6/2016)

"Thanks for the training - it was tough, lot of new topics introduced during just 3 days, a lot of enthusiasm, good jokes and friendly atmosphere created by the trainer. Respect!"
Anonym - ISACA CISA Certificering (4 dage) (6/6/2016 til 8/6/2016)

"I always look forward to the training at Firebrand."
Anonym - ISACA CISA Certificering (4 dage) (6/6/2016 til 8/6/2016)

"If you need to cram a lot of info into your head in a short time ...Firebrand are experts."
Jonathan Newton Griffiths, Mars Information Services. - ISACA CISA Certificering (4 dage) (2/9/2015 til 4/9/2015)

"Very good training with Firebrand."
Olu Akinrolabu, Reed Elsevier PLC. - ISACA CISA Certificering (4 dage) (8/6/2015 til 10/6/2015)

"Enjoyable and hectic course."
Eirik Standal, Nordland Fylkeskommune. - ISACA CISA Certificering (4 dage) (8/6/2015 til 10/6/2015)

"Enjoyed the fast-paced concentrated learning."
Aled Hughes, NMi Metrology & Gaming Ltd. - ISACA CISA Certificering (4 dage) (8/6/2015 til 10/6/2015)

"Thoroughly enjoyed my CISA course and felt it was very well delivered and managed, the location & accommodation were very good! I would use Firebrand again for future training."
S.G. - ISACA CISA Certificering (4 dage) (24/11/2014 til 26/11/2014)

"Course informative Facilities good This will make a difference when i go back to my company."
Barry Burgess, Barclays. - ISACA CISA Certificering (4 dage) (3/6/2013 til 5/6/2013)

"Helps clear your mind and soak up the knowledge"
Mark Allen, Compass Group. - ISACA CISA Certificering (4 dage) (3/6/2013 til 5/6/2013)

Se priser