{"id":3292,"date":"2024-07-08T11:20:32","date_gmt":"2024-07-08T11:20:32","guid":{"rendered":"https:\/\/pbi.ps\/?post_type=lp_course&#038;p=3292"},"modified":"2024-08-14T10:06:23","modified_gmt":"2024-08-14T10:06:23","slug":"%d8%a7%d9%84%d8%a8%d8%b1%d9%86%d8%a7%d9%85%d8%ac-%d8%a7%d9%84%d8%aa%d8%af%d8%b1%d9%8a%d8%a8%d9%8a-%d9%84%d8%b4%d9%87%d8%a7%d8%af%d8%a9-%d9%85%d8%af%d9%82%d9%82-%d8%a7%d9%86%d8%b8%d9%85%d8%a9-%d8%a7","status":"publish","type":"lp_course","link":"https:\/\/pbi.ps\/?lp_course=%D8%A7%D9%84%D8%A8%D8%B1%D9%86%D8%A7%D9%85%D8%AC-%D8%A7%D9%84%D8%AA%D8%AF%D8%B1%D9%8A%D8%A8%D9%8A-%D9%84%D8%B4%D9%87%D8%A7%D8%AF%D8%A9-%D9%85%D8%AF%D9%82%D9%82-%D8%A7%D9%86%D8%B8%D9%85%D8%A9-%D8%A7","title":{"rendered":"\u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062c \u0627\u0644\u062a\u062f\u0631\u064a\u0628\u064a \u0644\u0634\u0647\u0627\u062f\u0629 \u0645\u062f\u0642\u0642 \u0627\u0646\u0638\u0645\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0645\u0639\u062a\u0645\u062f (CISA)"},"content":{"rendered":"<p style=\"text-align: right;\"><strong>\u0627\u0644\u0645\u062f\u0631\u0628: \u0623.\u0623\u062d\u0645\u062f \u0623\u0628\u0648 \u0639\u064a\u0634\u0629<\/strong><\/p>\n<p style=\"text-align: left;\"><strong><u>Program Introduction<\/u><\/strong><\/p>\n<p style=\"text-align: left;\">Audits are conducted for a variety of reasons. An audit can help an organization ensure effective operations, affirm its compliance with various regulations and confirm that the business is functioning well and is prepared to meet potential challenges<\/p>\n<p style=\"text-align: left;\">An audit can also help to gain assurance on the level of protection available for information assets. Most significantly, an audit can assure stakeholders of the financial, operational and ethical wellbeing of the organization. IS audits support all those outcomes, with a special focus on the information and related systems upon which most businesses and public institutions depend for competitive advantage<\/p>\n<p style=\"text-align: left;\">IS audit being the formal examination and\/or testing of information systems to determine whether<\/p>\n<p style=\"text-align: left;\">Information systems are following applicable laws, regulations, contracts and\/or industry guidelines<\/p>\n<p style=\"text-align: left;\">Information systems and related processes comply with governance criteria and related and relevant policies and procedures<\/p>\n<p style=\"text-align: left;\">IS data and information have appropriate levels of confidentiality, integrity and availability<\/p>\n<p style=\"text-align: left;\">IS operations are being accomplished efficiently and effectiveness targets are being met<\/p>\n<p style=\"text-align: left;\">&nbsp;<\/p>\n<p style=\"text-align: left;\"><strong><u>Training Program Objectives &amp; Outcomes<\/u><\/strong><\/p>\n<p style=\"text-align: left;\">This official CISA training course provides in-depth coverage of the five CISA domains covered on the CISA certification exam. These domains include Information System Auditing, governance and management of IT; information systems acquisition, development, and implementation; information systems operations and business resilience; and protection of information assets<\/p>\n<p style=\"text-align: left;\"><strong>:Upon successful completion of CISA training, the trainees will know how to<\/strong><\/p>\n<p style=\"text-align: left;\">Prepare for the Certified Information Systems Auditor (CISA) Exam<\/p>\n<p style=\"text-align: left;\">Develop and implement a risk-based IT audit strategy in compliance with IT audit standard<\/p>\n<p style=\"text-align: left;\">Evaluate the effectiveness of an IT governance structure<\/p>\n<p style=\"text-align: left;\">Ensure that the IT organizational structure and human resources (personnel) management support the organization\u2019s strategies and objectives<\/p>\n<p style=\"text-align: left;\">Review the information security policies, standards, and procedures for completeness and alignment with generally accepted practices<\/p>\n<p style=\"text-align: left;\">&nbsp;<\/p>\n<p style=\"text-align: left;\"><strong><u>Program Contents &amp; Detailed Training Syllabus<\/u><\/strong><\/p>\n<p style=\"text-align: left;\"><strong><u>DOMAIN 1&nbsp;\u2013 INFORMATION SYSTEMS AUDITING PROCESS<\/u><\/strong><\/p>\n<p>Providing industry-standard audit services to assist organizations in protecting and controlling information systems, Domain-1 affirms your credibility to offer conclusions on the state of an organization\u2019s IS\/IT security, risk and control solutions<\/p>\n<table style=\"height: 378px;\" width=\"954\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"288\"><strong>Section<\/strong><strong> B \u2013 Audit Execution<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"348\"><strong>Section <\/strong><strong>A \u2013 Audit Planning<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"288\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Audit Project Management<\/td>\n<td style=\"text-align: left;\" width=\"348\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IS Audit Standards, Guidelines, and Codes of Ethics<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"288\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sampling Methodology<\/td>\n<td style=\"text-align: left;\" width=\"348\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Business Processes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"288\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Audit Evidence Collection Techniques<\/td>\n<td style=\"text-align: left;\" width=\"348\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Types of Controls<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"288\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Data Analytics<\/td>\n<td style=\"text-align: left;\" width=\"348\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Risk-Based Audit Planning<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"288\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Reporting and Communication Techniques<\/td>\n<td style=\"text-align: left;\" width=\"348\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Types of Audits and Assessments<\/td>\n<\/tr>\n<tr>\n<td width=\"288\">\n<p style=\"text-align: left;\">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Quality Assurance and Improvement of the Audit Process<\/p>\n<\/td>\n<td width=\"348\">&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: left;\"><strong><u>DOMAIN 2&nbsp;\u2013 GOVERNANCE &amp; MANAGEMENT OF IT<\/u><\/strong><\/p>\n<p style=\"text-align: left;\">This domain confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies<\/p>\n<table style=\"height: 371px;\" width=\"952\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><strong>Section<\/strong><strong> B \u2013 IT Management<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"312\"><strong>Section<\/strong><strong> A \u2013 IT Governance<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; IT Resource Management<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;IT Governance and IT Strategy<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; IT Service Provider Acquisition and Management<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; IT-Related Frameworks<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; IT Performance Monitoring and Reporting<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;IT Standards, Policies, and Procedures<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Quality Assurance and Quality Management of IT<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Organizational Structure<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Enterprise Architecture<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Enterprise Risk Management<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Maturity Models<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Laws, Regulations, and Industry Standards affecting the Organization<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><strong><u>DOMAIN 3&nbsp;\u2013 INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT &amp; IMPLEMENTATION<\/u><\/strong><\/p>\n<p style=\"text-align: left;\">Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business<\/p>\n<p>&nbsp;<\/p>\n<table style=\"height: 268px;\" width=\"992\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"348\"><strong>Section<\/strong><strong> B \u2013 Information Systems Implementation<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"300\"><strong>Section<\/strong><strong> A \u2013 Information Systems Acquisition and Development<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"348\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Testing Methodologies<\/td>\n<td style=\"text-align: left;\" width=\"300\">&nbsp; &nbsp; &nbsp; &nbsp;Project Governance and Management<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"348\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Configuration and Release Management<\/td>\n<td style=\"text-align: left;\" width=\"300\">&nbsp; &nbsp; &nbsp; &nbsp; Business Case and Feasibility Analysis<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"348\">&nbsp; &nbsp; &nbsp; &nbsp; System Migration, Infrastructure Deployment and Data Conversion<\/td>\n<td style=\"text-align: left;\" width=\"300\">&nbsp; &nbsp; &nbsp; &nbsp; System Development Methodologies<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"348\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Post-implementation Review<\/td>\n<td style=\"text-align: left;\" width=\"300\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Control Identification and Design<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><strong><u>DOMAIN 4&nbsp;\u2013 INFORMATION SYSTEMS OPERATIONS &amp; BUSINESS RESILIENCE<\/u><\/strong><\/p>\n<p style=\"text-align: left;\">Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business<\/p>\n<table style=\"height: 462px;\" width=\"974\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"312\"><strong>Section<\/strong><strong> B \u2013 Business Resilience<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"312\"><strong>Section<\/strong><strong> A \u2013 Information Systems Operations<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"312\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; Business Impact Analysis (BIA)<\/p>\n<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; Common Technology Components<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;System Resiliency<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;IT Asset Management<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; Data Backup, Storage, and Restoration<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Job Scheduling and Production Process Automation<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; Business Continuity Plan (BCP)<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; System Interfaces<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; Disaster Recovery Plans (DRP)<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;End-User Computing<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp;Data Governance<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; Systems Performance Management<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; Problem and Incident Management<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Change, Configuration, Release, and Patch Management<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; IT Service Level Management<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">&nbsp;<\/td>\n<td style=\"text-align: left;\" width=\"312\">&nbsp; &nbsp; Database Management<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: left;\">&nbsp;<\/p>\n<p style=\"text-align: left;\"><strong><u>DOMAIN 5&nbsp;\u2013 PROTECTION OF INFORMATION ASSETS<\/u><\/strong><\/p>\n<p style=\"text-align: left;\">Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5<\/p>\n<table style=\"height: 972px;\" width=\"982\">\n<tbody>\n<tr>\n<td width=\"324\">\n<p style=\"text-align: center;\"><strong>Section<\/strong><strong> B \u2013 Security Event Management<\/strong><\/p>\n<\/td>\n<td width=\"330\">\n<p style=\"text-align: center;\"><strong>Section<\/strong><strong> A \u2013 Information Asset Security and Control<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Security Awareness Training and Programs<\/p>\n<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; Information Asset Security Frameworks, Standards, and Guidelines<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; Information System Attack Methods and Techniques<\/p>\n<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; Privacy Principles<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Security Testing Tools and Techniques<\/p>\n<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp;Physical Access and Environmental Controls<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Security Monitoring Tools and Techniques<\/p>\n<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Identity and Access Management<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Incident Response Management<\/p>\n<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp;Network and End-Point Security<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Evidence Collection and Forensics<\/p>\n<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Data Classification<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">&nbsp;<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; Data Encryption and Encryption-Related Techniques<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">&nbsp;<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">Public Key Infrastructure (PKI)<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">&nbsp;<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;Web-Based Communication Techniques<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">&nbsp;<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; Virtualized Environments<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"324\">&nbsp;<\/td>\n<td width=\"330\">\n<p style=\"text-align: left;\">&nbsp; &nbsp; Mobile, Wireless, and Internet-of-Things (IoT) Devices<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: left;\"><strong><u>Target Group of Audience<\/u><\/strong><\/p>\n<p style=\"text-align: left;\">Executives and professionals in IT, experts in information and operational risk management, specialists in IT infrastructure security, this might include the following groups<\/p>\n<p style=\"text-align: left;\">IS\/IT Auditors<\/p>\n<p style=\"text-align: left;\">Information Security Professionals<\/p>\n<p style=\"text-align: left;\">IT Security Professionals<\/p>\n<p style=\"text-align: left;\">Security Officers<\/p>\n<p style=\"text-align: left;\">Internal Audit Professionals<\/p>\n<p style=\"text-align: left;\">Risk Management Professionals<\/p>\n<p style=\"text-align: left;\">Compliance Management Professionals<\/p>\n<p style=\"text-align: left;\">IT Governance Professionals<\/p>\n<p style=\"text-align: left;\">IT Infrastructure Administrators<\/p>\n<p style=\"text-align: left;\">&nbsp;<\/p>\n<p style=\"text-align: left;\"><strong><u>Training Methodology<\/u><\/strong><\/p>\n<p style=\"text-align: left;\">Tuition by CISA professionals using industry-specific examples.<\/p>\n<p style=\"text-align: left;\">The training comprises case studies.<\/p>\n<p style=\"text-align: left;\">Test CISA exam will be run upon training completion.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u0639\u062f\u062f \u0627\u0644\u0633\u0627\u0639\u0627\u062a : 45<\/strong> \u0633\u0627\u0639\u0629 \u062a\u062f\u0631\u064a\u0628\u064a\u0629 .<\/p>\n<p><strong>\u062a\u0627\u0631\u064a\u062e \u0627\u0644\u0627\u0646\u0639\u0642\u0627\u062f :<\/strong> \u0623\u064a\u0627\u0645 \u0627\u0644\u0633\u0628\u062a 3\/08 -07\/09\/2024<\/p>\n<p><strong>\u0648\u0642\u062a \u0627\u0644\u0627\u0646\u0639\u0642\u0627\u062f :<\/strong> 09:00 \u2013 16:30<\/p>\n<p><strong>\u0645\u0643\u0627\u0646 \u0627\u0644\u0627\u0646\u0639\u0642\u0627\u062f : <\/strong>\u0645\u0642\u0631 \u0627\u0644\u0645\u0639\u0647\u062f \u0627\u0644\u0645\u0635\u0631\u0641\u064a \u0627\u0644\u0641\u0644\u0633\u0637\u064a\u0646\u064a \u2013 \u0631\u0627\u0645 \u0627\u0644\u0644\u0647.<\/p>\n<p><strong>\u0627\u0644\u0631\u0633\u0648\u0645:&nbsp; ( 750$) \u0644\u0644\u0645\u0634\u0627\u0631\u0643 \u0627\u0644\u0648\u0627\u062d\u062f \u0645\u0646 \u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0623\u0639\u0636\u0627\u0621\u060c \u0648 ( 850$) \u0644\u0644\u0645\u0634\u0627\u0631\u0643 \u0627\u0644\u0648\u0627\u062d\u062f \u0645\u0646 \u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u063a\u064a\u0631 \u0627\u0644\u0623\u0639\u0636\u0627\u0621.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong><u>\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0639\u0646 \u0627\u0644\u0645\u062f\u0631\u0628:<\/u><\/strong><\/p>\n<p style=\"text-align: left;\">Ahmad Nizar Abu Eisha M.Sc. IS, CISM, CISA<\/p>\n<p style=\"text-align: left;\">Sc. of Information Security: Cybercrimes &amp; Digital Evidence Analysis<\/p>\n<p style=\"text-align: left;\">Bachelor of Technology: Computer Science<\/p>\n<p style=\"text-align: left;\">Certified Information Security Manager\u00ae (CISM)<\/p>\n<p style=\"text-align: left;\">Certified Information Systems Auditor\u00ae (CISA)<\/p>\n<p style=\"text-align: left;\">+16 years in Information Security, Technology Risk Management &amp; Information Systems Audit fields.<\/p>\n<p style=\"text-align: left;\">Head of Information Security and Business Continuity<\/p>\n<p style=\"text-align: left;\">President of ISACA Ra<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u0627\u0644\u0645\u062f\u0631\u0628: \u0623.\u0623\u062d\u0645\u062f \u0623\u0628\u0648 \u0639\u064a\u0634\u0629 Program Introduction Audits are conducted for a variety of reasons. An audit can help an organization [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3293,"comment_status":"open","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"footnotes":""},"course_category":[93,231,140],"course_tag":[205],"class_list":["post-3292","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category---ar","course_category-231","course_category-all-courses-porgrams-ar","course_tag-205","course"],"_links":{"self":[{"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/lp_course\/3292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3292"}],"version-history":[{"count":2,"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/lp_course\/3292\/revisions"}],"predecessor-version":[{"id":3295,"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/lp_course\/3292\/revisions\/3295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=\/wp\/v2\/media\/3293"}],"wp:attachment":[{"href":"https:\/\/pbi.ps\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3292"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=%2Fwp%2Fv2%2Fcourse_category&post=3292"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/pbi.ps\/index.php?rest_route=%2Fwp%2Fv2%2Fcourse_tag&post=3292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}