Many organizations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. The knowledge and course content provided in the vendor neutral Certified Information Systems Security Auditor certification - C)ISSA will not only cover ISACA®’s exam but will provide a measurable certification that demonstrates proficiency in the IS Auditing Field.
The Certified Information Systems Security Auditor
covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises.
The Certified Information Systems Security Auditors will receive in-depth knowledge in topics that pertain to the following:
IS audit, control, assurance, and security professionals, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
Duration: 4 days
Class Format Options:
Live Online Training
• A minimum of 1 year of Information Systems
• Student Workbook
• Mile2 C)ISSA – Certified Information Systems Security Auditor
• Covers ISACA® CISA exam objectives
CPEs: 32 Hours
WHO SHOULD ATTEND?
• IS Security Officers
• IS Managers
• Risk Managers
• Information Systems Owners
• IS Control Assessors
• System Managers
Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently attempt the CISSA exam.
The Certified Information Systems Security Auditor exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The exam must be purchased separately.
I. The Process of Auditing Information Systems
II. Risk Based Auditing
III. Audit Planning and Performance
IV. Reporting on Audit
V. IT Governance and Management
VI. Strategic Planning and Models
VII. Resource Management
VIII. Business Continuity Planning
IX. Systems Acquisition, Development and Implementation
X. Systems Development Models
XI. Types of Specialized Business Applications
XII. Application Controls
XIII. Information Systems Operations, Maintenance and Support
XIV. System and Communications