Certified Information Systems Security Auditor
Many organizations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. The knowledge and course content provided in the vendor neutral Certified Information Systems Security Auditor – C)ISSA will not only cover ISACA’s exam but will provide a measurable certification that demonstrates proficiency in the IS Auditing Field.
The Certified Information Systems Security Auditor covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises.
The Certified Information Systems Security Auditors will receive in-depth knowledge in topics that pertain to the following: IS audit, control, assurance, and security professionals, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.
- IS Security Officers
- IS Managers
- Risk Managers
- Information Systems Owners
- IS Control Assessors
- System Managers
A minimum of 1 year of Information Systems
Learning Outcomes / Objectives
Upon completion, Certified Information Systems Security Auditor students will be able to establish industry acceptable auditing standards with current best practices and policies. Students will also be prepared to competently take the CISSA exam.
Continuing education: 32 CPE Credits
The Certified Information Systems Security Auditor exam is taken online through Mile2’s Assessment and Certification System (“MACS”), which is accessible on your mile2.com account. The exam will take 2 hours and consist of 100 multiple choice questions. The cost is $400 USD and must be purchased from Mile2.com.
- The Process of Auditing Information Systems
- Risk Based Auditing
- Audit Planning and Performance
- Reporting on Audit
- IT Governance and Management
- Strategic Planning and Models
- Resource Management
- Business Continuity Planning
- Systems Acquisition, Development and Implementation
- Systems Development Models
- Types of Specialized Business Applications
- Application Controls
- Information Systems Operations, Maintenance and Support
- System and Communications