Ask us about our Best Price Guarantee. We’ll beat any competitor’s price!

ICLIn-Classroom Learning VLTVirtual Live Training GTRGuaranteed to Run (*Discounted Registrations may not be eligible/are subject to change)
Location Start date End Date Class Times Class Details Action
No class dates currently scheduled. Click here to request a date


Course Includes:

  • Individual Course Access
  • Course Video
  • E-Workbook
  • E-Prep & Lab Guide
  • Exam
  • 2 Week Cyber Range
  • 1 Year Exam Voucher


• A minimum of 1 year of Information Systems

Student Materials:

  • Student Workbook

Certification Exams:

  • Covers ISACA® CISA exam objectives
  • Mile2 C)ISSA – Certified Information Systems Security Auditor

CPEs: 32Hours

Many organizations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. The knowledge and course content provided in the vendor-neutral Certified Information Systems Security Auditor – C)ISSA will not only cover ISACA®’s exam but will provide a measurable certification that demonstrates proficiency in the IS Auditing Field. The Certified Information Systems Security Auditor covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. The Certified Information Systems Security Auditor students will receive in-depth knowledge in topics that pertain to the following: IS audit, control, and assurance. This course is designed for those IT professionals in the following job roles:  IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.


Course Outline

I. The Process of Auditing Information Systems

II. Risk-Based Auditing

III. Audit Planning and Performance

IV. Reporting on Audit

V. IT Governance and Management

VI. Strategic Planning and Models

VII. Resource Management

IX. Systems Acquisition, Development and Implementation

X. Systems Development Models

XI.Types of Specialized Business Applications

XII. Application Controls

XIII. Information Systems Operations, Maintenance, and Support

XIV. System and Communications

XV. Hardware

Who Should Attend?

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government