CISSA - Certified Information Systems Security Auditor

Prepare for the Mile2® Certified Information Systems Secuirty Auditor (CISSA) with this course.

Instructed by Mile2 Instructor

Want to learn more?
Go for Premium Subscription

Choose your plan:

  • Monthly
  • Annually
$ 29
Monthly Subscription
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
$ 299
Annual Subscription
  • One year Unlimited Access
  • Access to all courses
    You will be able to access all the courses from any category on the platform.
  • Learning paths access
  • Access Assignments & Projects
  • Access on Mobile, PC and Tablet
  • Pause & Resume Courses Anytime
  • Offline viewing
  • Instructor Support
  • Course Completion Certificates
  • Cancel Anytime
Subscribe Now
Need Help?

Call +1 855 999 1795

( Toll Free )
  • Performing an Audit
  • Protection of Information Assets
  • Management

This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.

Many organizations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. The knowledge and course content provided in the vendor-neutral Certified Information Systems Security Auditor - C)ISSA will not only cover ISACA®’s exam but will provide a measurable certification that demonstrates proficiency in the IS Auditing Field.

The Certified Information Systems Security Auditor covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises.

  • A minimum of 1 year of Information Systems
  • All
View More...

Section 1 : Introduction

  • Lecture 1 :

Section 2 : Module 1

  • Lecture 1 :
  • Part A - The Process of Auditing Information
  • Lecture 2 :
  • Part B - Risk-Based Auditing
  • Lecture 3 :
  • Part C - Audit Planning and Performance
  • Lecture 4 :
  • Part D - Reporting on Audit
  • Lecture 5 :
  • Part E - Continuous Self Assessment and Ethics

Section 3 : Module 2

  • Lecture 1 :
  • Part A - IT Governance and Management of IT
  • Lecture 2 :
  • Part B - Strategic Planning and Models
  • Lecture 3 :
  • Part C - Resource Management
  • Lecture 4 :
  • Part D - Business Continuity Planning

Section 4 : Module 3

  • Lecture 1 :
  • part a - Information Systems Acquisition, Development and Implementation
  • Lecture 2 :
  • part b - Systems Development Models (SDLC)
  • Lecture 3 :
  • part c - Types of specialized Business Applications
  • Lecture 4 :
  • part d - Application Controls

Section 5 : Module 4

  • Lecture 1 :
  • Information Systems Operations, Maintenance and Support
  • Lecture 2 :
  • System and Communication Hardware
  • Lecture 3 :
  • Auditing Networks
  • Lecture 4 :
  • Business Continuity and Disaster Recovery Audits

Section 6 : Module 5

  • Lecture 1 :
  • Protection of Information Assets
  • Lecture 2 :
  • Access controls
  • Lecture 3 :
  • Equipment and Network Security
  • Lecture 4 :
  • Encryption

Mile2 Instructor,

We develop and deliver proprietary vendor neutral professional certifications for the cyber security industry. Mile2® administers its certification exams through the MACS (Mile2 Assessment and Certification System) system via Mile2.com. Mile2 certification courses teach the fundamental and advanced principles of cyber security and follows a course/certification track that leads to advanced hands-on skills training for penetration testing, disaster recovery, incident handling and network forensics. Mile2 also provides Information Assurance services that meet military, government, private sector and institutional specifications. Mile2 is known for their robust list of cyber security certifications as: C)ISSO (Certified Information Systems Security Officer C)PTE (Certified Penetration Testing Engineer) C)NFE (Certified Network Forensics Examiner) C)SWAE (Certified Secure Web Application Engineer) Mile2 course ware has been approved by the Committee on National Security Systems (CNSS) National Training Standards. The Information Assurance Course ware Evaluation (IACE) Program provides consistency in technology training and education for the information assurance industry. The NSA/CSS is home to America’s code makers and code breakers.
View More...
ethical-hacking-and-penetration-testing

Ethical Hacking and Penetration Tes...

By : Darshil Modi

Lecture 21

implementing-configuring-cisco-routers-part-1

Implementing & Configuring Cisco Ro...

By : Dariusz Lipski

Lecture 10

learn-nxtgen-hacking-with-technology

Learn NxtGen Hacking with Technolog...

By : Gopikrishna C

Lecture 80

tcp-ip-the-complete-course

TCP/IP: The Complete Course

By : Lazaro (Laz) Diaz

Lecture 17

the-complete-ethical-hacking-certification-course

The Complete Ethical Hacking Certif...

By : Mohamed Atef

Lecture 151

voip-configuration-and-attacking-hacking

VoIP Configuration and Attacking (H...

By : Arpit Mittal

Lecture 6

Buy

$15

Enjoy Limitless Learning. Get Access to Unlimited Courses with Premium Subscrption Subscribe Now