C)ISSA – Certified Information Systems Security Auditor

C)ISSA - Certified Information Systems Security Auditor


Many organisations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. The knowledge and course content provided in the vendor-neutral Certified Information Systems Security Auditor - C)ISSA will not only cover ISACA®’s exam but will provide a measurable certification that demonstrates proficiency in the IS Auditing Field. The Certified Information Systems Security Auditor covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. The Certified Information Systems Security Auditors will receive in-depth knowledge in topics that pertain to the following: IS audit, control, assurance, and security professionals, including IT consultants, auditors, managers, security policy writers, privacy officers, information security officers, network administrators, security device administrators, and security engineers.

Accreditations & Acknowledgements

Accreditation And Certifications

Mile2 is:

  • ACCREDITED by the NSA CNSS 4011-4016
  • MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
  • APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Upon Completion

Upon completion, Certified Information Systems Security Auditor students will be able to establish
industry acceptable auditing standards with current best practices and policies.
Students will also be prepared to competently take the CISSA exam.

Key Data

Course Title: Certified Information Systems Security Auditor

Duration: 4 Days

Language: English

Class Format Options:

  • Instructor-led classroom
  • Instructor-led Online Training


• A minimum of 1 year of Information Systems

Student Materials:

  • Student Workbook
  • Certification Exams:
  • Covers ISACA® CISA exam objectives
  • Mile2 C)ISSA – Certified Information Systems Security AuditorCPEs: 32Hours

Course Outline

  • I. The Process of Auditing Information Systems
  • II. Risk-Based Auditing
  • III. Audit Planning and Performance
  • IV. Reporting on Audit
  • V. IT Governance and Management
  • VI. Strategic Planning and Models
  • VII. Resource Management
  • IX. Systems Acquisition, Development and Implementation
  • X. Systems Development Models
  • XI.Types of Specialized Business Applications
  • XII. Application Controls
  • XIII. Information Systems Operations, Maintenance, and Support
  • XIV. System and Communications
  • XV. Hardware

Who Should Attend?

  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government