Cissa Certified Information Systems Security Auditor

Prepare for the Mile2® Certified Information Systems Secuirty Auditor (CISSA) with this course.

Last updated 2022-01-10 | 4.6

- Performing an Audit
- Protection of Information Assets
- Risk Analysis and Risk Management

What you'll learn

Performing an Audit
Protection of Information Assets
Risk Analysis and Risk Management

* Requirements

* A minimum of 1 year of Information Systems

Description

This course is provided directly by Mile2®. This official Mile2® video includes an authorized exam prep and exam simulator, available upon request.

Many organizations require an Information System Auditor’s expert knowledge when it comes to identifying critical issues and providing effective auditing solutions. The knowledge and course content provided in the vendor-neutral Certified Information Systems Security Auditor - C)ISSA will not only cover ISACA®’s exam but will provide a measurable certification that demonstrates proficiency in the IS Auditing Field.

The Certified Information Systems Security Auditor covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises.

Who this course is for:

  • All

Course content

6 sections • 22 lectures

part a - The Process of Auditing Information Systems Preview 08:55

part b - Risk-Based Auditing Preview 44:59

part c - Audit Planning and Performance Preview 23:33

part d - Reporting on Audit Preview 13:02

part e - Continuos Self Assessment and Ethics Preview 16:06

part a - IT Governance and Management of IT Preview 16:57

part b - Strategic Planning and Models Preview 25:52

part c - Resource Management Preview 33:32

part d - Business Continuity Planning Preview 31:57

part a - Information Systems Acquisition, Development and Implementation Preview 39:12

part b - Systems Development Models (SDLC) Preview 23:58

part c - Types of specialized Business Applications Preview 34:23

part d - Application Controls Preview 23:49

Information Systems Operations, Maintenance and Support Preview 25:20

System and Communication Hardware Preview 47:36

Auditing Networks Preview 01:03:21

Business Continuity and Disaster Recovery Audits Preview 23:31

Protection of Information Assets Preview 15:27

Access controls Preview 40:56

Equipment and Network Security Preview 52:48

Encryption Preview 36:19