Description
Who Should Attend?
IS Security Officers
IS Managers
Risk Managers
Auditors
Information Systems Owners
IS Control Assessors
System Managers
Government
Course Outline
I. The Process of Auditing Information Systems
II. Risk-Based Auditing
III. Audit Planning and Performance
IV. Reporting on Audit
V. IT Governance and Management
VI. Strategic Planning and Models
VII. Resource Management
IX. Systems Acquisition, Development and Implementation
X. Systems Development Models
XI.Types of Specialized Business Applications
XII. Application Controls
XIII. Information Systems Operations, Maintenance, and Support
XIV. System and Communications
XV. Hardware
Upon Completion
Upon completion, Certified Information Systems Security Auditor students will be able to establish
industry acceptable auditing standards with current best practices and policies.
Students will also be prepared to competently take the CISSA exam.