Who Should Attend?
IS Security Officers
Information Systems Owners
IS Control Assessors
I. The Process of Auditing Information Systems
II. Risk-Based Auditing
III. Audit Planning and Performance
IV. Reporting on Audit
V. IT Governance and Management
VI. Strategic Planning and Models
VII. Resource Management
IX. Systems Acquisition, Development and Implementation
X. Systems Development Models
XI.Types of Specialized Business Applications
XII. Application Controls
XIII. Information Systems Operations, Maintenance, and Support
XIV. System and Communications
Upon completion, Certified Information Systems Security Auditor students will be able to establish
industry acceptable auditing standards with current best practices and policies.
Students will also be prepared to competently take the CISSA exam.