DoD DCWF - IT Program Auditor

MCSI Certification

MIPA - Certified IT Program Auditor

This comprehensive course is tailored for professionals tasked with evaluating the compliance of IT programs against established standards.

Participants will be introduced to foundational core principles in information security management, auditing, governance, and risk management. The curriculum is designed to familiarize participants with the critical terminology and frameworks used in the industry to assess and ensure IT program integrity effectively.

Upon completing this course, participants will possess a comprehensive mastery of essential information security principles and the hands-on expertise necessary to assess and reinforce security compliance across IT programs.

Intermediate Level MCSI Certification Intermediate
ic-certificate Certification
ic-clock 600+ hours
ic-money $1295
No Expiry, No Renewals

Course Overview

During this training, participants will engage in active security auditing exercises focused on both hardware and software components. They will learn to craft and refine policies that articulate the essential security requirements necessary for organizational compliance, covering elements such as computing devices, security controls, remote working environments, and communication protocols. This practical approach ensures that participants can apply their learning directly to real-world scenarios.

The course will also guide participants in establishing effective communication guidelines for interacting with external stakeholders. They will learn to create effective communication strategies that include the development of comprehensive guides, emergency plans, and templates. This training is crucial for maintaining operational integrity and ensuring that stakeholders are informed and compliant with security protocols.

Throughout the course, participants will not only learn to apply established and widely accepted industry standards but will also develop custom standards tailored to meet specific organizational needs. Additional modules include basic security principles and information security management in cloud environments, supplemented by guided case studies. These case studies provide participants with the opportunity to apply theoretical knowledge in controlled, realistic settings bridging the gap between learning and real-world application.

Upon completing this course, participants will emerge with advanced capabilities in:

  • Developing templates and checklists for various audits, including Audit Charters, Engagement Letters, and System Acquisition Audits.
  • Using CAATs (Computer-Assisted Audit Techniques) to enhance audit efficiency and thoroughness.
  • Techniques for drafting information security policies and breach notification letters.
  • Applying PCI DSS and ISO 27001 requirements within organizational audits.
  • Disaster recovery and business continuity planning best practices.
  • Managing and assessing risks in cloud environments, implementing a compliant System Security Plan (SSP) and continuous monitoring strategies.
  • Conducting detailed information security audits and cyber security maturity assessments.

Knowledge, Skills and Abilities You Will Acquire

MCSI is one of the most respected and trusted names in cyber security education and training. Our certifications teach critical skills, knowledge and abilities needed to advance a career in cyber security. Our courses are comprehensive and up-to-date, and our instructors are experienced professionals who are dedicated to helping students learn. MCSI provides the real-world skills and knowledge you need to protect any organization from cyber threats.

  • Information Security Governance and Concepts

    Information Security Governance and Concepts are crucial for IT program auditors as they provide the foundational framework for establishing, implementing, and maintaining effective security controls within organizations. Understanding governance principles ensures auditors can assess compliance with security policies, standards, and regulations, fostering a secure and resilient IT environment.

    Gap Analysis

    Gap analysis is essential for IT program auditors to identify discrepancies between current and desired security postures, guiding the prioritization of remediation efforts.

    Security Baselines

    Defining security baselines enables auditors to establish minimum standards for security configurations, aiding in consistent security posture assessments.

    Metrics

    Metrics allow auditors to measure and assess the effectiveness of security controls and compliance efforts, providing insights for improvement.

    RACI Charts

    RACI charts clarify roles and responsibilities in security governance, aiding auditors in understanding accountability across security functions.

    Plan Do Check Act (PDCA)

    PDCA cycles help auditors implement continuous improvement in security processes, ensuring systematic review and enhancement of security measures.

    Risk Appetite

    Understanding risk appetite informs auditors about acceptable levels of risk tolerance within an organization, guiding risk management decisions.

    Risk Transfer

    Knowledge of risk transfer mechanisms enables auditors to assess the effectiveness of risk transfer strategies, ensuring appropriate risk mitigation measures.

    Risk Responses

    Learning about risk responses helps auditors develop and evaluate risk response strategies, ensuring alignment with organizational goals and risk appetite.

    Writing Access Control Policies

    Developing access control policies allows auditors to establish guidelines for managing user access to resources, supporting security and compliance objectives.

    Writing Password Policies

    Password policies define rules for secure password practices, aiding auditors in strengthening authentication controls and reducing security risks.

    Writing Work from Home Policies

    Work from home policies provide guidelines for secure remote work practices, ensuring continuity of operations while managing associated risks.

    Writing Incident Response Policies

    Incident response policies outline procedures for handling security incidents, enabling auditors to assess preparedness and response capabilities.

    Writing Disaster Recovery Policies

    Disaster recovery policies establish processes for restoring critical systems and data after disruptions, supporting continuity and resilience objectives.

    Business Impact Analysis

    Conducting business impact analysis helps auditors identify critical business functions and prioritize recovery efforts, supporting continuity planning and risk management.

    Writing Guides on How to Manage Threats

    Guides on threat management provide resources for identifying, assessing, and mitigating threats, enabling auditors to enhance security posture and incident response capabilities.

    Writing Standards (e.g., Network Standard, Cryptography)

    Developing security standards establishes guidelines for implementing secure configurations and practices, facilitating consistent security assessments and compliance evaluations.

  • Auditing and Compliance

    Auditing and compliance are essential for ensuring organizations adhere to regulatory standards and industry best practices, providing assurance to stakeholders about the effectiveness of security controls and risk management strategies. It helps identify gaps, ensure accountability, and maintain continuous improvement in security posture, crucial for mitigating risks and maintaining trust in the digital landscape.

    Developing Audit Checklists

    Developing audit checklists is critical for IT auditors to ensure thorough assessments of IT systems, controls, and processes. Checklists facilitate systematic reviews, helping auditors identify risks, compliance gaps, and necessary corrective actions efficiently.

    Engagement Letters

    Engagement letters are vital documents for IT program auditors as they establish the scope, objectives, and responsibilities of audit engagements. They provide a formal agreement between auditors and stakeholders, ensuring clarity and alignment throughout the audit process.

    Audit Charter

    An audit charter is essential for IT auditors as it defines the authority, objectives, and approach for conducting audits. It serves as a guiding document that aligns audit activities with organizational goals, compliance standards, and best practices.

    Privacy Audit

    Privacy audits are critical for IT auditors to assess and validate data protection measures within IT systems. They ensure compliance with privacy regulations (e.g., GDPR, CCPA) and identify potential privacy risks that require mitigation actions.

    Database Review Checklists

    Database review checklists enable IT auditors to evaluate database configurations, access controls, and data integrity. These checklists ensure the security and reliability of databases, safeguarding sensitive information from unauthorized access or breaches.

    Environmental Control Audit Checklists

    Environmental control audit checklists are important for IT auditors to assess physical security measures within data centers and IT environments. They help identify vulnerabilities related to environmental controls (e.g., HVAC systems, physical access) that could impact IT operations and data security.

    Third Party Services Checklist

    Third party services checklists assist IT auditors in evaluating risks associated with outsourcing IT functions to external vendors. These checklists ensure proper vendor management, contractual compliance, and risk mitigation strategies to safeguard organizational data and operations.

    Request for Information Document

    Request for Information (RFI) documents are valuable for IT auditors to gather essential details about IT systems, processes, and controls from auditees. This information aids in audit planning, risk assessment, and ensures comprehensive audits of IT environments.

    Service Level Agreement Documents

    Service Level Agreement (SLA) documents are important for IT auditors as they define performance standards, availability, and responsibilities for IT services. Auditors use SLAs to assess service delivery, compliance, and evaluate the effectiveness of IT service management.

    Creating Privacy Breach Documents

    Developing privacy breach documents is crucial for IT auditors to establish protocols for incident response, notification procedures, and remediation actions in case of data breaches. These documents ensure compliance with data protection laws and enhance incident management capabilities.

    Creating Website to Report Customer Breach

    Implementing a website to report customer breaches enhances transparency and compliance with data breach notification laws. IT auditors benefit from this by ensuring effective incident reporting, accountability, and maintaining stakeholder trust in data protection practices.

  • Cloud Security and Management

    Cloud security and management are crucial for IT program auditors because they involve ensuring the integrity, confidentiality, and availability of data stored and processed in cloud environments, which is essential for maintaining compliance with regulatory standards and mitigating security risks associated with cloud-based technologies.

    Additionally, effective cloud management allows auditors to monitor and enforce proper governance frameworks, assess controls, and evaluate the implementation of security measures to safeguard organizational assets and data in the cloud.

    Deploying Virtual Machines

    Deploying virtual machines in cloud environments is relevant for IT auditors to assess proper provisioning, configuration, and security controls, ensuring compliance with organizational standards and best practices.

    Cloud-Based Risk Management

    Cloud-based risk management involves evaluating and mitigating security risks specific to cloud services, enabling IT auditors to address vulnerabilities, data breaches, and compliance gaps associated with cloud deployments.

    Compliant System Security Plan (SSP)

    Developing a compliant System Security Plan (SSP) ensures auditors understand security controls and measures in place within cloud systems, aiding in risk assessment and regulatory compliance evaluations.

    Information System Continuous Monitoring (ISCM) Strategy

    Implementing an effective ISCM strategy allows auditors to continuously monitor cloud environments for security incidents, performance issues, and compliance deviations, enhancing overall risk management and governance.

    'Shared Responsibility Model' in the Cloud

    Understanding the shared responsibility model clarifies roles and responsibilities between cloud service providers and users, enabling auditors to assess accountability and ensure proper security measures are implemented by all parties.

    Protect Access to Data in an S3 Bucket Using a Customer Managed Key

    Configuring access controls and encryption using customer-managed keys in S3 buckets is critical for auditors to enforce data protection and privacy requirements, reducing the risk of unauthorized access and data breaches.

    Configuring S3 Buckets

    Properly configuring S3 buckets involves implementing security policies, access controls, and encryption settings, allowing auditors to assess data protection measures and ensure compliance with security standards.

    Compliance Checking AWS Instances

    Conducting compliance checks on AWS instances helps auditors verify adherence to security configurations, patch management, and regulatory requirements, ensuring the integrity and security of cloud-based infrastructures.

DoD Cyber Workforce Framework KSATs

This course teaches the specific Knowledge, Skills, Abilities, and Tasks (KSATs) aligned with the DoD Cyber Workforce Framework (DCWF) as outlined in DoD 8140. By focusing on these critical competencies, the course ensures that you develop the essential capabilities required for various cybersecurity roles within the Department of Defense. This alignment not only guarantees that the training is relevant and comprehensive but also that it prepares you to meet the specific operational needs and standards of the DoD cyber workforce.

  • knowledge
    ID Description
    22 Knowledge of computer networking concepts and protocols, and network security methodologies.
    108 Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
    1158 Knowledge of cybersecurity principles.
    1159 Knowledge of cyber threats and vulnerabilities.
    6900 Knowledge of specific operational impacts of cybersecurity lapses.
    6935 Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).
    6938 Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.
    62 Knowledge of industry-standard and organizationally accepted analysis principles and methods.
    68 Knowledge of information technology (IT) architectural concepts and frameworks.
    69A Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).
    107 Knowledge of resource management principles and techniques.
    129 Knowledge of system life cycle management principles, including software security and usability.
    296 Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.
    954 Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk.
    979 Knowledge of supply chain risk management standards, processes, and practices.
    1004A Knowledge of information technology (IT) acquisition/procurement requirements.
    1021 Knowledge of risk threat assessment.
    1037 Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.
    1061A Knowledge of the acquisition/procurement life cycle process.
    1125 Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
    1130 Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).
    1133 Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
    1136A Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).
    6290 Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.
  • skills
    ID Description
    203 Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.
    1002 Skill in conducting audits or reviews of technical systems.
    6942 Skill in designing or implementing cloud computing deployment models.
    6945 Skill in migrating workloads to, from, and among the different cloud computing service models.
  • abilities
    ID Description
    325A Ability to ensure security practices are followed throughout the acquisition process.
    6918 Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.
    6919 Ability to determine the best cloud deployment model for the appropriate operating environment.
  • tasks
    ID Description
    537 Develop methods to monitor and measure risk, compliance, and assurance efforts.
    1143A Conduct import/export reviews for acquiring systems and software.
    811 Provide ongoing optimization and problem solving support.
    813 Provide recommendations for possible improvements and upgrades.
    840B Review or conduct audits of programs and projects.
    936 Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).
    949 Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.
    1147A Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce.
    1148B Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered.
    5610 Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up.

Career Outcomes

Our IT Program Auditor course equips you with the necessary skills to conduct comprehensive evaluations of IT programs. Through hands-on training, you will learn to perform system audits, manage cybersecurity risks, and ensure compliance with industry standards. Gain expertise in risk management, procurement evaluations, and the integration of security practices throughout the IT lifecycle. By the end of the course, you will be well-prepared to support and enhance the security and performance of IT programs within any organization.

Certification Detail

MCSI certifications are highly respected and sought-after credentials in the industry. Earning an MCSI certification is a testament to your knowledge and skillset, and demonstrates your commitment to excellence. The content is cutting-edge, uniquely-designed, and hands-on. Our exercises teach in-demand skills that are immediately applicable in the field.

The certifications are valid indefinitely and do not require any renewal fees. The training is accessible without any time limits.

Syllabus

Training Modules

This course provides you with multiple training modules, each of which is designed to teach you practical skills that can help you solve important cyber problems. Each module offers exercises that will help you build your skills and capabilities.

  • MIPA-001: Key Information Security Auditing Concepts - 4 exercises
  • MIPA-002: Key Information Security Management Concepts - 3 exercises
  • MIPA-003: Key Structured Ways of Working Concepts - 3 exercises
  • MIPA-004: Information Security Governance Concepts - 10 exercises
  • MIPA-005: Risk Management Concepts - 10 exercises
  • MIPA-101: Information Security Auditing Part 1 - 9 exercises
  • MIPA-102: Information Security Auditing Part 2 - 10 exercises
  • MIPA-103: Risk Management - 11 exercises
  • MIPA-104: Information Security Policies Part 1 - 10 exercises
  • MIPA-105: Information Security Policies Part 2 - 9 exercises
  • MIPA-201: Contracts - 3 exercises
  • MIPA-202: External Communication - 4 exercises
  • MIPA-203: Templates - 11 exercises
  • MIPA-301: Gap Assessment Workbooks - 5 exercises
  • MIPA-302: IT Security Guides and Baselines - 3 exercises
  • MIPA-303: IT Security Standards - 7 exercises
  • MIPA-401: Getting Started with Cloud Infrastructure - 5 exercises
  • MIPA-402: Risk Management in the Cloud - 10 exercises
  • MIPA-403: Data Storage in the Cloud - 11 exercises
  • MIPA-404: Configuration Management in the Cloud - 4 exercises

Scenarios

Cyber professionals must be ready for everything. The typical security training strategy, which focuses on individual skills and tools, is insufficient. You must be able to operate as part of a team, see the big picture, and respond swiftly and effectively to unforeseen circumstances. That's why, as part of our training, we use replays of whole cyber missions. Our scenarios help you prepare for the demands of the job and give you confidence in your ability to work professionally.

  • MIPA-SC-01: Plan the IT audit of payroll processes - 3 exercises
  • MIPA-SC-02: Plan a regulatory readiness audit - 3 exercises
  • MIPA-SC-03: Perform an Information Security Audit - 6 exercises
  • MIPA-SC-04: Reporting major weaknesses - 4 exercises

Enroll now with lifetime access for $1295

Certifications

MCSI Industry Certifications are important for you to earn because they signify that you have the skills required to work in a cybersecurity. Certificates of Completion are also important to earn because they signify that you have completed an exercise. Earning Certificates of Completion and Industry Certifications demonstrates that you are willing to put in the extra work to be successful.

1
ic-step-1

Student

2
ic-step-2

Obtain CPE points by solving exercises

3
ic-step-3

Achieve multiple certifications

4
ic-step-4

Receive help from instructors online

This certification is aligned with the DoD Cyber Workforce Framework (DoD 8140), ensuring you receive training that meets the standards and competencies required for cybersecurity roles within the Department of Defense. This alignment guarantees that you gain relevant, up-to-date skills and knowledge tailored to the specific needs of the DoD cyber workforce, effectively preparing you to support and secure defense operations.

Certificate Level Curriculum Completion Requirement Scenarios Completion Requirement
MCSI IT Program Auditor (Basic) Level 1 50% 0%
MCSI IT Program Auditor (Intermediate) Level 2 75% 50%
MCSI IT Program Auditor (Advanced) Level 3 95% 100%

Sample Exercises

Develop A Template For Audit Charter

exercise

Write A Data Protection Standard

exercise

List Down The Objectives Of Risk Governance

exercise

Help and Support

Unmatched Mentorship: Accelerate Your Growth

At MCSI, mentorship is built to unlock your full potential. Receive personalized insights from multiple experts, tackle real-world challenges, and get the guidance you need to grow rapidly and excel in your cybersecurity career.

  • Personalized feedback with an average instructor response time of 1 business day
  • Direct access to instructors and peers via a 24/7 Discord server
  • Progress tracking and milestone assessments to keep you on course toward success
  • 95% of MCSI graduates land cybersecurity jobs with expert mentoring and feedback

24/7/365 Discord Community:

If you're looking for additional support during your studies, consider joining our Discord server. Our community of fellow students and instructors is always available to provide help and answer any questions you may have.

Personalized Support:

Your submissions will be reviewed by MCSI instructors, who will provide you with personalized feedback. This input is critical since it can assist you in identifying the areas where you need to enhance your skills. The instructor's feedback will also tell you how well you did an exercise and what you can do to improve your performance even further.

Click here to see an example of personalized feedback.

Our personalized support will take your skills to the next level. Read what a student says about it:

Quick Questions:

If you have any questions or need clarification on any of the exercises, MCSI offers a Quick Questions section on each exercise where you can ask for help. This is a great resource to use if you need assistance. This feature is only available for paid courses.

Prerequisites

Training Laptop Requirement

This course can be completed on a standard training laptop. To ensure you have the necessary hardware to complete the course, your machine should meet the following specifications:

  • 64-bit Intel i5/i7 2.0+ GHz processor or equivalent
  • 8GB of RAM
  • Ability to run at least (1) virtual machine using Virtual Box, or an equivalent virtualization software
  • Windows 10 or later, macOS 10 or later, or Linux
  • Local administrator privileges
Do you support older operating systems?

Yes. Many of the exercises can be completed on older OS versions. A few of our students are successfully using older equipment to learn cyber security.

Proficiency in the English language

You must have the ability to comfortably read and understand IT documentation written in English. Ideally, they have an IELTS score of 6.5 with no band less than 6 (or equivalent).

Note: You can register for this course without having undertaken an English test.

Lab Environment

This course teaches you how to setup and configure your own cybersecurity lab.

  • Save thousands by avoiding the costs of pre-built labs
  • Customize your lab with the hardware and software you prefer
  • Gain practical skills in networking, system administration, and technical troubleshooting
  • Build confidence by practicing tasks you'll need to perform in real-world jobs
  • Manage and maintain your own tools—just as employers expect in the workplace

Aptitude Test (Optional)

This is an intermediate course. It includes exercises for novices but assumes that they have competent IT skills and a strong understanding of cybersecurity concepts.

Aptitude Test:

If you're not sure if you'll be able to fully enjoy this course, then contact us via email to organize a free aptitude test. This test will determine whether you meet the course's basic baseline criteria. If you've never studied with us before, it will also introduce you to the MCSI Method™.

Why MCSI's Vulnerability Assessment Analyst Certification is World Class

why MCSI

Comprehensive Vulnerability Assessment Training

The MVAA certification equips participants with rigorous training in vulnerability identification, assessment methodologies, and mitigation strategies, preparing them for real-world cybersecurity challenges.

why MCSI

Specialized Focus on Security Assessments

MVAA-certified analysts gain in-depth knowledge of penetration testing, compliance auditing, and security assessments across web applications, software, hosts, and networks, enabling them to conduct thorough evaluations and vulnerability assessments.

why MCSI

Proficiency in Report Drafting and Communication

The MVAA certification emphasizes the development of industry-standard reports that effectively communicate findings, recommendations, and remediation strategies to stakeholders, ensuring clarity and actionable insights from vulnerability assessments.

Enrollment and Fees

Fees

Your next breakthrough starts with bold action—take it today with MCSI, buy now:

What You Receive

MCSI delivers unmatched benefits, expertly combined to give you a competitive edge:

  • Lifetime access with no renewal fees or hidden costs
  • All updates free, with regularly refreshed content.
  • certifications in one purchase
  • Personalized feedback and direct access to instructors for continuous support
  • Join a community of 35,000+ users to network, collaborate, and grow

Click here to read student testimonials to see firsthand accounts of their experiences with MCSI training.

Time to Value

After just 5 exercises, 66% of users report stronger problem-solving skills as a direct result of their MCSI training.

Put in the effort, and we guarantee you'll see measurable improvements in your skills within weeks. Depending on your starting point, the MCSI Method will help you become a competent professional within the specific cyber domain taught in this course in just a few months.

Actively Maintained Course

This course is actively maintained, regularly tested, and updated with industry support to ensure accuracy, quality, and the most up-to-date skills—setting it apart as one of the best in the market.

Terms and Conditions

Cooling-Off Policy

Received a full refund if you changed your mind about a purchase within 24 hours. No questions asked. Read the full details here.

Don't Buy This Course

Don't buy this course if you believe cybersecurity is simple, can be mastered in hours, or that passive consumption of videos and books is enough.

Our competitors deceive you with promises that video courses and open-book certificates are sufficient. Cybersecurity demands hundreds of hours facing real challenges, with experts guiding you to strengthen your weaknesses. Only when you embrace this will you grasp the value of the MCSI Method™ and the transformation it offers.

By purchasing, you commit to our 100% practical MCSI Method™—no solutions, no walkthroughs, only critical thinking, problem-solving and research like in the real-world. Unsure? Try the free version first.

How does MCSI Compare?

MCSI is 95% more cost-effective with 20x more practical training hours:

Enroll now with lifetime access for $1295

Bloom's Taxonomy

Employers seek problem-solvers who deliver real value. With MCSI, you'll develop practical, in-demand skills applicable across diverse cyber roles.

Frequently Asked Questions

What is the MCSI Method™?

Common Questions

  • What is the MCSI Method™?

    Watch this video:

  • Are solutions disclosed and available?
    • No. Our method of teaching cyber security consists of challenging you with real-world problem statements that you're expected to research and solve by doing your own research. This is how you'll be expected to work in the field. When you fail an exercise, we provide you with constructive feedback to improve and try again.
  • Do exercises, training content, or certificates ever expire? Am I expected to buy again in the future?
    • Upon purchase, all the materials permanently unlocked with no recurring or ongoing fees.
  • Do I need to buy the training and the certification separately?
    • No. The price provided covers both. You only pay once.
  • Do you offer any special offers and discounts?
    • We understand that many of our customers may be looking for discounts, and we would love to be able to offer them. However, we do not provide discounts because we believe that our prices are fair and reasonable. We work hard to keep our prices low, and we feel that discounts would be unfair to our other customers. We hope you understand.
  • If I can't solve the exercise where do I go for help?
  • Who reviews and marks exercises?
    • Trained cyber security instructors that work for Mossé Cyber Security Institute.
    • MCSI instructors are highly qualified and experienced professionals who are able to teach a variety of topics related to information security. They have the ability to tailor their teaching methods to meet the needs of each student, regardless of their experience level. In addition, they are always up-to-date on the latest trends and developments in information security, which enables them to provide students with the most relevant and current information.
  • We can't pay via credit card. Can you raise an invoice for wire payment instead?
    • Yes. Send us the list of bundles and certifications you want to purchase at [email protected]
  • Can I access a trial/demo the certification programmes prior to enrolling?
    • We provide a free curriculum with 100+ hours practical exercises you can try.
    • The Free Curriculum teaches Security Tools, Penetration Testing, Red Teaming, Threat Hunting, Cyber Defence, GRC and Windows Internals.
    • Try the Free Curriculum
  • Do you provide Continuing Professional Education (CPE) credits?
    • Yes. Every single exercise offers CPE credits. The number of credits earned depends on the difficulty of the exercise completed. Below are the CPE Credits achieve for an exercise in each difficulty:
    • Novice exercises = 1 CPE credits
    • Advanced Beginner exercises = 2 CPE credits
    • Competent exercises = 5 CPE credits
  • Do I need to complete an exam to receive MCSI Certification?
    • No. MCSI Certifications are completed by solving practical cybersecurity exercises.
  • Do I need to purchase cybersecurity tools or subscriptions?
    • No. Only free or trial versions are used in our exercises. You do not require making any purchases.

More Kind Words from Students

Enroll now with lifetime access for $1295

DO YOU HAVE A QUESTION?

We'll respond within 24 hours

Visit our Frequently Asked Questions (FAQ) page for answers to the most common questions we receive.

Ready to learn hands-on cyber security skills online?

Try 100 hours for free