The CISA certification prep path will provide you with a comprehensive overview of the cybersecurity principles and security best practices needed to pass the CISA certification exam.
Learners at 96% of Fortune 1000 companies trust Cybrary
ISACA’s Certified Information Systems Auditor (CISA) certification is for mid-career professionals who want to understand the process of planning, executing, and reporting on risk-based auditing practices. Earning this certification demonstrates your ability to assess vulnerabilities, implement controls, and ensure compliance with industry standards.
The CISA exam will test your knowledge of key cybersecurity domains and assess your ability to apply risk-based auditing practices to real-world scenarios in IT governance, risk management, and information security.
The Leadership and Management Career Path is expected to release in Q2 of 2025. Sign up now to explore our other leadership courses and content.
Start Learning for FreeLearn core concepts and get hands-on with key skills.
In this CISA: Information Systems Auditing Process course, you will get an introduction to IS audit, learn about types of controls and sampling.
In this CISA: Governance and Management of IT course, you will learn about enterprise risk management, IT frameworks, evaluation criteria, and information security strategy.
In this CISA: Information Systems Acquisition, Development and Implementation course, you will learn about project management, control identification and design, and testing.
In this CISA: Information Systems Operations and Business Resilience course, you will learn about cloud deployment, redundancy, and business continuity.
In this CISA: Information Asset Security and Control course, you will learn about the OSI and TCP reference models, cryptography, indicators of attacks and network-based attacks.
Exercise your problem-solving and creative thinking skills with security-centric puzzles
In this hands-on lab, you will learn the basics of data backup and recovery, including different types of backups. You will practice using Windows Server Backup to create a data backup and recover files from a data backup.
In this hands-on lab, you will learn the basics of access control, including different types of access control. You will practice using Windows Security Permissions and icacls to manage and verify and access control.
In this hands-on lab, you will learn about the OSI and TCP/IP Reference Models and how they are used to organize the communications standards used by computer networks. You will then explore the different layers of the two models using Wireshark and a PCAP file containing wireless network traffic.
In this hands-on lab, you will learn the basics of IP addressing. You will practice analyzing a TCP/IP network topology in the GNS3 network simulator using basic Linux commands.
In this hands-on lab, you will learn the basics of network devices. You will practice assessing and configuring a simple network topology in the GNS3 network simulator.
In this hands-on lab, you will learn the basics of firewalls, including core functionality and practical applications. You will practice writing, setting, and validating rules using the host-based iptables firewall on a Linux system.
In this hands-on lab, you will learn about the basics of cryptography and the cryptographic process. You will practice encrypting and decrypting messages using a simple simple ciphe
In this hands-on lab, you will learn about the basics of symmetric cryptography. You will practice encrypting and decrypting messages using symmetric cryptography.
In this hands-on lab, you will learn about the basics of asymmetric cryptography. You will practice encrypting and decrypting messages using asymmetric cryptography.
In this hands-on lab, you will learn about the basics of cryptographic hash functions. You will practice generating and comparing hash values.
Assess your knowledge and skills to identify areas for improvement and measure your growth
Showcase your audit experience and demonstrate that you are skilled at assessing vulnerabilities, reporting on compliance, and instituting controls within the enterprise by obtaining your ISACA CISA certification. Completion of the practice test means you understand the five domains within the formal ISACA exam.
Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.
Put your skills to the test in virtual labs, challenges, and simulated environments.
Track your skills development from lesson to lesson using the Cybrary Skills Tracker.
Connect with peers and mentors through our supportive community of cybersecurity professionals.
This certification prep path is designed for mid-career practitioners who are interested in earning their CISA certification. You should earn this certification if you are interested in the information systems auditing process, governance and management of IT, protecting information assets, business resilience, as well as the acquisition, development, and implementation of information systems.
There are no prerequisites for Cybrary’s CISA training course, but you will need five years of security experience and the appropriate work experience to obtain certification. Read more about ISACA’s requirements here: Link.
Cybrary's CISA Cert Prep course is aligned with versions 27 and 28 of the CISA exam.
The CISA certification validates expertise in auditing, monitoring, and assessing IT and business systems. It also ensures IT audit professionals stay current on the latest technology trends and advancements.
The international professional organization that grants this certification, ISACA, has an excellent reputation and is highly regarded for its rigorous standards. CISA is recognized as the preferred credential for IT auditors and many professionals receive a pay increase after certification.
The CISA exam covers five job practice domains, including Information Systems Auditing Process, Governance and Management of Information Technology, Information Systems Acquisition, Development, and Implementations, Information Systems Operations and Business Resilience, and Information Asset Security and Control.
This exam is designed to test your knowledge and skills relating to real-life cybersecurity auditing job roles and tasks.
Earning your CISA certification prepares you for roles in auditing, risk management, and information security. A CISA-certified professional can go on to become an IT Auditor, Compliance Analyst, Risk Manager, or Internal Auditor.