Free

CISA Certification Prep

ISACA’s Certified Information Systems Auditor (CISA) certification is for entry to mid-career professionals who want to understand the process of planning, executing, and reporting on risk-based auditing practices. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.

7
20
M
Time
intermediate
difficulty
8
ceu/cpe

Course Content

Information Security Management

15m

Protection of Information Assets (Domain 5)
Information Systems Operations

4m

Information Systems Operations, Maintenance and Service Management (Domain 4)
Project Governance and Management

11m

Information Systems Acquisition, Development, and Implementation (Domain 3)
CISA Module 3 Introduction

1m

Governance and Management of IT (Domain 2)
The Process of Auditing Information Systems

8m

The Process of Auditing Information Systems (Domain 1)
Exam Preparation

7m

Exam Preparation
Logical Access

7m

Protection of Information Assets (Domain 5)
Information Systems Hardware

10m

Information Systems Operations, Maintenance and Service Management (Domain 4)
Project Management Practices

6m

Information Systems Acquisition, Development, and Implementation (Domain 3)
Corporate Governance

10m

Governance and Management of IT (Domain 2)
ISACA IS Audit and Assurance Standards and Guidance

6m

The Process of Auditing Information Systems (Domain 1)
Introduction and Overview of the Certification

5m

Introducing the Certified Information Systems Auditor
CISA Practice Test

2m

Exam Preparation
Network and Endpoint Security

10m

Protection of Information Assets (Domain 5)
Hardware Maintenance Program

5m

Information Systems Operations, Maintenance and Service Management (Domain 4)
Business Case and Feasibility Analysis

4m

Information Systems Acquisition, Development, and Implementation (Domain 3)
Information Security Governance

5m

Governance and Management of IT (Domain 2)
IS Controls

7m

The Process of Auditing Information Systems (Domain 1)
Network Architectures

20m

Protection of Information Assets (Domain 5)
Job Scheduling and Production Process Automation

4m

Information Systems Operations, Maintenance and Service Management (Domain 4)
System Development Tools and Productivity Aids

4m

Information Systems Acquisition, Development, and Implementation (Domain 3)
Information Systems Strategy

4m

Governance and Management of IT (Domain 2)
Performing an IS Audit

10m

The Process of Auditing Information Systems (Domain 1)
Data Classification

3m

Protection of Information Assets (Domain 5)
System Interfaces

3m

Information Systems Operations, Maintenance and Service Management (Domain 4)
Course Description

For cyber security professionals who are interested in the field of auditing and CISA certification course & training, the Certified Information Systems Auditor (CISA) certification by ISACA is the leading credential to achieve. In order to face the dynamic requirements of meeting enterprise vulnerability management challenges, this course covers the information systems auditing control processes to ensure that you have the ability to analyze the state of your organization and make changes where needed.

Prior to taking this CISA course online, it is recommended that candidates have a minimum of five years of work experience in information security audit, control, assurance, or security.

What is CISA?

CISA stands for Certified Information Systems Auditor and is a certification that is granted by the Information Systems Audit and Control Association (ISACA). It is the most recognized credential for IS audit control, assurance, and security professionals. It is designed for audit managers, IT auditors, security professionals, and consultants.

What is Involved in this online CISA training?

Our CISA training provides you with all the knowledge you need to be eligible to work in a professional information systems auditing role and pass the CISA certification exam. The course is a comprehensive study of the auditing process, including:

  • Information Systems Auditing Standards and Processes
  • Acquisition, Development, and Implementation
  • Operations, Maintenance, and Support
  • Code of Professional Ethics

  • Completion of the course demonstrates your overall competencies in auditing, controlling, monitoring, and assessing information security and business systems.

    While there are no prerequisites for this CISA course, it is suggested that you have previous work experience in information security audit, control, assurance, or security, as previous professional work experience is required to become certified.

    Why Get CISA Certification?

    Employees who are CISA certified are seen as knowledgeable, with skills including auditing information systems, ensuring compliance, managing vulnerabilities, and instituting control. Additionally, the benefits of achieving CISA certification include:

  • Automatic marketing of your expertise
  • Globally recognized as an IS audit professional
  • Increases value to the organization
  • Provides a competitive advantage over peers in the industry
  • Shows that candidates possess a high professional standard through ISACA's requirements for continuing education
  • Demonstrates the tactical skill required to successfully complete the exam
  • Credibility in the industry
  • Well-above average salary
  • What Jobs Are CISA Certified Professionals Qualified to Do?

    The primary role of the information technology auditor is to ensure that there are no situations of unnecessary spending, fraud, or noncompliance with federal regulations and governmental laws.

    CISA certification holders may be hired for the following positions:

  • IT Audit Manager
  • Internal Auditor
  • Cybersecurity professional
  • IT Consulting
  • Privacy Officer
  • IT Risk and Assurance Manager
  • PCI Security Specialist
  • What Are the Requirements for CISA Certification?

    To earn a CISA certification, candidates must pass the CISA test with a score of at least 450 (out of a possible 800) and have at least five years of professional experience in information systems auditing, assurance, control, or security. The previous experience requirement must have been within the last ten years preceding the application date for certification.

    The CISA exam consists of 150 multiple choice questions, for which you have four hours (240 minutes) to complete. The exam questions cover five domains:

  • Information System Auditing Process (21%)
  • Governance and Management of IT (17%)
  • Information Systems Acquisition, Development, and implementation (12%)
  • Information Systems Operation and Business Resilience (23%)
  • Protection of Information Assets (27%)

  • Once successfully passed, your certification will be valid for five years, and then must be reestablished by meeting certain requirements.

    You can find more information about the exam, scheduling the exam, and maintaining certification on the ISACA website.

    This course is part of a Career Path:
    No items found.

    Instructed by

    No items found.
    Provider
    Cybrary Logo
    Certification Body
    ISACA
    Certificate of Completion

    Complete this entire course to earn a CISA Certification Prep Certificate of Completion

    Coming mid-July
    Cybrary Reimagined.
    Level up with structured, role-aligned career paths.
    ALL NEW!
    Cybrary Reimagined.
    Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
    Level up with structured, role-aligned career paths.
    Valid until October 31. Elevate your skills today!
    Start Now

    Heading

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    This is some text inside of a div block.
    Share

    Purpose Statement

    Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
    This is some text inside of a div block.
    This is some text inside of a div block.
    M
    Time
    This is some text inside of a div block.
    difficulty
    This is some text inside of a div block.
    ceu/cpe

    Overview

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Frequently Asked Questions
    No items found.
    What Will I Learn?
    Foundations
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Defensive Security
    Focused on trying to find the bad guys. Topics such as threat intelligence, threat hunting, network monitoring, incident response. Defensive security is a reactive measure taken once a vulnerability is found through prevention, detection, and response.
    Engineering and Operations
    Focused on building and operating information systems.
    Governance, Risk, and Compliance
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Leadership and Management
    Focused on program design and oversight. Covers project and program management.
    Offensive Security
    Focused on validating security controls by trying to break them (i.e. penetration testing or ethical hacking). Topics such as Kali Linux, metasploit, scanning, and privilege escalation. Offensive security seeks out the problem or vulnerability through ethical hacking and finds a solution to disable the operation.
    Offensive Security
    Focused on the core IT competencies that cybersecurity professionals need to succeed in any career path.
    Path Outline

    Heading 1

    Heading 2

    Heading 3

    Heading 4

    Heading 5
    Heading 6

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

    Block quote

    Ordered list

    1. Item 1
    2. Item 2
    3. Item 3

    Unordered list

    • Item A
    • Item B
    • Item C

    Text link

    Bold text

    Emphasis

    Superscript

    Subscript

    Course Outline

    No items found.
    No items found.
    No items found.

    What Our Learners Are Saying

    Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

    No items found.