Certified Information Systems Auditor (CISA)

Take an extra 30% off this course! No coupon needed; auto applies in cart.


Sale Ends Soon

  • 00Days
  • 00Hours
  • 00Minutes
  • 00Seconds

CISAs are comparable to what CPAs and CAs are to the accounting industry. They uphold high standards, manage risks, promote compliance, offer solutions, Governance & Management, institute controls and deliver enterprise value. Due to their audit experience skillset and credibility CISAs are recognized internationally as professionals in this field.

12  Training Hours
74 Videos
7  Topics
55 Practice Questions

Course Description

Why do I need the CISA certification exam?

Elevate your professional experience and catapult yourself to the next level in your career with ISACA's Certified Information Systems Auditor (CISA). It is globally acknowledged as the benchmark of accomplishment for those who audit, monitor, control and assess a business or organization’s IT systems. Professionals in this career will make recommendations to management based on findings. CISA holds an unparalleled reputation that will guarantee you success as you advance on your professional journey

Who should take the CISA Exam

If you are a beginner to mid-career IT expert, CISA certification can help boost your tactical skills and credibility and demonstrate that you are capable of implementing a risk-based audit process. Achieve recognition in both internal and external interactions such as with regulators, auditors, customers and more when you obtain your CISA credentials! This is an important stepping stone for certification holders to furthering your career within the industry.

Being a Certified Information Systems Auditor is to Audit what CPA and CA are to Accounting. As one of the most sought-after credentials in the industry, CISAs possess a wide range of abilities, qualifications and technical knowledge – from upholding standards to managing vulnerabilities – that make them essential for any company looking to maximize profitability. They are considered experts at compliance management, providing innovative solutions and implementing effective controls which ultimately yield tremendous value for businesses across sectors on an international scale.

CISA job practice analysis has been completed by ISACA. This analysis resulted in a new CISA job practice that reflects the vital and evolving responsibilities of IT auditors. The new CISA job practice was effective beginning with the CISA exam administration in June 2011. For purposes of these statements, the terms "enterprise" and "organization" or "organizational" are considered synonymous.

Comprehensive exam overview

This certification test consists of 150 questions that assess five distinct domains related to real-world work experience. By successfully completing this assessment, you'll be able to display substantial proof of proficiency in all these areas!

The CISA job practice offers a wide range of domains, subtopics and supporting tasks related to the field of information systems audit, assurance and control. Developed through robust research with input from international subject matter experts and prominent industry leaders alike, it is designed to reflect practical knowledge and real-world work performed in this sector.

Job Practice Domains

  • 21% of the exam covers information systems auditing process 
  • 17% of the exam covers governance and management of IT 
  • 12 % is on information systems acquisition, development and implementation 
  • 23% of the test covers information systems operations and business resilience 
  • 27% covers protection of information assets 

Various jobs and roles within the information security field as a Information Systems Auditor (CISA) certificate holders.

  • Technology Auditor
  • Certified Internal Auditor
  • Systems Auditor and Audit Managers (or Internal Audit Manager)
  • Compliance Analyst
  • Security Officer
  • Chief Technology Officer
  • Privacy Officers

Your Training Instructor

Chrys Thorsen

Chrys Thorsen

Education and Technology Expert

Chrys is an education and technology expert who specializes in enterprise-level IT infrastructure consulting and certified training-of-trainers. In her career, she has garnered 35 IT Certifications including Cisco CCSI/CCNP, CISSP, CISA, MCSE/MCITP, and many more. She has also authored 40 published certification textbooks and is currently working on the new CompTIA PenTest+ courseware.

Course Outline

Certified Information Systems Auditor (CISA) Course Outline

Module 1 - The Audit Process
  •    Introduction
  •    Audit Process
  •    Auditing Standards
  •    Auditing Guidelines
  •    Cobit Model
  •    Audit Management
  •    Internal Control Classifications
  •    Planning
  •    Program
  •    Evidence
  •    Audit Control Evaluation
  •    CSA Control Self-Assessment
Module 2 - Audit Governance and Compliance
  •    IT Governance
  •    Governance & Security Policies
  •    Outsourcing & Governance
  •    Outsourcing & Globalization
  •    Organizational Compliance
  •    IT Strategy
  •    IT Performance
Module 3 - System Infrastructure, Project Management, and Testing
  •    System & Infrastructure
  •    Requirements
  •    Project Management Tools - Part 1
  •    Project Management Tools - Part 2
  •    Applications
  •    Agile Development
  •    Monitoring & Controlling
  •    Acquisition Process
  •    Testing Process
  •    Information Systems Maintenance Practices
  •    Data Conversion Tools
Module 4 - Media Disposal, Reviews, and System Maintenance
  •    Media Disposal Process
  •    Post Implementation Review
  •    Periodic Review
  •    System Maintenance
Module 5 - IT Service Level Management
  •    IT Service Delivery and Support
  •    How to Evalutate Service Level Management Practices
  •    Operations Management
  •    Databases
  •    Structured Query Language (SQL)
  •    Monitoring Performance
  •    Source Code and Perfomance Monitoring
  •    Patch Management
  •    Incident Management
  •    Hardware Component Types
  •    Network Component Types
Module 6 - Auditor Technical Overview
  •    IS Auditor Technical Overview
  •    Security Design
  •    Monitoring Systems
  •    Types of Attacks
  •    Cryptography
  •    Encryption
  •    Asymmetric Encryption
  •    Digital Certificate
  •    Different Kinds of Attacks
  •    Access Controls
  •    Identification and Authenication
  •    Physical Access Exposure
  •    Environmental Security
  •    Network Security Devices and Network Components
  •    Network Address Translation
  •    Virtual Private Networks (VPNs)
  •    Voice System Risks
  •    Intrusion Detection
  •    Firewalls
  •    Firewall Implementation
  •    Network Access Protection
  •    HoneyPot
  •    Risks to Portable and Wireless Devices
  •    Bluetooth
  •    OSI Networking
  •    Managing Data
Module 7 - Business Continuity and Disaster Recovery
  •    Business Continuity and Disaster Recovery
  •    Fault Tolerance
  •    Business Continuity and Disaster Recovery Regulations
Certified Information Systems Auditor (CISA)


CISAs are comparable to what CPAs and CAs are to the accounting industry. They uphold high standards, manage risks, promote compliance, offer solutions, Governance & Management, institute controls and deliver enterprise value. Due to their audit experience skillset and credibility CISAs are recognized internationally as professionals in this field.

Additional Options to Access This Training
This training is also part of our extensive training library containing over 225 courses, 12,000+ videos and over 19,000 practice test questions.
Monthly All-Access Subscription
$39.00 / month

A great option at an affordable monthly price.

Annual All-Access Subscription
$229 / year

A discounted price when paying for your All Access library on an annual basis.

Lifetime All-Access Library
$379 One time payment

Exceptional Value. Pay once, never have to buy IT training again.

Related Courses


In this Microsoft 70-412: Configuring Advanced Windows Server Services course you will learn how to perform the advanced configuring tasks required to deploy, manage, and maintain a Windows Server 2012 infrastructure, such as fault tolerance, certificate services, and identity federation.


This course will guide you through the basics of relational database design and through the creation of database objects. You will learn how to use forms, query tables and reports to manage data. You will understand the interface, customization and creation editing of the many objects available within the Microsoft Access application. This course is divided in to three separate levels being Basic Microsoft Access, Intermediate Microsoft Access and Advanced Microsoft Access.


This Cybersecurity Awareness and Prevention Training course offers an in-depth exploration of protecting your network, remaining safe online, securing emails, using anti-virus software to its fullest potential – plus plenty more.


This IT course will teach you key concepts you need to know about Cisco’s security technologies, including how to install and troubleshoot network devices. By the end of the course, you’ll be able to confidently maintain data integrity and availability, and have a thorough understanding of Cisco’s security structure and be prepared to take the Cisco Certified Network Associate Security (Cisco CCNA Security) exam. 


25% OFF

Sign up for updates, discounts, and more.