ISACA CISA Training Boot Camp

Certified Information Systems Auditor (CISA) Boot Camp is a five-day training focused on preparing you for the ISACA CISA exam. You’ll leave with the knowledge and domain expertise needed to pass the CISA exam the first time you take it.

Description

Overview

Information security is critical in today’s fast-paced world, and that’s led to a growing demand for professionals who understand how to measure the risk of an organization’s data and systems, and create and administer programs and policies to combat security breaches. This CISA Boot Camp teaches you the skills necessary to develop, manage and supervise programs to defend against unauthorized admittance to information. You’ll gain in-depth knowledge of auditing information systems and how it applies to real-world scenarios — and leave fully prepared to pass your CISA exam.

The hands-on cybersecurity training platform that moves as fast as you do

Boot camps are engineered to match the way today’s cybersecurity professionals prefer to learn. In addition to days of live training from an experienced pro, you’ll get unlimited access to 100s of additional hands-on cybersecurity courses and cyber ranges to help you advance your skills before, during and after your boot camp. Your access extends 90 days past your boot camp, so you can take additional time to prepare for your exam, or get a head start on your next certification goal.

The hands-on cybersecurity training platform that moves as fast as you do

Boot camp at a glance

What you will learn

  • Information systems auditing process
  • Security principles and best practices
  • Evaluating systems, operations, governance and more

Who should attend

  • IT auditors
  • Information security consultants
  • Information security analysts
  • Risk managers and professionals
  • Anyone interested in learning auditing skills and getting certified

What is Included:

  • Five days of live, expert CISA instruction
  • Exam Pass Guarantee
  • Exam voucher
  • Unlimited practice exam attempts
  • 100% Satisfaction Guarantee
  • 12-month subscription to the ISACA Official Question, Answer & Explanation (QAE) Database
  • Free 90-day skills subscription (access to 1,400+ additional courses and labs)
  • 90-day extended access to all boot camp video replays and materials
  • Pre-study learning path
  • Knowledge Transfer Guarantee

Industry-leading pass rates

CISA courseware materials are always up to date and synchronized with the latest ISACA exam objectives. Our industry-leading curriculum and expert instructors have led to the highest pass rates in the industry. More than 93% of students pass their certification exams on their first attempt.

ISACA Accredited Training Organization (ATO)

Skill up and get certified, guaranteed

CISA Objectives

:

This CISA Boot Camp extensively prepares you for the CISA exam, which consists of 150 multiple-choice questions that cover the five information systems auditing areas. These areas have been created from a CISA job practice analysis and reflect the work performed by information systems auditors:

  • The process of auditing information systems
  • Governance of IT and management
  • Information systems acquisition, development and implementation
  • Information systems operations, maintenance and services management
  • Protection of information assets

Course Outline

Before your boot camp

Start learning now. You’ll get immediate access to all the content in, including an in-depth CISA prep course, the moment you enroll. Prepare for your live boot camp, uncover your knowledge gaps and maximize your training experience.

During your boot camp

Day 1: The Process of Auditing Information System

  • Executing risk-based is audit strategy
  • Plan specific audits
  • Conduct audits in accordance with IT audit standards

Governance of IT and Management

  • Corporate governance
  • Governance of enterprise IT
  • Information systems strategy
  • Maturity and process improvement models
  • IT investment and allocation practices
  • Policies and procedures
  • Risk management
  • Information technology management practices
  • IT organization structure and responsibilities
  • Auditing IT governance structure and implementation
  • Business continuity planning
  • Auditing business continuity

Day 2: Information Systems Acquisition, Development and Implementation

  • Business realization
  • Project management structure
  • Project management practices
  • Business application development
  • Virtualization and cloud computing environments
  • Business application systems
  • Development methods
  • Infrastructure development/ acquisition practices
  • Information systems maintenance practices
  • System development tools and productivity aids
  • Process improvement practices
  • Application controls
  • Auditing application controls
  • Auditing systems development, acquisition and maintenance

Day 3: Information Systems Operations, Maintenance, and Services Management

  • Information systems operations
  • IT asset management
  • Information systems hardware
  • IS architecture and software
  • IS network infrastructure
  • Auditing infrastructure and operations
  • Disaster recovery planning

Day 4: Protection of Information Assets

  • Information security management
  • Logical access
  • Network infrastructure security
  • Auditing information security management framework
  • Auditing network infrastructure security
  • Environmental exposures and controls
  • Physical access exposures and controls
  • Mobile computing
  • Peer-to-peer computing
  • Instant messaging
  • Social media
  • Cloud computing
  • Data leakage
  • End-user computing security risk and controls

Day 5: Exam Review

After your boot camp

Your access extends 90 days past your boot camp, so you can take additional time to prepare for your exam, get a head start on your next certification goal or start earning CPEs.

Prerequisites

A minimum of five years of professional information systems auditing, control or security work experience is required for certification; however, up to three years can be waived if other requirements are met. You have five years after passing the exam to gain the necessary work experience and apply for certification.

Similar courses

This course was built to incorporate a unique, in-depth, and interactive hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential.

More Information

The CCISO program is a first-of-its-kind training and certification course that aims to produce cybersecurity executives of the highest caliber and ethics.

More Information

This course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur.

More Information

This course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst.

More Information

CompTIA Security+ is a global certification that validates the foundational cybersecurity skills necessary to perform core security functions and pursue an IT security career. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. CompTIA Security+ is compliant with ISO 17024 standards and approved by the U.S. DoD to meet Directive 8140.03M requirements.

More Information

Gain a broad view of how to respond to a cybersecurity incident while preparing for the CyberSec First Responder certification.

More Information

Our Exam Cram sessions are intensive, focused review sessions designed to help your team master key concepts and pass their CompTIA certification exams with confidence. Led by expert instructors, these sessions provide in-depth, targeted hands-on practice to ensure your team is fully prepared for exam day. Security+ covers the most in-demand skills related to current threats, automation, zero trust, IoT, risk – and more. This exam cram session is included with the Security+ course.

More Information

The Certified Information Systems Security Manager (C-ISSM) course covers the skills and knowledge to assess threat analysis & risks, risk & incident management, security programs & CISO roles, IS security strategy & frameworks, audit & risk management creation of policies, compliance & awareness, as well as DR & BCP development, deployment & maintenance. This course not only covers ISACA®'s CISM exam, but will provide a measurable certification that demonstrates proficiency in the IS Management field.

More Information

This scenario-based course focuses on computer security as an applied process across job roles and industries. The course also helps to prepare students for achieving the widely regarded Certified Information Systems Security Professional (CISSP) certification.

More Information

This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations.

More Information

The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization’s identity and access management systems by using Microsoft Entra ID (Formerly Azure AD). Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users.

More Information

Learn how to protect information in your Microsoft 365 deployment. This course focuses on data governance and information protection within your organization. The course covers implementation of data loss prevention policies, sensitive information types, sensitivity labels, data retention policies and Office 365 message encryption among other related topics. The course helps learners prepare for the Microsoft Information Protection Administrator exam (SC-400).

More Information

The Cloud is being widely adopted today for a diverse set of reasons. However, many are finding that security in the cloud is a huge challenge. The C)CSO looks to fill the gap in cloud security education and give you the skills you need to develop strong cloud security.

More Information

The Certified Security Principles (C)SP) course is going to prepare you for security across the entire environment including understanding risk management, identity and access control, network and data security. This is just a short list of everything covered within this course, which will include new technologies like IoT and cloud services. This course is intended to prepare you to become a benefit to any company attempting to improve its security posture.

More Information

The Certified Cybersecurity Systems Auditor (C)CSSA) course covers the skills and knowledge to assess vulnerabilities, report on compliance and implement controls for private and public enterprises. Many organizations require a Cybersecurity System Auditor's expert knowledge when it comes to identifying critical issues and providing effective auditing solutions.

More Information

The CISSO addresses the broad range of industry best practices, knowledge and skills expected of a security manager/officer. You will learn in-depth theory pertaining to the practical implementation of core security concepts, practices, monitoring and compliance of IS management. Whether you’re responsible for the management of a Cybersecurity team, a Security Officer, an IT auditor or a Business Analyst, the C)ISSO certification course is an ideal way to increase your knowledge, expertise and skill.

More Information

To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to a line of penetration testing courses because it teaches you to think like a hacker. Therefore, you can set up dynamic defenses to prevent intrusion.

More Information

A Certified Penetration Testing Engineer (C)PTE) imagines all of the ways that a hacker can penetrate a data system. In this course you will learn 5 Key Elements of Pen Testing, discover the latest vulnerabilities and the techniques malicious hackers are using to acquire and destroy data and learn more about the business skills needed to identify protection opportunities, justify testing activities and optimize security controls appropriate to the business needs in order to reduce business risk.

More Information

The Certified Secure Web Application Engineer (C)SWAE) course is delivered by high level OWASP experts and students can expect to obtain real world security knowledge that enables them to recognize vulnerabilities, exploit system weaknesses and help safeguard against application threats. You will learn how to develop web applications that aren't subject to common vulnerabilities, and how to test and validate that their applications are secure, reliable and resistant to attack.

More Information