- Home
- Explore
CYBERSECURITY
Cybersecurity qualifications unlock careers, prove expertise, drive innovation, and will shape the digital frontier in tomorrow’s AI-driven threat landscape.
Learn More
HOMELAND SECURITY
Homeland Security qualifications empower leaders, safeguard nations, advance resilience, and shape the next generation of defenders in an evolving global threatscape.
- Leadership and Management
- Emerging Technologies
- Medical Management & Prehospital Considerations
- Capstone
CPS PROGRAMS
George Washington University’s College of Professional Studies offers dynamic, career-ready courses in leadership, cybersecurity, CBRNE, technology, and public service—transforming professionals worldwide.
Learn More
REVU EXCLUSIVES
GW RevU’s growing number of exclusive courses offer a range of learning opportunities, from student success and introductory courses to cutting-edge courses about what is happening in the world now.
-
DC 101 (Coming Soon)
- Election Security
- Student Success Course
-
- Cybersecurity
CYBERSECURITY
Welcome to CyberForge.
MISSION — GW RevU aims to be a prime resource for lifelong learners and employers offering interdisciplinary, career-focused credentials that support up-skill, reskilling, and society advancement.VISION — GW RevU envisions delivering innovative, flexible education that meets evolving workforce needs and to empower professionals with current, market- and needs-based skills.
Learn More
PARTNERS
Cybersecurity (Coming Soon)
CISSP (Coming Soon)
- Homeland Security
HOMELAND SECURITY
Chemical. Biological. Radiological. Nuclear. Explosive. WMDs. Asymmetric Threats.
The CBRNE-WMD credentials program is a robust training series designed to prepare early and developing professionals for the complexities of a dynamic and evolving threat environment. Three interdependent certificates that deal with policy, mitigation, and emerging threats will propel you towards an immersive capstone in Washington, D.C. and the next steps in your career protecting our nation.
CBRNE-WMD Leadership and Management
Gain strategic leadership skills to manage CBRNE-WMD incidents through legal frameworks, interagency coordination, and real-world case studies.
CBRNE-WMD Hospital and Pre-Hospital Management
Learn medical response skills for CBRNE-WMD incidents, including triage, decontamination, PPE, and early threat detection in mass casualty events.
CBRNE-WMD Emerging Threats
Explore emerging CBRNE-WMD threats and technologies like AI and nanotech to enhance preparedness and response capabilities in complex environments.
CBRNE-WMD Capstone Event, Washington, D.C.
Experience an immersive, high-intensity, and multi-modal exercise that reflects the dynamic asymmetric threats of the modern world. The Capstone Experience is an annual event that is available to students that have completed the other CBRNE-WMD credentials.
- CPS Programs
CPS Programs
GW’s CPS bachelor programs empower working professionals with flexible, real-world education—launching impactful, leadership-focused, globally-oriented careers.
Learn More
BACHELORS DEGREES
GW’s CPS bachelor programs empower working professionals with flexible, real-world education—launching impactful, leadership-focused, globally-oriented careers.
Learn More
POSTGRADUATE DEGREES
CPS’s postgraduate programs transformed experienced professionals into visionary leaders through immersive, real-world learning, powerful networks, and practical rigor across critical fields.
- Cybersecurity Strategy & Information Management
- Homeland Security
- Legislative Affairs
- Paralegal Studies
- Political Management
- Public Relations & Communications
- Publishing
- Sustainable Urban Planning
REVU EXCLUSIVES
GW RevU’s growing number of exclusive courses offer a range of learning opportunities, from student success and introductory courses to cutting-edge courses about what is happening in the world now.
Learn More
- About RevU
Certified Information Systems Auditor (CISA) by ISACA
ABOUT THIS COURSE
Certified Information Systems Auditor (CISA), world-renowned as the standard of achievement for auditing, monitoring, and assessing IT and business systems, also acknowledges the importance of emerging technologies. Achieving a CISA certification showcases your expertise and asserts your ability to apply a risk-based approach to audit engagements. Addressing innovations like AI and blockchain, CISA ensures that IT audit professionals stay current on the latest technology trends and advancements. The certificate covers: Information Systems Auditing Process; Governance and Management of Information Technology; Information Systems Acquisition, Development & Implementation; Information Systems Operations and Business Resilience; and Protection of Information Assets.
ISACA credentials are among the top 10 highest-paying in IT, and CISA is recognized as the preferred credential for IT auditors.
Overview
Modality
online
Format
Pricing
$1979.00
Partner
RevU
Topic
CyberForge
Cybersecurity
Information Technology and Engineering
ISACA
Risk Management
COURSE REQUIREMENTS
There are no prerequisites for this course.
COURSE SYLLABUS
The Certified Information Systems Auditor (CISA) certification, offered by ISACA, is structured around five key domains, each focusing on critical aspects of information systems auditing, control, and security:
Information System Auditing Process: This domain emphasizes providing audit services in accordance with IT audit standards to assist organizations in protecting and controlling information systems. Key topics include:
- Planning:​
- IS Audit Standards, Guidelines, and Codes of Ethics
- Types of Audits, Assessments, and Reviews
- Risk-Based Audit Planning
- Types of Controls and Considerations
- Execution:
- IAudit Project Management
- Audit Testing and Sampling Methodology
- Audit Evidence Collection Techniques
- Audit Data Analytics
- Reporting and Communication Techniques
- Quality Assurance and Improvement of Audit Process
Governance and Management of IT: This domain focuses on ensuring that IT governance and management practices support the organization’s strategies and objectives. Key topics include:​
- IT Governance:​
- Laws, Regulations, and Industry Standards
- Organizational Structure, IT Governance, and IT Strategy
- IT Policies, Standards, Procedures, and Practices
- Enterprise Architecture and Considerations
- Enterprise Risk Management
- Privacy Program and Principles
- Data Governance and Classification
- IT Management:​
- IT Resource Management
- IT Vendor Management
- IT Performance Monitoring and Reporting
- Quality Assurance and Quality Management of IT
Information Systems Acquisition, Development, and Implementation: This domain addresses the processes for acquiring, developing, and implementing information systems that align with organizational objectives. Key topics include:
- Information Systems Acquisition and Development:
- Project Governance and Management
- Business Case and Feasibility Analysis
- System Development Methodologies
- Control Identification and Design
- IInformation Systems Implementation:​
- System Readiness and Implementation Testing
- Implementation Configuration and Release Management
- System Migration, Infrastructure Deployment, and Data Conversion
- Post-implementation Review
IInformation Systems Operations and Business Resilience: This domain focuses on the effectiveness and efficiency of information systems operations and ensuring business resilience. Key topics include:
- Information Systems Operations:​
- IT Components
- IT Asset Management
- Job Scheduling and Production Process Automation
- System Interfaces
- Shadow IT and End-User Computing
- Systems Availability and Capacity Management
- Problem and Incident Management
- IT Change, Configuration, and Patch Management
- Operational Log Management
- IT Service Level Management
- Database Management
- Business Resilience:
- Business Impact Analysis (BIA)
- System Resiliency
- Data Backup, Storage, and Restoration
- Business Continuity Plan (BCP)
- Disaster Recovery Plan (DRP)
- BCP and DRP Testing Methods
Protection of Information Assets: This domain ensures that information assets have the necessary levels of protection. Key topics include:
- Information Asset Security Frameworks, Standards, and Guidelines
- Privacy Principles
- Physical Access and Environmental Controls
- Identity and Access Management
- Network and Endpoint Security
- Data Classification
- Data Encryption and Masking
- Public Key Infrastructure (PKI)
- Web-Based Communication Techniques
- Virtualized Environments
- Mobile, Wireless, and Internet-of-Things (IoT) Devices
- Data Leakage Prevention (DLP)
- Security Awareness Training
- Threat Intelligence and Vulnerability Management
- Incident Response Management
- Forensic Investigation
- Fraud Risk Factors
RELATED COURSES
Come Explore What GW RevU Can Offer You
Artificial Intelligence Fundamentals by ISACA
Offering Partner: RevU
Modalities Available: online
Certified in Risk and Information Systems Control (CRISC) by ISACA
Offering Partner: RevU
Modalities Available: online
Certified Information Security Manager (CISM) by ISACA
Offering Partner: RevU
Modalities Available: online
Information Technology Bachelor’s Degree Completion Program
Offering Partner: RevU
Modalities Available: online
Internet of Things Fundamentals by ISACA
Offering Partner: RevU
Modalities Available: online
IT Audit Fundamentals Certificate by ISACA
Offering Partner: RevU
Modalities Available: online
IT Risk Fundamentals Certificate by ISACA
Offering Partner: RevU
Modalities Available: online
Master’s of Cybersecurity Strategy & Information Management
Offering Partner: RevU
Modalities Available: online
Thank you for your interest in the George Washington University’s College of Professional Studies. Please fill out the request for information form below, and we will be in touch shortly.
Loading…Request Information
Georgie
This AI chatbot provides automated responses, which may not always be accurate. By continuing with this conversation, you agree that the contents of this chat session may be transcribed and retained. You also consent that this chat session and your interactions, including cookie usage, are subject to our privacy policy.