Certified Information Systems Auditor (CISA) by ISACA
Certified Information Systems Auditor® (CISA®), world-renowned as the standard of achievement for auditing, monitoring, and assessing IT and business systems, also acknowledges the importance of emerging technologies. Achieving a CISA certification showcases your expertise and asserts your ability to apply a risk-based approach to audit engagements. Addressing innovations like AI and blockchain, CISA ensures that IT audit professionals stay current on the latest technology trends and advancements.
ISACA credentials are among the top 10 highest-paying in IT, and CISA is recognized as the preferred credential for IT auditors. Successful CISA certificate holders have experienced 70% on-the-job improvement and 22% have received a pay boost. CISM is DoD 8140 Approved.
RevU Pricing: $1,979
ABOUT THIS COURSE
Expand Your Career with CISA
Certified Information Systems Auditor® (CISA®), world-renowned as the standard of achievement for auditing, monitoring, and assessing IT and business systems, also acknowledges the importance of emerging technologies. Achieving a CISA certification showcases your expertise and asserts your ability to apply a risk-based approach to audit engagements. Addressing innovations like AI and blockchain, CISA ensures that IT audit professionals stay current on the latest technology trends and advancements.
ISACA’s CRISC certification is DoD 8140 Approved and aligned to the Cyber Workforce Framework (DWCF).
Certificate Curriculum
The Certified Information Systems Auditor (CISA) certification, offered by ISACA, is structured around five key domains, each focusing on critical aspects of information systems auditing, control, and security:
- Information Systems Auditing Process: This domain emphasizes providing audit services in accordance with IT audit standards to assist organizations in protecting and controlling information systems. Key topics include:
- Planning: IS Audit Standards, Guidelines, Codes/Ethics; Types of Audits/Assessments; Risk-Based Audit Planning; Types of Controls/Considerations;
- Execution: Audit Project Management, Testing/Sampling Methodology, Evidence Collection, Data Analytics; Report and Communication; Quality Assurance and Improvement.
- Governance and Management of IT: This domain focuses one ensuring that IT governance and management practices support the organization’s strategies and objectives. Key topics include:
- IT Governance: Laws, Regulations, and Standards; Organizational Structure, Governance, and Standards; Policies, Standards, and Procedures; Enterprise Architecture and Risk Management; Privacy Program, Data Governance, and Classification.
- IT Management: Resource and Vendor Management; Performance Monitoring/Reporting; Quality Assurance/Management of IT.
- Information Systems Acquisition, Development, and Implementation: This domain addresses the processes for acquiring, developing, and implementing information systems that align with organizational objectives. Key topics include:
- IS Acquisition and Development: Project Governance/Management; Business Case/Feasibility Analysis; Development Methodologies; Control Identification/Design.
- IS Implementation: Readiness and Implementation Testing; Configuration and Release Management; Migration, Deployment, and Data Conversion; Review.
- Information Systems Operations and Business Resilience: This domain focuses on thee effectiveness and efficiency of information systems operations and ensuring business resilience. Key topics include:
- Information Systems Operations: Components and Asset Management; Scheduling and Process Automation; Systems Interfaces; Shadow IT and End-User Computing; Problem/Incident Management; Database Management.
- Business Resilience: Business Impact Analysis; System Resilience; Data Backup/Storage/Restoration; Business Continuity Plan; Disaster Recovery Plan; BCP and DRP Testing.
- Protection of Information Assets: This domain ensures that information assets have the necessary levels of protection. Key topics include a wide variety of topics from Security Frameworks and Standards, Access/Environmental Controls, Data Encryption, Public-Key Infrastructure, Security Awareness Training, Threat Intelligence and Response Management, and Forensic Investigation.
Successful students will receive an internationally recognized badge from ISACA.
Additional Resources
Overview
Modality
Online
Format
Asynchronous
Pricing
$1,979
Partner
ISACA
Topic
Information Security and Cybersecurity
Price Includes
- ISACA Student Membership
- Certificate Exam
- Review Manual
- Online Review Course
Why RevU?
- Exclusive academic pricing
- Exam voucher and student membership included
- Access to RevU and CyberForge professional networks
- Synchronous sessions taught by GW and industry experts

RELATED COURSES
Come Explore
What GW RevU
Can Offer You
Our Partner ISACA

ISACA (Information Systems Audit and Control Association) is a global, nonprofit professional association focused on IT governance, risk management, cybersecurity, and assurance. Founded in 1969, ISACA has expanded its scope beyond IT auditing to encompass information security, governance, risk management, privacy, and emerging technologies. It provides globally-recognized certifications, frameworks, and training programs that are adopted worldwide and provide the background of industry qualifications such as CISA, CISM, CRISC, CGEIT, and CDPSE.
ISACA is a global professional association and learning organization with 185,000 members who work in digital trust fields such as information security, governance, assurance, risk, privacy, and quality. With a presence in 188 countries and 225 chapters worldwide, ISACA is recognized around the world for its guidance, credentials, education, training, and community.
Learn more at www.isaca.org.