phone icon 888.418.7051 info@testpassacademy.com

ISACA CISA certification training

Test Pass Academy has Expert Instructors that have been doing the ISACA Certified Information Systems Auditor - CISA Certification training for many years. Our instructors are well known in the industry not only as top level instructors with rave reviews, but also as top level Security Professionals who pass along real world examples to the class. Our experts have a vast understanding of security and a remarkable teaching ability making it easy to PASS the CISA Exam on the 1st attempt. If you are looking to gain CISA experience and pass the CISA exam, you found the right place. This 4 day bootcamp is geared for the Government, Military and Contractors seeking 8140 compliance.

What will I learn in the ISACA CISA Bootcamp?

The CISA certification enables you to be recognized, not only domestically, but at an international level, as a professional with knowledge, skills, and the credibility to offer opinions and solutions, and to audit all areas related to information systems. With organizations attempting to be faster to market and with more freely flowing information, the security and integrity of that information is key and CISA affirms you as an individual with the knowledge and abilities to identify risk, and articulate and apply proven practices for mitigating it.

What is the ISACA CISA Certification:

The CISA is known as the standard of achievement for those who audit, control, monitor and assess an organization’s information technology and business systems. CISA Certification holders are consistently recognized among the most-qualified professionals in the fields of IS auditing, control, cyber security and security.

ISACA CISA Class Details:

  • 4 Days of the Top CISA Training in the Industry
  • Instruction by a High-Level CISA Certified Expert
  • CISA Courseware - Continually Updated
  • CISA Practice Questions & Quizzes
  • Class Hours: 9:00 - 5:00
  • CISA Exam Fee INCLUDED
  • CISA Exam Retake INCLUDED

Upon completion of the ISACA CISA Course, you will demonstrate competence and learn to master:

DOMAIN 1 – INFORMATION SYSTEMS AUDITING PROCESS

Providing industry-standard audit services to assist organizations in protecting and controlling information systems, Domain-1 affirms your credibility to offer conclusions on the state of an organization’s IS/IT security, risk and control solutions.

PLANNING

  1. IS Audit Standards, Guidelines, and Codes of Ethics
  2. Types of Audits, Assessments, and Reviews
  3. Risk-Based Audit Planning
  4. Types of Controls and Considerations

EXECUTION

  1. Audit Project Management
  2. Audit Testing and Sampling Methodology
  3. Audit Evidence Collection Techniques
  4. Audit Data Analytics
  5. Reporting and Communication Techniques
  6. Quality Assurance and Improvement of Audit Process

DOMAIN 2 – GOVERNANCE & MANAGEMENT OF IT

This domain confirms to stakeholders your abilities to identify critical issues and recommend enterprise-specific practices to support and safeguard the governance of information and related technologies.

IT GOVERNANCE

  1. Laws, Regulations, and Industry Standards
  2. Organizational Structure, IT Governance, and IT Strategy
  3. IT Policies, Standards, Procedures and Practices
  4. Enterprise Architecture and Considerations
  5. Enterprise Risk Management
  6. Privacy Program and Principles
  7. Data Governance and Classification

IT MANAGEMENT

  1. IT Resource Management
  2. IT Vendor Management
  3. IT Performance Monitoring and Reporting
  4. Quality Assurance and Quality Management of IT

DOMAIN 3 – INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT & IMPLEMENTATION

Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

INFORMATION SYSTEMS ACQUISITION AND DEVELOPMENT

  1. Project Governance and Management
  2. Business Case and Feasibility Analysis
  3. System Development Methodologies
  4. Control Identification and Design

INFORMATION SYSTEMS IMPLEMENTATION

  1. System Readiness and Implementation Testing
  2. Implementation Configuration and Release Management
  3. System Migration, Infrastructure Deployment, and Data Conversion
  4. Post-implementation Review

DOMAIN 4 – INFORMATION SYSTEMS OPERATIONS & BUSINESS RESILIENCE

Domains 3 and 4 offer proof not only of your competency in IT controls, but also your understanding of how IT relates to business.

INFORMATION SYSTEMS OPERATIONS

  1. IT Components
  2. IT Asset Management
  3. Job Scheduling and Production Process Automation
  4. System Interfaces
  5. Shadow IT and End-User Computing
  6. Systems Availability and Capacity Management
  7. Problem and Incident Management
  8. IT Change, Configuration, and Patch Management
  9. Operational Log Management
  10. IT Service Level Management
  11. Database Management

BUSINESS RESILIENCE

  1. Business Impact Analysis
  2. System and Operational Resilience
  3. Data Backup, Storage, and Restoration
  4. Business Continuity Plan
  5. Disaster Recovery Plans

DOMAIN 5 – PROTECTION OF INFORMATION ASSETS

Cybersecurity now touches virtually every information systems role, and understanding its principles, best practices and pitfalls is a major focus within Domain 5.

INFORMATION ASSET SECURITY AND CONTROL

  1. Information Asset Security Frameworks, Standards, and Guidelines
  2. Physical and Environmental Controls
  3. Identity and Access Management
  4. Network and End-Point Security
  5. Data Loss Prevention
  6. Data Encryption
  7. Public Key Infrastructure
  8. Cloud and Virtualized Environments
  9. Mobile, Wireless, and Internet-of-Things Devices

SECURITY EVENT MANAGEMENT

  1. Security Awareness Training and Programs
  2. Information System Attack Methods and Techniques
  3. Security Testing Tools and Techniques
  4. Security Monitoring Tools and Techniques
  5. Security Incident Response Management
  6. Evidence Collection and Forensics  

Secondary Classifications – Tasks

  1. Plan an audit to determine whether information systems are protected, controlled, and provide value to the organization.
  2. Conduct audits in accordance with IS audit standards and a risk based IS audit strategy.
  3. Apply project management methodologies to the audit process.
  4. Communicate and collect feedback on audit progress, findings, results, and recommendations with stakeholders.
  5. Conduct post-audit follow up to evaluate whether identified risk has been sufficiently addressed.
  6. Utilize data analytics tools to enhance audit processes.
  7. Evaluate the role and/or impact of automatization and/or decision-making systems for an organization.
  8. Evaluate audit processes as part of quality assurance and improvement programs.
  9. Evaluate the IT strategy for alignment with the organization's strategies and objectives.
  10. Evaluate the effectiveness of IT governance structure and IT organizational structure.
  11. Evaluate the organization's management of IT policies and practices, including compliance with legal and regulatory requirements.
  12. Evaluate IT resource and project management for alignment with the organization's strategies and objectives.
  13. Evaluate the organization's enterprise risk management (ERM) program.
  14. Determine whether the organization has defined ownership of IT risk, controls, and standards.
  15. Evaluate the monitoring and reporting of IT key performance indicators (KPIs) and IT key risk indicators (KRIs).
  16. Evaluate the organization's ability to continue business operations.
  17. Evaluate the organization's storage, backup, and restoration policies and processes.
  18. Evaluate whether the business cases related to information systems meet business objectives.
  19. Evaluate whether IT vendor selection and contract management processes meet business, legal, and regulatory requirements.
  20. Evaluate supply chains for IT risk factors and integrity issues.
  21. Evaluate controls at all stages of the information systems development life cycle.
  22. Evaluate the readiness of information systems for implementation and migration into production.
  23. Conduct post-implementation reviews of systems to determine whether project deliverables, controls, and requirements are met.
  24. Evaluate whether effective processes are in place to support end users.
  25. Evaluate whether IT service management practices align with organizational requirements.
  26. Conduct periodic review of information systems and enterprise architecture (EA) to determine alignment with organizational objectives.
  27. Evaluate whether IT operations and maintenance practices support the organization's objectives.
  28. Evaluate the organization's database management practices.
  29. Evaluate the organization's data governance program.
  30. Evaluate the organization's privacy program.
  31. Evaluate data classification practices for alignment with the organization's data governance program, privacy program, and applicable external requirements.
  32. Evaluate the organization's problem and incident management program.
  33. Evaluate the organization's change, configuration, release, and patch management programs.
  34. Evaluate the organization's log management program.
  35. Evaluate the organization's policies and practices related to asset life cycle management.
  36. Evaluate risk associated with shadow IT and end-user computing (EUC) to determine effectiveness of compensating controls.
  37. Evaluate the organization's information security program.
  38. Evaluate the organization's threat and vulnerability management program.
  39. Utilize technical security testing to identify potential vulnerabilities.
  40. Evaluate logical, physical, and environmental controls to verify the confidentiality, integrity, and availability of information assets.
  41. Evaluate the organization's security awareness training program.
  42. Provide guidance to the organization in order to improve the quality and control of information systems.
  43. Evaluate potential opportunities and risks associated with emerging technologies, regulations, and industry practices.
DoD 8140: Roles where CISA Certification is beneficial - Information Systems Auditor, Risk Analyst, Compliance Analyst/Manager

ISACA CISA Exam Prep Schedule:

COURSECLASS DATESLOCATIONPRICEREQUEST QUOTE OR REGISTER
ISACA CISA CertificationOctober 27 - 30, 2025Live Online$3,295REGISTERQUOTE
ISACA CISA CertificationNovember 17 - 20, 2025Fort Bragg, NC$3,295REGISTERQUOTE
ISACA CISA CertificationDecember 1 - 4, 2025Live Online$3,295REGISTERQUOTE
ISACA CISA CertificationDecember 1 - 4, 2025Omaha, NE$3,295REGISTERQUOTE
ISACA CISA CertificationDecember 15 - 18, 2025San Diego, CA$3,295REGISTERQUOTE
ISACA CISA CertificationDecember 15 - 18, 2025Eglin AFB, FL$3,295REGISTERQUOTE
ISACA CISA CertificationJanuary 12 - 15, 2026Live Online$3,295REGISTERQUOTE
ISACA CISA CertificationJanuary 12 - 15, 2026Las Vegas, NV$3,295REGISTERQUOTE
ISACA CISA CertificationJanuary 26 - 29,2026San Diego, CA$3,295REGISTERQUOTE
ISACA CISA CertificationFebruary 9 - 12, 2026Live Online$3,295REGISTERQUOTE
ISACA CISA CertificationFebruary 9 - 12, 2026Jacksonville, FL$3,295REGISTERQUOTE
ISACA CISA CertificationFebruary 23 - 26, 2026CO Springs, CO$3,295REGISTERQUOTE
ISACA CISA CertificationMarch 9 - 12, 2026Live Online$3,295REGISTERQUOTE
ISACA CISA CertificationMarch 9 - 12, 2026Norfolk, VA$3,295REGISTERQUOTE
ISACA CISA CertificationMarch 16 - 19, 2026Sacramento, CA$3,295REGISTERQUOTE


CISA Requirements & Prerequisites:

CISA candidates are required to meet the following requirements prior to attending the CISA Bootcamp and CISA Exam:

A minimum of five years of work experience in the fields of IS auditing, control, assurance or security. Work experience must be gained within the 10-year period preceding the application date for certification or within five years from the date of initially passing the exam.

Certifications Earned During This Bootcamp: CISA

Updated: September 23, 2025

Certification Image

Why choose Test Pass Academy?

Your Instructor Has Vast Experience in the Field

Quotation MarkThe class went great. Michael was an excellent teacher. He has vast experience in the field and used great real world examples to help understand concepts. Thank you for the opportunity to take this bootcamp with such a qualified teacher.Quotation Mark

Thanks again, Robert
Booz Allen Hamilton

Experience and High Energy Teaching Style

Quotation MarkFred is a fantastic instructor, with his background, experience and high energy teaching style I definitely have a great deal of confidence in passing the test first time through. I definitely will recommend your class for any future CISSP candidates.Quotation Mark

V/R, Chuck US Navy

Instructor for the Course Was Outstanding

Quotation MarkI had a great experience and thought that the test center was top notch. The material that has to be covered for an exam like these is very extensive. The instructor for the course was outstanding, and knew the Windows platform in and out.Quotation Mark

Sean
DoD Contractor

I Learned a lot and Passed the Test

Quotation MarkThe Security Plus class went very well!! I learned a lot, passed the test, and Tracy was an excellent instructor. I felt it was very valuable training for my job and was very satisfied with my experience with Test Pass Academy. Thank you for everything.Quotation Mark

V/R,
Addy - US Air Force

For more information on our Training, call us at 1-888-418-7051 or via email at info@testpassacademy.com