Globally, organizations of all sizes need IT security auditors to assess and identify vulnerabilities in their computer systems. The first step to establishing yourself as a specialized information security auditor is to earn your Certified Information Systems Auditor (CISA) certification. This 100% online training course, which can be started at any time, will help you master cybersecurity best practices and prepare you for the industry-recognized CISA exam in as little as six months.
According the U.S. Bureau of Labor Statistics, demand for information security auditors is expected to grow 32% over the next eight years. The BLS also states that the average salary for these professionals is just under $100,000 per year, with top earners making nearly $159,000.
For more information, email [email protected].
Industry-recognized credential: ISACA (Information Systems Audit and Control Association®)
Complete in: Six months or less
Yes. This course will fully prepare you to test on the five domains covered in the Certified Information Systems Auditor certification exam: auditing, governance, implementation, management and protection.
The CISA designation proves a professional's ability to assess threats and vulnerabilities in IT business processes, as well as create technology controls to protect valuable assets. While not required, CISA is a globally-recognized certification that is seen as a benchmark for senior-level experience in the IT and IS security field.
Absolutely. In addition to the 32% job growth forecasted by the U.S. Bureau of Labor Statistics, a Global Knowledge survey listed CISA as the third-highest-paying certification in IT security.
There are many job titles available to CISAs including: internal audit director, IT manager, IT auditor, information security auditor, information systems auditor or audit manager and internal auditing manager.
Workforce Development offers financial assistance for many workforce training programs through the Propel program and other resources. Email [email protected] for more information.
Recall and identify key concepts related to IT auditing, cybersecurity, risk management, and internal controls.
Describe the fundamental principles of information systems auditing and risk management, including how to assess internal controls and evaluate cybersecurity practices.
Implement auditing techniques and risk management strategies in real-world scenarios, demonstrating the ability to evaluate and audit information systems for compliance.
Examine the effectiveness of internal controls and cybersecurity practices within an organization and identify potential risks or vulnerabilities.
Assess and determine the appropriate auditing and risk management solutions for various organizational needs, ensuring compliance with industry standards and regulations.
Introduction and Assessment Test
IT Governance and Management
The Audit Process
IT Life Cycle Management
IT Service Management
IT Infrastructure
Business Continuity and Disaster Recovery
Information Security Management
Identity and Access Management
Conducting a Professional Audit
Popular Methodologies, Frameworks, and Guidance
Certification Exam Preparation
96
1
ISACA
https://www.isaca.org/credentialing/cisa
Governance
IT Risk Assessment
Risk Response and Reporting
Information Technology and Security
No
Prior to course enrollment, students should have a basic understanding of Information Technology (IT), including computer systems, networking, and cybersecurity principles. A background in auditing, risk management, or business operations is helpful but not required.
None
None
80% attendance
Actively participate in class, including discussions and independent and group activities.
,Complete assigned labs and projects.
N/A
Individuals who want to expand their knowledge and skills to evidence relevant competencies or those who want to successfully prepare for the relevant industry certification exam(s).
Internal Auditors, Cyber Threat Analysts, Cybersecurity Engineers, Continuous Improvement Engineers
According to Lightcast, there is a need particularly in banking, cybersecurity, technology services, and government sectors due to the ongoing demand for skilled professionals in these areas.
Continuous Improvement Engineers
Cybersecurity Engineers
Cyber Threat Analysts
Internal Auditors
Details | Section | Date(s) | Location | Price | Seats | 311603 | 06/19/25 - 10/09/25 | MS Teams Virtual Learning Platform | 203.00 | 12 | Register |
---|
If you would like to be notified when additional sections become available, please use Wake Tech's Notify Me service.