ISACA CISA Training Course
In today’s dynamic environment, the ability to keep information secure is top-of-mind for companies large and small. To combat increasing and changing security threats, information security professionals need to keep skills and knowledge current. This high-level, next-gen training course, delivered in five domains, provides you with the mastery needed to apply your knowledge to real-world scenarios and confidently pass the CISA exam.
NEXT-GEN ONLINE ISACA CISA TRAINING
ISACA CISA TRAINING
Our ISACA CISA four-day training boot camp is designed to give you the tools needed to develop, manage, and supervise programs that reduce security breaches. Expect next-gen virtual training, expert instructors, and white glove service.
Key Features of ISACA CISA Training Exam Voucher Included
Exam Voucher Included
No public courses are currently scheduled, but we can deliver this course onsite at your location. Contact us for a quote.
OUR ISACA CISA INSTRUCTORS
Mark Hillyard (CISSP, ITIL Expert, ITIL MP) has worked in the IT industry for more than 20 years, including as a Public Key Infrastructure (PKI) and Domain Name System (DNS) Architect for GoDaddy.com. His experience ranges from some of the largest system infrastructures supporting the internet to boutique, game-changing start-ups. He has led large-scale data center asset management initiatives and has developed and managed such systems for enterprise infrastructures. Now a full-time Senior Advisor and resident InfoSec guru, Mark is helping transform IT organizations through process management, security development, and training.
MARGUERITE FINNIGAN, PHD
Marguerite is a cyber security consulting and training specialist with a passion for increasing awareness and technical understanding of global security threats and solutions. She has worked in the IT field since the mid-1980s and has worked around the world for the last 10 years training executives and operatives in major corporate organizations, financial institutions, and military organizations. She has addressed audiences at national conferences on behalf of (ISC)², where she has been a lead cyber security instructor for 10 years. She currently holds a “Secret” level security clearance with the US government.
"I liked that the training was dynamic – that it went beyond lectures to include hands-on activities and group work to solidify the information our employees received. The best thing about this whole experience has been how the training has transformed us as a company, and we’re still going through that transformation. If I had to rate the experience of working with Beyond20, I’d give them an 11 out of 10. They were invested in our business and what we were trying to do right from the start – and we’ve had great success as a result."
Debbie L., Director of HR
“It was huge for Board of Pensions (BOP) to start speaking the same language, have a common understanding, be equipped to drive culture change, and change everyone’s thinking. Now, the team is creating something together."
Nick , Assistant Director, Service Desk
"One important factor that makes Beyond20 a great organization is that the instructors work as consultants to organizations both in the private and public sector. The instructors have an excellent command of the material and have real-world experience with designing and implementing these principles. With their background, they can adapt discussion to a particular client and help students understand concepts based on how they fit into their organizations.”
Lucinda F., Manager, IT Field Operations
"The instructor knew his stuff! The materials were well designed and the course was well paced and very appropriate for our group."
Allan C., Project Engagement Manager
Need training for a group?
FREQUENTLY ASKED QUESTIONS
This domain focuses on the development and implementation of a risk-based IT audit strategy; planning audits, and conducting audits in accordance with IT audit standards; reporting audit findings and making recommendations; and conducting follow-ups or preparing status reports.
In this session of our ISACA CISA training, the focus is on evaluating the effectiveness of the IT governance structure; evaluating IT organizational structure and human resources management; evaluating an organization’s IT policies, standards, and procedures; evaluating the adequacy of the quality management system; evaluating IT management and the monitoring of controls; evaluating risk management practices; and evaluating an organization’s business continuity plan.
We’ll take an in-depth look at how to evaluate business cases for proposed investments in information; evaluate project management practices and controls; conduct reviews to determine if a project is progressing according to project plans; evaluate controls for information systems; evaluate the readiness of information systems for implementation and production migration; and conduct post implementation systems reviews.
This component of the ISACA CISA training takes a look at conducting periodic information systems reviews; evaluating service level management practices; evaluating third-party management practices; evaluating data administration practices; evaluating the use of capacity and performance monitoring tools and techniques, and evaluating change, configuration, and release management practices.
The emphasis of this domain is on evaluation. We’ll take a look at information security processes, standards and procedures; the design, implementation, and monitoring of system and logical security; the design, implementation, and monitoring of physical access and environmental controls; and the processes and procedures used to store, retrieve, transport, and dispose of information assets.
Subject Matter Expertise
We understand that your goal is to learn effectively and get certified in one shot. After all, certification training can be a substantial investment. As such, it’s critical to us that you learn from someone who will help you retain key concepts and get you across the finish line efficiently.
But at the same time, who wants to take a boring class? If we’re going to spend a lot of time looking at screens, the material should at least be engaging. That’s why we’re hyper-focused on bringing variety to your virtual training experience. People learn differently, so we use several methods to teach concepts throughout the day.
White Glove Service
We all know that bad customer service is one of the most frustrating things there is. That’s why we’ve endeavored to create the kind of training experience that we would want for ourselves.
We're a US-based organization with offices in DC, Phoenix, and San Diego. Come through! Otherwise, we'll be happy to meet you virtually.
Rest assured: At Beyond20, our instructors are some of the world’s best. Not only does our training staff have decades of experience leading real-world cyber security initiatives, but in many cases, we are the official authors of authoritative publications (e.g., ITIL). Working with Beyond20 means learning from the top subject matter experts out there. It means training and taking your exams with confidence.
Next-Gen Virtual Training
Depending on the course, this can include interactive whiteboards, breakout rooms, virtual sticky note walls, and more. We take this approach not only because it's more fun than simply memorizing terms, but because it works.
From the instant that you first reach out to us with a quick question, to that glorious moment when you learn you’ve earned the certification, our job is to make sure that every interaction you have with us is a positive one. If you look at our hundreds of Google-verified reviews, you’ll see that we take it seriously! Beyond20 is not a risky choice.
If you're PMP-certified, our courses will earn you PDUs!