CISA Study Resources

The Certified Information Systems Auditor (CISA) is for security professionals with an interest in information systems (IS) auditing, control and security. It is a globally recognized certification for IS audit control, assurance and security professionals. It validates your experience in auditing and demonstrates you are capable of accessing vulnerabilities, reporting on compliance and implementing controls within an enterprise.

The CISA is one of the four certifications granted by ISACA. This association was established in 1969 and has franchises in 180 countries. The CISA certification was launched in 1976, and it is an attractive choice for the IT professional. Once you are CISA certified, it confirms your knowledge and experience in IS, it quantifies your expertise and it also shows you have gained all of the knowledge required for meeting the challenges in the compliance/audit world.

This article details the best study resources that are currently available for the CISA exam.

CISA Review Manual by ISACA

The CISA Review Manual (26th Edition) serves as a comprehensive study guide for the CISA exam. It includes details on the core topics that are related to the CISA. For example, it has detailed content on all the domains of the CISA. This review manual is produced independently from the CISA Certification Board. It is available in English, Spanish, Turkish, Japanese, Chinese, Italian and French.

CISA All-in-One Exam Guide

McGraw-Hill publishes this book. Its content is very comprehensive and thorough. This resource is best suited for those candidates who already have some knowledge about the content of the exam but need to associate it with ISACA-specific terminologies.

CISA Review Questions, Answers & Explanations Manual

This manual contains 1,000 multiple-choice study questions. These questions are sorted by job practice areas, allowing the candidate to refer to questions that focus on a particular domain. The sample questions (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Hannah George. Read the original post at: