Certified Information Systems Auditor (CISA) courses can help you learn risk management, IT governance, and compliance frameworks, along with auditing techniques for information systems. You can build skills in assessing security controls, conducting audits, and ensuring regulatory adherence. Many courses introduce tools such as audit management software and risk assessment frameworks, providing practical experience in evaluating and improving organizational security and compliance practices.

Skills you'll gain: Audit Planning, Service Level Agreement, Data Governance, Systems Development Life Cycle, Data Loss Prevention, Security Testing, Network Security, Software Development Life Cycle, IT Management, Systems Development, Incident Management, IT General Controls (ITGC), Problem Management, Control Objectives for Information and Related Technology (COBIT), Cryptography, Cloud Management, Generally Accepted Auditing Standards, Software Development Methodologies, Auditing, Internal Controls
Intermediate · Specialization · 3 - 6 Months

Skills you'll gain: Enterprise Risk Management (ERM), IT Management, Business Continuity, Data Security, Business Continuity Planning, Disaster Recovery, Audit Planning, Information Technology, Risk Management, Data Validation, Data Management, Compliance Management, Risk Mitigation, Data Governance, Technology Strategies, Information Assurance, Security Controls, Law, Regulation, and Compliance, Project Risk Management, Auditing
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Audit Planning, Data Security, Network Security, Disaster Recovery, Cyber Attacks, Business Continuity Planning, Security Testing, Digital Forensics, Infrastructure Security, Business Continuity, Database Management, Enterprise Architecture, Internal Auditing, Compliance Management, Auditing, Quality Assurance, Cloud Computing, OSI Models, Asset Management, Quality Management
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Identity and Access Management, IT Security Architecture, Security Testing, Single Sign-On (SSO), Data Security, Contingency Planning, User Provisioning, Cryptography, Network Security, Application Security, Information Systems Security, Cryptographic Protocols, Asset Protection, Cloud Security, Computer Security Incident Management, Digital Assets, Public Key Cryptography Standards (PKCS), Incident Response, Risk Management Framework, Risk Management
Advanced · Specialization · 3 - 6 Months

Skills you'll gain: Network Security, Business Continuity Planning, Business Continuity, Audit Planning, Disaster Recovery, OSI Models, Control Objectives for Information and Related Technology (COBIT), Security Management, Computer Security Incident Management, IT General Controls (ITGC), Security Controls, Firewall, Asset Protection, Systems Development, Compliance Auditing, Information Technology, Information Systems, Security Awareness, Auditing, Cryptography
Beginner · Course · 1 - 3 Months

Skills you'll gain: Identity and Access Management, Business Continuity, Cryptographic Protocols, Network Security, Cryptography, Encryption, User Provisioning, Security Management, Penetration Testing, ISO/IEC 27001, Threat Management, Network Performance Management, Information Systems Security, Network Architecture, Cyber Operations, Data Management, Vulnerability Management, Software Development Methodologies, Cybersecurity, Configuration Management
Beginner · Specialization · 3 - 6 Months
Logical Operations
Skills you'll gain: Security Management, Information Systems Security, IT Security Architecture, Identity and Access Management, Security Architecture Review, Security Testing, Application Security, Asset Protection, Risk Management Framework, Cybersecurity, Security Controls, Risk Management, Data Security, Network Security, Infrastructure Security, Threat Modeling, Cloud Security, Incident Response, Cryptography, Network Monitoring
Mixed · Course · 1 - 3 Months

Skills you'll gain: IT Service Management, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Service Management, IT Management, Responsible AI, Compliance Auditing, Cyber Risk, Data Ethics, Cyber Governance, Information Technology, Regulatory Compliance, Auditing, Cybersecurity, Regulation and Legal Compliance, Compliance Management, Law, Regulation, and Compliance, Cyber Security Assessment, ISO/IEC 27001, Risk Management
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Computer Security Incident Management, Vulnerability Assessments, Cyber Operations, Cybersecurity, Cyber Threat Intelligence, Cyber Attacks, Cyber Security Strategy, IT Security Architecture, MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cyber Security Assessment, Network Security, Application Security, DevSecOps, Malware Protection, Security Management, Cloud Security, Encryption, Authentications
Intermediate · Specialization · 1 - 3 Months

LearnKartS
Skills you'll gain: Risk Management, Risk Analysis, Risk Management Framework, Risk Modeling, Security Management, Risk Appetite, Business Risk Management, Cyber Risk, Risk Mitigation, Threat Management, Enterprise Risk Management (ERM), Risk Control, Vulnerability Assessments, Threat Modeling, Vulnerability Management, Threat Detection, Security Controls, Stakeholder Communications, Vulnerability, Stakeholder Engagement
Mixed · Course · 1 - 4 Weeks

The Hong Kong University of Science and Technology
Skills you'll gain: Audit Working Papers, Change Control, Internal Auditing, Systems Development, Auditors Report, Risk Management, Risk Control, FinTech, Change Management, Risk Mitigation, Emerging Technologies, Project Implementation, Development Environment
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Enterprise Risk Management (ERM), IT Management, Information Technology, Risk Management, Data Management, Compliance Management, Risk Mitigation, Data Governance, Law, Regulation, and Compliance, Regulatory Compliance, Regulatory Requirements, Patch Management, Governance, Vulnerability Management, Data Ethics, Data Security, Personally Identifiable Information, Data Storage, Vendor Management, Generally Accepted Auditing Standards
Intermediate · Course · 1 - 4 Weeks