ISACA

Meet the challenges of modern enterprises in 2026 with ISACA certifications.

Information technology professionals in the fields of governance, control, risk, security and audit/assurance drive strategy in their organizations, and ISACA facilitates the transformative change needed to compete as individuals and enterprises.

  • 300,000+ Certifications awarded to date
  • 186 Countries with certification holders
  • 90%+ Of certification holders renew

The pace of change in technology is rapid. Start today with ISACA’s most in-demand credentials.

HRDC Claimable and Malaysian Bumiputeras are eligible for Yayasan Peneraju Financing Scheme. T&C applies.

Meet the challenges of modern enterprises in 2026 with ISACA certifications.

Information technology professionals in the fields of governance, control, risk, security and audit/assurance drive strategy in their organizations, and ISACA facilitates the transformative change needed to compete as individuals and enterprises.

  • 300,000+ Certifications awarded to date
  • 186 Countries with certification holders
  • 90%+ Of certification holders renew

The pace of change in technology is rapid. Start today with ISACA’s most in-demand credentials.

HRDC Claimable and Malaysian Bumiputeras are eligible for Yayasan Peneraju Financing Scheme. T&C applies.

Meet the challenges of modern enterprises in 2026 with ISACA certifications.

Information technology professionals in the fields of governance, control, risk, security and audit/assurance drive strategy in their organizations, and ISACA facilitates the transformative change needed to compete as individuals and enterprises.

  • 300,000+ Certifications awarded to date
  • 186 Countries with certification holders
  • 90%+ Of certification holders renew

The pace of change in technology is rapid. Start today with ISACA’s most in-demand credentials.

HRDC Claimable and Malaysian Bumiputeras are eligible for Yayasan Peneraju Financing Scheme. T&C applies.

  • 1 Day ILT, VILT

    COBIT is a framework for the governance and management of enterprise Information and Technology that supports enterprise goal achievement. This one-day COBIT2019B: COBIT 2019 Bridge course highlights the concepts, models and key definitions of the new framework and explains the differences between this recent release of COBIT 2019 with COBIT 5.

  • 3 Days ILT, VILT

    COBIT 2019 helps enterprises maximize the value of their technology investments. Throughout its history, COBIT has been used by enterprises around the world to significantly and sustainably improve the management of enterprise IT and governance.  In the age of technology-enabled business strategies, the COBIT 2019 framework has emerged as an indispensable framework.

    COBIT 2019 builds on the popular COBIT5 framework which provides globally accepted principles, practices, analytical tools and models designed to help business and IT leaders maximize trust in, and value from, their enterprise’s information and technology assets. COBIT 2019 continues to integrate existing ISACA risk and value management frameworks into an established governance framework provided for in earlier versions of COBIT.

    COBIT 2019 provides upgraded guidance to executives and those charged with making decisions concerning the use of technology in support of organizational objectives. This framework helps both business and technology leaders address the needs of all stakeholders, from shareholders to regulators, across the enterprise.

  • 3 Days ILT, VILT

    Learn, train and grow with Cybersecurity Fundamentals.

    As the cyber landscape continues to evolve rapidly, it is not enough to rely solely on knowledge and theory. Cybersecurity Fundamentals training is a performance-based testament to your real-life skills and experience and proclaims that your commitment, tenacity, and abilities exceed expectations.

    This course is a comprehensive understanding of Cybersecurity’s key concepts, the impacts on your business, and the integral role of a cybersecurity professional in protecting enterprise data and infrastructure.

    Cybersecurity Fundamentals offers a certificate in the introductory concepts that frame and define the standards, guidelines, and practices of the industry. The certificate and related training are an ideal way to get started on a career in Cybersecurity. These skills are in high demand as threats continue to plague enterprises around the world. This knowledge-based certificate can enable you to:

    • Demonstrate your understanding of the principles that frame and define Cybersecurity and the integral role of cybersecurity professionals in protecting enterprise data.
    • Add a credential to your resume/CV that will distinguish you from other candidates for advancement or a new job.
    • Stay ahead of the curve on your current career path or start your new cybersecurity career strong.

    The purpose of the ISACA® Cybersecurity Fundamentals qualification is to measure whether a candidate has sufficient knowledge and understanding of the key concept principles by defining Cybersecurity and the integral role of cybersecurity professionals in protecting cyber assets in the modern world.

    Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.

    Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read: 

    → Top ISACA Cybersecurity Certifications 2024 | Career Advancement 

     Incorporating ISACA Certifications into Corporate Training Program 

     ISACA’s CISM vs CRISC: Which Certification Is Right for You? 

     Your Ultimate Guide to the ISACA CISM Certification 

     Become a leader with ISACA: Cybersecurity Leadership 

  • 3 Days ILT, VILT

    This Data Science Fundamentals Certificate course introduces you to data science, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security. Data science demands skilled professionals who possess the knowledge, skills, and ability to address the evolving threat landscape.

  • 3 Days ILT, VILT

    This AI Fundamentals Certificate course introduces you to Artificial Intelligence (AI), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security

    AI focuses on building smart machines capable of performing tasks that typically require humans and is drastically increasing in demand as it continues to change the future of virtually every field of technology. With AI Fundamentals, you’ll learn how understanding AI’s risks and potential can fast-track your career.

  • 3 Days ILT, VILT

    This Blockchain Fundamentals Certificate course introduces you to Blockchain, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security

  • 3 Days ILT, VILT

    This Cloud Fundamentals Certificate course introduces you to Cloud Computing, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.

  • 3 Days ILT, VILT

    This IoT Fundamentals Certificate course introduces you Internet of Things (IoT), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.

  • 2 Days ILT, VILT

    Learn, train and grow with IT Risk Fundamentals.

    The IT Risk Fundamentals Certificate Program by ISACA offers a comprehensive understanding of IT risk management principles, methodologies, and best practices. Participants will develop the skills and knowledge needed to identify, assess, mitigate, and manage IT risks in alignment with ISACA’s standards and frameworks.

    The IT Risk Fundamentals Certificate covers the principles of IT risk management, the responsibilities and accountability for IT risk, how to build risk awareness and how to communicate risk.

  • 2 Days ILT, VILT

    The IT Audit Fundamentals Certificate provides knowledge and performance-based learning that empowers early professionals to gain insights into the principles of audit and build a foundation of knowledge and skill to be a successful IT auditor and a valuable step on the pathway to earning the CISA® Certification.

    There are 55 questions on the exam which must be completed in two hours. It is available online in-person testing centers where available

  • 3 Days ILT, VILT

    The Cybersecurity Audit Certificate Program provides audit/assurance professionals with the knowledge needed to excel in cybersecurity audits. It provides security professionals with an understanding of the audit process, and IT risk professionals with an understanding of cyber-related risk and mitigating controls.

  • 2 Days ILT, VILT

    Bring trust and insight to a world shaped by artificial intelligence.

    AI is no longer on the horizon. Organizations are embedding AI into the core of business operations, decision-making and automation. As these systems grow more complex and influential, audit professionals must evolve to ensure they are governed effectively, aligned to strategic goals, and ethically sound. Without specialized AI audit capabilities, organizations risk falling behind in both compliance and innovation.

    ISACA’s AAIA certification bridges this critical skills gap by equipping credentialed auditors with the ability to audit machine learning models, intelligent automation tools, and data-driven decision systems. More than just oversight, AAIA prepares you to use AI to enhance the audit process itself.

    This two-day, instructor-led course provides IS auditors with the foundational knowledge and background of AI solutions to evaluate their proper governance, design, development, and security to apply their expertise in audit and assurance activities in the enterprise. The course is structured to align with the job practice and features a variety of knowledge check questions, case studies, activities, and discussions designed to apply the concepts to real-life business scenarios.

Go to Top