This Blockchain Fundamentals Certificate course introduces you to Blockchain, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security
-
This Cloud Fundamentals Certificate course introduces you to Cloud Computing, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.
-
This IoT Fundamentals Certificate course introduces you Internet of Things (IoT), a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.
-
Bring trust and insight to a world shaped by artificial intelligence.
AI is no longer on the horizon. Organizations are embedding AI into the core of business operations, decision-making and automation. As these systems grow more complex and influential, audit professionals must evolve to ensure they are governed effectively, aligned to strategic goals, and ethically sound. Without specialized AI audit capabilities, organizations risk falling behind in both compliance and innovation.
ISACA’s AAIA certification bridges this critical skills gap by equipping credentialed auditors with the ability to audit machine learning models, intelligent automation tools, and data-driven decision systems. More than just oversight, AAIA prepares you to use AI to enhance the audit process itself.
This two-day, instructor-led course provides IS auditors with the foundational knowledge and background of AI solutions to evaluate their proper governance, design, development, and security to apply their expertise in audit and assurance activities in the enterprise. The course is structured to align with the job practice and features a variety of knowledge check questions, case studies, activities, and discussions designed to apply the concepts to real-life business scenarios.
-
Gain technical ability to match your technical knowledge.
ISACA’s Certified Cybersecurity Operations Analyst™ (CCOA™) certification focuses on the technical skills to evaluate threats, identify vulnerabilities, and recommend countermeasures to prevent cyber incidents. As emerging technologies like automated systems using AI evolve, the role of the cyber analyst will only become more critical in protecting digital ecosystems. Analysts specialize in understanding the what, where and how behind cybersecurity incidents. By identifying patterns, anomalies and indicators of compromise, you become the eyes and ears of your organization’s defense.
CCOA is administered through a hybrid exam that assesses a candidate’s knowledge and skills using a blend of traditional multiple-choice and performance-based questions.
This five-session exam-prep course combines knowledge and practice to prepare learners for the CCOA exam. Instructors are encouraged to tailor the course to the learners’ experience level. The initial domains may be better suited for review, providing more time to focus on the complex concepts in Domains 4 and 5.
-
Develop the essential skills to safely guide AI transformation with the first credential built for tomorrow’s secure enterprise.
ISACA Advanced in AI Security Management (AAISM) validates security management professionals’ ability to demonstrate their expertise in AI. This credential builds upon existing security best practices to enhance expertise and adapt to the evolving AI-driven landscape, ensuring robust protection and a strategic edge.
As AI transforms business and security architecture, enterprise risk profiles are changing dynamically. Security leaders must do more than react. They must evaluate, adapt and guide organizations through new AI-driven systems and models, ethical considerations and security tools. Professionals today require both the technical context and leadership mindset to manage AI-specific vulnerabilities with confidence.
AAISM goes beyond simply visualizing AI security. It signifies expertise in driving AI governance and program management, assessing and mitigating AI risk, and utilizing AI technologies and controls to enhance security and streamline monitoring. ISACA’s AAISM certification meets this need by building on globally recognized credentials like CISM and CISSP. It equips leaders to:
- Evaluate and secure AI-enabled systems across the enterprise
- Integrate AI into existing security operations and workflows
- Identify and respond to risks tied to AI technologies
- Reinforce governance, compliance and responsible innovation
-
The IT Audit Fundamentals Certificate provides knowledge and performance-based learning that empowers early professionals to gain insights into the principles of audit and build a foundation of knowledge and skill to be a successful IT auditor and a valuable step on the pathway to earning the CISA® Certification.
There are 55 questions on the exam which must be completed in two hours. It is available online in-person testing centers where available
-
Designed for IT professionals with technical expertise and experience in IS/IT security and control looking to transition from team player to manager.
Data breaches, ransomware attacks and other constantly evolving security threats are top-of-mind for today’s IT professionals. With a Certified Information Security Manager® (CISM®) certification, you’ll learn how to assess risks, implement effective governance and proactively respond to incidents.
The ISACA CISM certification can add credibility and confidence to interactions with internal and external stakeholders, peers, and regulators.
This cybersecurity certification indicates expertise in information security governance, program development and management, incident management and risk management.
Content in this course is:
- Aligned with the CISM job practice
- Adapted from the CISM Review Manual 16th Edition
- Reviewed by subject matter experts that hold the CISM certification
The course features an enhanced facilitator guide, additional participant resources, knowledge check questions from the CISM Questions, Answers and Explanations (QAE) database along with scenario-based activities and enrichment materials (articles, podcasts and whitepapers) selected from the ISACA website to provide learners with an opportunity to go deeper into specific areas related to the course content.
Learn more about Malaysia’s Top Cybersecurity Strategies and Trends in 2024.
Here are five insightful blog posts about ISACA and its cybersecurity certifications. Each one focuses on a different aspect of how ISACA’s training can enhance your cybersecurity career, take a read:
- Top ISACA Cybersecurity Certifications 2024 | Career Advancement
- Incorporating ISACA Certifications into Corporate Training Program
- ISACA’s CISM vs CRISC: Which Certification Is Right for You?
- Your Ultimate Guide to the ISACA CISM Certification
- Become a leader with ISACA: Cybersecurity Leadership
Explore more about cybersecurity certifications with our cybersecurity training and certifications guide.





