ISACA Certification Prep
Domain guides, practice questions, and exam strategies for ISACA credentials — CISM, CISA, CRISC, CDPSE, and CGEIT. Built for IT governance, audit, and risk management professionals.
Use the selector below to pick a certification and choose how you want to study — guides, practice exams, games, or curated resources.
CISM — Certified Information Security Manager
The management-level credential for information security leaders. CISM is widely required for CISO, security director, and security manager roles. It focuses on governance, risk management, and programme management — not hands-on technical skills. Requires five years of information security work experience, including three years in information security management in at least three of the four domains.
Information Security Governance
Establishing and maintaining an information security governance framework aligned to organisational objectives. Covers: security strategy development, security programme charter, organisational structure and roles, integration with enterprise governance (board and executive engagement), legal and regulatory compliance landscape, and security policy hierarchy (policy, standards, procedures, guidelines). Key concept: security governance vs. security management.
Information Risk Management
Identifying and managing information risk in alignment with business objectives. Covers: risk identification and assessment methodologies (qualitative and quantitative), risk register maintenance, threat and vulnerability analysis, risk treatment options (accept, mitigate, transfer, avoid), residual risk management, risk appetite and tolerance definition, and third-party risk management integration.
Information Security Program
Developing and managing an information security programme that supports business objectives. Covers: programme objectives and roadmap development, security controls framework (NIST CSF, ISO 27001, CIS Controls), security awareness and training programme design, security metrics and reporting (KPIs, KRIs), security architecture integration, third-party security management, and security programme budget management. Highest-weight domain — study thoroughly.
Incident Management
Developing an incident management capability and responding to information security incidents. Covers: incident management plan development, incident classification and escalation criteria, crisis communication planning, evidence preservation and chain of custody, business continuity and disaster recovery integration, post-incident review and lessons learned, and regulatory notification obligations (GDPR 72-hour rule, SEC disclosure requirements, state breach notification laws).
CISM exam mindset
Like CISSP, CISM questions require a management perspective. When multiple answers look correct, select the one that:
- Prioritises risk-based decision making over technical fixes
- Aligns security decisions to business objectives first
- Involves senior management or board engagement for strategic decisions
- Chooses policy/governance responses before technical controls
- Considers cost-effectiveness and proportionality (not "maximum security")
CISA — Certified Information Systems Auditor
The leading credential for IT auditors, audit managers, and IT governance professionals. CISA validates the skills to audit, control, monitor, and assess information systems. Requires five years of professional experience in IS audit, control, or security. Three years of verified experience can be substituted with education or other certifications.
Information System Auditing Process
ISACA IS audit standards and guidelines, audit planning and risk assessment, audit execution methodology (sampling, evidence gathering, testing), control evaluation, audit reporting and follow-up. Key: understanding the difference between compliance, substantive, and analytical audit procedures. CISA auditors follow ISACA's IS Audit Standards — ensure you know these.
Governance & Management of IT
IT governance frameworks (COBIT, ISO 38500), IT strategy alignment with business goals, IT organisational structure and roles, IT policies and procedures audit, IT investment management, IT human resources management, IT performance monitoring, and IT-related laws and regulations relevant to audit.
Information Systems Acquisition, Development & Implementation
Project management and governance audit, SDLC auditing (requirements, design, testing, UAT, go-live controls), change management controls, post-implementation review, and acquisition and vendor management audit (RFP process, contract controls, SLA monitoring).
Information System Operations & Business Resilience
IT operations audit (job scheduling, incident management, problem management, capacity management), IT infrastructure audit (hardware, networks, databases), business continuity planning audit, disaster recovery audit (RTO/RPO validation, testing results), and environmental controls audit (physical security, power, HVAC).
Protection of Information Assets
Information security governance audit, logical access controls audit (IAM, privileged access, authentication), network security audit (firewall rules, DMZ, encryption), data classification and handling audit, vulnerability management programme audit, and incident response capability audit. Highest-weight domain — prioritise in study plan.
CRISC — Certified in Risk and Information Systems Control
The specialist credential for IT risk and control professionals. CRISC validates the skills to identify, assess, evaluate, and manage IT risk and implement appropriate controls. Requires three years of cumulative work experience in at least two CRISC domains, with at least one year in Domain 1 or Domain 2.
Governance
Organisational governance and risk culture, risk appetite and tolerance definition, enterprise risk management (ERM) framework alignment (COSO ERM, ISO 31000), IT risk strategy development, risk ownership and accountability structures, and the role of the IT risk function within the three lines of defence model.
IT Risk Assessment
Risk identification and scenario analysis, risk assessment methodologies (qualitative: likelihood/impact matrices; quantitative: ALE, ARO, SLE), threat modelling, vulnerability assessment integration with risk process, inherent risk vs residual risk calculation, and IT risk register development and maintenance.
Risk Response and Reporting
Risk treatment selection and implementation, control design and evaluation (preventive, detective, corrective, compensating), control testing and assurance, risk reporting to senior management and boards (KRIs, heat maps, dashboards), management of risk exceptions, and emerging risk monitoring. Highest-weight domain.
Information Technology and Security
IT concepts relevant to risk and control (infrastructure, applications, data, cloud), IT architecture and design risk considerations, cybersecurity risk (threat intelligence, vulnerability management, incident response from a risk perspective), and technology risk in the context of digital transformation and third-party systems.
CDPSE — Certified Data Privacy Solutions Engineer
ISACA's technical privacy certification, distinct from legal/compliance privacy credentials. CDPSE focuses on implementing privacy by design, building privacy-enhancing technologies, and engineering privacy controls into systems and data pipelines. Requires two years of experience in privacy governance, privacy architecture, or data lifecycle management.
Privacy Governance
Privacy frameworks and regulations (GDPR, CCPA/CPRA, LGPD, PIPL, APPI), privacy programme structure, privacy impact assessments (PIA/DPIA), records of processing activities (ROPA), data classification for privacy, privacy roles (DPO, Privacy Engineer, Data Steward), and privacy-by-design and privacy-by-default principles.
Privacy Architecture
Privacy-enhancing technologies (PETs): differential privacy, homomorphic encryption, secure multi-party computation, federated learning, k-anonymity, and data masking/pseudonymisation. Identity and access management from a privacy perspective, consent management platform architecture, data minimisation design patterns, and privacy-preserving analytics. Highest-weight domain — highly technical.
Data Lifecycle
Data inventory and mapping, data flow diagrams (DFD), data retention and destruction policies and technical implementation, cross-border data transfer mechanisms (Standard Contractual Clauses, Adequacy Decisions, Binding Corporate Rules), data subject rights implementation (right to access, right to erasure, right to portability), and data breach response engineering.
CGEIT — Certified in the Governance of Enterprise IT
The senior governance credential for IT executives, CIOs, and governance professionals. CGEIT validates the skills to govern the use of IT to create value for the organisation. Requires five years of management, advisory, or assurance experience in IT governance. Less common than CISM or CISA but increasingly valued in board and executive governance contexts.
Governance of Enterprise IT
IT governance frameworks (COBIT 2019, ISO/IEC 38500, ITIL), IT governance structures (board IT committees, IT steering committees), governance culture and behaviour, IT governance assurance, and integrating IT governance with enterprise governance. Largest domain — two of every five questions.
IT Resources
IT resource management (people, processes, information, technology, infrastructure), IT human capital management, IT sourcing strategy (make/buy/outsource decisions), vendor management governance, IT financial management (budgeting, chargeback, TCO), and IT asset management.
Benefits Realisation
IT investment portfolio management, business case development and approval, IT programme and project governance, value measurement and benefits tracking, IT performance management (balanced scorecard, KPIs), and post-implementation review processes.
Risk Optimisation
Enterprise risk management integration with IT governance, risk appetite governance, IT risk culture, cybersecurity governance oversight (not operational), compliance governance, and resilience governance (BCM programme oversight).
Practice Questions — ISACA
ISACA questions are scenario-based and require prioritising governance and risk management decisions. Always choose the most risk-aligned, business-justified, and governance-appropriate answer.
1. (CISM) A new CISO has been hired at an organisation that has no formal information security programme. Which is the MOST important first step?
2. (CISA) An IS auditor discovers that a company has implemented compensating controls for a control that failed. What should the auditor do FIRST?
3. (CRISC) An organisation is considering accepting a risk because the cost of mitigation exceeds the potential financial impact. Which action should the risk manager take NEXT?
CISM Study Plan for Working Professionals
CISM requires management-level thinking more than technical knowledge. Most candidates need 150–250 study hours. This 12-week plan targets ~15 hours/week.
Weeks 1–3: Governance and Strategy
- Domain 1 — Information Security Governance (2 weeks)
- Review key frameworks: NIST CSF, ISO 27001, COBIT
- Week 3: Domain 2 — Information Risk Management
Weeks 4–7: Programme and Incident Management
- Week 4–5: Domain 3 — Information Security Programme (highest weight)
- Week 6–7: Domain 4 — Incident Management
- Study regulatory breach notification timelines (GDPR 72h, SEC, state laws)
Weeks 8–10: Practice and gaps
- Week 8: First full-length practice exam (150 questions, 4 hours timed)
- Week 9: Deep-dive on weakest two domains
- Week 10: Management mindset drills — practise choosing the "most governance-aligned" answer
Weeks 11–12: Final preparation
- Week 11: Two additional full-length practice exams; target ≥ 75%
- Week 12: Review ISACA terminology (controls, KPIs, KRIs, risk appetite vs tolerance)
- Exam day: Read all answer choices before selecting; think "what would a CISO advise?"
Free & reputable ISACA study resources
- Official blueprint: ISACA CISM exam content outline (free PDF) — download and study directly from this; it tells you exactly what the exam covers and in what proportion
- Free practice questions: ISACA official CISM sample questions — the only questions guaranteed to reflect the exam body's perspective
- Free video: Hemang Doshi's YouTube channel — free CISM/CISA concept walkthroughs; consistently cited in community pass posts
- Free chapter study groups: ISACA local chapters — most run free exam prep sessions; join your nearest chapter or attend online
- Community: r/cism and ISACA Engage — read recent "I passed" posts for real study breakdowns
- Key framework reading: ISACA COBIT 2019 overview (free) — understand governance concepts referenced throughout the exam
Flashcards & Term-Matching Game
Active recall beats passive reading for long-term retention. Use the flashcards to drill definitions and the matching game to reinforce connections between concepts. Shuffle to mix domains and reset to start fresh. Keyboard navigation supported on flashcards.
Flashcard Deck — Key Terms
Loading flashcards… ensure JavaScript is enabled.
Term-Matching Game
Click a term on the left, then click its matching definition on the right. Correct pairs lock in green; wrong pairs flash red. Complete all pairs to advance to the next round.
Loading matching game… ensure JavaScript is enabled.
Speed Round — True or False
You have 10 seconds per statement. Answer TRUE or FALSE before the timer runs out. Build a combo multiplier for consecutive correct answers and beat your session high score.
Loading speed round… ensure JavaScript is enabled.
Fill in the Blank
Read the clue and type the missing term. One typo is forgiven for longer answers. Use the hint button if you're stuck — but it costs half the question's points.
Loading fill-in-the-blank… ensure JavaScript is enabled.
Domain Sprint — Categorise the Term
A term appears — click the correct exam domain it belongs to. Correct selections score 100 pts; wrong selections deduct 25 pts. Master domain knowledge before exam day.
Loading domain sprint… ensure JavaScript is enabled.
Explore other certification tracks
Practice Questions — CISM & CISA
ISACA questions require a management and governance mindset. When faced with multiple plausible answers, select the one that demonstrates the most comprehensive risk management approach — not the most technically specific answer.
1. (CISM) The information security manager discovers that a business unit has deployed a cloud application without security review. What should be the FIRST course of action?
2. (CISM) Which metric BEST measures the effectiveness of an organisation's information security programme?
3. (CISA) During an IS audit, an auditor discovers that developers have production database access. The IS manager argues this has always been the case and has never caused an issue. What should the auditor do?
4. (CRISC) An organisation's risk register shows 47 open risks. Leadership wants to know which risks to prioritise for immediate treatment. Which approach should be used?
5. (CISM) A ransomware attack has encrypted data on 200 production servers. The incident response team has contained the attack. What is the NEXT step?
6. (CISM) An information security manager wants to ensure the security strategy remains aligned with business objectives. What is the MOST effective way to achieve this?
7. (CISA) An IS auditor is reviewing an organisation's change management process. Which finding represents the GREATEST risk?
8. (CGEIT) The board of directors asks the IT governance committee what percentage of the IT budget should be allocated to cybersecurity. What is the BEST response?
Practice Questions — CDPSE
CDPSE (Certified Data Privacy Solutions Engineer) is ISACA's only technical privacy credential — combining privacy governance with implementation engineering. Heavily tested topics: privacy by design, data lifecycle management, consent management, and cross-border data transfer mechanisms.
1. An organisation is designing a new customer data platform. Which Privacy by Design principle BEST ensures user data is collected only when strictly necessary?
2. A multinational organisation transfers personal data from the EU to a subsidiary in a country without an adequacy decision. Which mechanism is MOST appropriate to establish a lawful basis for the transfer under GDPR?
3. An organisation processes user health data and wants to perform analytics while protecting individual identity. Which technique provides the STRONGEST irreversibility?
4. A user submits a Data Subject Access Request (DSAR) under GDPR. The organisation must respond within what timeframe?
5. An organisation deploys a machine learning model that uses customer personal data. Which control is MOST important to satisfy GDPR Article 22 (automated decision-making)?
Interactive Practice Exam — CISA
Eighteen scenario-style items across the five CISA job-practice domains. The CISA exam is famous for testing JUDGEMENT — choosing between four plausibly correct answers based on the auditor's perspective. Every question walks through that reasoning explicitly, with citations to ISACA ITAF, COBIT, PCI DSS, ISO, and NIST.
Loading the interactive practice exam… If it does not load, ensure JavaScript is enabled.
Real-World Walkthrough: The 2020 Wirecard Collapse & Audit Failure
Wirecard AG was a German DAX-30 payments processor that collapsed in June 2020 after admitting €1.9 billion of supposed trust-account cash did not exist. Auditor Ernst & Young had signed off for over a decade. The case is a textbook illustration of nearly every CISA domain — independence, evidence reliability, third-party assurance, segregation of duties, and governance.
Timeline
- 2008–2018: Wirecard reports rapid growth in 'third-party acquiring' (TPA) operations in the Philippines, Singapore, and Dubai. Cash balances are allegedly held with trustee banks in escrow. EY confirms balances by reviewing audit-confirmation letters supplied via the trustee — never independently from the bank.
- January 2019: Financial Times reports document forgery allegations from a Singapore whistleblower. Wirecard sues the FT. BaFin (the German regulator) opens an investigation — into the FT journalists for market manipulation, not Wirecard.
- October 2019: Wirecard commissions a 'special audit' from KPMG. KPMG cannot verify the existence of €1 billion in TPA cash because the trustees refused to provide bank statements directly.
- April 28, 2020: KPMG publishes a damning report — many transactions had 'no documentary evidence' that they were real. Wirecard's stock falls 26%.
- June 18, 2020: EY refuses to sign the 2019 accounts. Wirecard admits €1.9 billion in trustee cash 'probably does not exist.' CEO Markus Braun is arrested. Stock falls 99%. Company files insolvency.
- 2021–2024: EY Germany faces multiple lawsuits and a €500k+ professional sanction. Germany's audit oversight (APAS) finds EY breached due-care obligations. Braun's criminal trial concludes with a 2024 conviction.
Map to CISA domains
- Domain 1 — IS Auditing Process: EY accepted audit confirmations RELAYED THROUGH the auditee instead of independently confirming with the trustee banks. CISA evidence hierarchy mandates direct independent confirmation as more reliable than auditee-supplied documents — exactly the standard that was breached.
- Domain 1 — Professional Scepticism: Multiple red flags (whistleblowers, FT investigations, refusal to provide raw bank statements) over years should have triggered enhanced procedures. CISA Code of Professional Ethics requires due care and scepticism — not the trust the engagement team extended.
- Domain 2 — Governance & IT Oversight: Wirecard's supervisory board had no audit-committee member with significant cybersecurity or payments-industry expertise. COBIT 2019 requires the board to have sufficient competence to oversee material risk.
- Domain 3 — Acquisition & Development: Wirecard expanded by acquiring TPA partners with poor systems-integration controls. Acquisition due diligence (a CISA topic) should test the data-quality and reconciliation controls of the target — not just the financials.
- Domain 4 — Operations: Cash reconciliation should be a daily automated control, not an annual audit confirmation. CISA expects auditors to TEST the reconciliation control, not just the year-end balance.
- Domain 5 — Protection of Information Assets: SOX/equivalent ICFR controls require segregation between transaction initiation and approval. Wirecard reportedly had a small number of executives who could both originate and approve TPA payouts — a classic SoD violation hidden by lack of supporting evidence.
Five lessons CISA candidates must internalise
- Independent direct confirmation outranks auditee-relayed evidence — every time. If a trustee won't confirm directly, that is the audit finding.
- Whistleblower allegations + analyst short reports = expand procedures, not contract them. The CISA exam will frame this as a 'change in audit risk' scenario.
- Three-line model — operational management (1st), risk & compliance (2nd), internal audit (3rd) — must be independent in fact AND appearance. Reporting lines to the CFO are a known impairment.
- SOC 2 / ISAE 3402 reports on outsourced service providers are not optional for material processes. Wirecard's TPA partners had no Type II reports — that alone is a finding.
- Substantive AND compliance testing are required — Wirecard demonstrates the danger of relying solely on control testing without verifying the transactions themselves.
BaFin official Wirecard page → · German Bundestag Wirecard Inquiry Report →
Helpful Materials — ISACA CISA / CISM / CRISC
Treat the ISACA Review Manual as the ground truth — the exam is written from it. Every other resource below is free and designed to drill, contextualise, or simplify what the Manual already covers.
Official & primary sources (all free)
- ISACA CISA certification page — exam content outline (free PDF) — download and use as your primary study checklist
- ITAF — Information Technology Assurance Framework (free on isaca.org) — the standards your exam answers are derived from
- COBIT 2019 Design Guide overview (free) — the governance framework referenced throughout CISA and CISM; the full framework requires purchase but the overview is sufficient for the exam
- NIST SP 800 series — referenced throughout CISA Domain 4 & 5
- AICPA — SOC 1 / SOC 2 / SOC 3 official guidance (free)
- COSO — Internal Control overview (free summary)
Free practice questions
- ISACA free CISA sample questions (official) — official questions from the exam body; no signup required
- Quizlet CISA community flashcard sets (free tier) — large community-maintained question banks covering all 5 CISA domains
Free video & community
- Hemang Doshi — free CISA / CISM video walkthroughs on YouTube — concept explanations and question walkthroughs; consistently cited in ISACA community pass posts
- ISACA local chapters — most run free exam-prep study groups — attend in-person or virtually; many chapters share free study materials
- ISACA Engage community forums (free with basic account)
- r/cisa — exam-day notes, scoring debriefs — read "I passed" posts for real study breakdowns
Adjacent free reference reading
- IIA — International Standards for the Professional Practice of Internal Auditing (free)
- ISO/IEC 27001 overview (free)
- PCI Security Standards — free document library — PCI DSS v4.0 and SAQ forms; important for CISA Domain 5
CISA Cheatsheet
High-frequency frameworks, formulas, and answer-pattern heuristics. The CISA exam rewards candidates who instantly recognise these labels.
Evidence reliability hierarchy (most → least)
- Auditor's direct observation & re-performance
- External independent confirmation (e.g., bank confirmation)
- Internal documents prepared/processed outside the audited function
- Auditor-prepared analysis from auditee data
- Auditee oral or written representations
Risk formulas
- Risk = Threat × Vulnerability × Impact (or Asset Value)
- ALE = SLE × ARO; SLE = Asset Value × Exposure Factor
- Residual Risk = Inherent Risk − Control Effectiveness
- Audit Risk = Inherent × Control × Detection Risk
DR test hierarchy (assurance ↑, risk ↑)
- Checklist (paperwork only)
- Walk-through / tabletop (discussion)
- Simulation (off-line role-play)
- Parallel (recovery site runs alongside primary)
- Full interruption (primary shut down — highest risk)
RPO vs RTO
- RPO = max acceptable DATA LOSS (drives backup/replication frequency)
- RTO = max acceptable DOWNTIME (drives recovery infrastructure choice)
- MTD = Maximum Tolerable Downtime (RTO + WRT)
- WRT = Work Recovery Time (re-keying / validation after restore)
SOC reports — pick the right one
- SOC 1 — controls relevant to FINANCIAL reporting (SOX scope)
- SOC 2 — controls over Security, Availability, Confidentiality, Processing Integrity, Privacy (Trust Service Criteria)
- SOC 3 — public summary version of SOC 2
- Type I — design of controls at a point in time
- Type II — operating effectiveness over a period (6–12 months) — stronger
Sampling vocabulary
- Attribute sampling — tests YES/NO compliance with a control
- Variable sampling — tests dollar amounts / quantitative properties
- Tolerable rate — maximum deviation the auditor will accept
- Upper precision limit — observed rate + allowance for sampling risk; compare to tolerable rate
- Sampling risk — risk that the sample mis-represents the population
CISA answer-pattern heuristics
- When asked 'BEST', pick the answer that is INDEPENDENT, PROACTIVE, and RISK-BASED.
- 'PRIMARY purpose' = the strategic, mission-aligned reason — not technical.
- 'GREATEST concern' = the answer with the largest business impact + likelihood.
- Process > person. Policy > ad-hoc. Preventive > detective > corrective.
- Segregation of duties almost always trumps monitoring.
Three-line model
- 1st line — Operational management owns risk & controls
- 2nd line — Risk & compliance functions oversee
- 3rd line — Internal audit provides independent assurance
- External audit and regulators sit OUTSIDE the model.
ISACA Certification FAQ
How hard is the CISM exam?
CISM is one of the harder management-level certifications. The exam has 150 questions in 4 hours. Questions are scenario-based and require thinking as a security manager — not a technical practitioner. The global pass rate is approximately 50–55%. Five years of work experience in information security management is required (with domain-specific waivers available for up to 2 years).
CISM vs CISSP — which should I get?
CISM (ISACA) is narrowly focused on security management, governance, and risk — preferred for CISOs and security programme managers. CISSP (ISC2) is broader, spanning both technical and managerial domains. Many senior professionals hold both. If your role is purely management/governance, start with CISM. If you want a credential spanning technical and management roles, CISSP is more versatile.
What is the CISA passing score?
CISA requires a scaled score of 450 or higher on a 200–800 scale. The exam covers five domains: IS Auditing Process (21%), Governance and Management of IT (17%), IS Acquisition, Development and Implementation (12%), IS Operations and Business Resilience (23%), and Protection of Information Assets (27%). CISA requires 5 years of IS audit, control, or security experience.
Who should pursue CRISC?
CRISC (Certified in Risk and Information Systems Control) is designed for IT and security professionals who identify, assess, and manage enterprise IT risk. It is particularly valued in GRC, internal audit, and enterprise risk management roles. CRISC requires 3 years of cumulative work experience in IT risk management and IS control across at least two CRISC domains.