Certification 

 

Become a Certified Professional

 

ISACA International Events

Take your career to a higher level. Participate in one of ISACA's many international conferences, training weeks and online events

More Info >>

EXCEED YOUR POTENTIAL

Earn an ISACA certification and enhance your professional credibility. A CISA, CISM, CGEIT or CRISC after your name confirms to employers that you possess the experience and knowledge to meet the challenges of the modern enterprise.

Certification criteria:

  • Successful completion of an examination
  • Relevant experience
  • Adherence to the Code of Professional Ethics
  • Adherence to the continuing professional education program
  • Compliance with respective Standards 

To obtain detailed information about ISACA certifications and register for an exam, CLICK HERE.

Review Sessions

ISACA Sydney Chapter provides 2-day advanced boot camp review sessions, facilitated by local subject matter experts. 

Visit our Training and Events page for more information.

FACT: Past exams results have proven that candidates have a higher likelihood of achieving outstanding marks by participating in these sessions.

Certified Information Systems Auditor CISA Logo
(CISA)

The CISA certification is known worldwide
as the recognized achievement for those
who control, monitor and assess an
organization’s information technology and
business systems.

More >>

 

Certified Information Security Manager CISM certification logo
(CISM)

The management-focused CISM is a unique
certification for individuals who design, build
and manage enterprise information security
programs. CISM is the leading credential for
information security managers.
.
More >> 

 
CGEIT Logo

Certified in the Governance of
Enterprise IT (CGEIT)

CGEIT recognizes a wide range of professionals
for their knowledge and application of enterprise
IT governance principles and practices.

More >>

 

CRISC Logo

Certified in Risk and Information        
Systems Control (CRISC)

CRISC (pronounced “see-risk”) is designed
for IT professionals who have hands-on
experience with risk identification, assessment
and evaluation; risk response; risk monitoring;
IS control design and implementation; and
IS control monitoring and maintenance.
More >>