Certifications

Certification Training Courses Information (Free)

CISA/CISM/CGEIT Class of Fall 2020!

Let me take a moment to introduce myself – My name is Helen Zell and I am the ISACA Certifications coordinator. I am excited to invite you to partake in our free fall training programs for either the CISA, CISM, or CGEIT. These programs will consist of 6 sessions for the CISA, 5 sessions for the CISM, or 5 sessions for the CGEIT, and will be guided by some of the best mentors we have in Colorado! Each week different IT professionals, who have passed the CISA, CISM, and CGEIT exam, will teach a 4 hour long class via a virtual meeting.

There are also courses you can pay to take, via the web. The remainder of this section discusses the Free courses offered by the Denver Chapter.

1. Logistics

These sessions are now provided virtually via Zoom meetings. Upon receiving your RSVP to one of our classes, we will send out the meeting invite the week before the sessions begin.

2. Sessions 
A)  CISA Review Sessions

Domain

Date

Introduction & Domain 1: The Process of Auditing Information Systems

September 19th, 2020 (9 AM -1 PM)

Domain 2 - Governance and Management of IT

September 26th, 2020 (9 AM -1 PM)

Domain 3 - Information Systems Acquisition, Development, and Implementation

October 3rd, 2020 (9 AM -1 PM)

Domain 4 - Information Systems Operations, Maintenance and Support

October 10th, 2020 (9 AM -1 PM)

Domain 5 - Protection of Information Assets

October 17th, 2020 (9 AM -1 PM)

CISA Exam Review

October 24th, 2020 (9 AM -1 PM)


B) CISM Review Sessions

Domain

Date

Domain 1 - Information Security Governance

September 19th, 2020 (9 AM -1 PM)

Domain 2 - Information Risk Management

September 26th, 2020 (9 AM -1 PM)

Domain 3 - Information Security Program Development and Management

October 3rd, 2020 (9 AM -1 PM)

Domain 4 - Information Security Incident Management

October 10th, 2020 (9 AM -1 PM)

CISM Exam Review

October 17th, 2020 (9 AM -1 PM)


C) CGEIT Review Sessions

Domain

Date

Domain 1 – Introduction and Governance of Enterprise IT

September 19th, 2020 (9 AM -1 PM)

Domain 2 – IT Resources

September 26th, 2020 (9 AM -1 PM)

Domain 3 – Benefits Realization

October 3rd, 2020 (9 AM -1 PM)

Domain 4 – Risk Optimization

October 10th, 2020 (9 AM -1 PM)

CGEIT Exam Review

October 17th, 2020 (9 AM -1 PM)


3. Study Materials 

A) CISA: CISA Review Manual, 27th Edition (either the hard copy or the e-book) and the CISA Review Questions, Answers, and Explanations Database (12 month)

B) CISM: CISM Review Manual, 15th Edition (either the hard copy or the e-book) and the CISA Review Questions, Answers, and Explanations Database (12 month)

C) CGEIT: CGEIT Review Manual, 8th Edition (either the hard copy or the e-book) and the CGEIT Review Questions, Answers, and Explanations Database (12 month)

*Note: You can get a year or two older version of these manuals, but please note that approximate 10% of the content changes each year



4. Preparation

In preparation for every class please read the chapter we're planning to cover and have your questions ready for our mentors to help you with. Our mentors will provide an in-depth discussion of each domain, but you will need to put the majority of your effort studying outside the training program. In every class we will have a mentor covering a different domain and providing their own style of teaching. Some will focus on your questions, some on your test taking skills, some on Q&A from the CISA, CRISC, or CISM database - but all will do their best to provide you with guidance to pass your exam.

5. Contact

All mentors have my direct contact details (phone etc.) for anything you might need during class. However, in case you ever need it, my cell phone number is 314-707-7156. Each session, building management will have the contact information of a designated Deloitte personnel whom you can reach out to if you arrive late, need to leave to feed a parking meter, or need to leave and re-enter the building for any other reason. Here are the best contacts for each of the courses:

CISA: Helen Zell, email: hzell@deloitte.com, cell: 314-707-7156
CISM and CRISC: Mike Pedrick, email: mikepedrick47@gmail.com, cell: 720-810-7602

CGEIT: Matt Morton, email: matt.morton@vantagetcg.com, cell: 402-708-2176

6. Participation

Anyone can drop in in our courses, but we like to get a general headcount of students prior to the sessions, so please send us an email prior to Wednesday 9/16, if you are interested in taking our course. Upon registering, you are not required to come to every session, but it is highly recommended that you come to as many as you can. Our training program has a pass rate of over 90% for both courses. We will also be emailing out a SurveyMonkey the Sunday prior to our Saturday sessions in order to get a more specific headcount for that particular session. We do this so that we can inform building management of the number of persons who will be accessing the building.

Good luck to us all and looking forward to seeing some of you in our training courses!

2020 EXAM REGISTRATION DATES 
Register at www.isaca.org : The Exams are now given during a months long Window. The next Window the review courses target are October - January.



*** Chapter members are welcome to attend group study sessions even if not registered for the next exam date. Please inform one of the Certification Coordinators of your interest.

Chapter Certification Coordinators are ready to assist all chapter members with any related certification questions. Their contact information is listed at the top of this page.

  The Certified Information Systems Auditor (CISA) is ISACA's cornerstone certification. The CISA certification has been earned by more than 70,000 professionals since inception and is for the IS audit, control, assurance and/or security professionals who wish to set themselves apart from their peers. Since 1978, the CISA certification has been renowned as the globally recognized achievement for those who control, monitor and assess an organization's information technology and business systems. 
Exam Information
Reference Material
Continuing Education Policy
FAQ
  The Certified Information Security Manager (CISM) certification is a unique management focused certification that has been earned by over 10,000 professionals since its introduction in 2003. Unlike other security certifications, CISM is for the individual who manages, designs, oversees and assesses an enterprise's information security program. CISM defines the core competencies and international performance standards that those who have information security management responsibilities must master. 
Exam Information
Reference Material
Continuing Education Policy
FAQ
  The IT Governance certification is intended to recognize a wide range of professionals for their knowledge and application of IT governance principles and practices. Many CGEIT certificates have been awarded. It is designed for professionals who have management, advisory, or assurance responsibilities as defined by a "job practice" consisting of IT governance related tasks and knowledge. Earning this designation will enable professionals to respond to the growing business demand for a comprehensive IT governance program that defines responsibility and accountability across the entire enterprise. 
Exam Information
Reference Material
Continuing Education Policy
FAQ
  The Certified in Risk and Information Systems Control™ certification (CRISC™, pronounced "see-risk") is intended to recognize a wide range of professionals for their knowledge of enterprise risk and their ability to design, implement, monitor, and maintain IS controls to mitigate such risk. It is particularly designed for IT professionals who have hands-on experience with risk identification, assessment, and evaluation; risk response; risk monitoring; IS control design and implementation; and IS control monitoring and maintenance.The CRISC designation will not only certify professionals who have knowledge and experience identifying and evaluating entity-specific risk, but also aid them in helping enterprises accomplish business objectives by designing, implementing, monitoring and maintaining risk-based, efficient and effective IS controls.

Grandfathering Information

Continuing Education Policy
FAQ