- This event has passed.
Review Course for CISA Summer 2018 Exam (Multi-Day Event)
July 14 @ 8:30 am - 5:00 pm EDT
One event on July 21, 2018 at 8:30am
The GWDC is sponsoring an intensive 4-day review course for the Summer 2018 Certified Information System Auditor® (CISA) Exam. The CISA® review course will provide practical advice on preparing for the CISA exam and specific instruction regarding the job practice areas addressed by CISA as defined by ISACA® International.
WHO SHOULD ATTEND
This event is intended for anyone sitting for the Summer CISA Exam window.
The CISA exam will be offered via Computer-Based Testing (CBT) during 3 testing windows per year. The Summer window begins on August 1 and ends on September 30.
Registration for the CISA exam is administered by ISACA, not the GWDC. Registering for the review course does not register you for the exam.
Students who take this GWDC review class and do not pass the corresponding Exam are eligible for a one-time 50% discount on the next review class offered by the GWDC for the exam. Please read the full policy for discount details.
WHEN AND WHERE
EVENT DATES AND TIMES
The dates of the review course are: July 14, 21, 28; August 4, 2018
Class Time: 8:30 AM - 5:00 PM
Check-in begins at 8:00 AM on the first day
Each student will receive a Starbucks card and Cosi card each day for breakfast and lunch.
George Mason University, Arlington VA Campus
Founders Hall 318
3351 Fairfax Drive Arlington, VA 22201
Note: Please do not contact the venue directly regarding this event.
Contact one of the NCAC Contacts listed on this page.
Use of Metro is encouraged for all GWDC events.
The GMU Arlington Campus is 2 blocks from the Virginia Square/GMU Metro station (Orange Line).
Campus parking is limited. Some visitor parking is available in the Founders Hall parking garage. Best entry point is off of Kirkwood Rd, between Washington Blvd and Fairfax Dr.
After completing this course, you will be able to apply the strategies provided and instruction on the Certification's Job Practice Areas to better prepare for the exam. Read more about the Job Practice Areas for the CISA.
Module 1 - The Process of Auditing Information Systems
Module 2 - Governance and Management of IT
Module 3 - Information Systems Acquisition, Development, and Implementation
Module 4 - Information Systems Operations, Maintenance, and Support
Module 5 - Protection of Information Assets
Register by July 12!
We encourage early registration, as some events sell out. The capacity for this event is 30 seats.
If you are unable to attend an event, you can cancel your registration. All cancellations must be received by July 18. A $15 cancellation fee is charged.
To cancel, log into the My Registration page linked in your confirmation e-mail and click the UNREGISTER link.
Earn up to 28 Continuing Professional Education (CPE) credits in the area of Specialized Knowledge. The ISACA® GWDC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: http://www.learningmarket.org.
CPE Distribution and Evaluation Survey
CPE's will be distributed via e-mail along with the event evaluation survey after the completion of the event. Attendees must be present the full day to receive full CPE credit.
Principal, Kearney & Company
CPA, CISA, CISSP, CISM, CGEIT, CAP, CEH, FITSP-A, FITSP-M
Mr. Harding is a Principal with Kearney & Company, P.C. (Kearney) with more than 20 years of professional experience serving CIOs, CFOs, and Inspector Generals in the federal government. Mr. Harding’s expertise is in information security, with a special emphasis on Federal security requirements for civilian and Intelligence agencies. He has led engagement teams to perform Federal Information Security Management Act (FISMA) assessments, privacy reviews, Statement on Standards for Attestation Engagements (SSAE) No. 16 engagements, IT general control reviews, application control reviews, compliance evaluations of Public Key Infrastructure (PKI) implementations, and network security penetration tests (ethical hacking). Mr. Harding also has supported numerous Federal Financial Statement Audits (FSAs) and conducted Information Technology (IT) controls testing in accordance with the Government Accountability Office’s (GAO) Federal Information System Controls Audit Manual (FISCAM). Prior to Kearney, Mr. Harding held leadership roles at KPMG, IBM, Corio, and PwC.In addition to his responsibilities at Kearney, Mr. Harding is actively involved in the information security field. He has taught a CISA Review Class twice a year for the past 16 years on behalf of the Washington, D.C., Information Systems Audit and Control Association (ISACA) Chapter, as well as a review course for the Certified in the Governance of Enterprise IT (CGEIT) exam. Mr. Harding also is actively involved with the Federal IT Security Institute, teaching an IT auditor review course for the FITSP:A certification. For both ISACA and FITSI, Mr. Harding has developed teaching materials and courseware to aid participants in passing the CISA and FITSP:A exams.
CISSP, ISSEP, CISM, CISM, SCNA, SCNP, CAP, IAM, IEM, SSCP, CEH, ECSA, CHFI, LPT, TICSA, CIWSA, Security+, and MCSE: Security and FITSP-M
Jim possesses over 17 years direct experience in the design, operation, management, and auditing of information technology systems, with the past 13 years focused on information systems security. He has an extensive background in technical education and specializes in security certification courses targeted at federal and government contracting clients.Additionally, Jim is the executive director of the Federal IT Security Institute (FITSI). FITSI is a 501c6, non-profit organization that provides a role-based IT security certification program targeted at the federal workforce.Jim is also the executive director of the FITSI Foundation. The FITSI Foundation is a 501c3 public charity that is running the Wounded Warrior Cyber Combat Academy (W2CCA).In 2011, the Federal Information Systems Security Educators® Association (FISSEA) named him "Educator of the Year" for the impact he is making in the federal workforce.Jim holds the following IA/IT security certifications: CISSP, ISSEP, CISM, CISM, SCNA, SCNP, CAP, IAM, IEM, SSCP, CEH, ECSA, CHFI, LPT, TICSA, CIWSA, Security+, and MCSE: Security and FITSP-M.
Materials Provided During the Course
Participants receive a Study Guide to help them prepare for the CISA exam. The Study Guide contains a presentation, a case study, and 20 quiz questions for each domain in the official CISA Review Manual. The Study Guide contains additional material such as suggested study approach, exam taking tips, list of "must know" vocabulary terms, and other suggested readings to aid participants in their exam preparation.
The instructors highly recommend that students purchase the CISA Review Manual and the CISA Review Questions, Answers, and Explanations Database - 12 Month. Below are the study materials available for purchase from the ISACA Bookstore:
- CISA Review Manual
- CISA Review Questions, Answers & Explanations Manual
- CISA Review Questions, Answers & Explanation Database - 12 month subscription
**It is highly recommended to order these at the earliest opportunity to avoid any possible delays in their availability for the start of the program.
Additional Study Resources
Candidates should review the Exam Candidate Guide as part of their study program. We've include additional resources for exam candidates on our Certifications page, including links to ISACA resources and Knowledge Center study groups.
The instructors request all students bring the CISA Review Manual to each class.
ISACA Members from Other Chapters
You will need to bring your ISACA Membership Card to the event to verify your ISACA Membership.
Conference presentations are posted to the Presentations Library when permission is received from the presenter and their organization. In some cases, permission is not received.