ISACA • CyberSec-Audit
Validates the ability to evaluate cybersecurity risk and audit organizational cybersecurity controls, covering cybersecurity operations, technology topics, governance, the audit role in cybersecurity, security frameworks, threat assessment, and regulatory requirements.
Questions
597
Duration
120 minutes
Passing Score
65%
Difficulty
AssociateLast Updated
Feb 2026
The ISACA Cybersecurity Audit Certificate is a certificate-level credential designed to validate a professional's ability to evaluate cybersecurity risk and audit organizational cybersecurity controls. The program is organized across four high-level domains—Cybersecurity Operations, Cybersecurity Technology Topics, Cybersecurity Governance, and Cybersecurity and Audit's Role—developed through extensive research and input from subject matter experts worldwide. It bridges the gap between traditional IT audit and modern cybersecurity practice, equipping candidates to assess threat environments, evaluate security controls, and align audits with established security frameworks and regulatory requirements.
This certificate is recognized globally and is particularly valued in industries where assurance over cybersecurity posture is critical, such as finance, healthcare, government, and technology. Unlike ISACA's full CISA certification, it does not require prior work experience, making it accessible to those earlier in their audit or security careers while still demonstrating verified, exam-tested competency through a shareable digital badge issued via the Credly platform.
The Cybersecurity Audit Certificate is primarily aimed at audit and assurance professionals who need to develop or formalize their cybersecurity audit skills, as well as IT risk professionals seeking a deeper understanding of cyber-related risks and mitigating controls. Security practitioners who want to understand the audit process from a cybersecurity lens are also well-served by this credential.
Suitable job roles include IT auditors, internal auditors, IT risk analysts, compliance officers, and information security analysts. ISACA recommends that candidates have a basic understanding of cybersecurity concepts and some prior industry experience, though neither is a formal requirement. The certificate is especially useful for professionals looking to add cybersecurity audit specialization without committing to the full CISA certification pathway.
There are no formal prerequisites for the Cybersecurity Audit Certificate. Candidates may register at any time without needing to demonstrate prior certifications, educational qualifications, or work experience. This makes it one of ISACA's most accessible credentials.
However, ISACA recommends that candidates possess a foundational understanding of cybersecurity concepts and some practical experience within the IT audit or security industry before sitting the exam. Familiarity with common security frameworks (such as NIST, ISO 27001, or COBIT) and basic knowledge of audit methodologies will assist in exam preparation and in understanding the context of the domains covered.
The Cybersecurity Audit Certificate exam is delivered online as a closed-book, remotely proctored assessment. It consists of 75 multiple-choice questions and must be completed within a 2-hour time limit. The number of questions per domain is proportional to each domain's assigned percentage weight. A passing score of 65% or higher is required.
Candidates can register at any time on a continuous basis, and exam scheduling is available as early as 48 hours after payment of registration fees. Upon registration, candidates have a 12-month eligibility window in which to sit the exam. Exam fees are US$259 for ISACA members and US$299 for non-members. Upon passing, candidates receive a digital badge credential managed through the Credly platform.
The Cybersecurity Audit Certificate positions holders to pursue or advance in roles such as IT auditor, internal auditor, IT risk analyst, compliance officer, and information security analyst. It serves as a strong entry point toward ISACA's flagship CISA certification, and professionals who later earn the CISA can expect significantly elevated earning potential—ISACA salary survey data indicates that certified professionals earn approximately 20% more than non-certified peers, with average U.S. CISA salaries exceeding $149,000 annually. Even at earlier career stages, IT audit and cybersecurity audit professionals in the U.S. typically earn between $63,000 and $100,000 depending on experience level.
Demand for cybersecurity audit skills is strong across regulated industries including financial services, healthcare, and government, where assurance over cybersecurity controls is a compliance and governance requirement. The certificate's digital badge, shareable via LinkedIn and Credly, provides verifiable proof of competency that is recognized by employers globally. For professionals who are not yet ready for the full CISA, this certificate offers a credible intermediate credential that demonstrates practical knowledge of cybersecurity audit without requiring years of documented work experience.
1. An organization implements threat modeling for a new mobile banking application using the STRIDE model. The security team identifies that the application stores user session tokens in shared preferences without encryption, and tokens remain valid for 30 days. Which two STRIDE threats are MOST relevant to this vulnerability? (Select two!)
Select all that apply2. An auditor reviews an organization's approach to symmetric versus asymmetric encryption and finds: customer credit card data is encrypted using RSA-2048 before storage in the database, TLS 1.3 with ECDHE is used for all web traffic, and AES-256 encrypts data at rest on servers. What is the auditor's PRIMARY concern with this implementation? (Select one!)
3. A manufacturing company implements Data Loss Prevention (DLP) with policies that block emails containing credit card numbers, social security numbers, and proprietary product designs. During testing, DLP successfully blocks outbound emails with full 16-digit credit card numbers but fails to detect credit card numbers split across multiple lines or with spaces inserted between digit groups. What DLP limitation does this scenario illustrate? (Select one!)
4. During a change management audit, an auditor discovers that database administrators can submit change requests, approve their own changes, and implement those changes in production without additional oversight. The database contains financial data subject to SOX compliance. What is the auditor's PRIMARY concern? (Select one!)
5. During an audit of authentication mechanisms, the auditor evaluates the organization's implementation of user authentication requiring a password plus a mobile device push notification. Which authentication factor categories does this implementation combine? (Select two!)
Select all that applyAll exams included • Cancel anytime