ISACA • ITCA
Entry-level certification that validates fundamental knowledge in cybersecurity concepts, one of five certificates in the ITCA program.
Questions
596
Duration
120 minutes
Passing Score
65%
Difficulty
FoundationalLast Updated
Jan 2026
The ISACA Cybersecurity Fundamentals Certificate is one of five stackable credentials that together comprise the Information Technology Certified Associate (ITCA) program. It validates foundational knowledge of cybersecurity principles, threat landscapes, asset security, and security operations — the core competencies required to begin a career protecting enterprise data and infrastructure. The exam blends knowledge-based multiple-choice questions with performance-based questions delivered in a virtual lab environment, ensuring candidates can demonstrate practical ability alongside theoretical understanding.
The certificate is part of ISACA's broader effort to create an entry-level pathway into IT credentialing. Candidates who earn all five ITCA certificates — covering Computing Fundamentals, Networking and Infrastructure, Cybersecurity, Software Development, and Data Science — can then apply for the full ITCA certification. The Cybersecurity Fundamentals certificate itself does not expire and awards 9.5 CPE credits when the accompanying course is completed.
This certificate is designed for individuals at the very beginning of their IT or cybersecurity career journey, including recent graduates, college students, and professionals from non-technical fields looking to transition into cybersecurity. No prior work experience in IT is required, making it accessible to career changers who want a recognized credential to validate self-taught or academic knowledge.
It is also well-suited for IT generalists, help desk technicians, or junior administrators who want to formalize their cybersecurity knowledge and differentiate themselves for roles such as security analyst, IT support specialist, or junior SOC analyst. Organizations may also use it as a structured upskilling tool for existing technical teams.
There are no formal prerequisites for the Cybersecurity Fundamentals certificate. Candidates can register and sit for the exam at any time without prior certifications, work experience documentation, or educational requirements — distinguishing it from ISACA's more advanced credentials such as CISM or CISA.
While no prerequisites are mandated, candidates will benefit from a basic familiarity with computing concepts, networking fundamentals, and general IT terminology before attempting the exam. ISACA offers an optional self-paced online course (9.5 CPE credits) and a study guide authored by subject-matter experts to help candidates without a formal cybersecurity background build the necessary knowledge before sitting for the exam.
The exam consists of 75 questions delivered in a computer-based, remotely proctored format. Questions are a blend of knowledge-based multiple-choice items and performance-based questions set within a virtual lab environment, requiring candidates to demonstrate practical task execution rather than purely theoretical recall. The time limit is 120 minutes, and a passing score of 65% is required.
The exam is available continuously — candidates can schedule it as early as 48 hours after payment, with appointments available up to 90 days in advance. Free rescheduling is permitted with at least 48 hours' notice. Candidates have 365 days from the date of purchase to sit for the exam, and there is no stated limit on retake attempts. Exam fees are US$120 for ISACA members and US$144 for non-members.
Earning the Cybersecurity Fundamentals certificate signals to employers that a candidate has verified, baseline competency in protecting systems and data — a quality increasingly valued even for non-security IT roles. It serves as a credible entry point for positions such as junior security analyst, SOC tier-1 analyst, IT support specialist, or cybersecurity technician, particularly at organizations that recognize ISACA credentials (common in financial services, government, and enterprise technology sectors).
As a standalone certificate it complements ISACA's advanced certifications (CISM, CISA, CRISC), providing a documented foundation that can accelerate a candidate's path toward those credentials. For candidates who complete all five ITCA badges and earn the full ITCA certification, the credential demonstrates breadth across core IT disciplines — making it a differentiator in entry-level hiring where employers seek candidates who can operate across multiple technology domains from day one.
1. A network engineer troubleshoots intermittent connectivity issues in an enterprise BGP environment connecting three autonomous systems. AS 65001 connects to AS 65002, which connects to AS 65003. A route advertisement from AS 65003 reaches AS 65001 with the AS_PATH attribute showing 65002, 65003. The engineer must verify the loop prevention mechanism. How does BGP prevent routing loops when advertising routes between autonomous systems? (Select one!)
2. A software development company adopts Agile methodology using Scrum framework. The team completes two-week sprints and needs to plan the upcoming Sprint 12. The Product Owner has prioritized 25 user stories in the backlog. The Scrum Master schedules all required ceremonies. According to Scrum best practices, what is the maximum timebox duration for the Sprint Planning meeting? (Select one!)
3. A network engineering team is designing Layer 2 redundancy for a campus network with multiple switches. They need to prevent switching loops while maintaining network availability if links fail. The solution must provide rapid convergence within 2 seconds to minimize downtime. Which protocol should the team implement? (Select one!)
4. A data center architect designs a server deployment requiring maximum storage performance and fault tolerance for a real-time trading application. The system must survive two simultaneous disk failures without data loss. Which RAID configuration meets these requirements with minimum disk overhead? (Select one!)
5. TechFlow Corporation is implementing a new security framework to protect customer financial data stored in their database. The security architect needs to ensure that even if attackers gain access to the database, they cannot read the sensitive information. Which CIA triad principle should be the primary focus of this implementation? (Select one!)
All exams included • Cancel anytime