Date Venue Category/City Fees (Inclusive Taxes)
12/07/2024 2:00 PM - 5:00 PM Online 3835

Introduction

Expand your IT auditing skills with expert-led training that helps you confirm key systems, processes and documentation for your organization. Get practical know-how on the latest cyber security tools and processes from a faculty with real-world IT and cyber security auditing experience.

This workshop examines information systems in order to provide valuable information about the operations and security of your IT systems. By the end of this course, you will have in depth understanding of cutting-edge techniques of auditing in order to provide audit efficiently and effectively.

Information System Auditing Process

  • IT audit: standards, techniques and approaches used in IT audits;
  • Risk assessment in the audit context;
  • Audit planning and delivery techniques;
  • Gathering information and audit evidence;
  • Presenting findings and recommendations, follow-up audits.

Governance and management of IT

  • IT strategy, policies, standards and procedures
  • enterprise risk management;
  • IT governance practices, organisation and segregation of duties;
  • Managing IT resources and project portfolios;
  • Maturity and process improvement models;
  • IT performan ce monitoring;

Information systems acquisition, development, and implementation

  • Evaluating IT investment business cases;
  • Selecting vendors and managing contracts;
  • Project management;
  • Software methodologies and development tools;
  • Information system implementation;
  • Implementation quality assessment objectives and practices.

Information systems Operations, Maintenance and Support

  • Supporting the organisation’s IT architecture;
  • Managing IT services under ITIL;
  • IT service level management practices and operational management;
  • Data management and data quality;
  • Business continuity management.

Protection of information assets

  • Information security policies, standards and procedures;
  • Information security controls and activities;
  • Access management;
  • Personnel security;
  • Network infrastructure security;
  • Physical security;
  • Cyber threats and pentesting.