IT Audit for IT Managers IT Audit Review: Critical Security Issues
- CPE Credits: 8
- Prerequisites: None
- Learning Level: Basic
- Instructional Method: Group-live
- Field of Study: Information Technology – Technical
Course Revision Date: March 1, 2023
Course Description
In today’s evolving virtual markets and highly complex, global corporate environments, information technology professionals, operational, financial, and IT auditors must all work together in helping to establish, implement and secure organizational infrastructure from both internal and external threats.
This seminar will provide the attendee with an insight into the most critical and sensitive areas of an organization, areas which are increasingly being examined by an organization’s internal audit function. Internal controls and security are examined with an objective of gaining a better understanding of the audit concerns related to securing and controlling an organization’s IT environment.
Audience
This particular seminar would also be of value to financial and operational audit professionals considering a career move into IT auditing as well as non-IT audit professionals tasked with the responsibility for assessing their organization’s IT operations and infrastructure.
Objectives
- Recognize and identify the differences between cyber crimes and cyber terrorism
- Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces
- Be prepared to assist their organization in securing its operations, minimize its security exposure, and avoid becoming the victim of an attack
- Identify the various uses of Internet technology and that the changing roles of this technology in an e-business environment can jeopardize the reliability of information both from a management and an audit point-of-view
- Pinpoint security requirements necessary for effective recovery operations
- Explain the countermeasures used to protect organizations against attack
- Conduct an assessment and technical review of their organization’s Internet and Web-based systems
- Discuss with both end users and management, how successful systems are developed and maintained
- Lay the foundation for a successful assessment and examination of application development projects, which includes planning the project, estimating the work, and tracking progress
Course Outline
Please contact Al with a request for a detailed course outline…
Need more information?
If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.
Request a Consultation Today
We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.
BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.