Training Courses
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a participant who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.
Course Catalog
Audit
- Assessing Organization IT Business Risk Exposure
- Assessing Organizational and Individual Ethics: A Value-Added Audit
- Auditing Critical Business System Applications
- Auditing Systems Acquisition, Design, Development and Implementation
- Fundamentals of IT Auditing for Non-IT Auditors and Enterprise Professionals
- IT Audit for IT Managers IT Audit Review: Critical Security Issues
- IT Audit for IT Managers: Corporate Governance/ Compliance and the IT Audit Function
Cyber Forensics
- Forensic Auditing: Implementing Auditing, IT and Accounting Skills to Identify and Mitigate Organizational Fraud
- Introduction to Cyber Forensics: From Data to Digital Evidence: Part 1, Part 2, Part 3, Part 4
Fraud and Risk
- Assessing Organization IT Business Risk Exposure
- Fraud: Awareness, Mitigation, Audit and Internal Controls
- Governance, Risk and Compliance: Managing and Assessing the Corporate IT Portfolio
- The Hunt for Fraud: Prevention and Detection Techniques
- Information Risk Management
- Risks in Cyber Crime, Cyber Terrorism and Warfare, Cyber Threats …What You Need to Know
Professional Development
- Establishing and Maintaining a Proactive, Privacy Compliant Corporation
- Ethics Series Part 1 – Criteria for Ethical Decision Making
- Ethics Series Part 2 – Assessing Organizational + Individual Ethics
- Ethics Series Part 3 – Practicing + Promoting Ethical Behavior
- Safeguarding Personally Identifiable Information: Assessing and Mitigating the Threat of Identity Fraud
Security
- BYOD & Securing Mobile Technologies
- Cybersecurity: Mitigating Risk Across Enterprise-Wide Operations
- Cyber Terrorism and Information Warfare
- Developing an Information Security Program
- Essential Cybersecurity Principles and Techniques
- The Essentials of Cloud Computing for Audit Professionals
- The Information Security Manager: Fundamentals of Managing Information Security
Unmanned Aircraft Systems (UAS) (a.k.a. RPAS, UAV, drone)
Need more information?
If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.
Request a Consultation Today
We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.
BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.