IT Auditing For Non-I.T. Auditors (Basic of I.T. Auditing) (BITA)

by Leadership Academy Claim Listing

This training course is aimed at internal audit professionals without specific expertise in IT auditing and provides them with the tools to start conducting IT and Security audits in their organisations.

R9715

Contact the Institutes

Fill this form

Advertisement

Leadership Academy Logo

img Duration

3 Days

Course Details

This training course is aimed at internal audit professionals without specific expertise in IT auditing and provides them with the tools to start conducting IT and Security audits in their organisations. The course focuses on internationally-recognised auditing standards and frameworks including CobIT, ITIL, COSO and ISO27002.

The training agenda covers extensive knowledge of the controls required when auditing currently installed systems, new systems under development, andvarious activities within the information technology department.

The course participants will learn techniques for auditing automated systems and the management of application transaction activity, controls, and procedures.

Delegates will master techniques that can be applied to mainframe, distributed processing, and client/server-based applications. They will gain field-tested tools for identifying, recording, assessing, and evaluating application controls and procedures.

 

Course Content:

  • Fundamentals of IT Auditing
    • What is IT auditing?
    • What is the role of an IT auditor?
    • IIA standards related to an IT audit
    • Key components of IT
    • Centralised vs distributed systems
    • On-line vs batch systems
    • Network concepts
    • Databases
    • Operating systems
  • General Control
    • General security concepts
    • Access management concepts
    • Access management principles
    • Common access management controls
    • Incident Management and the Service Desk
    • Service Level Management
    • Change and Patch Management
    • Elements of a typical change process
    • Aspects of the SDLC
    • SDLC phases
    • Business Continuity Management (BCM)
    • Disaster Recovery (DR)
    • Backup processing
  • Application Controls
    • Application control concepts
    • Input controls
    • Processing controls
    • Output controls
    • Interface controls
    • Audit trails
    • Application security
  • Cloud Computing and Service Organization Control (SOC) Reports
    • Cloud computing
    • SOC reports
  • Emerging Technology Impacting IT Auditing
    • 4th Industrial Revolution
    • Artificial Intelligence
    • Big Data
    • Robotics
    • Internet of Things (IOT)
  • Auditing key information systems controls
    • Procedures to audit the adequacy and effectiveness of each of the key information controls identified:
      • Perform a walkthrough
      • Defining the population to be tested for control effectiveness
      • Test procedures
  • Audit of data files - use of CAATs
    • Purpose of CAATs
    • Understanding data and meta data
    • Formulating the CAAT specification
    • Development, testing and implementation of CAATs
  • Johannesburg Branch

    Hanover Square, Cnr Hendrik Potgieter St and, 71 7th Ave, Johannesburg

Check out more IT Auditing courses in South Africa

Rantsane Mario Training Solutions Logo

Information Security Management

Information is the lifeblood to all organisations, without with it would be severally impacted and ultimately cease to function. Information is knowledge and knowledge is power.

by Rantsane Mario Training Solutions
Analytix Logo

COBIT® 5 Implementation Certification Training

Building on existing knowledge, this COBIT® 5 Implementation training course provides delegates with a practical appreciation of how to apply COBIT 5 to specific business problems, pain points, trigger events and risk scenarios within an organisation.

by Analytix [Claim Listing ]
ISOQAR Africa Logo

ISO 27001 (Information Security Management Systems)

ISO 27001 is the international standard which is recognized globally for managing risks to the security of information you hold. Certification to ISO 27001 allows you to prove to your clients and other stakeholders that you are managing the security of your information.

by ISOQAR Africa [Claim Listing ]
Pink Elephant Logo

COBIT®2019 Foundation

COBIT® provides the guidance and means to build and sustain a best-fit governance system that aligns with major related standards, frameworks and regulations. The COBIT framework is also very relevant to the modern enterprise

by Pink Elephant [Claim Listing ]
BSI Group Logo

ISO/IEC 27001 Auditor Qualification

The ability to identify opportunities for improvement is an important skill for an internal or lead auditor. It could involve a reduction in information security incidents, improved security processes and increased confidence in the security of your data.

by BSI Group [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy