IT Auditing For Non-I.T. Auditors (Basic of I.T. Auditing) (BITA)

by Leadership Academy Claim Listing

This training course is aimed at internal audit professionals without specific expertise in IT auditing and provides them with the tools to start conducting IT and Security audits in their organisations.

R9715

Contact the Institutes

Fill this form

Advertisement

Leadership Academy Logo

img Duration

3 Days

Course Details

This training course is aimed at internal audit professionals without specific expertise in IT auditing and provides them with the tools to start conducting IT and Security audits in their organisations. The course focuses on internationally-recognised auditing standards and frameworks including CobIT, ITIL, COSO and ISO27002.

The training agenda covers extensive knowledge of the controls required when auditing currently installed systems, new systems under development, andvarious activities within the information technology department.

The course participants will learn techniques for auditing automated systems and the management of application transaction activity, controls, and procedures.

Delegates will master techniques that can be applied to mainframe, distributed processing, and client/server-based applications. They will gain field-tested tools for identifying, recording, assessing, and evaluating application controls and procedures.

 

Course Content:

  • Fundamentals of IT Auditing
    • What is IT auditing?
    • What is the role of an IT auditor?
    • IIA standards related to an IT audit
    • Key components of IT
    • Centralised vs distributed systems
    • On-line vs batch systems
    • Network concepts
    • Databases
    • Operating systems
  • General Control
    • General security concepts
    • Access management concepts
    • Access management principles
    • Common access management controls
    • Incident Management and the Service Desk
    • Service Level Management
    • Change and Patch Management
    • Elements of a typical change process
    • Aspects of the SDLC
    • SDLC phases
    • Business Continuity Management (BCM)
    • Disaster Recovery (DR)
    • Backup processing
  • Application Controls
    • Application control concepts
    • Input controls
    • Processing controls
    • Output controls
    • Interface controls
    • Audit trails
    • Application security
  • Cloud Computing and Service Organization Control (SOC) Reports
    • Cloud computing
    • SOC reports
  • Emerging Technology Impacting IT Auditing
    • 4th Industrial Revolution
    • Artificial Intelligence
    • Big Data
    • Robotics
    • Internet of Things (IOT)
  • Auditing key information systems controls
    • Procedures to audit the adequacy and effectiveness of each of the key information controls identified:
      • Perform a walkthrough
      • Defining the population to be tested for control effectiveness
      • Test procedures
  • Audit of data files - use of CAATs
    • Purpose of CAATs
    • Understanding data and meta data
    • Formulating the CAAT specification
    • Development, testing and implementation of CAATs
  • Johannesburg Branch

    Hanover Square, Cnr Hendrik Potgieter St and, 71 7th Ave, Johannesburg

Check out more IT Auditing courses in South Africa

ISOQAR Africa Logo

ISO 27001 (Information Security Management Systems)

ISO 27001 is the international standard which is recognized globally for managing risks to the security of information you hold. Certification to ISO 27001 allows you to prove to your clients and other stakeholders that you are managing the security of your information.

by ISOQAR Africa [Claim Listing ]
Pink Elephant Logo

ISO 27001 Foundation

The standard forms the basis for effective management of sensitive, confidential information and for the application of information security controls. An organization that conforms to the ISO/IEC 27001 standard possesses clear

by Pink Elephant [Claim Listing ]
BSI Group Logo

ISO/IEC 27001 Auditor Qualification

The ability to identify opportunities for improvement is an important skill for an internal or lead auditor. It could involve a reduction in information security incidents, improved security processes and increased confidence in the security of your data.

by BSI Group [Claim Listing ]
Optimi College Logo

Certified Information Systems Security Professional (CISSP)

This course is ideal for anyone looking to become a Certified Information Systems Security Professional. The course will teach you to apply security principles and establish security governance principles.

by Optimi College [Claim Listing ]
Wits Digital Campus Logo

IT Management for CIO Teams

Information technology lies at the heart of every business organisation the world over. Digital transformation is the buzzword in organisations and many IT departments are now expected to engage with the entire business and no longer act as the traditional back-office support function.

by Wits Digital Campus [Claim Listing ]
  • Price
  • Start Date
  • Duration

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy