Skip Ribbon Commands
Skip to main content
The Institute of Internal Auditors North AmericaBreadcrumb SeparatorLearning and EventsBreadcrumb SeparatorCoursesBreadcrumb SeparatorAuditing Mobile Computing
Course Description Course Outline Bring Us On Site  

Auditing Mobile Computing

Course Description
As the capabilities of mobile devices continue to evolve, so does the reliance on the technology. Mobile apps have become an integral part of many organizational growth strategies, and most people are rarely without one or more of their mobile devices. As of April 2020, it's estimated that there are 1 billion more mobile connections than people in the world, and that there are 3.3 billion smartphone users in the world.

This course provides an overview of mobile technology, including some of the common threats and controls for mobile devices, mobile management systems, and mobile applications. The course is designed to help internal auditors plan and conduct a mobile computing audit engagement by addressing key risks related to mobile technology and mobile applications.
Learning Objective(s):
  • Define mobile computing.
  • Review common mobile computing related risks.

  • List the common characteristics of a Bring Your Own Device Policy (BYOD).

  • Recognize various types of mobile computing threats.

  • Recognize various types of mobile computing controls.

  • Explain standard approach for mobile computing audits.
Course Duration: 1 day(s)
CPEs Available: 1.6
Knowledge Level: Basic
Field of Study: Information Technology
Advance Preparation: 
Delivery Method: QAS Self-Study