Print-friendly Course Description and Outline
This course will provide attendees with an introduction to IT auditing, emphasizing the concepts through exercises and case studies. Internal audit professionals will develop knowledge of basic IT audit concepts that can be used to facilitate integrated audit efforts within their organization.
The course will also provide attendees the opportunity to perform an audit of IT applications supporting key business processes, coordinate the assessment of IT risk with the evaluation of IT general controls, and perform a risk assessment and evaluation of controls over end user computer applications.
Fundamentals – Pathways to Success
Fundamentals of IT Auditing is the third in a sequence of recommended courses for new internal auditors.
For additional Audit Fundamentals courses, please click here.
In-person classes are 2 day(s). For online courses, please click on the Details & Pricing link to review session times and dates.
|Course Duration: 2 day(s)
|CPEs Available: 16
|Knowledge Level: Basic
|Field of Study: Auditing
|Delivery Method: eLearning (Group-Internet-Based); On-site Training (Group-Live); Seminar (Group-Live); Live Stream
Overview of IT Auditing, Concepts and Controls: Why IT Auditing and What Is It?
- Why IT auditing?
- What is IT auditing?
- What are the benefits of an IT audit?
- What is the role of an IT auditor?
- Growth of the IT auditor, including background
- Common IT audit certifications
- IIA standards related to an IT audit
- Key components of IT
- How COSO and GAIT relate to IT audit
- Guide to the Assessment of IT Risk (GAIT)
- Major U.S. laws that impact IT audit
- IT general and application controls
- End-user computing
- IT governance
General Control: Logical Security
- General security concepts
- Access management concepts
- Access management principles
- Common access management controls
- Password configuration and authentication
General Control: Business Continuity Planning (BCP), Disaster Recovery (DR), and Backup Processing
- Business Continuity Management (BCM)
- Disaster Recovery (DR)
- Backup processing
- BCM Implementation Requirements
- Recovery solutions
- Application control concepts
- Input controls
- Processing controls
- Output controls
- Interface controls
- Audit trails
- Application security
General Control: Change and Patch Management
- What is change and patch management?
- Why do change and patch management?
- What are the types of changes?
- Elements of a typical change process
- Types of risks and controls
- Indicators and recognizable symptoms of poor change management practices
- Change management success measures
- Variations in change management processes
Cloud Computing and Service Organization Control (SOC) Reports
- Cloud computing
- SOC reports
General Control: System Development Lifecycle (SDLC)
- Aspects of the SDLC
- SDLC phases
- Impacts of project failures
- Pre and post implementation reviews
End User Computing
- User Developed Applications (UDAs)
- Benefits, risks, and controls of UDAs
- Auditor’s approach to UDAs
Most courses can be delivered through on-site training. You might be surprised that the organization leading the profession is just as committed to the delivery of affordable training.
Contact us by calling +1-407-937-1388 or send an e-mail to GetTraining@theiia.org.