IT Audit Training Courses and Workshops

Schools providing training courses, certificates, diplomas or degree programs of IT Audit




Total 117 training courses and degree programs available around the world.

CISA Prep (Certificate)

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge USA
Training Center(s)/Venue(s): Arlington, Atlanta, Cary, Irving, Morristown, New York City, Santa Clara, Schaumburg, Seattle, United States
  V

In this course, you&,#146,ll cover all six domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams

At the end of this course delegates will be able to,
In-depth coverage of the six domains required to pass the CISA exam:
IS Audit Process
IT Governance
Systems and Infrastructure Lifecycle Management
IT Service Delivery and Support
Protection of Information Assets
Business Continuity and Disaster Recovery

CISA Prep (Certificate)

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Canada
Training Center(s)/Venue(s): Halifax, Mississauga, Montreal, Ottawa, Toronto, Winnipeg, Canada
  V

In this course, you&,#146,ll cover all six domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams

At the end of this course delegates will be able to,
In-depth coverage of the six domains required to pass the CISA exam:
IS Audit Process
IT Governance
Systems and Infrastructure Lifecycle Management
IT Service Delivery and Support
Protection of Information Assets
Business Continuity and Disaster Recovery

CISA Prep (Certificate)

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge UK
Training Center(s)/Venue(s): Aberdeen, Bath, Bristol, Leeds, London, Wokingham, United Kingdom
  V

In this course, you&,#146,ll cover all six domains of the Certified Information Systems Auditor (CISA) exam and gain the knowledge and technical concepts required to obtain CISA certification. Since its inception in 1978, the CISA exam has become the gold standard of excellence in IS auditing, control, and security. Our experts have created a study guide of relevant, up-to-date information, including summary charts, insightful data, and practice exams

At the end of this course delegates will be able to,
In-depth coverage of the six domains required to pass the CISA exam:
IS Audit Process
IT Governance
Systems and Infrastructure Lifecycle Management
IT Service Delivery and Support
Protection of Information Assets
Business Continuity and Disaster Recovery

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Auditing & Monitoring Networks, Perimeters & Systems

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit

Conduct a proper risk assessment of network to identify vulnerabilities and prioritize what will be audited

Establish a well-secured baseline for computers and networks, a standard to conduct audit against

Perform a network and perimeter audit using a seven step process

Audit firewalls to validate that rules/settings are working as designed, blocking traffic as required

Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed deci- sions about risk and resources.

Audit web application&,#146,s configuration, authentication, and session management identify vulnerabilities attackers can exploit

Utilize scripting to build a system to baseline and automatically audit Active Directory and all systems in a Windows domain

Certified Information Systems Auditor

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

Testing-Taking Tips and Study Techniques ## Preparation for the CISA Exam
## Submitting Required Paperwork
## Resources and Study Aids
## Passing the Exam the First Time

## The Audit Process ## Risk
## Audit
## Standards and Guidelines

## IT Governance ## Best Practices
## Management Practices
## Roles and Responsibilities

## Lifecycle Management ## Project Management
## Business Application Development
## Information Systems Maintenance Practices

## System Infrastructure Control ## Auditing Application Controls
## Application System Development
## Business Application Systems

## Information Systems Hardware and Architecture ## Information Systems Operations
## Information Systems Hardware
## SDLC
## Databases

## Information Systems Used for IT Delivery and Support ## OSI
## TCP/IP Model
## TCP/UDP/ICMP/IP
## Routers/Switches/Hubs
## Firewalls
## Wireless
## WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cabl... [Read More]

Certified TIA-942 Internal Auditor

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

Course Objectives
## Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself
## Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines
## Facilitate and support the external audit to ANSI/TIA-942
## Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and nal certication
## Facilitate surveillance and recertication audits

Fundamental concepts and process of an internal audit
## Terms and denitions
## Dierence between an internal and external auditor
## Audit principles
## Auditor competency requirements

Managing an audit programme
## Establishing the audit objectives
## Establishing the audit programme

Planning the audit
## Planning the schedule
## Resource planning
## Tools/equipment required
## Document requirements
## Design documents
## Process documents
## Decla... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Auditing & Monitoring Networks, Perimeters & Systems

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V


Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit

Conduct a proper risk assessment of network to identify vulnerabilities and prioritize what will be audited

Establish a well-secured baseline for computers and networks, a standard to conduct audit against

Perform a network and perimeter audit using a seven step process

Audit firewalls to validate that rules/settings are working as designed, blocking traffic as required

Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed deci- sions about risk and resources.

Audit web application&,#146,s configuration, authentication, and session management identify vulnerabilities attackers can exploit

Utilize scripting to build a system to baseline and automatically audit Active Directory and all systems in a Windows domain

Certified Information Systems Auditor

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V

Testing-Taking Tips and Study Techniques ## Preparation for the CISA Exam
## Submitting Required Paperwork
## Resources and Study Aids
## Passing the Exam the First Time

## The Audit Process ## Risk
## Audit
## Standards and Guidelines

## IT Governance ## Best Practices
## Management Practices
## Roles and Responsibilities

## Lifecycle Management ## Project Management
## Business Application Development
## Information Systems Maintenance Practices

## System Infrastructure Control ## Auditing Application Controls
## Application System Development
## Business Application Systems

## Information Systems Hardware and Architecture ## Information Systems Operations
## Information Systems Hardware
## SDLC
## Databases

## Information Systems Used for IT Delivery and Support ## OSI
## TCP/IP Model
## TCP/UDP/ICMP/IP
## Routers/Switches/Hubs
## Firewalls
## Wireless
## WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cabl... [Read More]

Certified TIA-942 Internal Auditor

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V

Course Objectives
## Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself
## Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines
## Facilitate and support the external audit to ANSI/TIA-942
## Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and nal certication
## Facilitate surveillance and recertication audits

Fundamental concepts and process of an internal audit
## Terms and denitions
## Dierence between an internal and external auditor
## Audit principles
## Auditor competency requirements

Managing an audit programme
## Establishing the audit objectives
## Establishing the audit programme

Planning the audit
## Planning the schedule
## Resource planning
## Tools/equipment required
## Document requirements
## Design documents
## Process documents
## Decla... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Auditing & Monitoring Networks, Perimeters & Systems

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V


Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit

Conduct a proper risk assessment of network to identify vulnerabilities and prioritize what will be audited

Establish a well-secured baseline for computers and networks, a standard to conduct audit against

Perform a network and perimeter audit using a seven step process

Audit firewalls to validate that rules/settings are working as designed, blocking traffic as required

Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed deci- sions about risk and resources.

Audit web application&,#146,s configuration, authentication, and session management identify vulnerabilities attackers can exploit

Utilize scripting to build a system to baseline and automatically audit Active Directory and all systems in a Windows domain

Certified Information Systems Auditor

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V

Testing-Taking Tips and Study Techniques ## Preparation for the CISA Exam
## Submitting Required Paperwork
## Resources and Study Aids
## Passing the Exam the First Time

## The Audit Process ## Risk
## Audit
## Standards and Guidelines

## IT Governance ## Best Practices
## Management Practices
## Roles and Responsibilities

## Lifecycle Management ## Project Management
## Business Application Development
## Information Systems Maintenance Practices

## System Infrastructure Control ## Auditing Application Controls
## Application System Development
## Business Application Systems

## Information Systems Hardware and Architecture ## Information Systems Operations
## Information Systems Hardware
## SDLC
## Databases

## Information Systems Used for IT Delivery and Support ## OSI
## TCP/IP Model
## TCP/UDP/ICMP/IP
## Routers/Switches/Hubs
## Firewalls
## Wireless
## WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cabl... [Read More]

Certified TIA-942 Internal Auditor

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V

Course Objectives
## Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself
## Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines
## Facilitate and support the external audit to ANSI/TIA-942
## Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and nal certication
## Facilitate surveillance and recertication audits

Fundamental concepts and process of an internal audit
## Terms and denitions
## Dierence between an internal and external auditor
## Audit principles
## Auditor competency requirements

Managing an audit programme
## Establishing the audit objectives
## Establishing the audit programme

Planning the audit
## Planning the schedule
## Resource planning
## Tools/equipment required
## Document requirements
## Design documents
## Process documents
## Decla... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Auditing & Monitoring Networks, Perimeters & Systems

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V


Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit

Conduct a proper risk assessment of network to identify vulnerabilities and prioritize what will be audited

Establish a well-secured baseline for computers and networks, a standard to conduct audit against

Perform a network and perimeter audit using a seven step process

Audit firewalls to validate that rules/settings are working as designed, blocking traffic as required

Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed deci- sions about risk and resources.

Audit web application&,#146,s configuration, authentication, and session management identify vulnerabilities attackers can exploit

Utilize scripting to build a system to baseline and automatically audit Active Directory and all systems in a Windows domain

Certified Information Systems Auditor

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V

Testing-Taking Tips and Study Techniques ## Preparation for the CISA Exam
## Submitting Required Paperwork
## Resources and Study Aids
## Passing the Exam the First Time

## The Audit Process ## Risk
## Audit
## Standards and Guidelines

## IT Governance ## Best Practices
## Management Practices
## Roles and Responsibilities

## Lifecycle Management ## Project Management
## Business Application Development
## Information Systems Maintenance Practices

## System Infrastructure Control ## Auditing Application Controls
## Application System Development
## Business Application Systems

## Information Systems Hardware and Architecture ## Information Systems Operations
## Information Systems Hardware
## SDLC
## Databases

## Information Systems Used for IT Delivery and Support ## OSI
## TCP/IP Model
## TCP/UDP/ICMP/IP
## Routers/Switches/Hubs
## Firewalls
## Wireless
## WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cabl... [Read More]

Certified TIA-942 Internal Auditor

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V

Course Objectives
## Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself
## Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines
## Facilitate and support the external audit to ANSI/TIA-942
## Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and nal certication
## Facilitate surveillance and recertication audits

Fundamental concepts and process of an internal audit
## Terms and denitions
## Dierence between an internal and external auditor
## Audit principles
## Auditor competency requirements

Managing an audit programme
## Establishing the audit objectives
## Establishing the audit programme

Planning the audit
## Planning the schedule
## Resource planning
## Tools/equipment required
## Document requirements
## Design documents
## Process documents
## Decla... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Public Course / Instructor-Led / Open Enrollment
School/Trainer: Global Knowledge China
Training Center(s)/Venue(s): Guangzhou, China
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of t... [Read More]

Pages: 1 2 3 4 5 6


Find IT Audit training courses, certificates, diplomas and degrees in Countries:



Australia - Canada - India - Indonesia - Ireland - Malaysia - Pakistan - Philippines - Singapore - South Africa - United Arab Emirates - United Kingdom - United States



Tips:
ASKEDU jobs and talents message board can help you find jobs related to your experience in a specific city, or hire somebody in place with particular knowledges.



Auditing
IT Audit
- Online/E-learning -
IT Audit
Ask for Training
Add Courses