Auditing Training Courses and Workshops

Schools providing training courses, certificates, diplomas or degree programs of Auditor




Total 595 training courses and degree programs available around the world.

United States - United Kingdom - Canada - Australia - India

Auditing & Monitoring Networks, Perimeters & Systems

Course Format: Classroom
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V


Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit

Conduct a proper risk assessment of network to identify vulnerabilities and prioritize what will be audited

Establish a well-secured baseline for computers and networks, a standard to conduct audit against

Perform a network and perimeter audit using a seven step process

Audit firewalls to validate that rules/settings are working as designed, blocking traffic as required

Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed deci- sions about risk and resources.

Audit web application&,#146,s configuration, authentication, and session management identify vulnerabilities attackers can exploit

Utilize scripting to build a system to baseline and automatically audit Active Directory and all systems in a Windows domain

Certified Information Systems Auditor

Course Format: Classroom
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V

Testing-Taking Tips and Study Techniques ## Preparation for the CISA Exam
## Submitting Required Paperwork
## Resources and Study Aids
## Passing the Exam the First Time

## The Audit Process ## Risk
## Audit
## Standards and Guidelines

## IT Governance ## Best Practices
## Management Practices
## Roles and Responsibilities

## Lifecycle Management ## Project Management
## Business Application Development
## Information Systems Maintenance Practices

## System Infrastructure Control ## Auditing Application Controls
## Application System Development
## Business Application Systems

## Information Systems Hardware and Architecture ## Information Systems Operations
## Information Systems Hardware
## SDLC
## Databases

## Information Systems Used for IT Delivery and Support ## OSI
## TCP/IP Model
## TCP/UDP/ICMP/IP
## Routers/Switches/Hubs
## Firewalls
## Wireless
## WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cable

## Protection of Logical Assets ## CIA
## Roles and Responsibilities - RACI
#... [Read More]

Certified TIA-942 Internal Auditor

Course Format: Classroom
School/Trainer: Global Knowledge Malaysia
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V

Course Objectives
## Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself
## Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines
## Facilitate and support the external audit to ANSI/TIA-942
## Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and nal certication
## Facilitate surveillance and recertication audits

Fundamental concepts and process of an internal audit
## Terms and denitions
## Dierence between an internal and external auditor
## Audit principles
## Auditor competency requirements

Managing an audit programme
## Establishing the audit objectives
## Establishing the audit programme

Planning the audit
## Planning the schedule
## Resource planning
## Tools/equipment required
## Document requirements
## Design documents
## Process documents
## Declarations

Conducting the audit
## Conducting an opening meeting
## Conducting the... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Classroom
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of the 20 Critical Controls

SEC566.2: Critical Controls 3,4,5,6

SEC566.3: Critical... [Read More]

Auditing & Monitoring Networks, Perimeters & Systems

Course Format: Classroom
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V


Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit

Conduct a proper risk assessment of network to identify vulnerabilities and prioritize what will be audited

Establish a well-secured baseline for computers and networks, a standard to conduct audit against

Perform a network and perimeter audit using a seven step process

Audit firewalls to validate that rules/settings are working as designed, blocking traffic as required

Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed deci- sions about risk and resources.

Audit web application&,#146,s configuration, authentication, and session management identify vulnerabilities attackers can exploit

Utilize scripting to build a system to baseline and automatically audit Active Directory and all systems in a Windows domain

Certified Information Systems Auditor

Course Format: Classroom
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V

Testing-Taking Tips and Study Techniques ## Preparation for the CISA Exam
## Submitting Required Paperwork
## Resources and Study Aids
## Passing the Exam the First Time

## The Audit Process ## Risk
## Audit
## Standards and Guidelines

## IT Governance ## Best Practices
## Management Practices
## Roles and Responsibilities

## Lifecycle Management ## Project Management
## Business Application Development
## Information Systems Maintenance Practices

## System Infrastructure Control ## Auditing Application Controls
## Application System Development
## Business Application Systems

## Information Systems Hardware and Architecture ## Information Systems Operations
## Information Systems Hardware
## SDLC
## Databases

## Information Systems Used for IT Delivery and Support ## OSI
## TCP/IP Model
## TCP/UDP/ICMP/IP
## Routers/Switches/Hubs
## Firewalls
## Wireless
## WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cable

## Protection of Logical Assets ## CIA
## Roles and Responsibilities - RACI
#... [Read More]

Certified TIA-942 Internal Auditor

Course Format: Classroom
School/Trainer: Global Knowledge Indonesia
Training Center(s)/Venue(s): Jakarta, Indonesia
  V

Course Objectives
## Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself
## Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines
## Facilitate and support the external audit to ANSI/TIA-942
## Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and nal certication
## Facilitate surveillance and recertication audits

Fundamental concepts and process of an internal audit
## Terms and denitions
## Dierence between an internal and external auditor
## Audit principles
## Auditor competency requirements

Managing an audit programme
## Establishing the audit objectives
## Establishing the audit programme

Planning the audit
## Planning the schedule
## Resource planning
## Tools/equipment required
## Document requirements
## Design documents
## Process documents
## Declarations

Conducting the audit
## Conducting an opening meeting
## Conducting the... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Classroom
School/Trainer: Global Knowledge China
Training Center(s)/Venue(s): Guangzhou, China
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of the 20 Critical Controls

SEC566.2: Critical Controls 3,4,5,6

SEC566.3: Critical... [Read More]

Auditing & Monitoring Networks, Perimeters & Systems

Course Format: Classroom
School/Trainer: Global Knowledge China
Training Center(s)/Venue(s): Guangzhou, China
  V


Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit

Conduct a proper risk assessment of network to identify vulnerabilities and prioritize what will be audited

Establish a well-secured baseline for computers and networks, a standard to conduct audit against

Perform a network and perimeter audit using a seven step process

Audit firewalls to validate that rules/settings are working as designed, blocking traffic as required

Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed deci- sions about risk and resources.

Audit web application&,#146,s configuration, authentication, and session management identify vulnerabilities attackers can exploit

Utilize scripting to build a system to baseline and automatically audit Active Directory and all systems in a Windows domain

Certified Information Systems Auditor

Course Format: Classroom
School/Trainer: Global Knowledge China
Training Center(s)/Venue(s): Guangzhou, China
  V

Testing-Taking Tips and Study Techniques ## Preparation for the CISA Exam
## Submitting Required Paperwork
## Resources and Study Aids
## Passing the Exam the First Time

## The Audit Process ## Risk
## Audit
## Standards and Guidelines

## IT Governance ## Best Practices
## Management Practices
## Roles and Responsibilities

## Lifecycle Management ## Project Management
## Business Application Development
## Information Systems Maintenance Practices

## System Infrastructure Control ## Auditing Application Controls
## Application System Development
## Business Application Systems

## Information Systems Hardware and Architecture ## Information Systems Operations
## Information Systems Hardware
## SDLC
## Databases

## Information Systems Used for IT Delivery and Support ## OSI
## TCP/IP Model
## TCP/UDP/ICMP/IP
## Routers/Switches/Hubs
## Firewalls
## Wireless
## WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cable

## Protection of Logical Assets ## CIA
## Roles and Responsibilities - RACI
#... [Read More]

Certified TIA-942 Internal Auditor

Course Format: Classroom
School/Trainer: Global Knowledge China
Training Center(s)/Venue(s): Guangzhou, China
  V

Course Objectives
## Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself
## Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines
## Facilitate and support the external audit to ANSI/TIA-942
## Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and nal certication
## Facilitate surveillance and recertication audits

Fundamental concepts and process of an internal audit
## Terms and denitions
## Dierence between an internal and external auditor
## Audit principles
## Auditor competency requirements

Managing an audit programme
## Establishing the audit objectives
## Establishing the audit programme

Planning the audit
## Planning the schedule
## Resource planning
## Tools/equipment required
## Document requirements
## Design documents
## Process documents
## Declarations

Conducting the audit
## Conducting an opening meeting
## Conducting the... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: Classroom
School/Trainer: Global Knowledge India IBM Training Center
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V

This course describes the audit concerns reported by IBM® Security zSecure�Audit. The course explains how to audit the content of your Resource Access Control Facility (RACF®) database and z/OS® system. You can measure your current security settings against the security requirements of a selected policy level. In addition, you learn about an Access Monitor data set that contains statistics about all RACF decisions taken. This information is helpful for finding profiles, permissions, or connections that are not used and can, therefore, be removed from the RACF database. Furthermore, you learn how to review the current general Service Management Framework (SMF) and RACF audit settings. This course explains how to use and interpret the pre-defined SMF audit reports, and how to create your own customized SMF reports. Finally, the concepts of the Library status and change analysis functions are explained and demonstrated.

Course Objectives
## Describe the flow of a security call from Resource Managers to RACF
## Perform user ID and password audit analysis
## Use the audit functions to report on sensitive user IDs and z/OS resources
## Create au... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: Classroom
School/Trainer: Global Knowledge Malaysia IBM Training Center
Training Center(s)/Venue(s): Petaling Jaya, Malaysia
  V

This course describes the audit concerns reported by IBM® Security zSecure�Audit. The course explains how to audit the content of your Resource Access Control Facility (RACF®) database and z/OS® system. You can measure your current security settings against the security requirements of a selected policy level. In addition, you learn about an Access Monitor data set that contains statistics about all RACF decisions taken. This information is helpful for finding profiles, permissions, or connections that are not used and can, therefore, be removed from the RACF database. Furthermore, you learn how to review the current general Service Management Framework (SMF) and RACF audit settings. This course explains how to use and interpret the pre-defined SMF audit reports, and how to create your own customized SMF reports. Finally, the concepts of the Library status and change analysis functions are explained and demonstrated.

Course Objectives
## Describe the flow of a security call from Resource Managers to RACF
## Perform user ID and password audit analysis
## Use the audit functions to report on sensitive user IDs and z/OS resources
## Create au... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: Classroom
School/Trainer: Global Knowledge Indonesia IBM Training Center
Training Center(s)/Venue(s): Jakarta, Indonesia
  V

This course describes the audit concerns reported by IBM® Security zSecure�Audit. The course explains how to audit the content of your Resource Access Control Facility (RACF®) database and z/OS® system. You can measure your current security settings against the security requirements of a selected policy level. In addition, you learn about an Access Monitor data set that contains statistics about all RACF decisions taken. This information is helpful for finding profiles, permissions, or connections that are not used and can, therefore, be removed from the RACF database. Furthermore, you learn how to review the current general Service Management Framework (SMF) and RACF audit settings. This course explains how to use and interpret the pre-defined SMF audit reports, and how to create your own customized SMF reports. Finally, the concepts of the Library status and change analysis functions are explained and demonstrated.

Course Objectives
## Describe the flow of a security call from Resource Managers to RACF
## Perform user ID and password audit analysis
## Use the audit functions to report on sensitive user IDs and z/OS resources
## Create au... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: Classroom
School/Trainer: Global Knowledge China IBM Training Center
Training Center(s)/Venue(s): Guangzhou, China
  V

This course describes the audit concerns reported by IBM® Security zSecure�Audit. The course explains how to audit the content of your Resource Access Control Facility (RACF®) database and z/OS® system. You can measure your current security settings against the security requirements of a selected policy level. In addition, you learn about an Access Monitor data set that contains statistics about all RACF decisions taken. This information is helpful for finding profiles, permissions, or connections that are not used and can, therefore, be removed from the RACF database. Furthermore, you learn how to review the current general Service Management Framework (SMF) and RACF audit settings. This course explains how to use and interpret the pre-defined SMF audit reports, and how to create your own customized SMF reports. Finally, the concepts of the Library status and change analysis functions are explained and demonstrated.

Course Objectives
## Describe the flow of a security call from Resource Managers to RACF
## Perform user ID and password audit analysis
## Use the audit functions to report on sensitive user IDs and z/OS resources
## Create au... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: Classroom
School/Trainer: Global Knowledge Singapore IBM Training Center
Training Center(s)/Venue(s): Singapore, Singapore
  V

This course describes the audit concerns reported by IBM® Security zSecure�Audit. The course explains how to audit the content of your Resource Access Control Facility (RACF®) database and z/OS® system. You can measure your current security settings against the security requirements of a selected policy level. In addition, you learn about an Access Monitor data set that contains statistics about all RACF decisions taken. This information is helpful for finding profiles, permissions, or connections that are not used and can, therefore, be removed from the RACF database. Furthermore, you learn how to review the current general Service Management Framework (SMF) and RACF audit settings. This course explains how to use and interpret the pre-defined SMF audit reports, and how to create your own customized SMF reports. Finally, the concepts of the Library status and change analysis functions are explained and demonstrated.

Course Objectives
## Describe the flow of a security call from Resource Managers to RACF
## Perform user ID and password audit analysis
## Use the audit functions to report on sensitive user IDs and z/OS resources
## Create au... [Read More]

Implementing and Auditing the Critical Security Controls

Course Format: Classroom
School/Trainer: Global Knowledge Singapore
Training Center(s)/Venue(s): Singapore, Singapore
  V


Apply a security framework based on actual threats that is measurable, scalable, and reliable in stop- ping known attacks and protecting organizations&,#146, important information and systems

## Understand the importance of each control, how it is compromised if ignored, and explain the defesive goals that result in quick wins and increased visibility of network and systems

## Identify and utilize tools that implement controls through automation

## Learn how to create a scoring tool for measuring the effectiveness of each controls the effectiveness of each control

## Employ specific metrics to establish a baseline and measure the effectiveness of security controls

## Understand how critical controls map to standards such as NIST 800-53, ISO 27002, the Australian Top 35, and more

## Audit each of the critical security controls, with specific, proven templates, checklists, and scripts provided to facilitate the audit process

Course Content

SEC566.1: Introduction and Overview of the 20 Critical Controls

SEC566.2: Critical Controls 3,4,5,6

SEC566.3: Critical... [Read More]

Auditing & Monitoring Networks, Perimeters & Systems

Course Format: Classroom
School/Trainer: Global Knowledge Singapore
Training Center(s)/Venue(s): Singapore, Singapore
  V


Understand the different types of controls (e.g., technical vs. non-technical) essential to performing a successful audit

Conduct a proper risk assessment of network to identify vulnerabilities and prioritize what will be audited

Establish a well-secured baseline for computers and networks, a standard to conduct audit against

Perform a network and perimeter audit using a seven step process

Audit firewalls to validate that rules/settings are working as designed, blocking traffic as required

Utilize vulnerability assessment tools effectively to provide management with the continuous remediation information necessary to make informed deci- sions about risk and resources.

Audit web application&,#146,s configuration, authentication, and session management identify vulnerabilities attackers can exploit

Utilize scripting to build a system to baseline and automatically audit Active Directory and all systems in a Windows domain

Certified Information Systems Auditor

Course Format: Classroom
School/Trainer: Global Knowledge Singapore
Training Center(s)/Venue(s): Singapore, Singapore
  V

Testing-Taking Tips and Study Techniques ## Preparation for the CISA Exam
## Submitting Required Paperwork
## Resources and Study Aids
## Passing the Exam the First Time

## The Audit Process ## Risk
## Audit
## Standards and Guidelines

## IT Governance ## Best Practices
## Management Practices
## Roles and Responsibilities

## Lifecycle Management ## Project Management
## Business Application Development
## Information Systems Maintenance Practices

## System Infrastructure Control ## Auditing Application Controls
## Application System Development
## Business Application Systems

## Information Systems Hardware and Architecture ## Information Systems Operations
## Information Systems Hardware
## SDLC
## Databases

## Information Systems Used for IT Delivery and Support ## OSI
## TCP/IP Model
## TCP/UDP/ICMP/IP
## Routers/Switches/Hubs
## Firewalls
## Wireless
## WAN Technologies - X.25/Frame Relay/PPP/ISDN/DSL/Cable

## Protection of Logical Assets ## CIA
## Roles and Responsibilities - RACI
#... [Read More]

Certified TIA-942 Internal Auditor

Course Format: Classroom
School/Trainer: Global Knowledge Singapore
Training Center(s)/Venue(s): Singapore, Singapore
  V

Course Objectives
## Prepare the organisation for an audit according to ANSI/TIA-942 including preparation of the required documents, resource planning and management of the audit process itself
## Conduct an internal audit according to ANSI/TIA-942 following ISO-19011 guidelines
## Facilitate and support the external audit to ANSI/TIA-942
## Manage the post-audit process with respect to CAR (Corrective Action Reports), gap closing and nal certication
## Facilitate surveillance and recertication audits

Fundamental concepts and process of an internal audit
## Terms and denitions
## Dierence between an internal and external auditor
## Audit principles
## Auditor competency requirements

Managing an audit programme
## Establishing the audit objectives
## Establishing the audit programme

Planning the audit
## Planning the schedule
## Resource planning
## Tools/equipment required
## Document requirements
## Design documents
## Process documents
## Declarations

Conducting the audit
## Conducting an opening meeting
## Conducting the... [Read More]

Pages: 1 2 3 4 5 6 7 8 ...


Find Auditing training courses, certificates, diplomas and degrees in Countries:



Australia - Canada - India - Indonesia - Ireland - Malaysia - New Zealand
Pakistan - Philippines - Singapore - South Africa - United Arab Emirates
United Kingdom - United States



Tips:
Schools can use this unlimited free web marketing service by submitting their course descriptions and school introductions. Two outbound links will be granted to each posting.



- Other Topics -
- Online/E-learning -
Auditing
Ask for Training
Add Courses