Auditing Training Courses and Workshops

Schools providing training courses, certificates, diplomas or degree programs of Auditor




Total 595 training courses and degree programs available around the world.

United States - United Kingdom - Canada - Australia - India

Project Auditing & Risk Assurance

Course Format: On-site
School/Trainer: Equip Global Pte Ltd
Training Center(s)/Venue(s): Singapore, Singapore
  V


By attending this training course, you will gain the following

· Explain what constitutes a well-managed project

· Understand the concepts of controls and governance in a project setting

· Anticipate the common problems experienced in projects and find out their typical solutions

· Develop a consistent process for assessing project risk, especially with regards to contracts and procurement

· Learn what to look out for when monitoring and evaluating projects

· Determine whether a project demonstrates good project management practices

· Enhance efficiency through identifying your strengths and weaknesses in auditing projects

· Plan how to improve your skills in project auditing and risk assurance further

Who Should Attend

· Project Managers and Engineers

· Auditors / Internal Auditors

· Project Risk Managers

· Audit &, Risk Managers

· Managers of Compliance

· Finance Directors and Managers
Read More]

Quality Auditing

Course Format: Classroom
School/Trainer: Ferris State University
Training Center(s)/Venue(s): Big Rapids, United States
  V

A detailed study of the technology concerned with quality auditing with emphasis on the international ISO 9000 standards. Topics include: types of quality audits, planning for the audit, conducting the audit, follow-up activities to improve operations, and reporting results. Typically Offered Fall Only

Energy Audit and Analysis

Course Format: Classroom
School/Trainer: Ferris State University
Training Center(s)/Venue(s): Big Rapids, United States
  V

The survey of utility rate structures, billing energy consumption, and energy profiling of commercial and industrial buildings. On-site audit projects will report on recommendations to building envelopes, HVACR systems, and control systems, with regard to paybacks. Oral and written presentations are a requirement of this senior project course. This course meets General Education Requirements: Writing Intensive.

Environmental Audits

Course Format: Classroom
School/Trainer: Faculty of Extension, University of Alberta
Training Center(s)/Venue(s): Edmonton, Canada
  V

Environmental auditing is a management tool increasingly used by organizations to verify that the organization is meeting its environmental obligations. It is also an essential element of an environmental management system and a primary driver of continual improvement. This course will provide the student with the skills and knowledge to undertake effective environmental audits that will provide many benefits to their organization.

Fundamentals of Auditing

Course Format: Classroom
School/Trainer: Faculty of Extension, University of Alberta
Training Center(s)/Venue(s): Edmonton, Canada
  V

This course is designed to provide students with an overview of auditing principles, an appreciation of audit instruments, and the theory and practice of performing the essential steps of a health and safety program audit. There will be a particular emphasis on techniques important in making the audit a value-added tool for management in developing the organization&,#146,s safety program.

Certified Information Systems Auditor (CISA) Workshop

Course Format: Classroom
School/Trainer: CyberLabs Academy
Training Center(s)/Venue(s): Manila, Philippines
  V


This 5-day intensive course will provide IT and cyber security professionals with a comprehensive and concentrated exposure to the 5 critical domains of the ISACA CISA qualification, as well as critical exam taking tips unique to the CISA exam experience. The course covers critical topics in information security and infosec program management, and concentrates on each domain in a way that’s proportionate to how they each feature in the exam. As with all our credential exams, our mission on this course is to teach you precisely what you need to know to pass the exam, nothing else! Our course covers the 5 CISA knowledge domains, weighted as follows:

Domain 1—The Process of Auditing Information Systems

Provide audit services in accordance with IS audit standards to assist the organization in protecting and controlling information systems. (21%)

Domain 2—Governance and Management of IT

Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization’s strategy. (16%)

Domain 3—Information Systems Acquisition, Development a... [Read More]

Certified Information Systems Auditor (CISA) Workshop

Course Format: Classroom
School/Trainer: CyberLabs Academy
Training Center(s)/Venue(s): Singapore, Singapore
  V


This 5-day intensive course will provide IT and cyber security professionals with a comprehensive and concentrated exposure to the 5 critical domains of the ISACA CISA qualification, as well as critical exam taking tips unique to the CISA exam experience. The course covers critical topics in information security and infosec program management, and concentrates on each domain in a way that’s proportionate to how they each feature in the exam. As with all our credential exams, our mission on this course is to teach you precisely what you need to know to pass the exam, nothing else! Our course covers the 5 CISA knowledge domains, weighted as follows:

Domain 1—The Process of Auditing Information Systems

Provide audit services in accordance with IS audit standards to assist the organization in protecting and controlling information systems. (21%)

Domain 2—Governance and Management of IT

Provide assurance that the necessary leadership and organizational structures and processes are in place to achieve objectives and to support the organization’s strategy. (16%)

Domain 3—Information Systems Acquisition, Development a... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: On-site
School/Trainer: Arrow Electronics IBM Training
Training Center(s)/Venue(s): Atlanta, Boston, Cleveland, Denver, Minneapolis, United States
  V

Unit 1: Introduction to RACF auditing
•List the RACF resources that need to be audited
•Generate and interpret an audit concerns report
•Identify all the profiles owned by a particular user
•Identify the users authorized to maintain RACF application segments

Unit 2: Audit users and passwords
•Generate and interpret user reports
•Identify last logon and password aging
•Identify users with system-wide authorities
•Identify users with group specific authorities
•Generate a report of trusted users

Unit 3: Audit resources
•Identify sensitive profiles and the users who can modify them
•Identify users who can create profiles of various types
•Audit started tasks and programs

Unit 4: Audit subsystems
•Generate audit reports about CICS regions, transactions, and programs
•Generate audit reports about IMS regions, transactions, and program specification blocks
•Generate audit report about DB2 region

Unit 5: Generate SMF audit reports
•Explain the concepts of SMF auditing
•Report which events are logged in SMF
•Select events logged in SMF using ISPF i... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: On-site
School/Trainer: Arrow ECS IBM Training Canada
Training Center(s)/Venue(s): Concord, Quebec City, Toronto, Canada
  V

Unit 1: Introduction to RACF auditing
•List the RACF resources that need to be audited
•Generate and interpret an audit concerns report
•Identify all the profiles owned by a particular user
•Identify the users authorized to maintain RACF application segments

Unit 2: Audit users and passwords
•Generate and interpret user reports
•Identify last logon and password aging
•Identify users with system-wide authorities
•Identify users with group specific authorities
•Generate a report of trusted users

Unit 3: Audit resources
•Identify sensitive profiles and the users who can modify them
•Identify users who can create profiles of various types
•Audit started tasks and programs

Unit 4: Audit subsystems
•Generate audit reports about CICS regions, transactions, and programs
•Generate audit reports about IMS regions, transactions, and program specification blocks
•Generate audit report about DB2 region

Unit 5: Generate SMF audit reports
•Explain the concepts of SMF auditing
•Report which events are logged in SMF
•Select events logged in SMF using ISPF i... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: On-site
School/Trainer: Arrow ECS IBM Training Australia
Training Center(s)/Venue(s): Sydney, Australia
  V

Unit 1: Introduction to RACF auditing
•List the RACF resources that need to be audited
•Generate and interpret an audit concerns report
•Identify all the profiles owned by a particular user
•Identify the users authorized to maintain RACF application segments

Unit 2: Audit users and passwords
•Generate and interpret user reports
•Identify last logon and password aging
•Identify users with system-wide authorities
•Identify users with group specific authorities
•Generate a report of trusted users

Unit 3: Audit resources
•Identify sensitive profiles and the users who can modify them
•Identify users who can create profiles of various types
•Audit started tasks and programs

Unit 4: Audit subsystems
•Generate audit reports about CICS regions, transactions, and programs
•Generate audit reports about IMS regions, transactions, and program specification blocks
•Generate audit report about DB2 region

Unit 5: Generate SMF audit reports
•Explain the concepts of SMF auditing
•Report which events are logged in SMF
•Select events logged in SMF using ISPF i... [Read More]

IBM Security zSecure RACF and SMF Auditing

Course Format: On-site
School/Trainer: Arrow ECS UK IBM Training
Training Center(s)/Venue(s): Harrogate, London, Nottingham, Reading, Stockport, Suffolk, United Kingdom
  V

Unit 1: Introduction to RACF auditing
•List the RACF resources that need to be audited
•Generate and interpret an audit concerns report
•Identify all the profiles owned by a particular user
•Identify the users authorized to maintain RACF application segments

Unit 2: Audit users and passwords
•Generate and interpret user reports
•Identify last logon and password aging
•Identify users with system-wide authorities
•Identify users with group specific authorities
•Generate a report of trusted users

Unit 3: Audit resources
•Identify sensitive profiles and the users who can modify them
•Identify users who can create profiles of various types
•Audit started tasks and programs

Unit 4: Audit subsystems
•Generate audit reports about CICS regions, transactions, and programs
•Generate audit reports about IMS regions, transactions, and program specification blocks
•Generate audit report about DB2 region

Unit 5: Generate SMF audit reports
•Explain the concepts of SMF auditing
•Report which events are logged in SMF
•Select events logged in SMF using ISPF i... [Read More]

WebSphere Commerce Security and Auditing

Course Format: Online
School/Trainer: Arrow ECS UK IBM Training
Training Center(s)/Venue(s): Harrogate, London, Nottingham, Reading, Stockport, Suffolk, United Kingdom
  V

Objectives

•Provide an overview of Security and Auditing.
•Describe the WebSphere Commerce security model
•Describe how authorization is handled
•List and describe session management
•List and describe security consideration
•Understand PCI security standard

Programme

•Course Overview
•Security and Auditing Overview
•WebSphere Commerce Security Model
•WebSphere Commerce Authentication
•Authorization
•Session Management
•Security Considerations
•PCI Security Standard
•Course Wrap up

CISM Boot Camp (Certificate)

Course Format: Classroom
School/Trainer: Intense School
Training Center(s)/Venue(s): Atlanta, Chicago, Cleveland, Dallas, Las Vegas, New York City, Orlando, Seattle, Washington DC, United States
  V

Intense School&,#146,s CISM® (Certified Information Security Manager) Boot Camp is comprehensive training on what it means to be an Information Security Manager. We have incorporated the metaphors, teaching styles and concepts we have determined over the years that best prepare our students to become CISM®C certified. The advantage to this is that students learn security management concepts in a way that is fun, interesting, and reinforces the concepts in a way that sticks with students straight through the exams and into their careers.When a Security Manager thinks of themselves as students of the art and science of security, much like a martial artist thinks of their discipline and growth, they proactively engage their career. Practicing Security Management, like practicing the art of war, requires continual engagement and study of threats and their agents.

Features:
Five (5) full days of intense instruction with no outside distractions
In-person access to the top security experts in the industry
Lunch and snacks provided on each day of class
Highly accomplished status as a distinguished Information Security professional
For CIS... [Read More]

CISA Boot Camp (Certificate)

Course Format: Classroom
School/Trainer: Intense School
Training Center(s)/Venue(s): Atlanta, Chicago, Cleveland, Dallas, Las Vegas, New York City, Orlando, Seattle, Washington DC, United States
  V

Intense School&,#146,s Certified Information Systems Auditor (CISA®) Boot Camp is specifically designed to provide CISA® candidates with the effective skills necessary to develop, manage, and supervise programs to defend against unauthorized admittance to information. In addition, our boot camp is focused on preparing students for the CISA examination through testing of knowledge and the ability to apply it to real world scenarios.

Course Highlights
Five (5) full days of intense instruction with no outside distractions
Extensive exam review
In-person access to the top security experts in the industry
Lunch and snacks provided on each day of class
Highly accomplished status as a distinguished Information Security professional
Worldwide recognition as a universally accepted information systems manager
Provides tangible evidence of career growth
Intense award-winning propreitary courseware
Excellent Certification Preparation (Note that Students are responsible for registering for the exam and transportation to the exam, Intense School will not provide exam logistics)

IT Auditing (Certificate)

Course Format: Classroom
School/Trainer: Intense School
Training Center(s)/Venue(s): Atlanta, Chicago, Cleveland, Dallas, Las Vegas, New York City, Orlando, Seattle, Washington DC, United States
  V

This intense three day boot camp covers in detail the concepts and best practices that encompass a best-practice audit of IT systems. You&,#146,ll learn the technology specifics as they relate to the audit concerns in the IT environment. Additionally, you will study the necessary controls for enterprise systems. You will learn how to vary the audit process when auditing currently installed systems, new systems under development, and the various activities within the information technology department.

Focusing on a top-down, operational risk management approach to auditing application system transactions, you&,#146,ll master techniques you can apply to all types of applications from batch, to on-line, to real-time systems. You will leave this three day boot camp with a solid foundation in the basics of information technology as they apply to IT risks, audit, information security, and business application systems.

Every student leaves with a solid foundation in the basics of information technology as they apply to audit and security concerns. InfoSec Institute ensures that every student is able to apply this knowledge immediately after returning ... [Read More]

CISA Workshop (Certificate)

Course Format: On-site
School/Trainer: Adept Technology Pvt Ltd.
Training Center(s)/Venue(s): Bangalore, Chennai, Cochin, Hyderabad, New Delhi, Mumbai, Pune, Kolkatta, India
  V

The CISA designation is a globally recognized certification for IS audit control, assurance and security professionals. Being CISA-certified showcases your audit experience, skills and knowledge, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within the enterprise. Independent studies consistently rate ISACAs designations among the highest paying IT and impactful certifications that an IT professional can earn.

Earning and maintaining an ISACA certification:
Boosts your earning potential
Counts in the hiring process
Enhances your professional credibility and recognition
Benefits Demonstrates that you have gained and maintained the level of knowledge required to meet the dynamic challenges of a modern enterprise
Is globally recognized as the mark of excellence for the IS audit professional
Combines the achievement of passing a comprehensive exam with recognition of work and educational experience, providing you with credibility in the marketplace.
Increases your value to your organization
Gives you a competitive advantage over peers when seeking job growth
Helps... [Read More]

Practical Supplier & Vendor Auditing

Course Format: Classroom
School/Trainer: CP Training Consortium
Training Center(s)/Venue(s): London, United Kingdom
  V

This course provides you with the skills you need to audit and manage your suppliers and vendors effectively. After attending, you will be well equipped to build a robust management platform from which to continuously improve your supplier partnerships.

We have designed this course for supply chain and procurement officers, audit managers and key account managers in supplier businesses.

It will be of particular benefit to any manager who can influence processes and procedures in the supply chain, who needs to improve their skills in managing vendors and suppliers, or who wishes to improve their understanding of supply chain management.

It will also be of interest to any manager about to be promoted to any of these roles, and to graduates on fast-track development routes.

By the end of the programme participants will be able to:
?Use auditing tools and techniques to uncover weak links in the supply chain
?Apply best practice supplier/vendor auditing strategies internationally
?Undertake objective supplier/vendor audits and reporting
?Develop effective supplier/vendor compliance and improvement initiat... [Read More]

Forensic Accounting and Fraud Auditing

Course Format: Classroom
School/Trainer: Colorado State University College of Business
Training Center(s)/Venue(s): Fort Collins, United States

Professional practices for addressing the related areas of forensic accounting and fraud.

Accounting Ethics and Auditing (Certificate)

Course Format: Classroom
School/Trainer: Colorado State University College of Business
Training Center(s)/Venue(s): Fort Collins, United States
  V

Combine three graduate-level courses to increase your expertise and marketability. Study accounting ethics, forensic accounting, fraud auditing, and leading best practice information technologies used in organizational accounting systems worldwide. Earn a stand-alone certificate and complete two required courses to become a CPA in Colorado and one that bolsters your technology skills, or work toward a Master of Computer Information Systems degree and discover countless possibilities.

IT Auditing in Depth Workshop (Certificate)

Course Format: Classroom
School/Trainer: Pandora Security Labs
Training Center(s)/Venue(s): Pasig City, Philippines
  V

IT Auditing in Depth - Training by Pandora Security Labs

Course Overview:

The course is for beginners to administrator tasked to conduct IT Audit. An IT audit is different from a financial statement audit. While a financial audit’,s purpose is to evaluate whether an organization is adhering to standard accounting practices, the purposes of an IT audit are to evaluate the system’,s internal control design and effectiveness. This includes, but is not limited to, efficiency and security protocols, development processes, and IT governance or oversight. Installing controls are necessary but not sufficient to provide adequate security.

People responsible for security must consider if the controls are installed as
intended, if they are effective if any breach in security has occurred and if so, what actions can be done to prevent future breaches. These inquiries must be answered by independent and unbiased observers. These observers are performing the task of information systems auditing.

Topics:

A.) System &, Network Auditing
1. Auditor’,s Role in Relation to
2. Basic Auditing and Assessing
Read More]

Pages: 1 2 3 4 5 6 7 8 9 ...


Find Auditing training courses, certificates, diplomas and degrees in Countries:



Australia - Canada - India - Indonesia - Ireland - Malaysia - New Zealand
Pakistan - Philippines - Singapore - South Africa - United Arab Emirates
United Kingdom - United States



Tips:
Besides Acquiring latest course information by the search form, Students can also leave their study interests here and let schools callback.



- Other Topics -
- Online/E-learning -
Auditing
Ask for Training
Add Courses