Assessing IT General Controls
On-Demand - 12 CPE
Internal and external auditors in today's complex organizations must understand information systems and be able to function within a technical environment. This on-demand class provides the important concepts of information technology you need to know in order to address key IT infrastructure risks.Â
During this class you will examine the IT general controls to assess the confidentiality, integrity and availability of protection over your information assets. The session will concentrate on determining risks in critical IT infrastructure areas and the key controls that can reduce those enterprise risks.
This class is designed for IT Auditors, Financial and Business Auditors, Internal and External Auditors, and Audit Management.
Topics covered in this 12-CPE class will include:
IT Risks                                                                                                Â
·      IT Risk Definition                                                                       Â
·      Information Security Objectives                                               Â
·      Data Breach Commonalities                                                    Â
·      Defense in Depth                                                                      Â
·      Security & Control Resources                                                 Â
o  IIA Global Technology Audit Guides (GTAGs)                 Â
o  ISACA COBIT                                                                       Â
o  NIST Cybersecurity Framework (CSF)                              Â
o  Center for Internet Security (CIS) Controls                       Â
Â
Performing Integrated Audits
·      Defining Integrated Auditing
·      Scoping Integrated Audits
·      Business and Application Controls
·      Integrated Audits - Challenges
·      COSO – Principle-11
      Â
IT Operations                                                                                      Â
·      IT Asset Management                                                               Â
·      IT Vulnerability Management                                                   Â
·      Incident Response Management                                             Â
·      Malware / Ransomware
Â
Access Management                                                                        Â
·      User Identification and Authentication                                    Â
·      Single Sign-On                                                                          Â
·      Authorization Controls                                                              Â
·      Separation of Duties                                                                Â
·      Controlling Privileged Access                                                  Â
·      Audit Trail & Review                                                                Â
·      Log Management                                                                      Â
                                                                                                             Â
Change, Patch & Configuration Mgt
·      Change Management                                                               Â
·      Patch Management                                                                   Â
·      Security Configuration Management                                       Â
                                                                                                             Â
Network Perimeter Security                                                            Â
·      Network Risks                                                                           Â
·      Firewalls                                                                                     Â
·      Demilitarized Zone (DMZ)                                                        Â
·      Intrusion Detection / Prevention Systems                             Â
·      Protecting Sensitive Information / Encryption                        Â
                                                                                                             Â
Web Application Risks                                                                     Â
·      Web Application Risks                                                              Â
·      Web Applications / Web Servers / DMZ                                 Â
·      OWASP Top-10 Web Application Security Risks                 Â
·      Web Application Vulnerability Scanning                                 Â
                                        Â
Cloud Computing                                                                              Â
·      Cloud Security Incidents                                                           Â
·      Defining Cloud Characteristics                                                Â
·      Cloud Benefits and Risks                                                         Â
·      Cloud Security Organizations- CSA, FedRamp                   Â
·      Assessing Cloud Controls
                                                                                                             Â
Middleware, API, EDIÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â
·      Middleware                                                                                 Â
·      API - Application Programming Interface                               Â
·      EDI - Electronic Data Interchange                                          Â
Â
Assessing Systems Development Projects
·      Software Development Risks                                                  Â
·      Audit's Primary Objectives                                                       Â
·      Staffing the Audit                                                                       Â
·      Traditional / Waterfall Development Model                            Â
·      Agile Development Model                                                        Â
·      Assessing Project Management                                              Â
·      Assessing System Implementation Plans                                                                                                     Â
Disaster Recovery Planning
·      Business Impact Analysis (BIA)
·      Recovery Time Objective (RTO)
·      Recovery Point Objective (RPO)
·      Disaster Recovery Strategy
·      Disaster Recovery Strategy Components
 NOTE: This course material is covered in the 24-CPE Assessing IT Risks & Controls on-demand learning class. If you have taken the 24-CPE Assessing IT Risks & Controls course, please view our other course offerings for new materials.
Course Curriculum
Featured Courses
See featured courses below. Click on View All Products below to see all courses offered.