Course Description
This course will help auditors better understand how to evaluate the RACM to identify IT Dependent Controls and to evaluate whether the RACM is complete. We use real data from client’s RACMs to understand how to evaluate whether the RACM is complete and how to identify if there is a dependency on a report, configuration, or access control.
Agenda:
- ERP Systems Overview and Background
- Background - ISACA and IIA
- Identifying IT Dependent Controls in the RACM / Case Studies
- Looking for Risks Beyond the RACM
- Decision Matrix for Identifying IT Dependent Controls
Course Curriculum
Available in
days
days
after you enroll
Available in
days
days
after you enroll
- Session 1 ERP Systems Overview and Background (5:26)
- Session 2-1 Case Study Part A (3:25)
- Session 2-2 Case Study Part B (2:36)
- Session 2-3 Case Study Part C (4:09)
- Session 2-4 Case Study Part D (2:11)
- Session 2-5 Case Study Part E (3:46)
- Session 2-6 Case Study Part F (5:00)
- Session 3-1 Example Controls Introduction & Example 1 Questions (2:48)
- Session 3-2 Example 1 Answers (1:20)
- Session 4-1 Example 2 Questions (0:40)
- Session 4-2 Example 2 Answers (3:03)
- Session 5 Example 3 Questions & Answers (7:16)
- Session 6 Example 4 Questions & Answers (5:50)
- Session 7 Looking Beyond the RACM (17:31)
- Session 8 Decision Matrix (13:36)
- Session 9 Decision Matrix Wrap Up (2:23)
Available in
days
days
after you enroll
Featured Courses
View our other ERP Armor: Learning courses and get the continuing education hours you need!
Check your inbox to confirm your subscription