Course Description


Auditing and administering today’s ERP systems necessitates a thorough understanding of how the functionality ERP systems offer and how they can be implemented and administered. To help organizations meet this obligation, Connor Thompson, CIA CISA and CISSP Candidate discusses a variety of pertinent concepts surrounding Workday. In this course, we explore critical foundational concepts for master data, role design, change management, audit trails, IT application controls, and many other important concepts.

In addition to the helpful insight provided, 11 hours of CPE credit will be awarded upon completion of the class.

Agenda:
  • Architectural Overview - IaaS, PaaS, SaaS
  • Workday Overview
  • Organizations
  • Chart of Accounts
  • Master Data Overview
  • Authentication and Login Configurations
  • Access Controls and Workday's Security Model
  • Workday Audit Trails
  • Change Management
  • IT Application Controls (ITACs)
  • Identifying IT Dependent Controls in the Risks and Controls Matrix
  • Use of Reports for the Execution of Manual Controls
  • Integrations and Interfacing Data
  • Protecting Sensitive Data in Production and Non-Production Environments

Course Curriculum

  Introduction
Available in days
days after you enroll
  Workday Overview
Available in days
days after you enroll
  Organization in Workday
Available in days
days after you enroll
  Master Data
Available in days
days after you enroll
  Authentication with Workday and Related Controls
Available in days
days after you enroll
  Access Controls and Workday's Security Model
Available in days
days after you enroll
  Workday Audit Trails
Available in days
days after you enroll
  Change Management
Available in days
days after you enroll
  Identifying IT Dependent Controls
Available in days
days after you enroll
  Reports for the Execution of Manual Controls
Available in days
days after you enroll
  IT Application Controls
Available in days
days after you enroll
  Integrations and Interfacing Data in Workday
Available in days
days after you enroll
  Protecting Sensitive Data in Production and Non-Production Environments
Available in days
days after you enroll
  Conclusion Sessions
Available in days
days after you enroll

Choose a Pricing Option