Information Security and Technology Auditing 4-Day Course
An IT audit involves the analysis of an enterprise information technology structure, operations, and software programs. One of the most significant obstacles facing many auditors today is how exactly to go about auditing the security of an enterprise. IT Auditors are tasked with determining the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system. This course will teach you the versatile skills and techniques required to perform a comprehensive IT audit in your workplace. Our course will help develop and expand upon your audit knowledge of security and security controls to properly identify and categorize risks and achieve audit objectives while performing security audits of Applications, Active Directory, Databases, and Networks.
Course includes the following takeaway items: a printed training book and a CD that includes reference materials pertaining to the course.
NICE Work Roles
Security Control Assessor
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37).
IT Project Manager
Directly manages information technology projects.
- Module 1 – Laws, Policies & Guidance
- Module 2 – Critical Definitions
- Module 3 – Roles & Responsibilities
- Module 4 – Risk Assessment & Analysis
- Module 5 – Overview of the NIST RMF
- Module 6 – Audit Approach
- Module 6 – Ethical Hacking Principles and Practice
- Module 6 – Auditing High Risk Cyber Areas and Other Issues
No image gallery for this course as of yet.
No video for this course as of yet.