HOME > IT & Software > Technology Systems Auditing

Technology Systems Auditing

SynopsisTechnology Systems Auditing, available at $19.99, has an aver...
Technology Systems Auditing  No.1

Technology Systems Auditing, available at $19.99, has an average rating of 3.8, with 183 lectures, 5 quizzes, based on 16 reviews, and has 62 subscribers.

You will learn about Understand the IS audit process Plan audit and Perform risk analysis Put in place internal controls Learn about different phases of IS audit Understand the role of governance in IT/IS Make policies, procedures and identify risks Create information security policy document Conduct management reviews of the policy document Perform risk management Create insourcing and outsourcing strategy Perform organizational quality management Create project management structure Introduce application development best practices Plan IS operations and business resiliency plans Define RPO/RTO Develop disaster recovery plan Protect information assets Identify exposures and vulnerabilities Understand role of encryption in data protection Learn the basics of computer forensics This course is ideal for individuals who are Information systems auditors or Chief information security officers or Manager information security or Manager cyber security or Information system managers or Candidates aspiring for CISA certification It is particularly useful for Information systems auditors or Chief information security officers or Manager information security or Manager cyber security or Information system managers or Candidates aspiring for CISA certification.

Enroll now: Technology Systems Auditing

Summary

Title: Technology Systems Auditing

Price: $19.99

Average Rating: 3.8

Number of Lectures: 183

Number of Quizzes: 5

Number of Published Lectures: 183

Number of Published Quizzes: 5

Number of Curriculum Items: 188

Number of Published Curriculum Objects: 188

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Understand the IS audit process
  • Plan audit and Perform risk analysis
  • Put in place internal controls
  • Learn about different phases of IS audit
  • Understand the role of governance in IT/IS
  • Make policies, procedures and identify risks
  • Create information security policy document
  • Conduct management reviews of the policy document
  • Perform risk management
  • Create insourcing and outsourcing strategy
  • Perform organizational quality management
  • Create project management structure
  • Introduce application development best practices
  • Plan IS operations and business resiliency plans
  • Define RPO/RTO
  • Develop disaster recovery plan
  • Protect information assets
  • Identify exposures and vulnerabilities
  • Understand role of encryption in data protection
  • Learn the basics of computer forensics
  • Who Should Attend

  • Information systems auditors
  • Chief information security officers
  • Manager information security
  • Manager cyber security
  • Information system managers
  • Candidates aspiring for CISA certification
  • Target Audiences

  • Information systems auditors
  • Chief information security officers
  • Manager information security
  • Manager cyber security
  • Information system managers
  • Candidates aspiring for CISA certification
  • Information systems have become an integral part of any modern organization. Many of the business processes are now dependent on the information systems and the data contained in these systems is of critical importance to any enterprise. The need to protect and safeguard these systems is also directly proportional to the increase in their usage. With the information systems becoming so important, the attacks and threats including but not limited to ransomware, data theft, hacking, forgery and brute force are also on the rise. More and more attackers are targeting organization with less control and protection. This course prepares the candidates to put in place effective controls and policies to protect their information systems and assets from unauthorized access and leakage.

    Information systems auditor course is a comprehensive course designed with the objective of preparing the candidates to be able to familiarize themselves with the IS audit process, governance, management of IT, IS operations, maintenance and support, IS operations and business resilience as well as protection of information assets.

    These information systems or assets can be in the form of databases, files, images, documents and software. The course covers the protection methods and techniques regardless of the form the data is residing within the organization.

    Overall, the course touches all the aspects required to become an effective information systems auditor and perform the task efficiently. This course also helps the candidates to prepare for the relevant certification

    Course Curriculum

    Chapter 1: The IS Audit Process

    Lecture 1: The IS Audit Process

    Lecture 2: Topic A: The Auditing Process and Auditors

    Lecture 3: Definitions

    Lecture 4: Types of Auditors

    Lecture 5: The Auditing Process (1)

    Lecture 6: The Auditing Process (2)

    Lecture 7: The Auditing Process (3)

    Lecture 8: Audit Planning Process

    Lecture 9: Topic B: Risk Analysis

    Lecture 10: Risk Analysis Defined

    Lecture 11: Assessing Countermeasures

    Lecture 12: Steps of Assessment

    Lecture 13: Motivations for Risk Analysis

    Lecture 14: Topic C: Internal Controls

    Lecture 15: Internal Controls: Objectives & Procedures

    Lecture 16: Internal Control Types

    Lecture 17: Internal Controls (Preventative)

    Lecture 18: Internal Controls (Detective)

    Lecture 19: Internal Controls (Corrective)

    Lecture 20: Goals of Internal Controls

    Lecture 21: Goals of Internal Controls

    Lecture 22: General Control Methods/Types

    Lecture 23: The IS Audit Process

    Lecture 24: Audit Classifications

    Lecture 25: Audit Classifications

    Lecture 26: Phases of the Audit Process (Page 1)

    Lecture 27: Phases of the Audit Process (Page 2)

    Lecture 28: Inherent Risks During Audits

    Lecture 29: A Risk-Based Audit Approach

    Lecture 30: Evidence

    Lecture 31: Evidence Gathering Techniques

    Lecture 32: Computer Assisted Audit

    Lecture 33: Control Self-Assessment (CSA)

    Lecture 34: Chapter 1 Review

    Chapter 2: Chapter 2 – Governance and Management of IT

    Lecture 1: Chapter 2 – Governance and Management of IT

    Lecture 2: Topic A: The Role of Governance

    Lecture 3: IT Governance

    Lecture 4: IT Governance

    Lecture 5: Governance Defined

    Lecture 6: Relationship Structure

    Lecture 7: Role of Auditor

    Lecture 8: Role of Auditor

    Lecture 9: Practices & Procedures

    Lecture 10: Practices & Procedures

    Lecture 11: Information Security Governance

    Lecture 12: Information Security Governance

    Lecture 13: Information Security Governance

    Lecture 14: Information Security Governance

    Lecture 15: Results of Security Governance

    Lecture 16: Goals of Security Governance

    Lecture 17: Topic B: Policies, Procedures, and Risk

    Lecture 18: IT Governance

    Lecture 19: Policies

    Lecture 20: Policies

    Lecture 21: Information Security Policy Document

    Lecture 22: Information Security Policy Document

    Lecture 23: Management Reviews

    Lecture 24: Management Reviews

    Lecture 25: Procedures

    Lecture 26: Procedures

    Lecture 27: Risk Management – Approaches

    Lecture 28: Risk Management

    Lecture 29: IT Risk Management – Levels

    Lecture 30: Topic C: IT Governance & Personnel Management

    Lecture 31: IS Management Practices

    Lecture 32: Personnel Management

    Lecture 33: Sourcing IS Functions

    Lecture 34: Insourcing and Outsourcing Strategy

    Lecture 35: Insourcing and Outsourcing Strategy

    Lecture 36: Change Management

    Lecture 37: Change Management

    Lecture 38: Organizational Quality Management

    Lecture 39: Quality Management

    Lecture 40: Organizational Quality Management

    Lecture 41: Performance Management

    Lecture 42: Organizational Quality Management

    Lecture 43: Chapter 2 Review

    Chapter 3: Chapter 3 – IS Operations, Maintenance, and Support

    Lecture 1: IS Operations, Maintenance, and Support

    Lecture 2: Topic A: Project Management

    Lecture 3: Project Management Structure

    Lecture 4: Project Management Structure

    Lecture 5: Example Organizational Chart

    Lecture 6: Practical Project Management

    Lecture 7: Practical Project Management – 5 Steps

    Lecture 8: Topic B: Software Development and Acquisition

    Lecture 9: Business Application Development

    Lecture 10: Business Application Development

    Lecture 11: Traditional SDLC Approach

    Lecture 12: Software Development Risks

    Lecture 13: Alternative Development Methods

    Lecture 14: Alternative Development Methods

    Lecture 15: Agile Development

    Lecture 16: Prototyping

    Lecture 17: Prototyping

    Lecture 18: R.A.D. – Rapid Application Deployment

    Instructors

  • Technology Systems Auditing  No.2
    Stone River eLearning
    Over 1,000,000 Happy Students
  • Rating Distribution

  • 1 stars: 1 votes
  • 2 stars: 0 votes
  • 3 stars: 5 votes
  • 4 stars: 6 votes
  • 5 stars: 4 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!