By the end of this part of the course the attendees will be able to:
This module is designed to provide the participants with in-depth knowledge and experience of Technology and audit, Control objectives and risks, Batch and online systems, Programming computers, Database systems, Computer risks and exposures, Computer security, Application systems and their development, and Computer operations control.
By the end of this part of the course the attendees will be able to:
The module will cover Database types – Sequential, Hierarchical, Network, Inverted File Structures, Relational Models, Control opportunities in a database environment, Database tools and techniques, Auditing IMS; IDMS; ADABAS; DB2; DATACOM; Oracle; Access.
By the end of this part of the Course attendees will have an in-depth knowledge of:
The module will cover the areas like System testing techniques, Computerized application systems, Non-computerized systems, CAAT types, Source code review, Use of Test Data, Parallel Simulation, Integrated Test Facilities, Snapshot Techniques, SCARF, Retrieval Software, Generalized Audit Software, Specialized Audit Software, Utility Software, ACL, and IDEA.
By the end of this module, you will have the tools and techniques needed in your own environments to:
The module will cover What is a Disaster? What is a Disaster Recovery Plan? Who is Accountable? What are the Options? What is the cost? How can a C.P. be tested? What is Management’s Role? What is the User’s Role? What is the Information Services Role? What is the Internal Auditor’s Role?
By the end of this module, you will be able to:
The module will cover the areas like the nature of computer fraud, the Corporate risk profile, Computer fraud techniques, why computer fraud and who commits it? Fraud auditing, Fraud awareness, EDI and fraud, the expectation gap, Forensic auditing, Sources of evidence and audit tools, Legal evidence and Reporting sensitive issues.
By the end of this module, you will get an in-depth knowledge and experience of:
This module is designed to provide you with an in-depth knowledge of the risks as well as the benefits of Internet connection. You will learn about the tools and information sources available on the internet as well as the uses to which these might be put. The module will cover the following areas:
This module is developed to familiarize auditors with computer risk areas and security mechanisms, to provide auditors with an understanding of the building blocks of operational environments and operating systems, and to provide auditors with an appropriate methodology for reviewing computer security. The module will cover the following areas:
The objectives of this module are to provide attendees with the tools and techniques needed in their own environments to familiarize auditors with the Key Performance Areas within IT, to introduce them to a VFMA methodology to determine whether the IT resources are being optimized, and to provide delegates with a complete VFMA audit plan for the IT function. The module will cover the following areas:
IT Audit has developed into a maze of specialties with technical specialists requiring ever more. By the end of this part of the Course the attendee will be able to:
The module will cover the areas like the Scope of IT Audit, narrowing the perspective, Objective setting, Staffing and recruiting, the use of audit automation, skills and training, measuring effectiveness and the role of the Specialist.
An Information Technology (IT) audit, or Information Systems audit, is an examination of the management controls within an IT infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization’s goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.
iZen is brining you a structured learning curriculum for a program on ‘Analyst: IT Governance, Risk and Compliance Auditing’.
HIGH DEMAND
Most stringent government regulations, tighter lending standards, and demands for accountability keep IT auditors in high demand globally.
HUGE SUPPLY GAP
Demand for qualified IT auditing personnel far exceeds supply. That means less competition and more pay for highly trained-experts.
BRIGHT FUTURE
According to the Bureau of Labor Statistics, the employment rate for IT auditors is expected to grow by 15 percent over the next 10 years.
This course is aimed primarily at auditors, both internal and external, who are beginning their career in Computer Auditing or who wish to understand the complexities and vulnerabilities of computer systems. The course helps one to shorten the time period to productivity and effectiveness.
PREREQUISITES:
PROGRAM FACULTY
Richard Cascarino, CIA, CISM, CFE is a consultant and lecturer with over 30 years’ experience in Risk, Audit, Governance, Forensic, Internal and IT auditing education. He is a principal of Richard Cascarino & Associates. He is a regular speaker to national and international conferences and has presented courses throughout Africa, Europe, the Middle East and the USA.
He is the author of the books “Internal Auditing-an Integrated Approach”, “Auditor’s Guide to Information Systems Auditing”, “Corporate Fraud and Internal Control: A Framework for Prevention” published by Wiley, and the book “Data Analytics for Internal Auditors”. He is also a contributing author to the Governance section of Finance: The Ultimate Resource and is a frequent speaker at IIA, ACFE and ISACA courses and conferences.
Richard Cascarino was the chairman of the Audit and Risk Committee of the Department of Public Enterprises in South Africa and served as chairman of the Audit Committee of Gauteng cluster 2 (Premier’s office, Shared Services and Health). He is also a visiting Lecturer at the University of the Witwatersrand.
He is a Past President of the IIA – South Africa and founded the African Region of the IIA Inc. He is also a member of the Board of Regents for Higher Education of the Association of Certified Fraud Examiners. He is a member of the Board of Regents (Higher Education) for the ACFE.
Jim Kaplan CIA CFE was President and Founder of AuditNet®, the global resource for auditors which is now acquired by Workiva.
Jim is a highly accomplished Internal auditor and audit manager with 26 years of progressive experience with solid background utilizing internal audit standards and audit procedures and techniques. He is recipient of the IIA’s 2007 Bradford Cadmus Memorial Award. Jim Kaplan is an Author of “The Auditor’s Guide to Internet Resources” 2nd Edition.
Specialties: As a writer, journalist, educator, lecturer and dedicated local government auditor, Jim has promoted and encouraged the use of technology and the Internet for audit productivity.
Beginners
11 Modules
8 weeks
English
Webster University
Address: Office No: 946, Tamani Arts Offices, Business Bay, Dubai, UAE
Email: info@mcroxford.com
Phone: +971 50 548 5324