CERTIFIED INFORMATION TECHNOLOGY AUDITOR 

NAME OF THE COURSE
INFORMATION TECHNOLOGY AUDITOR 
 
CERTIFICATION
CERTIFIED INFORMATION TECHNOLOGY AUDITOR 
 
COURSE OVERVIEW
The role of information technology (IT) control and audit has become a critical mechanism for ensuring the integrity of information systems (IS) and the reporting of organization finances to avoid and hopefully prevent future financial fiascos such as Enron and WorldCom. Global economies are more interdependent than ever and geopolitical risks impact everyone. Electronic infrastructure and commerce are integrated into business processes around the globe. The need to control and audit IT has never been greater. 
 
TRAINING DURATION
Total Training Hours : 22 Hours
Training Duration      : 1 Week
Total Training  Days  : 4-5 Working Days
 
TRAINING SCHEDULE
Weekdays (Sunday to Thursday)
Regular Sessions : 4 – 6 Hrs Per day (9am to 2pm or 3.00pm to 9.00 pm)
Food & refreshments Included
Weekends (Friday & Saturday)
Fast Track Sessions: 8 Hours per day (9am to 5pm)
Food & refreshments Included
 
CERTIFICATION
Globally recognized certificate from “Kings Global Career Academy”
 
TEST
No
 
LEARNING AIDS
Yes
 
COURSE MATERIAL
Hard & Soft Copies of Study Material
 
LANGUAGE OF INSTRUCTION
English
 
INSTRUCTOR HELPLINE
Yes
1. Email
2. Social Media (For Emergency requirements)
 
REGISTRATION REQUIREMENTS
1. Passport Copy
2. Curriculum Vitae
3. Passport size photographs
4. Course Fee
 
MODE OF PAYMENT
Cash / Cheque / Credit Card / Bank Transfer.
 
ELIGIBILITY CRITERIA
  • Information assurance auditors
  • System implementers or administrators
  • Network security engineers
  • IT administrators
  • Department of Defense (DoD) personnel or contractors
  • Federal agencies or clients
  • Private sector organizations looking to improve information assurance processes and secure their systems
Security vendors and consulting groups looking to stay current with frameworks for information assurance
 
COURSE BENEFITS
  • Checks Susceptibility to Threat
  • Evaluates the System and Ensures Its Integrity
  • Secures Data
  • Bolsters Controls
  • Develops IT Governance
 
COURSE CONTENTS
  • Introduction and Overview of the 20 Critical Controls
  • Overview of the Control
  • How it is Compromised
  • Defensive Goals
  • Quick Wins
  • Visibility & Attribution
  • Configuration & Hygiene
  • Advanced
  • Overview of Evaluating the Control
  • Core Evaluation Test(s)
  • Testing/Reporting Metrics
  • Steps for Root Cause Analysis of Failures
  • Audit/Evaluation Methodologies
  • Evaluation Tools
  • Exercise to Illustrate Implementation Or Steps for Auditing a Control
  • Inventory of Authorized and Unauthorized Devices
  • Inventory of Authorized and Unauthorized Software
  • Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
  • Continuous Vulnerability Assessment and Remediation
  • Controlled Use of Administrative Privileges
  • Maintenance, Monitoring, and Analysis of Audit Logs
  • Email and Web Browser Protections
  • Malware Defenses
  • Limitation and Control of Network Ports, Protocols, and Services
  • Data Recovery Capability (validated manually)
  • Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
  • Boundary Defense
  • Data Protection
  • Controlled Access Based On Need to Know
  • Wireless Device Control
  • Account Monitoring and Control
  • Security Skills Assessment and Appropriate Training to Fill Gaps
  • Application Software Security
  • Incident Response and Management
  • Penetration Tests and Red Team Exercises