NAME OF THE COURSE |
INFORMATION TECHNOLOGY AUDITOR |
|
CERTIFICATION |
CERTIFIED INFORMATION TECHNOLOGY AUDITOR |
|
COURSE OVERVIEW |
The role of information technology (IT) control and audit has become a critical mechanism for ensuring the integrity of information systems (IS) and the reporting of organization finances to avoid and hopefully prevent future financial fiascos such as Enron and WorldCom. Global economies are more interdependent than ever and geopolitical risks impact everyone. Electronic infrastructure and commerce are integrated into business processes around the globe. The need to control and audit IT has never been greater. |
|
TRAINING DURATION |
Total Training Hours : 22 Hours |
Training Duration : 1 Week |
Total Training Days : 4-5 Working Days |
|
TRAINING SCHEDULE |
Weekdays (Sunday to Thursday) |
Regular Sessions : 4 – 6 Hrs Per day (9am to 2pm or 3.00pm to 9.00 pm) |
Food & refreshments Included |
Weekends (Friday & Saturday) |
Fast Track Sessions: 8 Hours per day (9am to 5pm) |
Food & refreshments Included |
|
CERTIFICATION |
Globally recognized certificate from “Kings Global Career Academy” |
|
TEST |
No |
|
LEARNING AIDS |
Yes |
|
COURSE MATERIAL |
Hard & Soft Copies of Study Material |
|
LANGUAGE OF INSTRUCTION |
English |
|
INSTRUCTOR HELPLINE |
Yes |
1. Email |
2. Social Media (For Emergency requirements) |
|
REGISTRATION REQUIREMENTS |
1. Passport Copy |
2. Curriculum Vitae |
3. Passport size photographs |
4. Course Fee |
|
MODE OF PAYMENT |
Cash / Cheque / Credit Card / Bank Transfer. |
|
ELIGIBILITY CRITERIA |
- Information assurance auditors
|
- System implementers or administrators
|
- Network security engineers
|
|
- Department of Defense (DoD) personnel or contractors
|
- Federal agencies or clients
|
- Private sector organizations looking to improve information assurance processes and secure their systems
|
Security vendors and consulting groups looking to stay current with frameworks for information assurance |
|
COURSE BENEFITS |
- Checks Susceptibility to Threat
|
- Evaluates the System and Ensures Its Integrity
|
|
|
|
|
COURSE CONTENTS |
- Introduction and Overview of the 20 Critical Controls
|
|
|
|
|
|
|
|
- Overview of Evaluating the Control
|
|
- Testing/Reporting Metrics
|
- Steps for Root Cause Analysis of Failures
|
- Audit/Evaluation Methodologies
|
|
- Exercise to Illustrate Implementation Or Steps for Auditing a Control
|
- Inventory of Authorized and Unauthorized Devices
|
- Inventory of Authorized and Unauthorized Software
|
- Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
|
- Continuous Vulnerability Assessment and Remediation
|
- Controlled Use of Administrative Privileges
|
- Maintenance, Monitoring, and Analysis of Audit Logs
|
- Email and Web Browser Protections
|
|
- Limitation and Control of Network Ports, Protocols, and Services
|
- Data Recovery Capability (validated manually)
|
- Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
|
|
|
- Controlled Access Based On Need to Know
|
|
- Account Monitoring and Control
|
- Security Skills Assessment and Appropriate Training to Fill Gaps
|
- Application Software Security
|
- Incident Response and Management
|
- Penetration Tests and Red Team Exercises
|