IT Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data. IT Controls are comprised of tactics such as utilizing strong passwords, encrypting laptops and backing up files. In this course you will learn how to ensure proper controls have been implemented to protect corporate assets, company trade secrets, customer and employee identity and financial information.
This course will take you through controls organizations can implement to protect assets, brand and image. We will delve into understanding the principles behind IT General Computer Controls. Lastly, we will discuss simple audit procedure proper controls are in place and working as intended.
Learning Objectives
- Recognize IT Risks
- Identify appropriate IT Controls to mitigate specific risks
- Explore audit procedures to ensure effective controls are in place
- Recognize audit output
- 1. A Primer on Cyber Security Programs and Roles
- 2. Sarbanes-Oxley Section 302: ICFR
- 3. Audit Committee Effectiveness in the Aftermath of 2007 - 2009 Global Financial Crisis
- 4. Cooking The Books! A Primer on Avoiding The Most Common Financial Statement Shenanigans
- 5. Internal Controls - Why They Are Important (Text Based Course)
- 6. Sarbanes-Oxley (SOX) - Top Down Risk Assessment Part 2
- 7. SOX: Authoritative Bodies
- 8. COSO 2013 Control Environment
- 9. Global Internal Audit Standards Domain III - Part 1; Principle 6 Authorized By the Board; Principle 7 Positioned Independently
- 10. Enterprise Risk Management 101
31 Reviews (142 ratings)
Prerequisites
No advanced preparation or prerequisites are required for this course.