This is the third of a multi-part series following the structure of my book Auditor’s Guide to IT Auditing which follows the Information Systems Audit and Control Association (ISACA) Certified Information Systems Auditor qualification syllabus.
The whole series takes the aspiring IT auditor from the basics all the way through to advanced concepts and techniques for conducting professional IT audits.
Both the book and the courses have proven of major assistance to auditors for the Certified Information Systems Auditor (CISA) exam as well as Part 1 of the Certified Internal Auditor (CIA) examination of the Institute of Internal Auditors (IIA).
Part 3 of the series covers the Risk Management of the Audit Process, Audit Management, Managing the Information Systems (IS) Relationship, Gathering Evidence, and Audit use of Statistics.
Course Series
This course is included in the following series:
5 CoursesAuditor's Guide to IT Auditing
- Auditor’s Guide to IT Auditing – Part 1: Technology Underlying Modern Computer Systems and the Role of IT Audit
- Auditor’s Guide to IT Auditing – Part 2: Risks Within Today's IT Systems and Fundamental Audit Concepts
- Auditor’s Guide to IT Auditing – Part 3: Primary Audit Controls and Roles
- Auditor’s Guide to IT Auditing – Part 4
- Auditor’s Guide to IT Auditing – Part 5
Learning Objectives
- Identify the major primary controls over the Audit Process and recognize an appropriate structure for the Information Technology (IT) Audit function
- Identify potential roles for the IT audit specialist
- Identify Evidence sources
- Explore the fundamentals of Statistical Sampling
- 1. Understanding and Responding to Bribery & Corruption Red Flags
- 2. Fraud Risk - Complying with Minimum Audit Requirements
- 3. Adapting to Evolving Business Risks and Opportunities
- 4. Cyber Risk in Small-Medium Entities
- 5. The COVID Fraud Pandemic
- 6. Fraud Risk Assessments
- 7. 2023 Information Security: Basic Safeguards for Practitioners
- 8. Sarbanes-Oxley (SOX) And Fraud Sections
- 9. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
- 10. Fraud Trends for the Future - Mitigation Methods for Synthetic Identities
31 Reviews (130 ratings)
Prerequisites
No advanced preparation or prerequisites are required for this course.