Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

CyberAudit and Cybersecurity curriculum offers a wide range of lecture and hands-on courses. They are designed for internal audit, IT auditor, and information security professionals, focusing on technical topics related to Cyber controls including: networking. data security, privacy, identity management, access controls, and specific technologies. The curriculum is divided into sections to ease viewing on the website.

Training Courses

CyberSecurity and Audit of Payment Card Systems (CY30)

You will gain solid familiarity with the current PCI DSS and recent significant changes, and get proven tips on how best to overcome compliance challenges.

CyberSecurity Risk Assessments: Identifying and Reporting (CY91)

This course will cover the essential background information, resources, and techniques necessary to execute meaningful CyberSecurity risk assessments. Important common “red flag” CyberSecurity risks will be highlighted. Concepts and techniques will be reinforced through the use of group exercises associated with risk assessment.

Introduction to Intrusion Analysis and Incident Response (CY17) – NEW

This course will provide you with an understanding of the various attack characteristics, an analysis of lessons learned from recent attacks, and allow you to create your own processes for responding to attacks of your enterprise network. Using lecture and workshops, you will have the opportunity to explore and experience documented incidents.

Intrusion Analysis and Incident Response (CY18) – NEW

This course will provide you with an understanding of the various attack characteristics, an analysis of lessons learned from recent attacks, and allow you to create your own processes for responding to attacks of your enterprise network. You will learn from “live” events and scenarios from actual computer incidents.

Is Your Data Really Secure ???…13 Ways to Avoid Cyber Data Leaks (CY40)

We will heighten your awareness by pinpointing “A Dirty Baker’s Dozen”: 13 common CyberSecurity Leakage Exposures and How to Avoid Them.

Linux as an Audit Target…and as an IT Audit Tool (CY22)

In this pragmatic seminar, we will identify the important Unix/Linux security controls, best practice for secure configuration, and tools and techniques on how to audit Linux and other Unix variants

Performing Effective CyberSecurity Risk Assessments and Audits (CY90)

This practical how-to workshop, will cover the essential background information, resources, and techniques necessary to plan and execute thorough, hard-hitting CyberSecurity risk assessments and audits. Important common “red flag” CyberSecurity risks will be highlighted. We will explore a wide array of essential CyberSecurity administrative, technical, and physical controls for protecting valuable information assets and associated resources in today’s highly complex and rapidly changing Cyber world. Concepts and techniques will be reinforced through the use of group exercises associated with risk assessment and CyberSecurity control evaluations.

Securing and Auditing Java Web Applications (CY04)

In this unique, information packed webinar, you will learn a structured approach to auditing the security of typical Java EE web application. You will cover all key application building blocks of a “typical” web application built with Java technologies, as well as common security risks, safeguards, and audit procedures.

Securing and Auditing Microsoft ASP.NET Web Applications (CY03)

You will learn a structured approach to auditing the security of a typical Microsoft-based Web application. You will cover all key application building blocks of a typical web application built with Microsoft technologies, as well as common security risks, safeguards, and audit procedures.

Simplifying Audits of Network CyberSecurity (CY10)

In this information-packed workshop, you will review the security and audit implications of local-area network (LAN) and wide-area area network (WAN) infrastructures, uncover the risks in the technologies, and identify cost‑effective tools for preventing and detecting serious security loopholes.

Understanding and Auditing Cryptography for Cybersecurity Applications (CY41)

This seminar is designed to equip you with a better, practical understanding of cryptography, so you may apply it with a practical information security perspective.