Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

COURSECODESEMINARINTAUDITITAUDITINTCTLINFOSEC
AAAudit Approach
AA01Introduction to IT AuditingXXX
AA02Auditing IT-Enabled ApplicationsXXX
AA03Planning and Conducting an IT General Controls ReviewXXX
AA04Audit and Governance of Application Development/Acquisition ProjectsXXX
AA06Auditing the IT Outsourced EnvironmentXXX
AA09IT Audit AcademyX
AA10Assessing Data ReliabilityXXX
AA23Auditing CyberSecurity GovernanceXXXX
AA24Auditing Cloud Computing SecurityXXX
AA25Auditor's Guide to Big DataXXXX
AA28Auditing Your CyberSecurity Program: Top to BottomXXXX
AMAudit Management
AM07CyberSecurity OversightXXXX
AM08Managers' Guide to CyberSecurity Risk Assessment and Audit PrioritiesXXXX
AM09Successfully Implementing and Managing Enterprise Risk ManagementX
ASAudit Skills
AS07Developing Results-Driven Audit Work ProgramsXX
AS09Enhancing Your Risk-Based Audit SkillsXX
AS18Embedding Critical Thinking into the Internal Audit ProcessXX
AS22Getting the Message Across: Writing Effective Concise ReportsXX
AS23Getting to the Root of the Matter: Root Cause Analysis for AuditorsXX
AS24Interviewing Skills for Internal AuditorsXX
AS25Demystifying IT Audit: IT Auditing for Business AuditorsXX
AS27Effective Identification and Testing of Internak ControlsXXX
AS28Effective Risk-Based Audit Planning and ExecutionXX
AS29Project Management Skills for Internal AuditorsXX
AS30Technical Writing Skills for Internal AuditorsXX
AS31Building Credibility in Audit through Effective CommunicationsXX
CYCyberAudit
CY01CyberAudits of Identity and Access Control ManagementXXX
CY02CyberSecurity Audits of Modern Web ApplicationsXX
CY03Securing and Auditing Microsoft ASP.NET Web ApplicationsXX
CY04Securing and Auditing Java Web ApplicationsXX
CY10Simplifying Audits of Network CyberSecurityXX
CY11Audits of Your Internet CyberSpace DMZ NetworkXX
CY12Auditing CyberSecurity of Wireless NetworksXX
CY13Auditor's Guide to CyberSecurity Vulnerability and Penetration TestingXX
CY16Securing and Auditing Your Network InfrastructureXXX
CY17Intrusion Analysis and Incident ResponseXX
CY20CyberAudits of Microsoft Windows Server and Active Directory SecurityXX
CY21CyberSecurity on the Go: Auditing Mobile ApplicationsXX
CY22Linux as an Audit Target..and as an IT Audit ToolXX
CY23Auditing Windows Server CyberSecurityXX
CY24Auditing Windows Active Directory CysberSecurityXXX
CY30CyberSecurity and Audit of Payment Card SystemsXX
CY40Is Your Data Really Secure??...13 Ways to Avoid Cyber Data LeaksXXXX
CY41Understanding and Auditing Cryptography for CyberSecurity ApplicationsXX
CY90Performing Effective CyberSecurity Risk Assessments and AuditsXXXX
CY91CyberSecurity Risk Assessments: Identifying and ReportingXXXX
DAData Analytics
DA01Using Data Analytics to Improve Internal AuditXXX
DA02Fundamentals of Data AnalyticsXXX
DA03Automating Data Analytics Scripts and QueriesXXX
DA04Developing Effective Continuous AuditsXXX
DA05Leveraging Data Analytics to Fight FraudXX
FRFraud Detection & Prevention
FR05Developing a Fraud Risk AssessmentXXX
FR07Leveraging Data Analytics to Fight FraudXXX
FR09Catching the Bad Guys: Fraud Auditing for Internal AuditorsXXX
FR10Conducting Fraud Risk Assessments SuccessfullyXXX
FR11Implementing a Fraud Awareness ProgramXXX
FR13Financial Statement Fraud Analysis and Forensic AccountingXX

.