Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

Training for IT Auditors – IT Audit Training Courses

Below are our IT audit training courses and seminars. Visit the link of the IT audit training course, which interests you for more information.

COURSECODESEMINAR
AA10Assessing Data Reliability
AA04Audit and Governance of Application Development/Acquisition Projects
AA24Auditing Cloud Computing Security
AA23Auditing CyberSecurity Governance
CY12Auditing CyberSecurity of Wireless Networks
AA02Auditing IT-Enabled Applications
AA06Auditing the IT Outsourced Environment
CY23Auditing Windows Server CyberSecurity
AA28Auditing Your CyberSecurity Program: Top to Bottom
AA25Auditor's Guide to Big Data
CY13Auditor's Guide to CyberSecurity Vulnerability and Penetration Testing
CH13Auditors Hands-On Guide to CyberSecurity Vulnerability and Penetration Testing
CY11Audits of Your Internet CyberSpace DMZ Network
DA03Automating Data Analytics Scripts and Queries
AS31Building Credibility in Audit through Effective Communications
FR09Catching the Bad Guys: Fraud Auditing for Internal Auditors
FR10Conducting Fraud Risk Assessments Successfully
CY01CyberAudits of Identity and Access Control Management
CY20CyberAudits of Microsoft Windows Server and Active Directory Security
CY02CyberSecurity Audits of Modern Web Applications
CY21CyberSecurity on the Go: Auditing Mobile Applications
AM07CyberSecurity Oversight
FR05Developing a Fraud Risk Assessment
DA04Developing Effective Continuous Audits
AS07Developing Results-Driven Audit Work Programs
AS27Effective Identification and Testing of Internak Controls
AS28Effective Risk-Based Audit Planning and Execution
AS18Embedding Critical Thinking into the Internal Audit Process
AS09Enhancing Your Risk-Based Audit Skills
DA02Fundamentals of Data Analytics
AS22Getting the Message Across: Writing Effective Concise Reports
AS23Getting to the Root of the Matter: Root Cause Analysis for Auditors
CH11Hands-On Audits of DMZ Network CyberSecurity
CH10Hands-On Audits of Network CyberSecurity
CH20Hands-On Audits of Windows Server and Active Directory
FR11Implementing a Fraud Awareness Program
AS24Interviewing Skills for Internal Auditors
AA01Introduction to IT Auditing
CY17Intrusion Analysis and Incident Response
CY40Is Your Data Really Secure??...13 Ways to Avoid Cyber Data Leaks
AA09IT Audit Academy
DA05Leveraging Data Analytics to Fight Fraud
CY22Linux as an Audit Target..and as an IT Audit Tool
AM08Managers' Guide to CyberSecurity Risk Assessment and Audit Priorities
CY05Overview of Amazon Web Services Controls
AA03Planning and Conducting an IT General Controls Review
AS29Project Management Skills for Internal Auditors
CY10Simplifying Audits of Network CyberSecurity
AS30Technical Writing Skills for Internal Auditors
CY41Understanding and Auditing Cryptography for CyberSecurity Applications
CY50Understanding Blockchain: The Underlying Technology for Trusted Transactions
DA01Using Data Analytics to Improve Internal Audit