Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

Training for IT Auditors – IT Audit Training Courses

Below are our IT audit training courses and seminars. Visit the link of the IT audit training course, which interests you for more information.

COURSECODESEMINAR
AA10Assessing Data Reliability
AA04Audit and Governance of Application Development/Acquisition Projects
AA24Auditing Cloud Computing Security
AA23Auditing CyberSecurity Governance
CY12Auditing CyberSecurity of Wireless Networks
AA02Auditing IT-Enabled Applications
AA06Auditing the IT Outsourced Environment
CY24Auditing Windows Active Directory CysberSecurity
CY23Auditing Windows Server CyberSecurity
AA28Auditing Your CyberSecurity Program: Top to Bottom
AA25Auditor's Guide to Big Data
CY13Auditor's Guide to CyberSecurity Vulnerability and Penetration Testing
CY11Audits of Your Internet CyberSpace DMZ Network
DA03Automating Data Analytics Scripts and Queries
AS31Building Credibility in Audit through Effective Communications
FR09Catching the Bad Guys: Fraud Auditing for Internal Auditors
FR10Conducting Fraud Risk Assessments Successfully
CY01CyberAudits of Identity and Access Control Management
CY20CyberAudits of Microsoft Windows Server and Active Directory Security
CY30CyberSecurity and Audit of Payment Card Systems
CY02CyberSecurity Audits of Modern Web Applications
CY21CyberSecurity on the Go: Auditing Mobile Applications
AM07CyberSecurity Oversight
CY91CyberSecurity Risk Assessments: Identifying and Reporting
FR05Developing a Fraud Risk Assessment
DA04Developing Effective Continuous Audits
AS07Developing Results-Driven Audit Work Programs
AS27Effective Identification and Testing of Internak Controls
AS28Effective Risk-Based Audit Planning and Execution
AS18Embedding Critical Thinking into the Internal Audit Process
AS09Enhancing Your Risk-Based Audit Skills
DA02Fundamentals of Data Analytics
AS22Getting the Message Across: Writing Effective Concise Reports
AS23Getting to the Root of the Matter: Root Cause Analysis for Auditors
FR11Implementing a Fraud Awareness Program
AS24Interviewing Skills for Internal Auditors
AA01Introduction to IT Auditing
CY17Intrusion Analysis and Incident Response
CY40Is Your Data Really Secure??...13 Ways to Avoid Cyber Data Leaks
AA09IT Audit Academy
DA05Leveraging Data Analytics to Fight Fraud
FR07Leveraging Data Analytics to Fight Fraud
CY22Linux as an Audit Target..and as an IT Audit Tool
AM08Managers' Guide to CyberSecurity Risk Assessment and Audit Priorities
CY90Performing Effective CyberSecurity Risk Assessments and Audits
AA03Planning and Conducting an IT General Controls Review
AS29Project Management Skills for Internal Auditors
CY04Securing and Auditing Java Web Applications
CY03Securing and Auditing Microsoft ASP.NET Web Applications
CY16Securing and Auditing Your Network Infrastructure
CY10Simplifying Audits of Network CyberSecurity
AS30Technical Writing Skills for Internal Auditors
CY41Understanding and Auditing Cryptography for CyberSecurity Applications
DA01Using Data Analytics to Improve Internal Audit