Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

Training for IT Auditors – IT Audit Training Courses

Below are our IT audit training courses and seminars. Visit the link of the IT audit training course, which interests you for more information.

AA10Assessing Data Reliability
AA04Audit and Governance of Application Development/Acquisition Projects
AA25Auditor's Guide to Big Data
AA24Auditing Cloud Computing Security
GR03Auditing CyberSecurity Governance and Controls
CY12Auditing CyberSecurity of Wireless Networks
AA23Auditing Information Security Governance
AA02Auditing IT-Enabled Applications
AA06Auditing the IT Outsourced Environment
CY13Auditor's Guide to CyberSecurity Vulnerability and Penetration Testing
CY11Audits of Your Internet CyberSpace DMZ Network
AM04Briefing on Current Technology-Related Issues for Internal Auditors
FR09Catching the Bad Guys: Fraud Auditing for Internal Auditors
AS20Communication Skills for Internal Auditors
FR10Conducting Fraud Risk Assessments Successfully
CY01CyberAudits of Identity and Access Control Management
CY20CyberAudits of Microsoft Windows Server and Active Directory Security
CY30CyberSecurity and Audit of Payment Card Systems
CY02CyberSecurity Audits of Modern Web Applications
FR05Developing a Fraud Risk Assessment
AS07Developing Audit Work Programs
AS18Embedding Critical Thinking into the Internal Audit Process
AS09Enhancing Your Risk-Based Audit Skills
FR06Fighting Fraud in a Global Marketplace
FR12Forensic Accounting and Financial Statement Fraud Analysis
AS22Getting the Message Across: How to Write Short Concise Effective Reports Business Owners Will Read
AS23Getting to the Root of the Matter: Root Cause Analysis for Auditors
FR11Implementing a Fraud Awareness Program
AS24Interviewing Skills for Internal Auditors
AA01Introduction to IT Auditing
CY40Is Your Data Really Secure??...13 Ways to Avoid Cyber Data Leaks
AA09IT Audit Academy
FR07Leveraging Data Analytics to Fight Fraud
CY22Linux as an Audit Target..and as an IT Audit Tool
AM08Manager’s Guide to CyberSecurity Risk Assessment and Audit Priorities
AS03Managing Audits as Projects
CY90Performing Effective CyberSecurity Risk Assessments and Audits
AA03Planning and Conducting an IT General Controls Review
AS16Risk and Control - The Foundation
CY04Securing and Auditing Java Web Applications
CY03Securing and Auditing Microsoft ASP.NET Web Applications
CY10Simplifying Audits of Network CyberSecurity
AA27The Essentials of Payment Card Systems Auditing
CY41Understanding and Auditing Cryptography for CyberSecurity Applications
AS26Using Data Analytics to Improve Internal Audit