Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive
Continuing Professional Education for Audit, Assurance, & Info Security
Home
About Us
CPEinteractive Certification Policies – Group Training
CPEinteractive Certification Policies – Virtual Classroom
Group Sponsored Training
Partial List of Clients
Faculty
Norm Kelson
Ken Cutler
Keith Barber
Kevin Cardwell
Mary Breslin
Leighton Johnson
Richard Tarr
How We Train
Corporate Training
Professional Organization Training
Training Catalog
Cyber Hands-On
Auditor’s Hands-On Guide to CyberSecurity Vulnerability and Penetration Testing (CH13)
Hands-On Audits of Windows Server and Active Directory (CH20)
Hands-On Audits of DMZ Network CyberSecurity (CH11)
Hands-On Audits of Network CyberSecurity (CH10)
Cyber Audit & Security 1
Auditing Windows Active Directory Services CyberSecurity (CY24)
Auditing Windows Server CyberSecurity (CY23)
Auditor’s Guide to CyberSecurity Vulnerability and Penetration Testing (CY13)
Audits of Your Internet DMZ Network (CY11) – REVISED
Cyber Audit & Security 2
CyberAuditing Your Software Supply Chain (CY44) – NEW
CyberAudits of Remote Access and Mobile Computing (CY18)
CyberAudits of Your Critical Network Infrastructure (CY14) – NEW
CyberSecurity Audits of Cloud-Native Applications (CY45) – NEW
CyberSecurity Audits of MS Windows Server & Active Directory Security (CY20)
CyberSecurity Audits of Web Applications – Legacy & Beyond (CY02)
Intrusion Analysis and Incident Response (CY17)
CyberAudit & Security 3
Linux as an Audit Target…and as an IT Audit Tool (CY22)
Overview of Amazon Web Services Security and Controls (CY05)
Understanding and Auditing Cryptography for Cybersecurity Applications (CY41)
Understanding Blockchain: The Underlying Technology for Trusted Transactions (CY50)
Audit Approach 1
Assessing Data Reliability (AA10)
Auditors Guide to Big Data (AA25)
Auditing Cloud Computing Security (AA24)
Auditing CyberSecurity Governance (AA23)
Auditing IT Outsourced Environments (AA06)
Audit Approach 2
Auditing Your CyberSecurity Program: Top to Bottom (AA28)
Introduction to IT Auditing (AA01)
One-Day Introduction to IT Audit (AA29)
Planning and Conducting IT General Controls Reviews (AA03)
Audit Management
A Guide to CyberSecurity Risk Assessment and Management (AM08)
How to Perform and Benefit from a Quality Assessment Review (AM10) – NEW
Successfully Implementing and Managing Enterprise Risk Management (AM09)
Audit Skills
Developing Results-Driven Audit Work Programs (AS07)
Effective Identification and Testing of Internal Controls – (AS27)
Effective Risk-Based Audit Planning and Execution – (AS28)
Embedding Critical Thinking into the Internal Audit Process (AS18)
Getting to the Root of the Matter: Root Cause Analysis Techniques for Auditors (AS23)
Project Management Skills for Internal Auditors (AS29)
Communications & Reporting
Building Credibility in Audit Through Effective Communication (AS31)
Interviewing Skills for Internal Auditors (AS24)
Data Analytics
Automating Data Analytics Scripts and Queries (DA03)
Developing Effective Continuous Audits (DA04)
Using Data Analytics to Improve Internal Audit (DA01)
Fundamentals of Data Analytics (DA02)
Fraud Detection & Prevention
Catching the Bad Guys: Fraud Auditing for Internal Auditors (FR09)
Conducting Fraud Risk Assessments Successfully (FR10)
Financial Statement Fraud Analysis and Forensic Accounting (FR13)
Implementing a Fraud Awareness Program (FR11)
Leveraging Data Analytics to Fight Fraud (FR07)
Contact Us
Getting to the Root of the Matter: Root Cause Analysis Techniques for Auditors (AS23)
Home
»
How We Train
CPEinteractive offers:
Corporate Training
Professional Organization Training
Public Virtual Training
We target our approach to the requirements of each constituency.