Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

Training for IT Auditors

Below are our focused IT audit training courses and seminars. Consider these along with the Cyber and Data Analytics seminars.

COURSECODESEMINAR
AA10Assessing Data Reliability
AA24Auditing Cloud Computing Security
AA23Auditing CyberSecurity Governance
CY12Auditing CyberSecurity of Wireless Networks
AA30Auditing IT Outsourcing
AS33Auditing Virtually
CY24Auditing Windows Active Directory CyberSecurity
CY23Auditing Windows Server CyberSecurity
AA28Auditing Your CyberSecurity Program: Top to Bottom
AA25Auditor's Guide to Big Data
AM08Auditor's Guide to CyberSecurity Risk Assessment and Audit Priorities
CY13Auditor's Guide to CyberSecurity Vulnerability and Penetration Testing
CH13Auditors Hands-On Guide to CyberSecurity Vulnerability and Penetration Testing
CY11Audits of Your Internet CyberSpace DMZ Network
DA03Automating Data Analytics Scripts and Queries
AS31Building Credibility in Audit through Effective Communications
FR09Catching the Bad Guys: Fraud Auditing for Internal Auditors
FR10Conducting Fraud Risk Assessments Successfully
CY44CyberAuditing Your Software Supply Chain
CY20CyberAudits of Microsoft Windows Server and Active Directory Security
CY18CyberAudits of Remote Access and Mobile Computimg
CY45CyberSecurity Audits of Cloud-Native Applications
CY02CyberSecurity Audits of Modern Web Applications
DA04Developing Effective Continuous Audits
AS07Developing Results-Driven Audit Work Programs
AS27Effective Identification and Testing of Internal Controls
AS28Effective Risk-Based Audit Planning and Execution
AS18Embedding Critical Thinking into the Internal Audit Process
FR12Forensic Accounting and Financial Statement Fraud Analysis
FR14Fraud Risk After COVID-19
DA02Fundamentals of Data Analytics
AS22Getting the Message Across: Writing Effective Concise Reports
AS23Getting to the Root of the Matter: Root Cause Analysis for Auditors
CH11Hands-On Audits of DMZ Network CyberSecurity
CH10Hands-On Audits of Network CyberSecurity
CH20Hands-On Audits of Windows Server and Active Directory
AM10How to Perform and Benefit from a Quality Assessment Review
FR11Implementing a Fraud Awareness Program
AS24Interviewing Skills for Internal Auditors
AA01Introduction to IT Auditing
CY17Intrusion Analysis and Incident Response
AA09IT Audit Academy
DA05Leveraging Data Analytics to Fight Fraud
CY22Linux as an Audit Target..and as an IT Audit Tool
CY05Overview of Amazon Web Services Controls
AS34Persuasion Negotiation & Conflict Management for Internal Auditors
AA03Planning and Conducting an IT General Controls Review
AS29Project Management Skills for Internal Auditors
AS32Revisiting Risk Assessments After COVID-19
CY10Simplifying Audits of Network CyberSecurity
CY41Understanding and Auditing Cryptography for CyberSecurity Applications
CY50Understanding Blockchain: The Underlying Technology for Trusted Transactions
DA01Using Data Analytics to Improve Internal Audit

Questions? Contact us

Phone: +1 (781) 784-4390
Fax: +1 (781) 705-2327
Email: fill out form below

    [recaptcha size:compact class:captcha]