Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

AAAudit Approach
AA01Introduction to IT AuditingXXX
AA03Planning and Conducting an IT General Controls ReviewXXX
AA09IT Audit AcademyX
AA10Assessing Data ReliabilityXXX
AA23Auditing CyberSecurity GovernanceXXXX
AA24Auditing Cloud Computing SecurityXXX
AA25Auditor's Guide to Big DataXXXX
AA28Auditing Your CyberSecurity Program: Top to BottomXXXX
AA29One-Day Introduction to IT AuditingX
AA30Auditing IT OutsourcingXXX
AMAudit Management
AM08Auditor's Guide to CyberSecurity Risk Assessment and Audit PrioritiesXXXX
AM09Successfully Implementing and Managing Enterprise Risk ManagementX
AM10How to Perform and Benefit from a Quality Assessment ReviewXXX
ASAudit Skills
AS07Developing Results-Driven Audit Work ProgramsXX
AS18Embedding Critical Thinking into the Internal Audit ProcessXX
AS22Getting the Message Across: Writing Effective Concise ReportsXX
AS23Getting to the Root of the Matter: Root Cause Analysis for AuditorsXX
AS24Interviewing Skills for Internal AuditorsXX
AS27Effective Identification and Testing of Internal ControlsXXX
AS28Effective Risk-Based Audit Planning and ExecutionXX
AS29Project Management Skills for Internal AuditorsXX
AS31Building Credibility in Audit through Effective CommunicationsXX
AS32Revisiting Risk Assessments After COVID-19XXX
AS33Auditing VirtuallyXX
AS34Persuasion Negotiation & Conflict Management for Internal AuditorsXXX
CHCyber Hands-On
CH10Hands-On Audits of Network CyberSecurityXX
CH11Hands-On Audits of DMZ Network CyberSecurityXX
CH13Auditors Hands-On Guide to CyberSecurity Vulnerability and Penetration TestingXX
CH20Hands-On Audits of Windows Server and Active DirectoryXX
CY02CyberSecurity Audits of Modern Web ApplicationsXX
CY05Overview of Amazon Web Services ControlsXXXX
CY10Simplifying Audits of Network CyberSecurityXX
CY11Audits of Your Internet CyberSpace DMZ NetworkXX
CY12Auditing CyberSecurity of Wireless NetworksXX
CY13Auditor's Guide to CyberSecurity Vulnerability and Penetration TestingXX
CY17Intrusion Analysis and Incident ResponseXX
CY18CyberAudits of Remote Access and Mobile ComputimgXXX
CY20CyberAudits of Microsoft Windows Server and Active Directory SecurityXX
CY22Linux as an Audit Target..and as an IT Audit ToolXX
CY23Auditing Windows Server CyberSecurityXX
CY24Auditing Windows Active Directory CyberSecurityXXX
CY41Understanding and Auditing Cryptography for CyberSecurity ApplicationsXX
CY44CyberAuditing Your Software Supply ChainXXXX
CY45CyberSecurity Audits of Cloud-Native ApplicationsXXX
CY50Understanding Blockchain: The Underlying Technology for Trusted TransactionsXXXX
DAData Analytics
DA01Using Data Analytics to Improve Internal AuditXXX
DA02Fundamentals of Data AnalyticsXXX
DA03Automating Data Analytics Scripts and QueriesXXX
DA04Developing Effective Continuous AuditsXXX
DA05Leveraging Data Analytics to Fight FraudXX
FRFraud Detection & Prevention
FR09Catching the Bad Guys: Fraud Auditing for Internal AuditorsXXX
FR10Conducting Fraud Risk Assessments SuccessfullyXXX
FR11Implementing a Fraud Awareness ProgramXXX
FR12Forensic Accounting and Financial Statement Fraud AnalysisXXX
FR13Financial Statement Fraud Analysis and Forensic AccountingXX
FR14Fraud Risk After COVID-19XXX