COURSECODE | SEMINAR | INTAUDIT | ITAUDIT | INTCTL | INFOSEC |
AA | Audit Approach | | | | |
AA01 | Introduction to IT Auditing | X | X | X | |
AA03 | Planning and Conducting an IT General Controls Review | X | X | X | |
AA10 | Assessing Data Reliability | X | X | X | |
AA23 | Auditing CyberSecurity Governance | X | X | X | X |
AA24 | Auditing Cloud Computing Security | X | X | X | |
AA25 | Auditor's Guide to Big Data | X | X | X | X |
AA28 | Auditing Your CyberSecurity Program: Top to Bottom | X | X | X | X |
AA29 | One-Day Introduction to IT Auditing | X | | | |
AM | Audit Management | | | | |
AM08 | Auditor's Guide to CyberSecurity Risk Assessment and Management | X | X | X | X |
AM09 | Successfully Implementing and Managing Enterprise Risk Management | X | | | |
AM10 | How to Perform and Benefit from a Quality Assessment Review | X | X | X | |
AS | Audit Skills | | | | |
AS07 | Developing Results-Driven Audit Work Programs | X | X | | |
AS18 | Embedding Critical Thinking into the Internal Audit Process | X | X | | |
AS22 | Getting the Message Across: Writing Effective Concise Reports | X | X | | |
AS23 | Getting to the Root of the Matter: Root Cause Analysis for Auditors | X | X | | |
AS24 | Interviewing Skills for Internal Auditors | X | X | | |
AS27 | Effective Identification and Testing of Internal Controls | X | X | X | |
AS28 | Effective Risk-Based Audit Planning and Execution | X | X | | |
AS29 | Project Management Skills for Internal Auditors | X | X | | |
AS31 | Building Credibility in Audit through Effective Communications | X | X | | |
AS34 | Persuasion Negotiation & Conflict Management for Internal Auditors | X | X | X | |
CH | Cyber Hands-On | | | | |
CH10 | Hands-On Audits of Network CyberSecurity | | X | | X |
CH11 | Hands-On Audits of DMZ Network CyberSecurity | | X | | X |
CH13 | Auditors Hands-On Guide to CyberSecurity Vulnerability and Penetration Testing | | X | | X |
CH20 | Hands-On Audits of Windows Server and Active Directory | | X | | X |
CY | CyberAudit | | | | |
CY02 | CyberSecurity Audits of Web Applications - Legacy and Beyond | | X | | X |
CY05 | Overview of Amazon Web Services Controls | X | X | X | X |
CY11 | CyberAudits of Your Internet DMZ Network | | X | | X |
CY13 | Auditor's Guide to CyberSecurity Vulnerability and Penetration Testing | | X | | X |
CY14 | CyberAudits of Your Critical Network Infrastructure | | X | | X |
CY17 | Intrusion Analysis and Incident Response | | X | | X |
CY18 | CyberAudits of Remote Access and Mobile Computing | | X | X | X |
CY20 | CyberAudits of Microsoft Windows Server and Active Directory Security | | X | | X |
CY22 | Linux as an Audit Target..and as an IT Audit Tool | | X | | X |
CY23 | Auditing Windows Server CyberSecurity | | X | | X |
CY24 | Auditing Windows Active Directory CyberSecurity | | X | X | X |
CY41 | Understanding and Auditing Cryptography for CyberSecurity Applications | | X | | X |
CY44 | CyberAuditing Your Software Supply Chain | X | X | X | X |
CY45 | CyberSecurity Audits of Cloud-Native Applications | | X | X | X |
CY50 | Understanding Blockchain: The Underlying Technology for Trusted Transactions | X | X | X | X |
DA | Data Analytics | | | | |
DA01 | Using Data Analytics to Improve Internal Audit | X | X | X | |
DA02 | Fundamentals of Data Analytics | X | X | X | |
DA03 | Automating Data Analytics Scripts and Queries | X | X | X | |
DA04 | Developing Effective Continuous Audits | X | X | X | |
FR | Fraud Detection & Prevention | | | | |
FR07 | Leveraging Data Analytics to Fight Fraud | X | X | X | |
FR09 | Catching the Bad Guys: Fraud Auditing for Internal Auditors | X | X | X | |
FR10 | Conducting Fraud Risk Assessments Successfully | X | X | X | |
FR11 | Implementing a Fraud Awareness Program | X | X | X | |
FR12 | Forensic Accounting and Financial Statement Fraud Analysis | X | X | X | |
FR13 | Financial Statement Fraud Analysis and Forensic Accounting | X | | X | |