Internal Audit Training, IT Audit Training Courses, Information Security Training - CPE Interactive

Continuing Professional Education for Audit, Assurance, & Info Security

COURSECODESEMINARINTAUDITITAUDITINTCTLINFOSEC
AA Audit Approach
AA01Introduction to IT Auditing XXX
AA03Planning and Conducting an IT General Controls Review XXX
AA06Auditing the IT Outsourced Environment XXX
AA10Assessing Data Reliability XXX
AA23Auditing CyberSecurity Governance XXXX
AA24Auditing Cloud Computing Security XXX
AA25Auditor's Guide to Big Data XXXX
AA28Auditing Your CyberSecurity Program: Top to Bottom XXXX
AA29One-Day Introduction to IT Auditing X
AM Audit Management
AM08Auditor's Guide to CyberSecurity Risk Assessment and Management XXXX
AM09Successfully Implementing and Managing Enterprise Risk Management X
AM10How to Perform and Benefit from a Quality Assessment Review XXX
AS Audit Skills
AS07Developing Results-Driven Audit Work Programs XX
AS18Embedding Critical Thinking into the Internal Audit Process XX
AS22Getting the Message Across: Writing Effective Concise Reports XX
AS23Getting to the Root of the Matter: Root Cause Analysis for Auditors XX
AS24Interviewing Skills for Internal Auditors XX
AS27Effective Identification and Testing of Internal Controls XXX
AS28Effective Risk-Based Audit Planning and Execution XX
AS29Project Management Skills for Internal Auditors XX
AS31Building Credibility in Audit through Effective Communications XX
AS34Persuasion Negotiation & Conflict Management for Internal Auditors XXX
CH Cyber Hands-On
CH10Hands-On Audits of Network CyberSecurity X X
CH11Hands-On Audits of DMZ Network CyberSecurity X X
CH13Auditors Hands-On Guide to CyberSecurity Vulnerability and Penetration Testing X X
CH20Hands-On Audits of Windows Server and Active Directory X X
CY CyberAudit
CY02CyberSecurity Audits of Web Applications - Legacy and Beyond X X
CY05Overview of Amazon Web Services Controls XXXX
CY11CyberAudits of Your Internet DMZ Network X X
CY13Auditor's Guide to CyberSecurity Vulnerability and Penetration Testing X X
CY14CyberAudits of Your Critical Network Infrastructure X X
CY17Intrusion Analysis and Incident Response X X
CY18CyberAudits of Remote Access and Mobile Computing XXX
CY20CyberAudits of Microsoft Windows Server and Active Directory Security X X
CY22Linux as an Audit Target..and as an IT Audit Tool X X
CY23Auditing Windows Server CyberSecurity X X
CY24Auditing Windows Active Directory CyberSecurity XXX
CY41Understanding and Auditing Cryptography for CyberSecurity Applications X X
CY44CyberAuditing Your Software Supply Chain XXXX
CY45CyberSecurity Audits of Cloud-Native Applications XXX
CY50Understanding Blockchain: The Underlying Technology for Trusted Transactions XXXX
DA Data Analytics
DA01Using Data Analytics to Improve Internal Audit XXX
DA02Fundamentals of Data Analytics XXX
DA03Automating Data Analytics Scripts and Queries XXX
DA04Developing Effective Continuous Audits XXX
FR Fraud Detection & Prevention
FR07Leveraging Data Analytics to Fight Fraud XXX
FR09Catching the Bad Guys: Fraud Auditing for Internal Auditors XXX
FR10Conducting Fraud Risk Assessments Successfully XXX
FR11Implementing a Fraud Awareness Program XXX
FR12Forensic Accounting and Financial Statement Fraud Analysis XXX
FR13Financial Statement Fraud Analysis and Forensic Accounting X X