AA10 | Assessing Data Reliability |
AA24 | Auditing Cloud Computing Security |
AA23 | Auditing CyberSecurity Governance |
AA06 | Auditing the IT Outsourced Environment |
CY24 | Auditing Windows Active Directory CyberSecurity |
CY23 | Auditing Windows Server CyberSecurity |
AA28 | Auditing Your CyberSecurity Program: Top to Bottom |
AA25 | Auditor's Guide to Big Data |
AM08 | Auditor's Guide to CyberSecurity Risk Assessment and Management |
CY13 | Auditor's Guide to CyberSecurity Vulnerability and Penetration Testing |
CH13 | Auditors Hands-On Guide to CyberSecurity Vulnerability and Penetration Testing |
DA03 | Automating Data Analytics Scripts and Queries |
AS31 | Building Credibility in Audit through Effective Communications |
FR09 | Catching the Bad Guys: Fraud Auditing for Internal Auditors |
FR10 | Conducting Fraud Risk Assessments Successfully |
CY44 | CyberAuditing Your Software Supply Chain |
CY20 | CyberAudits of Microsoft Windows Server and Active Directory Security |
CY18 | CyberAudits of Remote Access and Mobile Computing |
CY14 | CyberAudits of Your Critical Network Infrastructure |
CY11 | CyberAudits of Your Internet DMZ Network |
CY02 | CyberSecurity Audits of Web Applications - Legacy and Beyond |
CY45 | CyberSecurity Audits of Cloud-Native Applications |
DA04 | Developing Effective Continuous Audits |
AS07 | Developing Results-Driven Audit Work Programs |
AS27 | Effective Identification and Testing of Internal Controls |
AS28 | Effective Risk-Based Audit Planning and Execution |
AS18 | Embedding Critical Thinking into the Internal Audit Process |
FR12 | Forensic Accounting and Financial Statement Fraud Analysis |
DA02 | Fundamentals of Data Analytics |
AS22 | Getting the Message Across: Writing Effective Concise Reports |
AS23 | Getting to the Root of the Matter: Root Cause Analysis for Auditors |
CH11 | Hands-On Audits of DMZ Network CyberSecurity |
CH10 | Hands-On Audits of Network CyberSecurity |
CH20 | Hands-On Audits of Windows Server and Active Directory |
AM10 | How to Perform and Benefit from a Quality Assessment Review |
FR11 | Implementing a Fraud Awareness Program |
AS24 | Interviewing Skills for Internal Auditors |
AA01 | Introduction to IT Auditing |
CY17 | Intrusion Analysis and Incident Response |
FR07 | Leveraging Data Analytics to Fight Fraud |
CY22 | Linux as an Audit Target..and as an IT Audit Tool |
CY05 | Overview of Amazon Web Services Controls |
AS34 | Persuasion Negotiation & Conflict Management for Internal Auditors |
AA03 | Planning and Conducting an IT General Controls Review |
AS29 | Project Management Skills for Internal Auditors |
CY41 | Understanding and Auditing Cryptography for CyberSecurity Applications |
CY50 | Understanding Blockchain: The Underlying Technology for Trusted Transactions |
DA01 | Using Data Analytics to Improve Internal Audit |