• Classroom
Course Description

This seminar will provide a unique opportunity for your organizations IT management and professional staff to become acquainted with the role and responsibilities of your organizations internal audit function and more specifically, the organizations IT audit professional.

In today's evolving virtual markets and highly complex, global corporate environments, information technology professionals, operational, financial, and IT auditors must all work together in helping to establish, implement and secure organizational infrastructure from both internal and external threats.

This seminar will provide the attendee with an insight into the most critical and sensitive areas of an organization, areas which are increasingly being examined by an organizations internal audit function. Internal controls and security are examined with an objective of gaining a better understanding of the audit concerns related to securing and controlling an organizations IT environment.

Learning Objectives

  • Recognize and identify the differences between cyber crimes and cyber terrorism.
  • Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces.
  • Be prepared to assist their organization in securing its operations, minimize its security exposure, and avoid becoming the victim of an attack.
  • Identify the various uses of Internet technology and that the changing roles of this technology in an e-business environment can jeopardize the reliability of information both from a management and an audit point-of-view.
  • Pinpoint security requirements necessary for effective recovery operations.
  • Explain the countermeasures used to protect organizations against attack.
  • Conduct an assessment and technical review of their organization's Internet and Web-based systems.
  • Discuss with both end users and management, how successful systems are developed and maintained.
  • Lay the foundation for a successful assessment and examination of application development projects, which includes planning the project, estimating the work, and tracking progress.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.