Казахстан, г. Алматы, ул. Шевченко 90, БЦ «Каратал», офис 53
Казахстан, г. Астана, ул. Иманова 19, БЦ Деловой Дом "Алма-Ата", офис 612

направление: Corporative Format Author Trainings кол-во дней: 3
вендор: Информационная безопасность кол-во часов: 24
код курса: ITAP

The “IT AUDIT” trainings will allow participants to gain a wide set of knowledge to plan, perform IT audits and manage IT audit enterprise programs. You will have all required skills to face the most difficult problems, which include:

  • audit planning and reporting

  • business continuity audit

  • software development and system implementation lifecycle audit

  • operating systems, databases, network equipment configuration audit

Target Audience:

This is solely practical training! You immediately will work. The training adopted for an audience which represents students with completely different background. If you just a novice, you will be solving simple tasks. If you're professional, you will have a set of very sophisticated tasks. The obtained experience will mandatory increase your value for employees and customers, and bring a tremendous level of a professional confidence to you personally. We recommend this training for:

  • IT auditors

  • IT security specialists

  • IT quality specialists

  • IT manager

Section 1: IT audit

  • IT assurance framework (ITAF).

  • Audit charter/mandate for the audit.

  • Auditor independence.

  • Professional due care.

  • Audit assertions.

  • Audit criteria.

  • ISACA audit programs.

  • IIA audit guidelines.

  • Trust services principles and criteria

  • Cobit 5

  • ISO27001

  • Other sources of criteria

  • Audit planning. Risk-based planning.

  • Audit performance.

  • Materiality of audit findings.

  • Audit evidence.

  • Evidence collection methods

  • Audit sampling.

  • Using the work of other experts.

  • Reporting.

  • Handling illegal acts.

  • Audit follow-up.

  • Control environment

  • Control design

  • Control effectiveness

  • Control monitoring

  • Practical workshop.

Section 2: IT governance and management

  • IT strategy

  • IT architecture

  • IT metrics

  • IT organization

  • IT service management

  • Service catalog

  • Incident management

  • Change management

  • Release management

  • Problem management

  • IT investments

  • IT risks

  • End-user computing.

  • Shadow IT

  • Cloud IT

  • BYOD

  • IT outsourcing

  • Practical workshop.

Section 3: Information systems development and implementation

  • System implementation and development lifecycle.

  • Project management control frameworks.

  • System development methodologies.

  • Project business case.

  • Feasibility study.

  • Requirements specification.

  • Design and Architecture.

  • Procurement process.

  • Coding.

  • Implementation.

  • Testing

  • Handover to production.

  • Operational support.

  • Decommissioning.

  • Migrations.

  • Project closure.

  • Practical workshop.

Section 4: IT operations

  • Inventory and asset management.

  • Patch management.

  • Hardware maintenance.

  • Licensing.

  • Capacity planning.

  • Performance and availability monitoring.

  • Utilities

  • Datacenter management

  • Network physical infrastructure

  • Practical workshop.

Section 5: Business continuity and disaster recovery

  • Business continuity management

  • Business continuity project initiation and management.

  • Business impact assessment.

  • RTO/RPO

  • Recovery strategies.

  • Business continuity plan testing.

  • Disaster phases:

  • Preparation.

  • Initial response

  • Restoration

  • Recovery

  • Post-incident activities

  • Practical workshop.

Section 6: Information security assurance

  • Information security policies, standards and procedures

  • Information security roles and organizational structures.

  • Human resource security

  • Data classification and handling

  • Key processes.

  • Information security risk management.

  • Incident handling.

  • Awareness programs.

  • Identity and access management.

  • IDS/IPS

  • DLP

  • SIEM

  • PKI

  • 802.11x, NAP and network access control

  • Remote access and teleworking risks

  • Rights management

  • Antimalware solutions

  • Physical security controls

  • Fraud controls

  • Practical workshop.

Section 7: Audit considerations

  • ERP audit

  • CRM audit

  • VOIP

  • Virtualization

  • Practical workshop.

Labs:

  • Windows audit

  • Linux audit

  • Networking, VPN and Firewall audit

  • PKI audit

  • Database audit (MySQL and Oracle)

  • Web application audit (PHP)

  • Mobile application audit (android)