IT Audit Comprehensive

The IT Audit course is designed to provide practical view in conducting IT audit and assurance in one organization.

The course is designed to support professional staffs to expand their understanding of information technology (IT) audit. The course presents a more in-depth view on the fundamentals of IT auditing by highlighting on topics such as: IT audit and control analysis, examination of control evidence in conducting IT audit, application control, and management of IT audit.

The course will include discussion and exercises related to general control examinations and application system auditing. The course will also focus on control research and analysis for IT-related topic areas. In addition, through discussion and exercises, students will gain a working understanding of the process of developing audit work programs.

Participants will be expected to gain a working understanding of how to identify reference and implement IT management and control policies, standards and related auditing standards. Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in auditing process..

Each class session will include discussion on an IT audit management, security, control or audit issues that participants should be familiar with.

This course will delivered in Indonesian and/or English by Our Master Trainer:
DR, Ir. Fauzi Hasan, MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS, Cert. Change Management (APMG)

Objectives

At the completion of this course, the participants should be able to :

  • Participants shall obtain an expanded understanding the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization
  • Participants shall obtain the capability in conducting IT audit and implement techniques in performing assurance, attestation, and audit engagements
  • Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
  • Participants shall obtain the working ability to plan, conduct, and report on information technology audits
  • Participants shall obtain an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards

Target Audience

  • IT Managers
  • Security Managers
  • Auditing Staffs
  • IT Operation Staffs

Course Contents & Description

  1. Introduction to Information Technology Audit
    •The class session will focus on IT audit concepts and processes, which includes: review of some of the key fundamentals of IT auditing, including general auditing standards, risk-based auditing, pre-audit objectives, determining scope and audit objectives, and the process of performing an IT audit.
    •The class session will include discussion on IT performance, controls, control self-assessment, risk analysis, and the objectives of the IT audit or assurance report.
  2. Conducting Information Technology Audit
    •The class session shall describe on practical methodology in conducting the effective and efficient IT audit, expand upon the need for appropriate controls and assurance processes for business and IT environment. The participants will be geared toward gaining a working understanding of the content and value of the management guidelines and assurance methodology.
    •Discussion will focus on the importance of measurement in achieving organizational and IT objectives. The session will also focus on the business and IT environments subject to operational and control assessments (audit).
  3. Management Controls
    •The session will provide an overview of the control model such as: internal control, control analysis methodology from the Closing the Loop Framework, identification of business processes, considerations regarding materiality, and the assessment of IT value by which all these tools will be used assessing the appropriateness of IT processes.
    •The class session will also expand upon the audit process by providing methodology for developing audit strategies and developing audit work programs with reference to best practices (CobiT, BS 17799,etc).
    •In this regard, the participant will cover organizational structure, accountability, role of the IT steering committee and oversight functions, and method for ensuring that appropriate policies and procedures are in place.
  4. Application Controls
    •The class session will expand upon the requirements for application system audits, use of audit software, and IT service delivery.
    •From an audit perspective, the objective is to provide assurance that application systems have integrity, and that IT service management practices will ensure the delivery of the level of services required to meet the business organization’s objectives.
    •Topic areas will include such as: types of application systems, application control assessment, evaluating IT service agreements, problem management, help desk functions, and network standards.
  5. Evidence Collection and Evaluation
    •The class session will expand the methods in conducting the evidence collection, evaluation and reporting which cover the observed processes, documentary audit and analysis of evidence using appropriate tools such as: sampling, CAAT, and etc.
    •The participants will be driven towards having the capability in conducting effective evidence collection and evaluation which are essential
  6. Managing the IT Audit Function
    •The class session will focus on management issues regarding how to manage IT audit and assurance functions. The class material will include developing and assessing staff knowledge and skills, competency measurement, assignment of staff, documentation and continuing education requirements.
    •Discussion will be on best approaches for involvement in professional organizations, obtaining certifications, and professional development. The class will also focus on the key issues surrounding audit and assurance engagements, such as establishing auditee /auditor protocols, oral and written communication requirements, engagement administration, and follow-up requirements.

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <IT Audit Comprehensive> atau klik di sini!
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk inhouse training silahkan download IHT Request Form dan kirim via fax/email setelah diisi dengan hal-hal yang menjadi kebutuhan Anda.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax:021-5748888;  SMS/WA/Mobile: 08815608163 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

The Comprehensive IT Security Audit

Training IT Project

The IT Security Audit course is designed to provide practical view  in conducting IT audit and assurance in one organization. The course is designed to support professional staffs   to expand their understanding of information technology (IT) audit.
The course presents a more in-depth view on the fundamentals of IT auditing by highlighting  on topics such as:  IT  audit and control analysis, examination of control evidence in conducting IT audit, application control, Operating System and IT Infrastructure audit, and management of IT audit.
The course will include discussion and exercises related to general control examinations and application system auditing. The course will also focus on control research and analysis for IT-related topic areas. In addition, through discussion and exercises, participants will gain a working understanding of the process of developing audit work programs encompassing all elements of IT infrastructures.
Participants  will be expected to gain a working understanding of how to identify, reference and implement IT management and control policies, standards and related auditing standards. Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in auditing process.
IT Security  Auditing covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.
Each class session will include discussion on an IT audit  management, security, control or audit issues that participants   should be familiar with.

This course will delivered in Indonesian and/or English by Our Master Trainer:
DR, Ir. Fauzi Hasan, MM, MBA, PMP, CISA, CISSP, SSCP, CISM, CGEIT, CPRC, CSCP, CDCP, CITM APICS, Cert. Change Management (APMG)

Course Objectives & Benefits

At the completion of this course, the participants should be able to :

  • Participants shall obtain an expanded understanding on  the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization, with the focus on IT infrastructures
  • The participants shall obtain the capability on  how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, participants  get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobIT standard.
  • Participants shall obtain the capability in conducting IT audit and implement  techniques in performing assurance, attestation, and audit engagements
  • Capability to build  and maintain an IT audit function within the organization with maximum effectiveness and value
  • Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
  • Participants shall obtain the working ability to plan, conduct, and report on information technology audits with specific focus on infrastructure vulnarability assesment and assurance, and drill down upon application vulnarabilities
  • Participants shall obtain  an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards
  • Capability to use  best prractices  and methodologies such as: COSO, CobiT, ITIL, ISO, and NSA INFOSEC

Who Should Attend

  • IT Managers
  • Security Managers
  • Auditing Staffs
  • IT Operation Staffs.

What You Will Learn

  1. Audit Overview
    The class session will focus on IT audit concepts and processes, which includes: review of some of the key fundamentals of IT auditing, including general auditing standards, risk-based auditing, pre-audit objectives, determining scope and audit objectives, and the process of performing an IT audit. The class session will include discussion on IT performance, controls, control self-assessment, risk analysis, and the objectives of the  IT audit or assurance report.
  2. Building an Effective Internal IT Audit Function
    The class session will focus on management issues regarding how to manage IT audit and assurance functions. The class material will include developing and assessing staff knowledge and skills, competency measurement, assignment of staff, documentation and continuing education requirements.
  3. The Audit Process
    Perform IT audit in accordance with IT audit standards, guidelines and best practices to assist the organizations in ensuring that its information technology and business system are protected and controlled.
  4. Auditing Techniques
    Describing all techniques which are available to implemented for IT infrastructure auditing
  5. Auditing Entity-Level Controls
    Describing all entities control level which encompassing embedded controls in the areas such as:

    • Operating system control in UNIX-, Linux-, and Windows-based operating systems
    • Controls in  network routers, switches, firewalls, WLANs, and mobile devices
    • Entity-level controls, data centers, and disaster recovery plans
    • Controls in  Web servers, platforms, and applications
    • Database  critical controls
  6. Auditing Data Centers and Disaster Recovery
    Describe how to conduct data center as disaster recovery site with all supporting infrastructures
  7. Auditing Switches, Routers, and Firewalls
    Describe how to perform auditing on network infrastructure and network appliances
  8. Auditing Windows Operating Systems
    Describe how to conduct auditing on operating system using effective and control-piercing methodology within the Windows operating system environment
  9. Auditing Unix and Linux Operating Systems
    Describe how to conduct auditing on operating system using reliant and control-focus  methodology within the Unix  operating system environment
  10. Auditing Web Servers
    Describe how to perform auditing on Web Servers  infrastructure and net     DMZ devices
  11. Auditing Databases
    Describe how to perform auditing on organization’s Database  and all operating support elements
  12. Auditing Applications
    Describe how to perform auditing on organization’s Enterprise Applications and the supporting modules
  13. Auditing WLAN and Mobile Devices
    Describe how to perform auditing on Wide Area Network infrastructure and interface able mobile devices.

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <The Comprehensive IT Security Audit>
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk inhouse training silahkan download IHT Request Form dan kirim via fax/email setelah diisi dengan hal-hal yang menjadi kebutuhan Anda.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com

IT Risk Management

This course deals with how IT helps to achieve an appropriate balance between realizing opportunities for gains while minimizing losses. It is an integral part of good management practice and an essential element of good corporate governance. It is an iterative process consisting of steps that, when undertaken in sequence, enable continuous improvement in IT decision-making and facilitate continuous improvement in IT performance.

This course will deliver in Indonesian and/or English by Our Master Trainer: Fauzi Hasan, DR, Ir. MM, MBA, PMP, CISA, CISSP, SSCP, CISM,  CMPP, CGeIT, APICS

Objectives & Benefits

IT risk management course covers how to establish an appropriate infrastructure and culture and apply a logical and systematic method of establishing the context, identifying, analyzing, evaluating, treating, monitoring and communicating IT risks associated with any activity, function or process in a way that will enable organizations to minimize losses and maximize gains. At the completion of this course, the participants should be able to :

  • Conceptualize organizations risk management within IT processes
  • Identify and analyze risks within IT operations and understand the implications to the whole business operation
  • Improve IT operation risk level thru  the application and implementation of IT risk management methodology and best practices
  • Support the attainment of organizational business objectives by providing comprehensive perspective of IT risk management to the executive management of the organization
  • Plan to  implement tool  for identifying, analyzing, eradicating and communicating the risks within the cycle of risk management

Target Audience

  • Managers involved and related in the IT operations
  • IT staff and executives involved in risk management and  business process improvement
  • Information technology professionals involved in projects that are concerned, in part, with the automation of business processes
  • IT professionals especially from companies regulated to implement risk management and IT risk management such as banks and state-owned enterprises.

Course Content & Description

  1. Risk Management Introduction
    The segment defines Process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and deciding what countermeasures
  2. Risk Management Processes
    The participants learn to recognize the following issues in the risk management processes such as:

    • Identification and classification of information resources or assets that need protection
    • Assess threats and vulnerabilities and the likelihood of their occurrence Identification and classification of information resources or assets that need protection
    • Assess threats and vulnerabilities and the likelihood of their occurrence
  3. Risk Indicators
    This  segment shall describe on the need of IT risk management  to operate at multiple levels with diversified risk indicators including:

    • Operation: risks that could compromise the effectiveness of IT systems and supporting infrastructure
    • Project:  risks management needs to focus on the ability to understand and manage project complexity
    • Strategic:  the risk focus shifts to considerations such as how well the IT capability is aligned with the business strategy
  4. Loss Event Database
    The segment shall describe to the participants on intentional and unintentional action that causes data loss, and highlight on organizational responsibility such as:

    • preventing data loss
    • recovery from data loss
    • Cost of data loss
  5. Effective Risk Management
    This segment shall describe to the participants how to establish effective risk management program that covers:

    • Establish purpose of the risk management program
    • Assign the responsibility for the risk management
  6. Risk Management Maturity
    This segment shall describe the road-mapping of risk management as related to IT processes; the framework will be based on the CMM maturity level concept.
  7. IT Risk Management
    This segment shall describe on the Information Technology risk management which is part of the organization IT governance encompassing such as: the identification, assessment, and prioritization of IT operation risks, and  followed by coordinated and economical application of IT resources to minimize, monitor, and control the probability and/or impact of unfortunate events.
  8. Cases Study: IT risk management cases

Information & Registration:

  • Untuk keterangan selengkapnya (termasuk biaya dan jadwal pelaksanaan) silahkan dilihat di <IT Risk Management>
  • Untuk pendaftaran silahkan download Registration Information dan kirim kembali via email atau fax setelah diisi dengan lengkap.
  • Bila membutuhkan pelatihan dalam bentuk Inhouse Training silakan download IHT Request Form dan dikirim kembali kepada kami melalui Fax/email setelah diisi dengan lengkap.
  • Anda juga dapat menghubungi langsung customer service kami melalui Tel: 021-5748889; Fax: 021-5748888; WA/SMS: 08815608163; Mobile:081282595355, 085779877879 atau Email: info<at>beproseminar.co / beproseminars<at>gmail.com