IT Auditing: The Next Step

This seminar has been completely rebuilt from the ground up to reflect the ever-shifting risks within the IT environment. In addition to physical and logical security risks, IT auditors must contend with hackers, viruses, malware and spyware. Outsourcing and offshoring have dramatically changed the audit world. The Internet and wireless networks have amplified connectivity threats. Databases, data warehouses and storage management systems are now part of the basic audit requirements. The modules of this seminar have been structured such that the knowledge gained from completing one audit acts as a stepping stone to the next. This progression along with classroom discussion and comprehensive handouts will prepare participants for a transition into an IT audit role.

Adobe_PDF_file_icon_32x32Course Information | IT Auditing: The Next Step
Fill out this form if you have a question or need a quote