We may earn an affiliate commission when you visit our partners.
Course image
Stone River eLearning

The IT Systems Auditing course has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams.

Read more

The IT Systems Auditing course has become the industry standard for the IT auditing, control and security. The course helps the students to gain relevant, up-to-date and concise knowledge along with hands-on practice exams.

If you’re a professional with experience of participating, leading and directing information system projects, this online IT Systems Auditing course will help you prepare for a lucrative and highly sought after position in this exciting and challenging field of information technology.

Completing this course showcases your knowledge of IS auditing, and demonstrates you are capable to assess vulnerabilities, report on compliance and institute controls within an enterprise. After completing this training course you will be able to leverage standards, manage vulnerabilities, you will understand ensure compliance, offer solutions, institute controls and deliver value to an enterprise, and the Acquisition process and testing process.

IT Systems Auditing is one of the most popular and high-demand IT employment options available. The course offers the ability for students to gain comprehensive knowledge in concepts that are required to get into the field of IT Systems Auditing.

Get your start in the world of IT Systems Auditing by taking this course today. Part 2 of this course is also available to complete your education.

This course is in no way sponsored or endorsed by, or in any way affiliated with, ISACA.

Enroll now

12 deals to help you save

We found 12 deals and offers that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.
Use code at checkout. Ended October 29
24-Hour Flash Sale
Save on all online courses in your cart and take advantage of big savings.
FLASH SALE
24T6MT102824
Use code at checkout. Ended October 19
24-Hour Flash Sale
Save on all online courses in your cart and take advantage of big savings.
FLASH SALE
ST15MT100124A
Ended October 8
24-Hour Flash Sale
Take advantage of big savings on online courses.
Up to
80%
off
Ended September 28
24-Hour Flash Sale! Save up to 85% on Udemy online courses.
For 24 hours, save big on courses from Udemy's extensive catalog.
Up to
85%
off
Ended September 25
Save on courses
Gain the skills you need to reach your next career milestone.
Up to
85%
off
Use code at checkout. Only 2 days left!
24-Hour Sale
Save with steep discounts on most courses including bestsellers from popular instructors.
Flash Sale!
ST7MT110524
Use code at checkout. Ended October 12
Explore new possibilities
Start exploring new possibilities for your future with courses on sale.
Up to
85%
off
ST14MT101024
Use code at checkout. Valid until November 13
Get skills that impress
Learn from courses across popular topics and take big discounts during this 48-hour sale.
Up to
80%
off
ST20MT111124A
Ended October 1
Personal Plan sale
Gain unlimited access to thousands of courses. For a limited time, save when you start an annual subscription.
From
40%
off
Use code at checkout. Valid until December 1
For new customers
Save when you purchase top courses. For new customers only.
Special Offer
UDEAFNULP2024
Ended November 1
New customer offer
New customers, complete your first order and save big.
Up to
80%
off
Valid for a limited time only
Future-proof your career
Access O'Reilly books, live events, courses, and more. Save with an annual subscription.
Take
15%
off

What's inside

Learning objectives

  • It audit process
  • It governance
  • Systems and infrastructure lifecycle management
  • It service delivery and support
  • Protection of information assets
  • Business continuity and disaster recovery

Syllabus

Module 01 -The Process of Auditing Information Systems

Download Supporting files here

Lesson 1: Management of the Audit Function
Organization of the IS Audit Function
Read more
IS Audit Resource Management
Audit Planning Part1
Audit Planning Part2
Audit Planning Part3
Audit Planning Part4
Audit Planning Part5
Effect of Laws and Regulations on IS Audit Planning Part1
Effect of Laws and Regulations on IS Audit Planning Part2
Effect of Laws and Regulations on IS Audit Planning Part3
Effect of Laws and Regulations on IS Audit Planning Part4
Lesson 2: ISACA IT Audit and Assurance Standards and Guidelines Part1
IT Audit and Assurance Standards and Guidelines Part2
IT Audit and Assurance Standards and Guidelines Part3
IT Audit and Assurance Standards and Guidelines Part4
IT Audit And Assurance Standards Framework
Auditing Standards Part1
Auditing Standards Part2
Auditing Standards Part3
Auditing Standards Part4
Auditing Standards Part5
Auditing Standards Part6
Auditing Standards Part7
Auditing Standards Part8
Auditing Standards Part9
Audit Guidelines Part1
Audit Guidelines Part2
Audit Guidelines Part3
Audit Guidelines Part4
Audit Guidelines Part5
Audit Guidelines Part6
Audit Guidelines Part7
Audit Guidelines Part8
Audit Guidelines Part9
Audit Guidelines Part10
Audit Guidelines Part11
Audit Guidelines Part12
Audit and Assurance Tools and Techniques
Relationship Among Standards, Guidelines, and Tools and Techniques
Information Technology Assurance Framework
Information Technology Assurance Framework Components
ITAF General Standards (Section 2200) Part1
ITAF General Standards (Section 2200) Part2
ITAF Performance Standards (Section 2400) Part1
ITAF Performance Standards (Section 2400) Part2
ITAF Performance Standards (Section 2400) Part3
ITAF Performance Standards (Section 2400) Part4
Reporting Standards (Section 2600) Part1
Reporting Standards (Section 2600) Part2
Reporting Standards (Section 2600) Part3
IT Assurance Guidelines (Section 3000) Part1
IT Assurance Guidelines (Section 3000) Part2
IT Assurance Guidelines (Section 3000) Part3
IT Assurance Guidelines (Section 3000) Part4
IT Assurance Guidelines (Section 3000) Part5
IT Assurance Guidelines (Section 3000) Part6
IT Assurance Guidelines (Section 3000) Part7
IT Assurance Guidelines (Section 3000) Part8
IT Assurance Guidelines (Section 3000) Part9
IT Assurance Guidelines (Section 3000) Part10
IT Assurance Guidelines (Section 3000) Part11
Lesson 3: Risk Analysis
Risk Analysis Part1
Risk Analysis Part2
Risk Analysis Part3
Risk Analysis Part4
Risk Analysis Part5
Risk Analysis Part6
Risk Analysis Part7
Lesson 4: Internal Controls
Internal Control Objectives
IS Control Objectives Part1
IS Control Objectives Part2
IS Control Objectives Part3
COBIT
General Controls Part1
General Controls Part2
IS Controls
Lesson 5: Performing An IS Audit
Performing an IS Audit
Classification of Audits
Audit Programs Part1
Audit Programs Part2
Audit Methodology Part1
Audit Methodology Part2
Audit Methodology Part3
Fraud Detection Part1
Fraud Detection Part2
Risk-Based Auditing Part1
Risk-Based Auditing Part2
Risk-Based Auditing Part3
Audit Risk and Materiality Part1
Audit Risk and Materiality Part2
Audit Risk and Materiality Part3
Audit Risk and Materiality Part4
Audit Risk and Materiality Part5
Risk Assessment and Treatment Part1

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops experience in IS auditing, control, and security, in high demand in the IT industry
Enhances knowledge of IT audit process across various IT aspects such as IT governance, systems lifecycle, IT service delivery, protection of information assets, business continuity, and disaster recovery
Provides hands-on practice exams to aid in preparation for industry standard certifications
Useful for professionals seeking to qualify for lucrative and sought-after IT audit positions
Designed for students and professionals with experience participating in, leading, and directing information system projects
Course content is designed to meet industry standards set by ISACA, but is not sponsored or endorsed by ISACA

Save this course

Save Technology Systems Auditing (Part 1 of 2) to your list so you can find it easily later:
Save

Reviews summary

Helpful tech auditing survey

learners say this course is very clear, well-structured, and helpful. They also mention that more examples and technical explanations could improve the course.
Learners found the course to be well-structured.
"I found the course very clear, well-structured and helpful."
Learners felt the course could improve by including more examples and technical explanations.
"More examples and explanations on technical terms could make it even better."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Technology Systems Auditing (Part 1 of 2) with these activities:
Mentor junior IS auditors or students
Share your knowledge and support the next generation of IS auditors.
Show steps
  • Identify opportunities to mentor junior IS auditors or students
  • Provide guidance and support on IS audit concepts and practices
  • Review their work and provide constructive feedback
  • Share your experiences and insights to help them grow professionally
  • Build relationships and expand your professional network
Review IS audit standards and best practices
Stay up-to-date on the latest regulations and best practices in IS auditing.
Browse courses on IT Governance
Show steps
  • Download and read recent IS audit standards and guidelines
  • Attend a webinar or conference on IS audit best practices
  • Review articles and research papers on emerging IS audit trends
  • Identify areas where your knowledge or skills need to be updated
  • Develop a plan to address any knowledge gaps
Participate in Group Discussion on Internal Controls
Engage in a collaborative discussion with peers to exchange insights and deepen your understanding of internal controls within information systems.
Browse courses on Internal Controls
Show steps
  • Prepare by reviewing course materials on internal controls
  • Actively participate in group discussions
  • Share knowledge and experiences with peers
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
Explore IT Governance Frameworks
Deepen your understanding of industry best practices by exploring IT governance frameworks such as COBIT and ITIL.
Browse courses on IT Governance
Show steps
  • Research different IT governance frameworks
  • Identify key principles and practices
  • Discuss the application of frameworks in real-world scenarios
COBIT Framework Tutorial
Complete a tutorial on the COBIT framework to strengthen your understanding of IT governance and control.
Show steps
  • Find a reputable COBIT tutorial
  • Watch or read the tutorial
  • Take notes on the key concepts
  • Complete any quizzes or exercises
Develop an IS audit plan for a small business
Put your knowledge into practice by creating a comprehensive IS audit plan.
Browse courses on Audit Planning
Show steps
  • Define the scope and objectives of the audit
  • Identify and assess potential risks
  • Develop an audit plan and methodology
  • Gather and analyze evidence
  • Prepare and issue an audit report
Review Risk Analysis Processes
Reinforce your understanding of risk analysis processes and their implementation within enterprise systems.
Browse courses on Risk Analysis
Show steps
  • Identify key risk analysis processes
  • Analyze threat vectors and attack surfaces
  • Develop mitigation strategies and controls
Design an Audit Plan for a System
Apply your knowledge in designing a comprehensive audit plan for a given information system, outlining scope, objectives, and procedures.
Browse courses on Audit Planning
Show steps
  • Define the audit scope and objectives
  • Identify and assess risks and controls
  • Develop audit procedures and techniques
  • Document the audit plan
Vulnerability Assessment Exercises
Practice assessing vulnerabilities to reinforce what you learned about identifying potential IT security risks.
Show steps
  • Review common types of vulnerabilities
  • Configure a vulnerability scanner
  • Conduct a vulnerability scan
  • Analyze the scan results
  • Prioritize and remediate the vulnerabilities
Simulate Vulnerability Assessment
Enhance your practical skills in identifying and assessing system vulnerabilities through simulations.
Browse courses on Vulnerability Assessment
Show steps
  • Configure vulnerability scanning tools
  • Execute scans and analyze results
  • Prioritize and mitigate critical vulnerabilities
Analyze common IS audit scenarios
Practice critical thinking and apply audit knowledge to real-world situations.
Show steps
  • Identify and prioritize key audit risks
  • Develop audit procedures to address the risks
  • Execute the audit procedures and gather evidence
  • Evaluate the evidence and draw conclusions
  • Prepare an audit report and communicate the findings
Participate in a virtual IS audit competition
Challenge yourself and showcase your IS audit skills against other professionals.
Show steps
  • Find and register for a virtual IS audit competition
  • Prepare for the competition by reviewing course materials and practicing mock audits
  • Compete in the virtual competition and present your findings
  • Analyze your performance and identify areas for improvement
  • Network with other participants and learn from their experiences
Contribute to an open-source IS audit project
Gain practical experience and contribute to the IS audit community.
Show steps
  • Find an open-source IS audit project to contribute to
  • Familiarize yourself with the project's goals and codebase
  • Identify an area where you can contribute your skills
  • Write and submit a pull request with your contribution
  • Collaborate with other contributors and maintain your contribution

Career center

Learners who complete Technology Systems Auditing (Part 1 of 2) will develop knowledge and skills that may be useful to these careers:
IT Auditor
As an IT Auditor, you will be responsible for evaluating an organization's information systems, including computer hardware, software, and networks, to ensure their effectiveness, efficiency, and compliance with laws and regulations. This course can help you build a strong foundation in IT audit processes, IT governance, and systems and infrastructure lifecycle management, all of which are essential for success in this role.
IT Consultant
As an IT Consultant, you will be responsible for providing advice and guidance to organizations on how to improve their IT systems and processes. This course can help you build a strong foundation in IT audit processes, IT governance, and systems and infrastructure lifecycle management, all of which are essential for success in this role.
Cybersecurity Analyst
As a Cybersecurity Analyst, you will be responsible for monitoring and analyzing an organization's network for security threats. This course can help you build a strong foundation in IT audit processes, IT governance, and risk analysis, all of which are essential for success in this role.
IT Security Analyst
As an IT Security Analyst, you will be responsible for identifying, assessing, and mitigating risks to an organization's information systems. This course can help you build a strong foundation in IT audit processes, IT governance, and risk analysis, all of which are essential for success in this role.
Information Security Manager
As an Information Security Manager, you will be responsible for developing and implementing an organization's information security program. This course can help you build a strong foundation in IT audit processes, IT governance, and risk analysis, all of which are essential for success in this role.
IT Manager
As an IT Manager, you will be responsible for overseeing an organization's IT systems and processes. This course can help you build a strong foundation in IT audit processes, IT governance, and systems and infrastructure lifecycle management, all of which are essential for success in this role.
IT Director
As an IT Director, you will be responsible for leading an organization's IT department. This course can help you build a strong foundation in IT audit processes, IT governance, and systems and infrastructure lifecycle management, all of which are essential for success in this role.
Compliance Analyst
As a Compliance Analyst, you will be responsible for ensuring that an organization's IT systems and processes comply with laws and regulations. This course can help you build a strong foundation in IT audit processes, IT governance, and risk analysis, all of which are essential for success in this role.
Data Privacy Officer (DPO)
As a Data Privacy Officer (DPO), you will be responsible for overseeing an organization's compliance with data privacy laws and regulations. This course can help you build a strong foundation in IT audit processes, IT governance, and risk analysis, all of which are essential for success in this role.
Risk Analyst
As a Risk Analyst, you will be responsible for identifying, assessing, and mitigating risks to an organization. This course can help you build a strong foundation in risk analysis, which is essential for success in this role.
Chief Information Officer (CIO)
As a Chief Information Officer (CIO), you will be responsible for overseeing all aspects of an organization's IT operations. This course can help you build a strong foundation in IT audit processes, IT governance, and systems and infrastructure lifecycle management, all of which are essential for success in this role.
IT Architect
As an IT Architect, you will be responsible for designing and implementing an organization's IT systems. This course may be useful for building a foundation in systems and infrastructure lifecycle management, which is relevant to this role.
Network Administrator
As a Network Administrator, you will be responsible for managing an organization's computer networks. This course may be useful for building a foundation in systems and infrastructure lifecycle management, which is relevant to this role.
Forensic Accountant
As a Forensic Accountant, you will be responsible for investigating financial crimes. This course may be useful for building a foundation in risk analysis, internal controls, and fraud detection, all of which are relevant to this role.
Internal Auditor
As an Internal Auditor, you will be responsible for evaluating an organization's internal control systems. This course may be useful for building a foundation in risk analysis, internal controls, and fraud detection, all of which are relevant to this role.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Technology Systems Auditing (Part 1 of 2).
This official review manual from ISACA is designed to prepare candidates for the CISA certification exam. It covers the entire CISA exam blueprint and can serve as a valuable study aid to complement this course.
Provides foundational knowledge on information systems control and audit, covering essential concepts and best practices. It can serve as a valuable reference or textbook for this course.
Offers a comprehensive overview of IT audit, control, and security, providing practical guidance for professionals in the field. It can serve as a useful reference or supplement to this course.
Focuses on auditing cloud computing environments, addressing specific risks and challenges. It can provide additional knowledge for professionals involved in auditing cloud-based systems.
Provides a comprehensive overview of security auditing, covering key concepts, methodologies, and best practices. It can serve as a foundational reference for professionals involved in IT auditing and security.
Provides a comprehensive overview of COBIT 5, a leading framework for IT governance and management. It valuable reference for professionals involved in IT auditing and control.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Technology Systems Auditing (Part 1 of 2).
Technology Systems Auditing (Part 2 of 2)
Most relevant
Information Systems Auditing: Information Systems...
Most relevant
Information Systems Auditing, Controls and Assurance
Most relevant
Digital Shield: Cybersecurity for Data and System...
Most relevant
Security Architecture and Engineering: Security Controls...
Digital Shield: Cybersecurity for Data and System...
Play It Safe: Manage Security Risks
Cybersecurity Compliance and System Administration
NIST 800-171
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser