Cyber Security And Info. Systems Auditing

In the last decade, business models have changed dramatically as a result of the rapidly evolving Information Technology. The use of internet has resulted in new and exciting ways for people to engage in business. However, notwithstanding the conveniences offered by computerization and e-commerce, they have also made business processes more complex and susceptible.

Regrettably, this technology equally offers the criminals the same usage opportunity to commit criminal acts. As a consequence, organizations must consider their vulnerabilities and assess the benefits of having a cyber-security and information systems auditing skill sets capable of proactively managing and detecting fraud risks, trespasses, availability aspects and putting in place a responsible measure to deal with cyber fraud and corruption.

At the end of this programme, participants will be equipped with evolving trends of Information Systems (IS), and the impact of Information System on the various structures and levels within Organizations. The sessions are designed to cover all the areas of the Certified Information Systems Auditor Examination and gain the knowledge and practical concepts prerequisite to obtaining CISA Certification.

Learning Outcomes

Participants will be able to:

  • State the basic concepts in information systems security, including security technology and principles, software security and trusted systems, and IT security management.
  • Indicate the requirements and mechanisms for identification and authentication.
  • List the database security issues and solutions, including models, architectures, and mechanisms for database security;
  • State the issues related to administration security, physical security, and program security;
  • Determine appropriate mechanisms for protecting information systems ranging from operating systems, to database management systems, and to applications.
  • Explore cyber-crime, cyber terrorism and organized crime.

Course Content

  • Systems and Application Security
  • Technology and Principles
  • Software Security and Trusted Systems
  • Risks Management, Security Standards and Controls
  • Intrusion Detection and Prevention
  • Security Plans, Policies and Contingency Planning
  • Cybersecurity Management and Strategic Planning

 

Who Should Attend

This course is intended for information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. These include but not limited to Investigators and law enforcers, Systems Investigators, Corporate Security Managers, Auditors, IS Security and ICT Managers, Legal practitioners, Forensic Managers, Risk Managers.