IIA training and events

IIA Award in information systems audit and assurance

Presented By
John Silltow John has over 30 years' experience of information systems within the government, private and not for profit sectors. He has specific expertise in computer audit, computer security, business continuity and software management. He is the author of the P4 study text.

This is an introductory course for those who need to be able to undertake or become involved with reviews of computer systems. It provides guidance and information on a range of information systems (IS) issues that will enable delegates to build their knowledge and provide a platform for further progress.

Earn the IACert designation

Gain the IIA Certificate in Internal Audit and Business Risk when you study four awards from the certificate programme.     


Who should attend?

This course is open to all but will especially suit:

  • delegates who need to acquire some IS skills for a future role
  • staff who are new to computer audit
  • non-IS staff who are required to manage computer audit projects or teams.

What will I learn? 

Upon completion you will be able to understand and discuss:

  • the basics of information systems
  • how information systems may be organised and managed
  • the benefits and drawbacks of the Internet and the cloud
  • how information systems are secured and protected
  • where computer audit and analysis techniques can be utilised
  • the emerging future techniques that will impact upon audit and assurance.

Course programme 

What are information systems?

  • the concepts of information systems (IS) and information technology (IT)
  • information systems building blocks
  • jargon and its implications.

What are the key components of information systems?

  • identifying the assets and resources involved
  • some of the ways of managing hardware, software and information
  • digital governance.

How do we manage information systems?

  • the structure of information systems
  • developing an information strategy
  • policies and projects.

 Can we trust the internet and the cloud?

  • brief history of the internet
  • how the internet works
  • what is the cloud?
  • understanding what a data center is
  • dealing with outsourced cloud providers.

How do we protect our computer systems?

  • threats and issues including social engineering
  • protection approaches
  • managing user access including the use of passwords and other techniques
  • disaster recovery
  • ethical hacking.

Where does computer audit and analysis fit in?

  • identification of potential areas for computer audit reviews
  • an overview of analysis and interrogation principles
  • audit analytics and the development of hindsight, insight and foresight
  • an introduction to computer forensics.

 


CPE competency areas covered

  • Technical expertise
  • Improvement and innovation

14 CPE points

Sorry, there are no events currently scheduled, please check back again soon