Auditors must be able to review and assess the controls put in place to instigate IT risk. This course will help you learn the techniques and methodologies used to gain insight into control effectiveness.
Learning about the techniques and methodologies used to gain insight into control effectiveness is essential for an auditor to instigate IT risk. In this course, Information Systems Asset Protection: Monitoring, you will learn how to develop the skills necessary to observe and analyze information systems' controls. First, you will discover how to measure compliance and audit IT system configurations. Then, you will examine the maturity of the change control process. Finally, you will learn how to assess the security and reliability of databases. When you are finished with this course, you will have essential skills necessary to provide technical audits of Information systems and their implementation.
Learning about the techniques and methodologies used to gain insight into control effectiveness is essential for an auditor to instigate IT risk. In this course, Information Systems Asset Protection: Monitoring, you will learn how to develop the skills necessary to observe and analyze information systems' controls. First, you will discover how to measure compliance and audit IT system configurations. Then, you will examine the maturity of the change control process. Finally, you will learn how to assess the security and reliability of databases. When you are finished with this course, you will have essential skills necessary to provide technical audits of Information systems and their implementation.