IT Controls are integral to ensuring the completeness, accuracy, integrity, and privacy of data. IT Controls are comprised of tactics such as utilizing strong passwords, encrypting laptops, and backing up files. In this course, you will learn how to ensure proper controls have been implemented to protect corporate assets, sensitive data, company trade secrets, customer and employee identity, and financial information.
This course will take you through controls organizations can implement to protect data, brand, and image. We will delve into understanding the principles behind IT General Computer Controls and corresponding compliance requirements. Lastly, we will discuss simple audit procedures proper controls are in place and working as intended.
Learning Objectives
- Recognize IT Risks.
- Identify appropriate IT Controls to mitigate specific risks.
- Explore and discuss audit procedures to ensure effective controls are in place.
- Discover and understand audit output.
Included In Certifications
This course is included in the following Certification Programs:
10 CoursesInformation Technology Auditor Certification
- Understanding Information Technology Governance and the Application of NIST
- Performing a Security Risk Assessment
- Auditing Data Security IT Computer Controls
- Auditing Third Party Service Providers and Cloud Environments
- Auditing Automated Business and Financial Transaction Processes
- Auditing Logical Security and Logical Access Controls
- Auditing Change Management
- Auditing the Network
- The Importance of Incident Response, Disaster Recovery and Business Continuity Planning
- Information Technology Audit Summary
11 Reviews (42 ratings)
Prerequisites
No advanced preparation or prerequisites are required for this course.