IT Controls are integral to ensuring the completeness, accuracy, integrity, and privacy of data. IT Controls are comprised of tactics such as utilizing strong passwords, encrypting laptops, and backing up files. In this course, you will learn how to ensure proper controls have been implemented to protect corporate assets, sensitive data, company trade secrets, customer and employee identity, and financial information.

This course will take you through controls organizations can implement to protect data, brand, and image. We will delve into understanding the principles behind IT General Computer Controls and corresponding compliance requirements. Lastly, we will discuss simple audit procedures proper controls are in place and working as intended.

Learning Objectives
  • Recognize IT Risks.
  • Identify appropriate IT Controls to mitigate specific risks.
  • Explore and discuss audit procedures to ensure effective controls are in place.
  • Discover and understand audit output.
Last updated/reviewed: March 23, 2024

Included In Certifications

This course is included in the following Certification Programs:

10 CoursesInformation Technology Auditor Certification

  1. Understanding Information Technology Governance and the Application of NIST
  2. Performing a Security Risk Assessment
  3. Auditing Data Security IT Computer Controls
  4. Auditing Third Party Service Providers and Cloud Environments
  5. Auditing Automated Business and Financial Transaction Processes
  6. Auditing Logical Security and Logical Access Controls
  7. Auditing Change Management
  8. Auditing the Network
  9. The Importance of Incident Response, Disaster Recovery and Business Continuity Planning
  10. Information Technology Audit Summary
11 Reviews (41 ratings)

Reviews

5
Anonymous Author
Thoughtfully presented. This is one of the clearest and most helpful general IT controls webinars that I have taken. Rather than just flip through to get my CPE, I actually am taking notes and getting the slides because I can apply this information to the work I do. Thank you Wendi.

5
Anonymous Author
great course- each of the topics builds upon the other. the author helps you understand why each topic matters . Each section is clearly written with good examples, Wendy does an excellent job and have taken a few of her courses she has vast practical experience

5
Anonymous Author
That was a great refresher of material I have not seen in a number of years. Nice summary to get so much information in just 31 slides. Thanks.

5
Anonymous Author
This was a good course given by Wendi on IT computer controls, and is a great introductory course on the basics of ITGC's.

5
Member's Profile
Very informative! Program materials were relevant and contributed to the achievement of the learning objectives

5
Anonymous Author
This course provides a good overview of a number of security controls in the information technology field.

5
Anonymous Author
The course was detailed and easy to understand for all system users and auditors. Very well presented.

5
Anonymous Author
Very good course for beginner level IT auditors. Other courses from the lecturer should also be taken.

5
Anonymous Author
Great course for those of us who are not in the IT field but want an understanding of ITGCs

5
Anonymous Author
Good course, good overview, good information, good presentation.

5
Anonymous Author
A thorough course in Data Security and IT Controls.

Prerequisites
Course Complexity: Foundational

No advanced preparation or prerequisites are required for this course.

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to Auditing Data Security IT Computer Controls2:15
  The Layers of IT General Controls11:38
LOGICAL ACCESS
  The Layers12:23
  Auditing Network and Active Directory Logical Access12:58
  Auditing Application and Data Base Logical Access11:44
OTHER AUDIT PROCEDURES
  Change Management13:48
  Backup and Recovery14:02
  Computer Operations8:18
  Documenting Audit Procedures and Testing8:45
CONTINUOUS PLAY
  Auditing Data Security IT Computer Controls1:35:51
SUPPORTING MATERIAL
  Slides: Auditing Data Security IT Computer ControlsPDF
  Auditing Data Security IT Computer Controls Glossary/ IndexPDF
REVIEW AND TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam