IT Controls are integral to ensuring the completeness, accuracy, integrity and privacy of data. IT Controls are comprised of tactics such as utilizing strong passwords, encrypting laptops and backing up files. In this course we review proper controls that should be implemented to protect corporate assets, sensitive data, company trade secrets, customer and employee identity and financial information. Additionally, we reflect on appropriate audit procedures to ensure the controls are in place and working as intended.
This course provides an overview of the IT general controls organizations should implement to ensure privacy, security, data integrity, system availability and to protect their brand and image. We delve into compliance requirements and review procedures to help ensure control effectiveness. Lastly, we discuss the importance of utilizing a control framework and implementing continuous monitoring techniques.
Learning Objectives
- Recognize IT General Control Components.
- Identify appropriate IT Controls to mitigate specific risks.
- Discover and discuss audit procedures to ensure effective controls are in place.
- Explore and understand audit output.
Included In Certifications
This course is included in the following Certification Programs:
10 CoursesInformation Technology Auditor Certification
- Understanding Information Technology Governance and the Application of NIST
- Performing a Security Risk Assessment
- Auditing Data Security IT Computer Controls
- Auditing Third Party Service Providers and Cloud Environments
- Auditing Automated Business and Financial Transaction Processes
- Auditing Logical Security and Logical Access Controls
- Auditing Change Management
- Auditing the Network
- The Importance of Incident Response, Disaster Recovery and Business Continuity Planning
- Information Technology Audit Summary
9 Reviews (26 ratings)
Reviews
Prerequisites
No advanced preparation or prerequisites are required for this course.