Information Technology (IT) Controls are integral to the protection of our business and personal lives. They are comprised of tactics such as utilizing strong passwords, encrypting laptops and backing up files. In this course you will learn about policies, procedures and controls that entities should implement to protect corporate assets, company trade secrets, and customer and employee identity and financial information.
All other controls are reliant on the ITGC, which is why IT general controls are such an essential part of internal controls. This course serves as a good refresher on the ITGC's basic concepts and also leads to resources where one may learn more about the ITGC in depth.
This course takes you through a variety of controls you can implement to protect your organization’s assets, brand and image. We delve into understanding the principles behind IT General Computer Controls. Lastly, we discuss simple controls that can be implemented, critical monitoring that should be performed, and important training that needs to occur.
Learning Objectives
- Recognize Information Technology (IT) risks.
- Explore the primary types of IT General Controls(ITGC).
- Identify ITGC that mitigate specific risks
- Explore practices to assist with IT control implementation
121 Reviews (503 ratings)
Prerequisites
No advanced preparation or prerequisites are required for this course.