Information Technology
Auditor Certification
This certification course introduces security compliance requirements, as well as the controls deemed necessary and critical to ensuring network availability, security, privacy, and data integrity.
Purchase Certification:
Certificate Highlights

Illumeo is making it easy to get the qualification you need to conduct quality audits over information technology systems and environments. This certification program introduces security compliance requirements, as well as the controls deemed necessary and critical to ensuring network availability, security, privacy, and data integrity. We walk through audit methodologies step by step to ensure students are able to identify the key controls and associated risks, develop audit programs, perform detailed control attribute testing, and deliver quality findings and recommendations. This is an effective, high-quality training program you can complete at your own pace and repeat as necessary to maximize the learning experience.
The courses are designed for those looking to further their understanding of IT general computing controls, cybersecurity controls and the corresponding approach to auditing these types of controls. The curriculum is created for new IT auditors or those outside of IT looking to enhance their skillset. While some content might be a bit technical, we strongly believe this is the perfect opportunity for financial and operational auditors to obtain a clear understanding of the IT controls they rely so heavily upon.
This certification training is composed of the following courses:
1. Understanding Information Technology Governance and the application of NIST
2. Performing a Security Risk Assessment
3. Auditing Data Security IT Computer Controls
4. Auditing 3rd Party Service Providers and Cloud Environments
5. Auditing Automated Business and Financial Transaction Processes
6. Auditing Logical Access, Logical Security and Segregation of Duties
7. Auditing Systems Acquisition, Implementation and Maintenance
8. Auditing The Network
9. The Importance of Incident Response, Disaster Recovery, and Business Continuity
10. Information Technology Audit Summary
Frequently Asked Questions


FAQs
Why should I be Illumeo Certified?
Why should I hire a Professional with an Illumeo Certification?
What happens if I fail the exam?
Why would I want a subscription on Illumeo?
Instructor

Wendi Finn
IS Security Solutions LLC

Wendi Finn is a CPA with a MS in Technology. She spent six years working for the big 4 in public accounting as a system security expert prior to founding IS Security Solutions, LLC in 2004. In addition to consulting, Wendi has 10 years’ experience as a professor at Franklin University, was a member of the State of Ohio Audit Committee and has published 4 books.
IS Security Solutions, LLC has recently developed an IT framework encompassing NIST CyberSecurity Framework, PCI, HIPAA and Sarbanes Oxley allowing for a single framework to meet all your IT compliance requirements.
In addition to compliance, we also employee individuals specializing and certified in Lean Six-Sigma, Project Management, Accounting, IT implementations, Disaster Recovery and Business Continuity and Accounting.
10 Courses
