Certified IT Auditor For Critical Change & Controls

by Kings Global Career Academy

The role of information technology (IT) control and audit has become a critical mechanism for ensuring the integrity of information systems (IS) and the reporting of organization finances to avoid and hopefully prevent future financial fiascos such as Enron and WorldCom. 

AED 5000

Contact the Institutes

Fill this form
Kings Global Career Academy Logo

img Duration

24 hours

Course Details

The role of information technology (IT) control and audit has become a critical mechanism for ensuring the integrity of information systems (IS) and the reporting of organization finances to avoid and hopefully prevent future financial fiascos such as Enron and WorldCom. 

Global economies are more interdependent than ever and geopolitical risks impact everyone. Electronic infrastructure and commerce are integrated in business processes around the globe. The need to control and audit IT has never been greater.

Who Should Attend?

  • Information assurance auditors
  • System implementers or administrators
  • Network security engineers
  • IT administrators
  • Department of Defense (DoD) personnel or contractors
  • Federal agencies or clients
  • Private sector organizations looking to improve information assurance processes and secure their systems
  • Security vendors and consulting groups looking to stay current with frameworks for information assurance

Benefits:

  • Checks Susceptibility to Threat
  • Evaluates the System and Ensures Its Integrity
  • Secures Data
  • Bolsters Controls
  • Develops IT Governance

Contents:

  • Introduction and Overview of the 20 Critical Controls
  • Overview of the Control
  • How it is Compromised
  • Defensive Goals
  • Quick Wins
  • Visibility & Attribution
  • Configuration & Hygiene
  • Advanced
  • Overview of Evaluating the Control
  • Core Evaluation Test(s)
  • Testing/Reporting Metrics
  • Steps for Root Cause Analysis of Failures
  • Audit/Evaluation Methodologies
  • Evaluation Tools

Exercise to Illustrate Implementation Or Steps for Auditing a Control

1: Inventory of Authorized and Unauthorized Devices

2: Inventory of Authorized and Unauthorized Software

3: Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers

4: Continuous Vulnerability Assessment and Remediation

5: Controlled Use of Administrative Privileges

6: Maintenance, Monitoring, and Analysis of Audit Logs

7: Email and Web Browser Protections

 8: Malware Defenses

9: Limitation and Control of Network Ports, Protocols, and Services

10: Data Recovery Capability (validated manually)

11: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches

12: Boundary Defense

13: Data Protection

14: Controlled Access Based On Need to Know

15: Wireless Device Control

16: Account Monitoring and Control

17: Security Skills Assessment and Appropriate Training to Fill Gaps

18: Application Software Security

19: Incident Response and Management

20: Penetration Tests and Red Team Exercises

Kings Global Career Academy is a leading training institute aiming to provide quality training services in a bid to enhance skills and impart experience to individuals, corporations & government organizations to rise in the corporate ladder. It provides more than 10,000 corporate courses in locations of more than 10 cities across the globe.

 

Pillars of Kings Global Career Academy:

  • Quality
  • Transparency
  • Responsibility
  • Partnership 
  • Garhoud Branch

    Mezzanine Floor, Bin Ham Properties Airport Road, Garhoud, Dubai

Check out more IT Auditing courses in UAE

NobleProg MEA Logo

Certified Information Systems Auditor CISA

This course is designed to teach its participants about organizational methods, procedures and policies to evaluate information system and see its alignment with the overall business objectives and needs. You will also learn about implementi

by NobleProg MEA
  • Price
  • Start Date
  • Duration
LEORON Institute Logo

CISA (Certified Information System Audit)

This training course is of high value for both individuals who would like to invest in their future and keen to join the community of senior information technology leaders and consultants. The Certified information systems auditor (CISA) cer

by LEORON Institute
KBS Quality Certification Services LLC Logo

ISO 27001 Lead Auditor Training

Through interactive lectures, case studies, and practical exercises, participants will gain the knowledge and skills necessary to develop, implement, maintain, and improve an information security management system aligned with ISO 27001 stan

by KBS Quality Certification Services LLC
Professional Management Consultants International LLC Logo

Information Security Management System (ISO 27001:2013) Lead Auditor

This comprehensive five-day course provides hands-on training to ensure that your lead auditor thoroughly understands the role and acquires the expertise needed to perform it effectively. Delegates completing the course will be presented wit

by Professional Management Consultants International LLC
  • Price
  • Start Date
  • Duration
Professional Management Consultants International LLC Logo

Information Security Management System (ISO 27001:2013) Implementation

This course has been developed to provide participants with the knowledge to implement the procedures and forms based on the ISO 27001:2013 management system standard.

by Professional Management Consultants International LLC

© 2025 www.coursetakers.ae All Rights Reserved. Terms and Conditions of use | Privacy Policy