Intermediate IT Audit School: Database Management and Change Management
Overview
Auditors proficient in IT and cybersecurity are in high demand because they can assist organizations in their efforts to create and preserve value. Business models depend on the effective deployment, maintenance, and protection of the organizations’ computer infrastructure, the effective use of IT systems while complying with applicable rules and regulations, and the adoption of best practices whenever possible.
Topics covered include logical security concepts, social engineering, malware, user identification and authentication, user authorization, and privileged access monitoring. Other topics covered include log management, vulnerability assessments, middleware, virtualization, and audit considerations.
CPE: 4
Who should attend:
Senior IT Auditors, Technologists, and Information Security Managers and Analysts with 2+ years of experience looking to increase their ability to move into a position of IT audit leadership.
Here are the topics we'll cover.
- Course Overview
- Database Management Systems
- Change Management
Learning Style
Level
Includes
Assessment