Featured courses

This course covers ways to audit strategic risks, incorporate data analytics and continuous auditing to root cause and trend analysis, approaches to enhance the audit plan and ways of auditing projects and other strategic initiatives.
View course details
This course focuses on how in-charge auditors lead audits. You will review audit program development and changes, risk assessments, setting priorities, delegation, managing staff performance, reviewing workpapers and stakeholder management.
View course details
This course focuses on key building blocks of modern IT audit, physical and logical security, including identity and access management, the threats to web-based e-commerce, best practices and standards for auditing servers.
View course details
This courses provides the fundamentals, covers the data analytic phases of importing data, preparing data, analyzing data and reporting results. It also covers basic scripting showing how to automate analytic routines with ACL Analytics.
View course details
This course covers how to design, maintain and assess the effectiveness of cybersecurity programs, what controls are needed, where the controls should be positioned, and how to perform tests to assess the controls’ reasonable effectiveness.
View course details
The webinar provides tools and techniques to help students improve their processes and deliverables, improve planning, recording, improving project dynamics, and applying lessons learned
View course details
This course provides students and in-depth understanding of SAP Basis, SAP S/4HANA, and security assessment techniques to perform a detailed technical audit and review of SAP GRC.
View course details
This roadmap to align the major stakeholders of the audit function. The fundamental question of “why” audit functions do what they do the “way” they do them & ask “what if“ questions around what can be done differently to achieve outcomes.
View course details
This webinar explains agile auditing, its origins, benefits, and common pitfalls. Also, how to reduce cycle time from planning to reporting, exceed expectations, reduce wasted effort, lower audit costs, and become more efficient
View course details
This course goes beyond the typical discussions about ethics, and covers the implications of technology on governance, institutional change, digital transformation, cybersecurity, automation and digitalization on organizations.
View course details
This webinar covers risks that have already changed in every aspect of businesses, including health and safety, remote working, information security, financial reporting, supply chain, and third party relationships.
View course details
This webinar provides the key ethical considerations, models impacting this field, important technological implications, and a roadmap to conduct a review of an organization’s corporate culture and ethics infrastructure.
View course details
This course covers the common architecture of cloud computing and examines the security and controls of SaaS, PaaS, and IaaS. It also covers the deficiencies that exist in cloud-based services and how Security-as-a-Service can be helpful.
View course details
This webinar covers the key elements of sound IT Governance and how it directly interfaces with corporate governance and enterprise risk management. Enterprise governance and IT Governance cannot be considered separate disciplines.
View course details
This webinar covers key indicators and actions that characterize a mature risk program, how to assess the organization’s operational risk maturity level, and action plans to move the organization higher in a maturity scale
View course details
This webinar covers security breaches to extract lessons learned and help develop an audit strategy. It is designed to help audit management meet today’s challenges and establish a strategic response to cybersecurity risks
View course details
This course covers continuous development, testing, deployment, monitoring, feedback, vulnerability scanning and auditing of DevOps. This is a continuous process, so the focus is on where to find the risks in a dynamic environment.
View course details
This webinar covers the risks in procurement, primarily the dynamics that result in fraud. Focus is on essential controls and concern areas like purchasing activities, bidding, contracting, vendor management. Also, essential data analytics.
View course details
This course covers the risks inherent in the SAP application and review some of the most effective controls that can be configured into the application. It covers the critical business processes that ensure that SAP is working as intended
View course details
This course looks systematically at how to best implement controls within asset management to drive down risk, and considers the approach that internal auditors should adopt when conducting such an assignment.
View course details
This course provides a top-down, risk-based approach to assess key risks and controls in each stage of the application processing cycle, how to audit efficiently and effectively, and what testing techniques should be used.
View course details
This webinar covers essential tools and techniques used by project management professionals. It breaks down planning into scoping, sequencing and scheduling, then it addresses contingencies related to time, resources and quality.
View course details
This webinar covers the technical and operational information necessary to audit automated business applications. Students focus on a top-down, risk-based approach to auditing application system transactions.
View course details
This course covers Agile and Scrum methodologies, expectations, business models, and focuses on what auditors and developers must review and manage to facilitate rapid application systems development and project success.
View course details
This course covers application risks and controls for the most commonly implemented applications. It includes application security, IT general controls, and dozens of SQL queries often used in assessments.
View course details