Featured courses

This courses provides the fundamentals, covers the data analytic phases of importing data, preparing data, analyzing data and reporting results. It also covers basic scripting showing how to automate analytic routines with ACL Analytics.
View course details
This course provides students and in-depth understanding of SAP Basis, SAP S/4HANA, and security assessment techniques to perform a detailed technical audit and review of SAP GRC.
View course details
This roadmap to align the major stakeholders of the audit function. The fundamental question of “why” audit functions do what they do the “way” they do them & ask “what if“ questions around what can be done differently to achieve outcomes.
View course details
This webinar explains agile auditing, its origins, benefits, and common pitfalls. Also, how to reduce cycle time from planning to reporting, exceed expectations, reduce wasted effort, lower audit costs, and become more efficient
View course details
This course covers how to design, maintain and assess the effectiveness of cybersecurity programs, what controls are needed, where the controls should be positioned, and how to perform tests to assess the controls’ reasonable effectiveness.
View course details
This webinar covers risks that have already changed in every aspect of businesses, including health and safety, remote working, information security, financial reporting, supply chain, and third party relationships.
View course details
This webinar provides the key ethical considerations, models impacting this field, important technological implications, and a roadmap to conduct a review of an organization’s corporate culture and ethics infrastructure.
View course details
This webinar covers the key elements of sound IT Governance and how it directly interfaces with corporate governance and enterprise risk management. Enterprise governance and IT Governance cannot be considered separate disciplines.
View course details
This webinar covers key indicators and actions that characterize a mature risk program, how to assess the organization’s operational risk maturity level, and action plans to move the organization higher in a maturity scale
View course details
This course covers continuous development, testing, deployment, monitoring, feedback, vulnerability scanning and auditing of DevOps. This is a continuous process, so the focus is on where to find the risks in a dynamic environment.
View course details
This course covers the risks inherent in the SAP application and review some of the most effective controls that can be configured into the application. It covers the critical business processes that ensure that SAP is working as intended
View course details
This webinar covers essential tools and techniques used by project management professionals. It breaks down planning into scoping, sequencing and scheduling, then it addresses contingencies related to time, resources and quality.
View course details
This course covers Agile and Scrum methodologies, expectations, business models, and focuses on what auditors and developers must review and manage to facilitate rapid application systems development and project success.
View course details
This webinar offers answers to the many questions asked about moving to, and working in, the cloud. It follows an easy-to-understand format and includes several Top 10 lists that explain and clarify the cloud, the cloud risks, and cloud solutions.
View course details
This webinar provides an overview of EIDL and PPP Loans and how to record these loans, document the expenses paid for with the loan proceeds, and how to audit the forgiveness application documentation.
View course details
This webinar covers how internal audit can review this difficult topic and assess reputational risks, get buy-in when presenting the findings, and how to effectively call for action.
View course details
Recent corporate disasters have highlighted the importance of establishing and maintaining a strong ethical culture. This classes covers how internal audit can review this difficult topic and assess reputational risks.
View course details
This course focuses on strategy, governance, risk management and other boardroom processes that have been "no-go" areas for internal audit. It also covers how to make the case for involvement and ways to become a catalyst for improvement.
View course details
This course covers application risks and controls for the most commonly implemented applications. It includes application security, IT general controls, and dozens of SQL queries often used in assessments.
View course details
This course examines Oracle’s cloud application, its core elements, technical architecture, security model, role design, generic users patching, change management, profile options, controls monitoring and reporting, and workflow issues.
View course details
This webinar covers key aspects of project management including team composition, management, setting time estimates, defining milestones, and using metrics to measure the achievement of time, financial and scope goals.
View course details
This course covers traditional and alternative ERM methods, structures and tools for establishing a risk management program. You will learn about the essential ingredients and why they are critical, and how an oversight tool should work.
View course details
This webinar covers which risks to focus on, how to evaluate the level of compliance with prevailing laws, regulations, and best practices, how to examine every stage of the employees’ life cycle and identify the most important issues.
View course details
This webinar covers the risks inherent in the procurement function, the strategic relationships it depends on, the information systems used, the management processes it affects and the bidding, vendor selection and process implications.
View course details
This course focuses on the challenges facing organizations and the assurance procedures to assess the effectiveness of controls that protect your digital presence and the related marketing activities.
View course details