Pioneers in Global Leadership and Quality Training and KM Consultancy

Out of Safety for all our Clients, All our Courses are available for Live Online Training 

Risk Based IT Auditing, Practical Masterclass
The Changing Landscape of Auditing Business Processes Enabled by IT​​


Information Technology has developed into a Nerve center of every organization. It has become an integral and pervasive component for critical business operations, it has commanded effective power in sustaining and extending enterprise strategies and objectives. The impact of emerging technology such as Cloud computing, Big Data, Mobility, Consumerization, Social Media, Cybersecurity, and the Internet of things is permeating every aspect of the business. More than ever, forward-looking Organizations are using IT to build sustainable innovations for competitive advantages.   This Risk-Based IT Auditing Masterclass is aimed to equip experienced IT Auditors, and non-IT auditors, Audit Committee Members, IT professionals, CAEs and Business Leaders with practical risk-based IT auditing skills and knowledge that will link IT Control gaps to impact on business strategy and performance goals. This Risk-Based IT Auditing Masterclass will provide practical approaches to auditing IT, How to document relevant entity-specific system descriptions, perform Risk Assessment Control Matrix (RACM), Test Procedures (Audit Programs), Work paper, Findings management later points and reporting.  We will also focus on linking IT Audit observations to key enterprise strategy and performance objectives in line with the new internal audit principles. This Masterclass will seek to equip delegates with Skills, knowledge, and proven approaches to completely perform value-add IT Auditing from start to finish. You will be equipped with the necessary knowledge and skills required to communicate insights and foresights more effectively.

Present your work and leave with an action plan of best practices to apply immediately on the job.

This training will include:

  • Planning an IT Audit driven by a clear understanding of the business environment and Business Processes Clear understanding of Business Process Documentation 
  • Learning a pro-active audit approach to provide value-add IT auditing service to your organization
  • Mastery of COBIT®4/5 Principles, Goals cascade, Enablers, Processes and Assessment
  • Mastery of COBIT®4/5 for Quality Assurance 
  • A business-centric approach to auditing IT General Controls
  • Active Directory and Identity Management Auditing
  • Application Controls Review- HR and Finance Systems anchored on the understanding of Business Processes 
  • Auditing Outsourced IT Environments and Systems 
  • Value-added IT Projects Advisory and Assurance 
  • Introduction to Auditing Emerging Technology –Cloud Computing, Social Media, BYOD, Cybersecurity, Big Data, and Internet of Things
  • Understanding Enterprise Governance in IT Auditing

Impact on you and your Organization:

  • Define the various types of fraud related to computers and IT
  • Identify the types of anti-fraud controls and rate their effectiveness
  • Predict the opportunities for fraud presented by advanced technology
  • Employ the most effective methods of detection for different types of IT fraud
  • Explain the advantages and disadvantages of audit software in IT fraud investigation

Who should Attend
This training is suitable for a wide range of professionals but will greatly benefit:

  • Internal Auditors
  • Experienced and Upcoming IT Auditors
  • Chief Audit Executives
  • Audit Managers
  • IT Audit Consultants,
  • Senior Consultants and Managers 
  • Risk & Audit Committee Members
  • Corporate Services Managers
  • IT Professionals
  • IT Assurance, Risk, Security and Governance Professionals

Compressed Program Outline (Kindly contact us for a detailed outline)

IT Audit Planning
IT auditing Field Work
Using COBIT®5 to Perform Risk-Based IT Audit
Business Centric Approach to Auditing IT General Control
Auditing Application (Automated Business Processes and Transactions) Controls

Auditing IT Project
Logical access controls
Change management
Network perimeter security
Application controls

Disaster recovery and business continuity

Also available for 2 to 3 day durations as well as 10 to 30-day training durations In-House and Live online

Reach us today via email, ​WhatsApp, our website Chat system below or ​Simply leave us a Message on the Chat system and we'll get back to you

Apply here