Featured courses

This course provides an intensive review of the subject matter tested on the Project Management Institute’s (PMI) Project Management Professional (PMP) examination from the nine knowledge areas and five process groups covered in A Guide to the Project Man
View course details
This course offers a job-related approach to the security process, while providing a framework to prepare for the CISSP certification, which is the premier gold standard certification for information systems security professionals.
View course details
This course prepares practitioners for the Cisco Certified Network Associate (CCNA 200-301) certification, building on existing user-level knowledge and experience with computing and networking for an entry level Network Administrator.
View course details
This course prepares practitioners for the Cisco Certified Network Associate (CCNA 200-301) certification, building on existing user-level knowledge and experience with computing and networking for an entry level Network Administrator.
View course details
This course will build on the student's existing user-level knowledge and experience with personal computer (PC) hardware to present fundamental skills and concepts that are used on the job.
View course details
This course is designed for individuals who have basic computer user skills and who are interested in obtaining the CompTIA A+ Certification to be eligible for a job as an entry-level IT technician.
View course details
This course covers how to troubleshoot, configure, and manage common network devices to master the fundamental skills and concepts for the CompTIA Network+ 007 Certification exam for any type of networking career.
View course details
This course builds knowledge on security fundamentals, networks, and organizational security while preparing you for the CompTIA Security+ SYO-601 Certification exam to be successful in any Information Security career.
View course details
This course teaches how to scan, test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems while preparing students for the CEH Certification.
View course details
This course gives students hands-on ability to act in real-life situations involving network defense while preparing for the EC-Council Certified Network Defender E|CND Certification leading to a successful career as a junior level network security admin.
View course details
This course gives students hands-on ability to act in real-life situations involving network defense while preparing for the EC-Council Certified Network Defender E|CND Certification leading to a successful career as a junior level network security admin.
View course details
ITIL® course covers the foundational knowledge and skills for adopting and adapting best practices for IT service management (ITSM) in your organization.
View course details
This course covers Agile and Scrum methodologies, expectations, business models, and focuses on what auditors and developers must review and manage to facilitate rapid application systems development and project success.
View course details
This course reviews audit planning best practices so the work focuses on the right areas, like how to develop a business-focused, objective-based plan that will zero in on business issues and maximize the value of expended audit resources.
View course details

An IT auditor with the skills, knowledge and competencies to help organizations navigate through the complex environment of IT risks has never been in higher demand.  Every organization in every industry has become aware of the importance of proactively identifying then evaluating and monitoring IT risks.  This course is designed to help reinforce and enhance the principles of assessing IT risks.  The leaner will emerge with the ability to incorporate and implement the elements of risk assessment and audit planning; identify and apply pertinent audit and security resources; utilize tools of evaluating logical security; evaluate risks within database management systems; monitor risks within change management; test network perimeter security and cloud computing; evaluate threats within the internet of things; add value in the IT auditor’s organization regarding business continuity and disaster recovery planning and IT governance.  The learner will also emerge with increased skills regarding effective communication and presentation of the results of the IT audit to various levels of leadership within the organization.  The learner will be engaged through case studies of real-life examples and scenarios.  The learner will emerge with a wealth of resources, templates and guides which can be adapted to and incorporated into any industry.  The course is designed for an IT auditor who has perhaps been in the field for 1-2 years and is looking to increase his/her skills and competencies to move into a more seasoned position of leadership in IT auditing.

View course details

This course provides audit practitioners a comprehensive understanding of the types of fraud affecting organizations and shows proven techniques for preventing and detecting fraud.  

View course details
This course covers different types of process automation, considerations before implementation, and how to assess them. It includes functional specific tools, robotic and cognitive automation tools, governance and understanding workflows.
View course details
In this course students learn audit leadership and management tools that will enhance their role as a leader, improve the performance of the audit team, and boost its profile in the organization.
View course details
This is a review the short and long-term security and control challenges, and a discussion of the strategic considerations to address key risk areas since COVID-19 has altered the information security environment.
View course details
Managers must understand, deploy, and sustain innovation as a key characteristic of their departments. This course shows how to embed innovation and agility in your department’s methodology and its administration.
View course details
This course explores how innovation can enhance the planning and execution of audits to enhance and protect value. You will learn how to be more creative in the planning, fieldwork, and reporting stages of internal audits.
View course details
More and more today, companies are deciding to undertake the journey to employ Development Security Operations (DevSecOps) as an evolutionary extension of the Agile principles. Change management processes are continuous and largely automated in a DevSecOps environment, which can be challenging for Internal Audit teams, as they must shift their mindsets about IT risks and the controls in place to mitigate them.
DevSecOps is a software development and delivery approach that emphasizes communication and collaboration between development, security, and IT operations, building on Agile and Lean thinking to provide technology faster, with greater stability, quality, scalability, and security. DevSecOps encompasses many teams involved in the software development and delivery process. The “Dev” side incorporates developers, front-end designers, and quality assurance. The “Ops” area brings in system administrators and support teams responsible for the product after it’s been moved to production. The “Sec” area covers all the cybersecurity professionals responsible for system control, compliance, and secure applications.
In a DevSecOps centric organization, tools are used to automate historically manual tasks, such as code quality checks, execution of test scripts, and deployments. These factors raise some questions about the efficacy of traditional change management controls in the environment, especially Separation of Duties (SoD).
Automation does not have to mean that humans are left out of the process. Manual decisions still need to be made to tell the automated tools how to perform. These human-centric aspects of the process should also be considered in the risk-management approach.
All these challenges and more need to be identified, discussed, and put into perspective as organizations seek to make the transition towards a DevSecOps methodology. The benefits can be numerous, but the risks are plentiful, and the decisions your customers make are the difference between successful implementation and failure.                                                                                    In this course, we will delve into the DevSecOps methodology, assessing how and where auditors can find their footing. We will cover best practices that need to be on the forefront of business leaders’ minds as a DevSecOps culture is adopted, identifying key shifts in mindset that must occur for a seamless transition from manual transactions to automated process flows. Finally, with a forward-thinking approach, we will address how organizational teams can work together in a DevSecOps environment, prioritizing tools and resources that will facilitate meaningful collaboration.
View course details
This course provides practical guidance on risk-based auditing. It teaches participants how to identify and prioritize the risks, and assess the efficiency, effectiveness and economics of both core and non-core business processes.
View course details
This course focuses on the three ‘E’s of performance auditing - economy, efficiency and effectiveness of programs, projects, and processes. It equips students by providing ways to assess these themes within organizations.
View course details