Featured courses

This course provides an intensive review of the subject matter tested on the Project Management Institute’s (PMI) Project Management Professional (PMP) examination from the nine knowledge areas and five process groups covered in A Guide to the Project Man
View course details
This course offers a job-related approach to the security process, while providing a framework to prepare for the CISSP certification, which is the premier gold standard certification for information systems security professionals.
View course details
This course prepares practitioners for the Cisco Certified Network Associate (CCNA 200-301) certification, building on existing user-level knowledge and experience with computing and networking for an entry level Network Administrator.
View course details
This course prepares practitioners for the Cisco Certified Network Associate (CCNA 200-301) certification, building on existing user-level knowledge and experience with computing and networking for an entry level Network Administrator.
View course details
This course will build on the student's existing user-level knowledge and experience with personal computer (PC) hardware to present fundamental skills and concepts that are used on the job.
View course details
This course is designed for individuals who have basic computer user skills and who are interested in obtaining the CompTIA A+ Certification to be eligible for a job as an entry-level IT technician.
View course details
This course covers how to troubleshoot, configure, and manage common network devices to master the fundamental skills and concepts for the CompTIA Network+ 007 Certification exam for any type of networking career.
View course details
This course builds knowledge on security fundamentals, networks, and organizational security while preparing you for the CompTIA Security+ SYO-601 Certification exam to be successful in any Information Security career.
View course details
This course teaches how to scan, test, hack and secure your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current essential security systems while preparing students for the CEH Certification.
View course details
This course gives students hands-on ability to act in real-life situations involving network defense while preparing for the EC-Council Certified Network Defender E|CND Certification leading to a successful career as a junior level network security admin.
View course details

ITIL® is the world's leading best practice framework for implementing IT service management. Organizations use ITIL to plan, implement, support, and improve services and create value for their customers. This course covers the foundational knowledge and skills for adopting and adapting best practices for IT service management (ITSM) in your organization. This course includes a voucher to take the ITIL exam. ITIL® is a registered trademark of AXELOS Limited, used under permission of AXELOS Limited.  All rights reserved.

View course details
This courses provides the fundamentals, covers the data analytic phases of importing data, preparing data, analyzing data and reporting results. It also covers basic scripting showing how to automate analytic routines with ACL Analytics.
View course details
This course focuses on key building blocks of modern IT audit, physical and logical security, including identity and access management, the threats to web-based e-commerce, best practices and standards for auditing servers.
View course details
This course covers continuous development, testing, deployment, monitoring, feedback, vulnerability scanning and auditing of DevOps. This is a continuous process, so the focus is on where to find the risks in a dynamic environment.
View course details
This course covers the common architecture of cloud computing and examines the security and controls of SaaS, PaaS, and IaaS. It also covers the deficiencies that exist in cloud-based services and how Security-as-a-Service can be helpful.
View course details
This course covers Agile and Scrum methodologies, expectations, business models, and focuses on what auditors and developers must review and manage to facilitate rapid application systems development and project success.
View course details
This course looks systematically at how to best implement controls within asset management to drive down risk, and considers the approach that internal auditors should adopt when conducting such an assignment.
View course details
This course focuses on how in-charge auditors lead audits. You will review audit program development and changes, risk assessments, setting priorities, delegation, managing staff performance, reviewing workpapers and stakeholder management.
View course details

This course will start with an overview of the Enterprise Risk Management process and all the underlying elements of Enterprise Risk Management, including a discussion on risk appetite, governance, and roles & responsibilities. The course will provide more details into the attributes that make an Enterprise Risk Management process effective, such as addressing black swans, using risk-driven metrics, and linking Enterprise Risk Management with the organization’s strategy. Most of the course will involve methods for auditing the Enterprise Risk Management process by assessing the Enterprise Risk Management process according to the COSO framework, comprising five components and twenty principles.   


The five components include: 1) Governance & Culture, 2) Strategy & Objective Setting, 3) Performance, and 4) Review & Revision. The objective of the assessment procedures is to determine if the organization’s ERM process exhibits these twenty principles.  


There will also be a discussion to address another risk management framework, ISO 31000. A summary of key highlights of ISO 31000 will be covered; we will also compare the commonalities and differences between the ISO risk management framework and the COSO risk management framework. 


The course will end with a discussion on Enterprise Risk Management reporting to various stakeholders.  


The course will be delivered with practical application of concepts using actual examples, case studies, and exercises. 

View course details
This course provides the key skills required to conduct reviews of retail and corporate banking, private banking, and similar financial institutions. It focuses on the design of suitable internal audit programs for such assignments.
View course details
This course provides a comprehensive review of the COBIT framework, and its IT governance, management, control, and audit elements. It covers how to use this framework to evaluate the effectiveness of IT activities.
View course details
Students explore cybersecurity scenarios designed to reinforce the knowledge of effective control design, execution, risk warning signs and investigative techniques. Students also learn how to implement and assess controls effectively.
View course details
This course covers new regulations, IT security threats and other challenges audit management should know about. It brings students up to date on a wide range of technologies so they can provide assurance that IT risks are being addressed.
View course details
This course covers the critical aspects of data mining that auditors should know, what data to use, how to incorporate data mining into audit methodology, how to assess critical business functions and essential analytical procedures
View course details