Featured courses

This courses provides the fundamentals, covers the data analytic phases of importing data, preparing data, analyzing data and reporting results. It also covers basic scripting showing how to automate analytic routines with ACL Analytics.
View course details
This course covers ways to audit strategic risks, incorporate data analytics and continuous auditing to root cause and trend analysis, approaches to enhance the audit plan and ways of auditing projects and other strategic initiatives.
View course details
This course focuses on how in-charge auditors lead audits. You will review audit program development and changes, risk assessments, setting priorities, delegation, managing staff performance, reviewing workpapers and stakeholder management.
View course details
This course focuses on key building blocks of modern IT audit, physical and logical security, including identity and access management, the threats to web-based e-commerce, best practices and standards for auditing servers.
View course details
This course provides students and in-depth understanding of SAP Basis, SAP S/4HANA, and security assessment techniques to perform a detailed technical audit and review of SAP GRC.
View course details
The webinar provides tools and techniques to help students improve their processes and deliverables, improve planning, recording, improving project dynamics, and applying lessons learned
View course details
This webinar provides the key ethical considerations, models impacting this field, important technological implications, and a roadmap to conduct a review of an organization’s corporate culture and ethics infrastructure.
View course details
This webinar covers key indicators and actions that characterize a mature risk program, how to assess the organization’s operational risk maturity level, and action plans to move the organization higher in a maturity scale
View course details
This course goes beyond the typical discussions about ethics, and covers the implications of technology on governance, institutional change, digital transformation, cybersecurity, automation and digitalization on organizations.
View course details
This course covers continuous development, testing, deployment, monitoring, feedback, vulnerability scanning and auditing of DevOps. This is a continuous process, so the focus is on where to find the risks in a dynamic environment.
View course details
This course covers the common architecture of cloud computing and examines the security and controls of SaaS, PaaS, and IaaS. It also covers the deficiencies that exist in cloud-based services and how Security-as-a-Service can be helpful.
View course details
This course covers the risks inherent in the SAP application and review some of the most effective controls that can be configured into the application. It covers the critical business processes that ensure that SAP is working as intended
View course details
This webinar covers security breaches to extract lessons learned and help develop an audit strategy. It is designed to help audit management meet today’s challenges and establish a strategic response to cybersecurity risks
View course details
This course covers Agile and Scrum methodologies, expectations, business models, and focuses on what auditors and developers must review and manage to facilitate rapid application systems development and project success.
View course details
This course provides a top-down, risk-based approach to assess key risks and controls in each stage of the application processing cycle, how to audit efficiently and effectively, and what testing techniques should be used.
View course details
This webinar offers answers to the many questions asked about moving to, and working in, the cloud. It follows an easy-to-understand format and includes several Top 10 lists that explain and clarify the cloud, the cloud risks, and cloud solutions.
View course details
Recent corporate disasters have highlighted the importance of establishing and maintaining a strong ethical culture. This classes covers how internal audit can review this difficult topic and assess reputational risks.
View course details
This course focuses on strategy, governance, risk management and other boardroom processes that have been "no-go" areas for internal audit. It also covers how to make the case for involvement and ways to become a catalyst for improvement.
View course details
This course covers application risks and controls for the most commonly implemented applications. It includes application security, IT general controls, and dozens of SQL queries often used in assessments.
View course details
This course examines Oracle’s cloud application, its core elements, technical architecture, security model, role design, generic users patching, change management, profile options, controls monitoring and reporting, and workflow issues.
View course details
This course covers traditional and alternative ERM methods, structures and tools for establishing a risk management program. You will learn about the essential ingredients and why they are critical, and how an oversight tool should work.
View course details
This course focuses on the challenges facing organizations and the assurance procedures to assess the effectiveness of controls that protect your digital presence and the related marketing activities.
View course details
This webinar covers key security related considerations that should be written into Service Level Agreements and Memorandums of Understanding. You will learn how to build security into contractual agreements and how to ensure effectiveness.
View course details
A benchmarking and networking course for audit directors and senior managers. It covers managing expectations and relationships, and auditing emerging risks and non-traditional topics like culture, ethics, governance and strategy.
View course details