Information Systems Audit Fundamentals

Learn computer auditing in a practical, easy and fast way. From the basic level.

Last updated 2022-01-10 | 4

- In a very short time you will have an overview of what is systems auditing.
- You will learn the basic concepts
- functions
- objectives
- stages and types of computer audits.
- They will be able to evaluate internal controls and recommend changes based on best practices.

What you'll learn

In a very short time you will have an overview of what is systems auditing.
You will learn the basic concepts
functions
objectives
stages and types of computer audits.
They will be able to evaluate internal controls and recommend changes based on best practices.

* Requirements

* You only need to have basic computer skills.

Description

In this course I am going to show you how fun, easy and fast it can be to learn Systems Auditing. The classes are designed in a dynamic and practical way, made up of short videos with precise information and illustrated examples, based on the 5 domains of the CISA Certification Preparation Manual, so it will be an excellent guide if you decide to embark on the path to certification. international in systems auditing.


At the end you will know:

- Conduct regular audits

- How the audit department is managed

- What are the steps to plan and conduct an audit

- What is the operation of IT governance.

- Audit system operations and maintenance

- Types and forms of cybercrime and attack methods.


The systems audit is responsible for collecting, grouping and evaluating evidence to determine whether computer systems safeguard assets and maintain data integrity, through the effective use of the organization's resources. The systems audit seeks the availability, integrity, veracity and privacy of the information through validation techniques and recommendations based on best practices and international standards.


This function can operate internally or externally to the company. The internal audit is carried out by an internal agent of the company whose function is to carry out a professional, objective and critical analysis as a result of the evaluation of internal controls and the faithful fulfillment of plans in order to improve the operations of the company. In turn, the external audit is carried out by independent personnel who carry out revision work in different management areas of the company, to determine the efficiency they have in the development of their functions.

Who this course is for:

  • If you have basic computer skills, this course is for you.

Course content

4 sections • 45 lectures

Introduction Preview 00:42

Definition Preview 01:17

Management of the IT Audit Function Preview 00:53

Systems Audit Standards Preview 01:34

Types of Audits Preview 01:36

Planning the Audit Preview 01:23

Steps to plan an audit Preview 01:29

Carrying out an IS audit Preview 01:17

Steps to understand the business Preview 00:57

Internal controls Preview 00:50

Risks Preview 01:34

Risks evaluation Preview 02:09

Evidence Preview 00:35

Evidence gathering techniques Preview 01:02

Sampling Preview 00:48

Communication of results Preview 00:56

Introduction Preview 00:38

Corporate governance Preview 00:35

IT governance Preview 01:45

Politics and procedures Preview 01:12

Information Security Policies Preview 01:09

Information Security Policy Documentation Preview 01:36

Auditing the Information Security Policy Preview 00:41

Procedures Preview 00:30

Human resources management Preview 01:19

Segregation of Duties in the IT Department Preview 02:48

Segregation of Duties Controls Preview 01:34

Business Continuity Plans (BCP) Preview 01:20

Disasters and events that can cause disruptions Preview 00:44

Business Impact Analysis (BIA) Preview 00:55

Introduction Preview 02:18

Security controls Preview 02:13

Encryption Preview 00:45

Hardware Maintenance Program Preview 00:56

Systems Operations and Maintenance Audit Preview 01:51

Systems Operations and Maintenance Audit part.2 Preview 01:28

Systems Operations and Maintenance Audit part.3 Preview 01:31

Systems Operations and Maintenance Audit part.4 Preview 02:19

Disaster Recovery Plan (DRP) Preview 01:47

Recovery Alternatives Preview 02:23

Introduction Preview 01:24

Information Security Management System (ISMS) Preview 01:38

Computer Crimes Preview 02:21

Common attack methods Preview 02:08

Assessment of minimum security levels Preview 00:55