BASIC DATAS : To be a person in charge of control organs and to master the computer tool, a specialist in the field of security (Police, Military, etc.), a person in charge of the information system, a lawyer or partner, an internal or external auditor.
TARGET AUDIENCE :
Anyone already initiated or not to master the business risk in an information system, to audit or accompany the audit of the IS, to carry out the controls in an IS, to write the audit reports of the IS.
LEADERS :
NDJE Yves, Teacher-Researcher, University of Douala;
° Membre du Laboratoire XLIM UMR 6172, Université de Limoges
Pr.KALLA :
- Professor at the Catholic University of Central Africa, Head of the Master of Information Systems Management
Christelle BIBEE :Master in Management Information Systems; consultant at ITS
TCHATCHOU Christelle. Master in Management Information Systems; consultant at ITS
METHODOLOGY
Active pedagogy, individualized responses to participants' needs, theoretical presentations, methodological contributions and numerous practical work.
Each participant is invited to present their needs in Audit of information systems
Place : Yaoundé
Period: 16 April 2013
Duration: 1 day (8AM to 6PM)
Couts: 150.000 Fcfa (Rates including teaching fees and fees de documentation)
OBJECTIVES - MAKING PARTICIPANTS A :
Understand the objectives of the IT audit
Understand the conduct of a computer audit mission;
Understand the audit of the security function;
Know the tools of computer auditing
Understand the objectives of the CobiT Repository, Master risk management.
EXPECTED RESULTS - PARTICIPANTS MASTER :
The process of the computer audit;
The specificities of the project audit;
Data analysis;
The "best practices" of CobiT and their implementation;
Writing an IT audit report;
The ethical code of the profession of auditor.
GUEST:
– Dr BELL B G, PhD - Director General of ITS - Member of ISACA and expert in security and protection of information systems
PROGRAMS A DEROULEMENT DE LA FORMATION:
1st Part: IT Audit: Introduction
- Reasons to be computer audit
- Fields of application of the IT audit
- Computer Audit Methodologies
2nd Party: Audit and Security
- Risk Assessment
- Audit and security functions
- Professional standards of the computer auditor
3nd Part: CobiT Tools and Repository
- IT audit tools
- Process and steps of the CobiT
- Audit reports