Web Seminars: IT Audit

BASIC DATAS : To be a person in charge of control organs and to master the computer tool, a specialist in the field of security (Police, Military, etc.), a person in charge of the information system, a lawyer or partner, an internal or external auditor.

 

TARGET AUDIENCE :

Anyone already initiated or not to master the business risk in an information system, to audit or accompany the audit of the IS, to carry out the controls in an IS, to write the audit reports of the IS.

 

LEADERS :

NDJE Yves, Teacher-Researcher, University of Douala;

° Membre du Laboratoire XLIM UMR 6172, Université de Limoges

Pr.KALLA :

- Professor at the Catholic University of Central Africa, Head of the Master of Information Systems Management

Christelle  BIBEE :Master in Management Information Systems; consultant at ITS

TCHATCHOU Christelle. Master in Management Information Systems; consultant at ITS

 

METHODOLOGY

Active pedagogy, individualized responses to participants' needs, theoretical presentations, methodological contributions and numerous practical work.

Each participant is invited to present their needs in Audit of information systems

 

Place :        Yaoundé

Period: 16 April 2013

Duration: 1 day (8AM to 6PM)

Couts: 150.000 Fcfa  (Rates including teaching fees and fees de documentation)

 

OBJECTIVES - MAKING PARTICIPANTS A :

Understand the objectives of the IT audit

Understand the conduct of a computer audit mission;

Understand the audit of the security function;

Know the tools of computer auditing

Understand the objectives of the CobiT Repository, Master risk management.

 

 EXPECTED RESULTS - PARTICIPANTS MASTER :

The process of the computer audit;

The specificities of the project audit;

Data analysis;

The "best practices" of CobiT and their implementation;

Writing an IT audit report;

The ethical code of the profession of auditor.

 

 GUEST:

 

– Dr BELL B G,  PhD - Director General of ITS - Member of ISACA and expert in security and protection of information systems

 

PROGRAMS A DEROULEMENT DE LA FORMATION:

 

   1st Part: IT Audit: Introduction  

 

- Reasons to be computer audit

- Fields of application of the IT audit

- Computer Audit Methodologies

 

   2nd Party: Audit and Security 

 

- Risk Assessment

- Audit and security functions

- Professional standards of the computer auditor

 

   3nd Part: CobiT Tools and Repository

 

- IT audit tools

- Process and steps of the CobiT

- Audit reports

More articles