OUTLINE FOR IT AUDIT
 Develop and implement a risk-based IT audit strategy
 Plan specific audits to ensure that the IT audit strategy and objectives are achieved.
 How to obtain sufficient, reliable, relevant, and useful evidence to achieve the audit objectives.
 Analyze information gathered to identify reportable conditions and reach conclusions.
 Review the work performed by others to provide reasonable assurance that objectives have been achieved.
 Communicate audit results to key stakeholders.
OUTLINE FOR ORACLE APPLICATION SECURITY & CONTROLS
 Oracle basic security concepts – functional security, Data security, Role based Access controls (RBAC)
 Oracle application interface and navigation
 Oracle Background, capabilities, and offerings
 Common Oracle application modules
 Oracle organizational concept and model
 Master data concepts and audit considerations
 General Computer Controls vs. Application Common Controls
 Specific controls/audit for General ledger, Payables, Purchasing, Receivables, Assets, Order Entry and Inventory modules
 Data conversion and interface concepts
OUTLINE FOR ORACLE EBUSINESS SUITE (FINANCIALS)
 Hands on step by step learning process with real life examples
 Learn how to gather clients’ requirement and perform FIT/GAP analysis
 Understand different business processes & associated risks
 Implementation consideration for Multi-org implementation
 Learn different modules and develop expertise in your chosen area
OUTLINE FOR ORACLE GOVERNANCE RISK & COMPLIANCE (GRC)
 Modules covered include:
 Application access controls governor (AACG)
 Transaction controls governor (TCG)
 Preventive controls governor (PCG)
 Configuration controls governor (CCG)
 Learn the concept of Segregation of duties
 Learn the Drivers and implementation considerations for GRC
 Learn how to Complete Administrative Tasks in all GRC covered modules
 Learn how to Manage (Plan, scope, budget, resource) and deploy GRC
OUTLINE FOR NETWORK DESIGN & IMPLEMENTATION
 Learn OSI Model
 TCP/IP addressing & communications
 Working with cisco switches, routers & servers etc
 IP sub-netting and static routing
 Network security – telnet, SSH, CDP, file management
 LAN, WAN – wired/wireless security and implementation
 VLAN, VLSM, VPN technologies and Spanning tree protocol