OUTLINE FOR IT AUDIT
Develop and implement a risk-based IT audit strategy
Plan specific audits to ensure that the IT audit strategy and objectives are achieved.
How to obtain sufficient, reliable, relevant, and useful evidence to achieve the audit objectives.
Analyze information gathered to identify reportable conditions and reach conclusions.
Review the work performed by others to provide reasonable assurance that objectives have been achieved.
Communicate audit results to key stakeholders.
OUTLINE FOR ORACLE APPLICATION SECURITY & CONTROLS
Oracle basic security concepts – functional security, Data security, Role based Access controls (RBAC)
Oracle application interface and navigation
Oracle Background, capabilities, and offerings
Common Oracle application modules
Oracle organizational concept and model
Master data concepts and audit considerations
General Computer Controls vs. Application Common Controls
Specific controls/audit for General ledger, Payables, Purchasing, Receivables, Assets, Order Entry and Inventory modules
Data conversion and interface concepts
OUTLINE FOR ORACLE EBUSINESS SUITE (FINANCIALS)
Hands on step by step learning process with real life examples
Learn how to gather clients’ requirement and perform FIT/GAP analysis
Understand different business processes & associated risks
Implementation consideration for Multi-org implementation
Learn different modules and develop expertise in your chosen area
OUTLINE FOR ORACLE GOVERNANCE RISK & COMPLIANCE (GRC)
Modules covered include:
Application access controls governor (AACG)
Transaction controls governor (TCG)
Preventive controls governor (PCG)
Configuration controls governor (CCG)
Learn the concept of Segregation of duties
Learn the Drivers and implementation considerations for GRC
Learn how to Complete Administrative Tasks in all GRC covered modules
Learn how to Manage (Plan, scope, budget, resource) and deploy GRC
OUTLINE FOR NETWORK DESIGN & IMPLEMENTATION
Learn OSI Model
TCP/IP addressing & communications
Working with cisco switches, routers & servers etc
IP sub-netting and static routing
Network security – telnet, SSH, CDP, file management
LAN, WAN – wired/wireless security and implementation
VLAN, VLSM, VPN technologies and Spanning tree protocol