The information security management audit/assurance review will: • Provide management with an assessment of the effectiveness of the information security management function • Evaluate the scope […]
The litigation process is increasingly becoming a multidisciplinary process as lawyers depend on experts in various fields to develop, characterize and present legal evidence in court. […]
This course is designed to help auditors perform effective audit of computer networks to detect vulnerabilities and network attacks. It takes you from basic computer network […]
The course is intended for those who have audit responsibilities that include a Unix operating system environment. It explains the Unix operating system security reliability to […]
This course introduces information technology (IT) professional to the UNIX operating system. They will learn to use both UNIX shell commands and on disk utilities to […]
Control and audit monitoring are important to the security of the Oracle database. Many computer incidents and frauds in the database occur because the database management […]
This course is designed as a foundation course that will teach participants basic relational database management system concepts in Oracle environment. This will help participants understand […]
The widespread use of information technology (IT) in organizations today mean that every auditor must understand IT audit process to some extent. It is impossible to […]
Course Objective: This course is designed to help bank executives and officers understand the remote root causes of revenue leakages that erode profitability, and to show […]