IT Auditing and the Internal Auditor

Course Overview

• Understanding of IT infrastructure and application terminology, architecture, operation, risks, and controls
• Learn fundamental IT audit “tools of the trade” and how to apply them in a variety of IT and integrated audit project
• Familiarization with the IT Audit process and associated best practices
• Provide foundation knowledge relevant to IT Audit professional certification

Training Format:In-class, Virtual, In-house

Location:Lagos, Accra, Nairobi, Kigali

Language:English, French

Nigeria Price:
₦300000

Int'l., (Nigeria) Price:
$1000

Ghana Price:
$4000

Kenya Price:
$5500

Rwanda Price:
$6000

Nigeria Price:₦300000

Int'l., (Nigeria) Price:
$1000

Ghana Price:
$4000

Kenya Price:
$4000

Rwanda Price:
$4000

Nigeria Price: ₦300000

Int'l., (Nigeria) Price:
$1000

Ghana Price: $4000

Kenya Price: $4000

Rwanda Price: $4000

Explaining the IT Audit Process
• IT Audit Objectives
• Role of the IT Auditor
• IT Audit Projects

IT Audit and Information Security Standards
• ISACA: COBIT, Risk IT, Val IT
• AICPA/CCPA
• Information Technology Infrastructure Library (ITIL)
• OECD, ISO, and other international standards

Dealing with IT Risks
• Materiality and effects on financial reporting
• Identifying high-risk applications and IT components
• Tools and techniques for assessing and measuring risk

Tools and Techniques for the IT Auditor
• Work programs and checklists
• Maturity models
• Flowcharting
• Audit software

Understanding and Auditing IT Governance and Infrastructure: General Controls Reviews
• IT Governance and Management
• Separation of Duties, Least Privilege, and other Organziational Controls
• Incident Response: Disaster Recovery, Computer Crime, and other Breaches of Security
• Physical and Environmental Security
• Hardware and Software Asset Management
• Configuration Management, Change Control, and Problem Reporting
• System Software Security and Patch Management
• Software Development Tools and Library Management
• Network Infrastructure Security: Internal, External
• Information Security
• Identity and Access Control Management
• Cryptography and Public Key Infrastructure (PKI)
• Cloud Computing and Other Outsourcing

Getting Your Arms Around IT Application Audits
• Understanding, Scoping, and Documenting an Application
• Reliance on General Controls
• IT Computing Process Models Up Close: Operational, Risk, and Control Considerations
o Batch processing
o Distributed client/server
o Web-based
o Mobile computing
• Service oriented architecture (SOA)
• Cloud computing

System Development Life Cycle (SDLC)
• SDLC process models: internally developed, off-the-shelf
• Defining IT Audit, Information Security, and other control agency role(s) in SDLC
• On-going application change management

Key Application Processes, Risks, and Controls
• Batch data input: collection, authorization, entry
• Web-based and other types of real-time data input
• Transaction authentication, authorization, and logging
• Data editing and input validation
• Processing and interfaces to other applications
• Outputs
• Data Management and Protection

Audit Data Collection and Testing
• Application testing tools and techniques
• Sampling
• Working in support of an integrated or operational audit team

FOR WHOM:
IT auditors and other Internal auditors.

1ST BATCH: Tuesday, February 17, 2026 — Friday, February 20, 2026.

2ND BATCH: Tuesday, June 9, 2026 — Friday, June 12, 2026.

3RD BATCH: Tuesday, October 6, 2026 — Friday, October 9, 2026.

The training methodology integrates lectures, interactive discussions, collaborative group exercises, and
illustrative examples. Participants will acquire a blend of theoretical insights and hands-on practical
experience, emphasizing the application of learned techniques. This approach ensures that attendees return
to their professional environments equipped with both the competence and self-assurance to effectively
implement the acquired skills in their responsibilities.

Facebook
WhatsApp
X
Threads
Telegram
Print