
Training Institute
a Wholly Owned Division of AuditNet®

IT Audit Webinar Training – via Practical Application
An information technology audit, or information systems audit, is an examination of the management controls within an Information technology (IT) infrastructure. The evaluation of obtained evidence determines if the information systems are safeguarding assets, maintaining data integrity, and operating effectively to achieve the organization's goals or objectives. These reviews may be performed in conjunction with a financial statement audit, internal audit, or other form of attestation engagement.
AuditNet® has joined forces with Richard Cascarino and Associates to bring you a structured learning curriculum for IT audit. The courses are designed to build on skills developed from prior knowledge or training. Auditors can choose between the complete series or pick and choose specific course depending on both needs as well as budgetary financial constraints.
About the Series
The IT Auditing Series is a 5 month series of 2-hour webinars.
The study program consists of 5 modules, spanning a broad range of
topics and issues in the OIT Auditing field. The emphasis in all
webinars is therefore on practical aspects, of Internal Auditing.
The course content is based upon ISACA Framework which has been
accepted world-wide as the basis of skills and competencies required for
all IT Auditors.
The webinars are presented by Richard E. Cascarino, MBA, CIA, CFE, CISA
Who should attend
The series is aimed primarily at auditors, both internal and external, who are beginning their career in Computer Auditing or who wish to understand the complexities and vulnerabilities of computer systems. The series builds rapidly to shorten the time period to productivity and effectiveness.
Webinar Leader

Richard Cascarino, CIA, CISM, CFE is a consultant and lecturer with over 28 years experience in IT Risk, Audit, Governance, Forensic, Internal and IT auditing education and author of the books Internal Auditing-an Integrated Approach and Auditor’s Guide to Information Systems Auditing and the forthcoming book Preventing Fraud – It Could Happen to You. He is also a contributing author to the Governance section of Finance: The Ultimate Resource and is a frequent speaker at IIA and ISACA courses and conferences.
He is a Past President of the IIA – South Africa and founded the African Region of the IIA Inc.
Richard is a computer and audit professional with over 35 years’
experience in designing, implementing, managing and auditing complex
computer systems. In addition he has conducted extensive operational
audits in a variety of business environments throughout the world.
Richard is the Principal of Richard Cascarino & Associates and, in
addition to being a regular speaker to National and International
conferences, he has presented this series of courses throughout Africa,
Europe, the Middle East and the USA. Richard is a Past President of the
Institute of Internal Auditors in South Africa, was the founding
Regional Director of the Southern African Region of the IIA-Inc and is a
member of both the ISACA and the Association of Certified Fraud
Examiners. He is also the author of “Internal Auditing – an Integrated
Approach” and “Auditor’s Guide to IT Auditing”.
Cost $79 (2.0 CPE) each or the complete series of 5 for $300 (10.0 CPE)
1. Fundamentals of IT Auditing February 14, 2012
The webinar covers basic concepts of computing, primary types of
computer systems, the risks and controls and audit usage of computers.
You will gain the confidence of understanding the jargon and knowing
that questions you put to clients are addressing the real issues. The
attendee will also realize the difference between jargon answers and
evasive answers.
On using the knowledge you have gained, you will discover a greater level of acceptance by Information Technology staff and users due to your increased comprehension. This can be immediately translated into more effective and efficient audits and a greater contribution to the organization.
By the end of this webinar the attendee will be able to:
- Understand the jargon of the computer world
- Differentiate between types of systems and their major risk elements
- Understand how computer systems are constructed and how this can influence the eventual running in the business environment
- Utilize this knowledge to gain a greater acceptance by computer-literate auditees
- Identify the role of the IS audit specialist
- Identify potential areas for the audit use of computerized technology
Date: February 14, 2012
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded
based on a 50-minute hour.
Program Level / Prerequisites and
Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based
Recommended Category: Specialized Knowledge and Applications
Cost:
$79
Webinar Contents
This two-hour webinar is designed to provide the participants with an in-depth knowledge and experience of:
- Technology and audit
- Control objectives and risks
- Batch and on-line systems
- Programming computers
- Database systems
- Computer risks and exposures
- Computer security
- Application systems and their development
- Computer operations controls
2. Auditing Database Structures March 13, 2012
Today's IT auditor is increasingly being faced with a multiplicity of database management systems (DBMSs). Since each of these affects not only the control concerns of the IT systems due to the concentration of risk, but also the control and audit opportunities due to the increased control and audit tools, it has become critical that auditors understand their role and criticality.
This two-hour webinar is designed as an intermediate course to introduce auditors to the risks and exposures specific to a business operating in a Database Environment and indicates the unique control opportunities as well as the wide range of audit tools available.
By the end of this webinar the attendee will be able to:
Identify the differing types of database structures, their principal components, and the threats to them
Relate DBMS components to the operating system environment in which they operate
Identify potential control opportunities and select among control alternatives
Recognize vulnerabilities in multiple DBMS environments and make appropriate recommendations
Select the appropriate audit tool and technique to meet a given audit objective
Webinar content
The webinar will cover the following areas:
-
Database types
-
Sequential
-
Hierarchical
-
Network
-
Inverted File Structures
-
Relational Models
-
Control opportunities in a database environment
-
Database tools and techniques
-
Auditing IMS; IDMS; ADABAS; DB2; DATACOM; Oracle;Access
Date: March 13, 2012
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded
based on a 50-minute hour.
Program Level / Prerequisites and
Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based
Recommended Category: Specialized Knowledge and Applications
Cost:
$79
3. Audit use of CAATs April 16, 2012
In order to audit in today's complicated, computerized environment, the auditor must frequently utilize computer technology himself. This may take the form of auditing the computer applications themselves, utilizing computerized techniques to obtain information about non-computerized business areas and extracting and manipulating data from computerized systems. As such it becomes imperative that auditors be familiar with the types of computerized audit tools and techniques available, their advantages and disadvantages and be comfortable with their use.
This two-hour webinar is designed to give specialist IT auditors practical experience in both the selection of an appropriate CAAT as well as experience in running CAATs and interpreting results.
By the end of this webinar attendees will have an in-depth knowledge of:
-
The nature and usage of CAATS
-
Methods for determining the appropriate CAAT
-
Usage of differing types of CAAT
-
Interpretation of results
-
Verification of CAAT results
Webinar Content
The Webinar will cover the following areas:
-
System testing techniques
-
Computerized application systems
-
Non-computerized systems
-
CAAT types
-
Source code review
-
Use of Test Data
-
Parallel Simulation
-
Integrated Test Facilities
-
Snapshot Techniques
-
SCARF
-
Retrieval Software
-
Generalized Audit Software
-
Specialized Audit Software
-
Utility Software
-
ACL
-
IDEA
Date: April 16, 2012
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded
based on a 50-minute hour.
Program Level / Prerequisites and
Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based
Recommended Category: Specialized Knowledge and Applications
Cost:
$79
4. Auditing Contingency Planning June 26, 2012
Business has become increasingly dependent on computers to survive on a day-to-day basis. If these systems become unavailable for a significant period or if the integrity of the data they process is prejudiced, the very survival of the organizations which depend on them may be at serious risk. No busy manager likes to spend time contemplating the worst which could befall the company and anyway, disasters happen infrequently and always to someone else.
This two-hour webinar puts Computer Disaster Recover Planning firmly in its place as part of the Corporate Survival Program and highlights the auditor's role in ensuring the viability of the corporate Contingency Plan.
Webinar Objectives
The objectives of the webinar are to provide attendees with the tools and techniques needed in their own environments to:
-
Assess the corporate risks
-
Identify their audit strategies
-
Establish their priorities
-
Develop their Audit Plan
-
Evaluate and test their Corporate Disaster Recovery Plan
Webinar Content
The Webinar will cover the following areas:
-
What is a Disaster?
-
What is a Disaster Recovery Plan?
-
Who is Accountable?
-
What are the Options?
-
What is the cost?
-
How can a C.P. be tested?
-
What is Management's Role?
-
What is the User's Role?
-
What is the Information Services Role?
-
What is the Internal Auditor's Role?
Date: June 26, 2012
CPE: 2 Credits are available for attending the seminar which are awarded
based on a 50-minute hour.
Program Level / Prerequisites and
Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based
Recommended Category: Specialized Knowledge and Applications
Cost:
$79
5. IT Fraud and Countermeasures July 5, 2012
IT fraud is presently a major growth area within our corporations. This two-hour webinar is designed to assist auditors and management in the design and implementation of an IT architecture which minimizes the possibilities of fraud and maximizes the probability of detecting fraud.
By the end of this webinar the attendee will be able to :
-
Distinguish between the varying types of computer fraud, their nature and effect
-
Identify likely fraud indicators
-
Audit for computer fraud
-
Establish a Corporate Risk Profile
-
Structure an anti-fraud security environment
-
Distinguish between fraud and forensic auditing
-
Identify the requirements to ensure that audit evidence is acceptable as legal evidence
-
Identify the requirement and effect of reporting sensitive issues
Webinar Content
The webinar will cover the following areas:
-
The nature of computer fraud
-
The Corporate risk profile
-
Computer fraud techniques
-
Why computer fraud and who commits it?
-
Fraud auditing
-
Fraud awareness
-
EDI and fraud
-
The expectation gap
-
Forensic auditing
-
Sources of evidence and audit tools
-
Legal evidence
-
Reporting sensitive issues
Date: July 5, 2012
Time: 1:00 PM- 3:00 PM (Eastern, GMT -0500)
CPE: 2 Credits are available for attending the seminar which are awarded
based on a 50-minute hour.
Program Level / Prerequisites and
Advance Preparation: Basic / None
Basic Delivery Method: Group Internet Based
Recommended Category: Specialized Knowledge and Applications
Cost:
$79
AuditNet LLC is registered with the National Association of State Boards
of Accountancy (NASBA) as a sponsor of continuing professional education
on the National Registry of CPE Sponsors. State boards of accountancy
have final authority on the acceptance of individual courses for CPE
credit. Complaints regarding registered sponsors may be submitted to the
National Registry of CPE Sponsors through its website:
www.learningmarket.org.

