PENGANTAR TRAINING IT SECURITY AUDIT
The IT Security Audit course is designed to provide practical view in conducting IT audit and assurance in one organization. The course is designed to support professional staffs to expand their understanding of information technology (IT) audit. The course presents a more in-depth view on the fundamentals of IT auditing by highlighting on topics such as: IT audit and control analysis, examination of control evidence in conducting IT audit, application control, Operating System and IT Infrastructure audit, and management of IT audit. The course will include discussion and exercises related to general control examinations and application system auditing. The course will also focus on control research and analysis for IT-related topic areas. In addition, through discussion and exercises, participants will gain a working understanding of the process of developing audit work programs encompassing all elements of IT infrastructures. Participants will be expected to gain a working understanding of how to identify, reference and implement IT management and control policies, standards and related auditing standards. Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in auditing process. IT Secuity Auditing covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates. Each class session will include discussion on an IT audit management, security, control or audit issues that participants should be familiar with.
TUJUAN TRAINING CYBERSECURITY ASSESSMENT
At the completion of this course, the participants should be able to :
? Participants shall obtain an expanded understanding on the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization, with the focus on IT infrastructures
? The partipants shall obtain the capabilityon how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, participants get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.
? Participants shall obtain the capability in conducting IT audit and implement techniques in performing assurance, attestation, and audit engagements
? Capability to build and maintain an IT audit function within the organization with maximum effectiveness and value
? Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
• Participants shall obtain the working ability to plan, conduct, and report on information technology audits with specific focus on infrastructure vulnarability assesment and assurance, and drill down upon application vulnarabilities
? Participants shall obtain an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards
? Capability to use best prractices and methodologies such as: COSO, CobiT, ITIL, ISO, and NSA INFOSEC
PESERTA TRAINING AUDIT PROCESS IN IT SECURITY OFFLINE JOGJA
? IT Managers
? Security Managers
? Auditing Staffs
? IT Operation Staffs.
MATERI TRAINING AUDIT PROCESS IN IT SECURITY
1. Audit Overview The class session will focus on IT audit concepts and processes, which includes: review of some of the key fundamentals of IT auditing, including general auditing standards, risk-based auditing, pre-audit objectives, determining scope and audit objectives, and the process of performing an IT audit. The class session will include discussion on IT performance, controls, control self-assessment, risk analysis, and the objectives of the IT audit or assurance report.
2. Building an Effective Internal IT Audit Function The class session will focus on management issues regarding how to manage IT audit and assurance functions. The class material will include developing and assessing staff knowledge and skills, competency measurement, assignment of staff, documentation and continuing education requirements.
3. The Audit Process
Perform IT audit in accordance with IT audit standards, guidelines and best practices to assist the organizations in ensuring that its information technology and business system are protected and controlled.
4. Auditing Techniques
Describing all techniques which are available to implemented for IT infrastructure auditing
5. Auditing Entity-Level Controls
Describing all entities control level which encompassing embedded controls in the areas such as:
? Operating system control in UNIX-, Linux-, and Windows-based
operating systems
? Controls in network routers, switches, firewalls, WLANs, and mobile devices
? Entity-level controls, data centers, and disaster recovery plans
? Controls in Web servers, platforms, and applications
? Database critical controls
6. Auditing Data Centers and Disaster Recovery Describe how to conduct data center as disaster recovery site with all supporting infrastructures
7. Auditing Switches, Routers, and Firewalls Describe how to perform auditing on network infrastructure and network appliances
8. Auditing Windows Operating Systems Describe how to conduct auditing on operating system using effective and control-piercing methodology within the Windows operating system environment
9. Auditing Unix and Linux Operating Systems Describe how to conduct auditing on operating system using reliant and control-focus methodology within the Unix operating system environment
10.Auditing Web Servers
Describe how to perform auditing on Web Servers infrastructure and net DMZ devices
11.Auditing Databases
Describe how to perform auditing on organization’s Database and all operating support elements
12.Auditing Applications
Describe how to perform auditing on organization’s Enterprise Applications and the supporting modules
13.Auditing WLAN and Mobile Devices
Describe how to perform auditing on Wide Area Network infrastructure and interface able mobile devices.
INSTRUKTUR PELATIHAN CYBERSECURITY ASSESSMENT BANDUNG
Instruktur yang mengajar pelatihan ini adalah pemateri yang berkompeten di bidangnya dengan baik datang dari kalangan akademisi maupun praktisi.
Kami sangat terbuka jika anda ingin berkomunikasi terlebih dahulu tim trainer sehingga outline dapat disesuaikan dengan outcome kompetensi yang diharapkan.
METODE PELATIHAN AUDIT PROCESS IN IT SECURITY KUALA LUMPUR
1. Presentation
2. Discuss
3. Case Study
4. Evaluation
5. Pre-Test & Post-Test
6. Games
Metode dapat disesuaikan sesuai kebutuhan peserta ataupun perusahaan. Kami sangat terbuka untuk berdiskusi menentukan metode yang paling efektif.
Jadwal DsBanking Training Tahun 2025
- Training Bulan Januari : 18-19 Januari 2025
- Training Bulan Februari : 22-23 Februari 2025
- Training Bulan Maret : 15-16 Maret 2025
- Training Bulan April : 19-20 April 2025
- Training Bulan Mei : 23-24 Mei 2025
- Training Bulan Juni : 14-15 Juni 2025
- Training Bulan Juli : 12-13 Juli 2025
- Training Bulan Agustus : 23-24 Agustus 2025
- Training Bulan September : 13 – 14 September 2025
- Training Bulan Oktober : 11-12 Oktober 2025
- Training Bulan November : 29-30 November 2025
- Training Bulan Desember : 13-14 Desember 2025
Catatan: Jadwal tersebut dapat disesuaikan dengan kebutuhan calon peserta. Peserta dapat mengajukan tanggal pelaksanaan pelatihan.
LOKASI
REGULER TRAINING
- Yogyakarta, Hotel Dafam Malioboro (6.000.000 IDR / participant)
- Jakarta, Hotel Amaris Tendean (6.500.000 IDR / participant)
- Bandung, Hotel Golden Flower (6.500.000 IDR / participant)
- Bali, Hotel Ibis Kuta (7.500.000 IDR / participant)
- Lombok, Hotel Jayakarta (7.500.000 IDR / participant)
ONLINE TRAINING VIA ZOOM
INVESTASI
- Investasi pelatihan selama tiga hari tersebut menyesuaikan dengan jumlah peserta (on call). *Please feel free to contact us.
Catatan: Apabila perusahaan membutuhkan paket in house training, anggaran investasi pelatihan dapat menyesuaikan dengan anggaran perusahaan.
Benefit Apa Saja yang Didapatkan Peserta?
- FREE Airport pickup service (Gratis Antar jemput Hotel/Bandara)
- FREE Transportasi Peserta ke tempat pelatihan
- Module / Handout
- FREE Flashdisk
- Sertifikat
- FREE Bag or backpack (Tas Training)
- Training Kit (Dokumentasi photo, Blocknote, ATK, etc)
- 2x Coffee Break & 1 Lunch, Dinner
- FREE Souvenir Exclusive
FAQ tentang Dsbanking
Q : Berapa minimal running pelatihan ini ?
A : Pelatihan ini akan running idealnya minimal dengan 3 peserta, tetapi bisa disesuaikan dengan kebutuhan peserta
Q : Apakah bisa jika saya hanya ingin pelatihan sendiri aja / private course ?
A : Bisa, kami akan membantu menyelenggarakan pelatihan 1 hari jika ada persetujuan dari klien
Q : Dimana saja pelatihan biasanya di selenggarakan?
A : Pelatihan kami selenggarakan di beberapa kota besar di Indonesia seperti Bandung, Jakarta, Yogyakarta, Surabaya, Malang, Bali, Lombok dan beberapa negara seperti Singapore dan Malaysia
Q : Apakah bisa diselenggarakan selain di kota lain?
A : Penyelenggaraan pelatihan bisa diadakan di kota lain dengan minimal kuota 5 orang setiap kelas
Q : Apakah bisa juga diselenggarakan secara IHT/ In House Training di Perusahaan klien ?
A : Bisa diselenggarakan secara IHT di Perusahaan klien
Q : Apakah jadwal bisa disesuaikan dengan kebutuhan klien ?
A : Jadwal pelatihan dapat di sesuaikan dengan kebutuhan klien.
Materi, Lokasi dan Jadwal Pelatihan Bisa Berubah Sewaktu-waktu dan disesuaikan Dengan Kondisi Peserta, dimohon untuk Melakukan Konfirmasi untuk Segala Bentuk Perubahan, agar Tidak Terjadi Miskomunikasi. Segera Daftar Pelatihan, Diskon Menarik hanya Bulan Ini.
Silabus Training ini disunting oleh Suhada Faisal sebagai Content Writer Spesialis di bidang Pelatihan. Berpengalaman lebih dari 5 tahun sebagai konsultan training atau seminar baik secara online maupun offline.
About the author