Skip to main content

Information Technology Beginners

Date(s): Jan 25, 2021
Time: 8:00AM - 12:00PM
Registration Fee: $179.00
Cancellation Date: Jan 18, 2021
Location: Online

Course Description

What Do IT Auditors Do? This is an Entry level IT Auditors Course, designed to provide each student an introductory overview of IT Audits, roles & responsibilities processes, and techniques. This course is not designed to teach you all aspects of IT Audit Reviews nor is it designed to make you an expert. This course is designed to provide an overview of the basic entry level IT Auditor assessment requirements. IT Auditors create and execute audits based on organizational policies and governmental regulations. IT Auditors work closely with IT professionals, managers, and organization executives.

 


Potential CPE Credits: 4.0
Govt Hours: This class meets 4.0 hours of the 24-hour requirement for governmental CPE under Government Auditing Standards (yellow book), in most cases.
Technical Hours: This class meets 4.0 CPE credits of technical training in compliance with Texas Admin. Code Rule 523.102.

Instruction Type: Live
Experience Level: INTERMEDIATE
Category: Information Technology

Course Objectives

Upon completion of the course, participants will have a complete understanding of the following:  

·         Define the role/s of the IT Auditor

·         Why do we have IT Audits, and why they are important?

·         IT Risk Assessment/Strategies

·         Course Overview Questions and Answers (Q&A)   

 

What do Information Technology (IT) Auditors Do?

 

Lesson 1.  Define the Roles and Responsibilities of an IT Auditor  

·         What is the role of an IT Auditor?  An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure, to find problems with efficiency, risk management and compliance.

 

Lesson 2. Why do we have IT Audits, and why are they important (Not all inclusive)?

·         The primary functions of an IT audit are to evaluate the systems that are in place to guard an organization's information.

·         Information technology audits are used to evaluate the organization's ability to protect its information assets and to properly dispense information to authorized parties.

·         To ensure that the IT systems and the data stored within are reliable and secure.

·         Enables companies to know if their systems are working effectively and are achieving the goals and objectives of their organization.

·         Evaluation of Internal Controls

·         Improve processes and proficiencies

·         Provides credibility  

 

Lesson 3. IT Risk Assessment

·         A high-level overview of your technology, controls, and policies/procedures to identify gaps and areas of risk.

·         IT Audit Checklist Strategies

·         Review IT organizational structure.

·         Review IT policies and procedures.

·         Review IT standards.

·         Review IT documentation.

·         Review the organization's Business Information and Audits (BIA).

·         Interview the appropriate personnel.

·         Observe the processes and employee performance.

·         EXAMPLES of other IT Risk Assessment check lists (Explained during class).

 


Instructors

Connie Allaire

Mrs. Clydea (Connie) Allaire is President and Founder of Allaire’s Management Consulting Firm. She is a retired Army Officer and Military Veteran with 25 plus years of demonstrated success in Information Technology. She has held key management positions in the military, government, and private industries. While working with the government and during the 44th Presidential administration Mrs. Allaire successfully completed a career development assignment with The Federal Chief of Information Management Office assigned to the Executive Office of the President Office (EOP) and Management and Budge White House Communications located in Washington DC. While assigned to the Army CIO/ G-6 Cybersecurity Directorate she served as the Drone Technology Authorization Lead. Other key management positions held by Mrs. Allaire include Chief Information Officer (CIO), Program and Project Manager, IT Cloud Application Migration/Transition Lead, Supply Chain Risk Management Officer and Lead for IT Policy and Governance. Mrs. Allaire has served as an adjunct professor at the University level and has supported a myriad of other Information Technology innovative initiatives.

Mrs. Allaire earned her Master’s Degrees in Business Administration (MBA) from the University of Phoenix and a Master’s Certification in Security Leadership. She has a bachelor’s Degree in Psychology from Western Illinois University. She is a graduate of the Army’s Command and General Staff Collège. Ms Allaire is an active member of The Information Systems Audit and Control Association (ISACA) The Armed Forces Communications and Electronics Association (AFCEA) and The US Women Chamber of Commerce.


Additional Information

TAC Rule 523.142(g) requires the CPE Sponsor to monitor individual attendance and assign the correct number of CPE credits. Participants will be asked to document their time of arrival and departure in compliance with this Rule. Additionally, attendance will be monitored throughout the day and CPE certificates will reflect actual attendance of each participant.

If you are making travel plans to come to Austin, we recommend making "refundable" air and hotel reservations or waiting until 14 days before the class to actually book your reservations. Courses are occasionally canceled or rescheduled due to low enrollment. We determine whether a course has enough participants 16 days prior to the course date. If we cancel or reschedule, we will email the participant and his or her billing contact no later than 14 days before the original class date.

The course coordinator will contact you with parking information. Handicapped parking is free at the meters around the downtown area.

Vending machines with Coca-Cola products and various snack items are available. There is also a refrigerator and microwave in our coffee bar area. Feel free to bring in your own drinks and food if you prefer.

You might want to bring a light sweater or jacket, as room temperatures vary.

To see answers to our Frequently Asked Questions, visit http://www.sao.texas.gov/training/faq.html.