Skip to main content

Information Technology Beginners

Back to Course Schedule
Date(s): Jan 25, 2021
Time: 8:00AM - 12:00PM
Registration Fee: $179.00
Cancellation Date: Jan 18, 2021
Location: Online

Course Description

What Do IT Auditors Do? This is an Entry level IT Auditors Course, designed to provide each student an introductory overview of IT Audits, roles & responsibilities processes, and techniques. This course is not designed to teach you all aspects of IT Audit Reviews nor is it designed to make you an expert. This course is designed to provide an overview of the basic entry level IT Auditor assessment requirements. IT Auditors create and execute audits based on organizational policies and governmental regulations. IT Auditors work closely with IT professionals, managers, and organization executives.


Potential CPE Credits: 4.0
Govt Hours: This class meets 4.0 hours of the 24-hour requirement for governmental CPE under Government Auditing Standards (yellow book), in most cases.
Technical Hours: This class meets 4.0 CPE credits of technical training in compliance with Texas Admin. Code Rule 523.102.

Instruction Type: Live
Experience Level: INTERMEDIATE
Category: 02 Auditing

Course Objectives

Upon completion of the course, participants will have a complete understanding of the following:  

·         Define the role/s of the IT Auditor

·         Why do we have IT Audits, and why they are important?

·         IT Risk Assessment/Strategies

·         Course Overview Questions and Answers (Q&A)   


What do Information Technology (IT) Auditors Do?


Lesson 1.  Define the Roles and Responsibilities of an IT Auditor  

·         What is the role of an IT Auditor?  An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure, to find problems with efficiency, risk management and compliance.


Lesson 2. Why do we have IT Audits, and why are they important (Not all inclusive)?

·         The primary functions of an IT audit are to evaluate the systems that are in place to guard an organization's information.

·         Information technology audits are used to evaluate the organization's ability to protect its information assets and to properly dispense information to authorized parties.

·         To ensure that the IT systems and the data stored within are reliable and secure.

·         Enables companies to know if their systems are working effectively and are achieving the goals and objectives of their organization.

·         Evaluation of Internal Controls

·         Improve processes and proficiencies

·         Provides credibility  


Lesson 3. IT Risk Assessment

·         A high-level overview of your technology, controls, and policies/procedures to identify gaps and areas of risk.

·         IT Audit Checklist Strategies

·         Review IT organizational structure.

·         Review IT policies and procedures.

·         Review IT standards.

·         Review IT documentation.

·         Review the organization's Business Information and Audits (BIA).

·         Interview the appropriate personnel.

·         Observe the processes and employee performance.

·         EXAMPLES of other IT Risk Assessment check lists (Explained during class).



No prerequisites required.


Government Hours: 4.23(k)


Connie Aillaire

Clydea (Connie) Allaire, President and CEO of Allaire’s Management Consulting Firm, (AMCF), is a former Cybersecurity Analyst and Cybersecurity Program Manager with the Army Chief Information Management Office (CIO/G-6) Cybersecurity Directorate, Washington D.C. Pentagon. As a former government employee, Ms. Allaire was selected and successfully completed a Career Developmental assignment with the Federal Chief CIO, to the Special Staff Executive Office of the President White House Communications Directorate. Ms. Allaire is a retired Army Officer who brings 32+(plus) years of experience in Cybersecurity from the military, government, and private sectors. Ms. Allaire has held positions as Chief Information Management Officer, Cybersecurity Risk Management Officer, Information Technology (IT) Program and Project Manager for several IT include sharing her skills as an Adjunct Professor.


Ms. Allaire is a doctoral degree candidate. She earned a Master’s Degree in Business Administration (MBA) and a Masters Certification in Information Security Leadership. Bachelor’s Degrees in Psychology and Biology. She is a graduate of the Army’s Command and General Staff College and active member of the Armed Forces Communications and Electronics Association (AFCEA) and the Information Systems Audit and Control Association (ISACA.)

Additional Information

TAC Rule 523.142(g) requires the CPE Sponsor to monitor individual attendance and assign the correct number of CPE credits. Participants will be asked to document their time of arrival and departure in compliance with this Rule. Additionally, attendance will be monitored throughout the day and CPE certificates will reflect actual attendance of each participant.

If you are making travel plans to come to Austin, we recommend making "refundable" air and hotel reservations or waiting until 14 days before the class to actually book your reservations. Courses are occasionally canceled or rescheduled due to low enrollment. We determine whether a course has enough participants 16 days prior to the course date. If we cancel or reschedule, we will email the participant and his or her billing contact no later than 14 days before the original class date.

The course coordinator will contact you with parking information. Handicapped parking is free at the meters around the downtown area.

Vending machines with Coca-Cola products and various snack items are available. There is also a refrigerator and microwave in our coffee bar area. Feel free to bring in your own drinks and food if you prefer.

You might want to bring a light sweater or jacket, as room temperatures vary.

To see answers to our Frequently Asked Questions, visit

Back to Course Schedule