IT Audit


IT Audit Boot Camp

29 November-10 December 2021

Practical Training

Enhanced IT Audit program is structured specifically for young professionals who are willing to be expert in the field.

Advanced IT audit boot camp #1 

1. The Information Systems (IS) Audit Process Key concept you will study: 

1.1 IS Auditing Standards and Guidelines and Code of Professional Ethics 

1.2 IS auditing practices and techniques 

1.3 Techniques to gather information and preserve evidence 

1.4 Control objectives and controls related to IS 

1.5 Types of risk: IS, business, and audit risk 

1.6 How to determine an organization’s use of system platforms, IT   infrastructure and applications 

1.7 Risk-analysis methods, principles, and criteria 

1.8 Audit planning and management techniques 

1.9 How to communicate the audit results 

1.10 Personnel-management techniques


2. Auditing of Management, Planning and Organization of IS Key concept   you will study: 

2.1 IT governance, risk management, and control frameworks 

2.2 Components of IS strategies, policies, standards, and procedures 

2.3 Processes for the development, deployment, and maintenance of IS   strategies, policies, standards, and procedures 

2.4 IS project-management strategies and policies 

2.5 IS problem and change-management strategies and policies 

2.6 IS quality-management strategies and policies 

2.7 IS information security-management strategies and policies 

2.8 IS business continuity–management strategies and policies 

2.9 Contracting strategies, processes, and contract-management  practices 

2.10 Roles and responsibilities of IS functions (for example: segregation of duties) 

2.11 Principles of IS organizational structure and design 

2.12 IS management practices, key performance indicators, and performance measurement techniques 

2.13 Relevant legislative and regulatory issues (for example: privacy and intellectual property) 

2.14 Generally accepted international IS standards and guidelines


3. Technical Infrastructure and Operational Practices and  Infrastructure Key concept you will study: 

3.1 Risks and controls related to hardware platforms, system software and utilities, network infrastructure, and IS operational practices 

3.2 Systems performance and monitoring processes, tools, and   techniques (for example: network analyzers, system error messages,   system utilization reports, load balancing) 

3.3 The process of IT infrastructure acquisition, development,   implementation, and maintenance 

3.4 Change control and configuration-management principles for   hardware and system software 

3.5 Practices related to the management of technical and operational   infrastructure (for example: problem-management/resource-management   procedures, help desk, scheduling, service-level agreements) 

3.6 Functionality of systems software and utilities (for example:   database-management systems, security packages) 

3.7 Functionality of network components (for example: firewalls,   routers, proxy servers, modems, terminal concentrators, hubs,   switches) 

3.8 Network architecture (for example: network protocols, remote   computing, network topologies, Internet, intranet, extranet,  client/server) 

3.9 Cloud computing (for example: types, risks and measures)   


4. Protection of Information Assets  Key concept you will study: 

4.1 The processes of design, implementation, and monitoring of   security (gap analysis baseline, tool selection) 

4.2 Encryption techniques (DES, RSA) 

4.3 Public key infrastructure (PKI) components (certification   authorities, registration authorities) 

4.4 Digital signature techniques 

4.5 Physical security practices 

4.6 Techniques to identify, authenticate, and restrict users to authorized functions and data (dynamic passwords, challenge/response,  menus, profiles) 

4.7 Security software (single sign-on, intrusion-detection systems [IDS], automated permission, network address translation) 

4.8 Security testing and assessment tools (penetration testing, vulnerability scanning) 

4.9 Network and Internet security (SSL, SET, VPN, tunneling) 

4.10 Voice communications security 

4.11 Attack/fraud methods and techniques (hacking, spoofing, Trojan horses, denial of service, spamming) 

4.12 Sources of information regarding threats, standards, evaluation   criteria, and practices in regard to information security 

4.13 Security monitoring, detection, and escalation processes and   techniques (audit trails, intrusion detection, computer emergency  response team) 

4.14 Viruses and detection 

4.15 Environmental protection practices and devices (fire suppression,   cooling systems)   



Advanced IT audit boot camp #2 

5. Disaster Recovery and Business Continuity Key concept you will study: 

5.1 Crisis management and business impact analysis techniques 

5.2 Disaster recovery and business continuity planning and processes 

5.3 Backup and storage methods and practices 

5.4 Disaster recovery and business continuity testing approaches and   methods 

5.5 Insurance in relation to business continuity and disaster recovery 

5.6 Human resource issues (such as evacuation planning and response   teams)   



6. Business Application System Development, Acquisition, Implementation, and Maintenance Key concept you will study: 

6.1 System-development methodologies and tools (prototyping, RAD,   SDLC, object-oriented design techniques) 

6.2 Documentation and charting methods 

6.3 Application implementation practices (piloting, parallel run) 

6.4 Software quality-assurance methods 

6.5 Application architecture (client/server applications,   object-oriented design, data warehousing, web-based applications,   interfaces) 

6.6 Testing principles, methods, and practices 

6.7 Project-management principles, methods, and practices (PERT, CPM,   estimation techniques) 

6.8 Application system-acquisition processes (evaluation of vendors,   preparation of contracts, vendor management, escrow) 

6.9 Application-maintenance principles (versioning, packaging, change   request) 

6.10 System migration and data-conversion tools, techniques, and   procedures 

6.11 Application change-control and emergency change-management   procedures 

6.12 Post-implementation review techniques   


7. Business Process Evaluation and Risk Management Key concept you will study: 

7.1 Methods and approaches for designing and improving business   procedures (e-business, B2B, BPR) 

7.2 Business process controls (management, automated, and manual   controls) 

7.3 Business performance indicators (balanced scorecard, key   performance indicators (KPI)) 

7.4 Business project organization, management, and control practices 

7.5 Project progress monitoring and reporting mechanisms 

7.6 Project success criteria and pitfalls 

7.7 Corporate governance risk and control frameworks   



8. IS Finance Management  Key concept you will study: 

8.1 IS planning, calculations and budgeting (capex, opeх) 

8.2 Proper IS sizing and purchasing 

8.3 IS Total Cost of Ownership (TCO) calculation 

8.4 Software license compliance


Language: English

Facilitator: Vladimir Remyga, Risk Advisory Director 

Participation fee per individual: AZN 3000 (VAT excluded)

Date: 29 November-10 December 2021

Time: 09:00–18:00 (check-in starts at 08:30)

Venue: Baku White City Office Building 25E 8 November Ave, Baku

To register, please contact Nargiz Ibrahimova by phone at +994 12 404 12 10 or email at

Did you find this useful?