20 – 21 Agustus 2018 | Rp. 6.900.000 Per Peserta di Yogyakarta/ Semarang/ Solo
20 – 21 Agustus 2018 | Rp. 7.900.000 Per Peserta di Bandung/ Jakarta/ Surabaya
20 – 21 Agustus 2018 | Rp. 8.900.000 Per Peserta di Bali/ Batam/ Balikpapan/ Manado/ Lombok
27 – 28 Agustus 2018 | Rp. 6.900.000 Per Peserta di Yogyakarta/ Semarang/ Solo

24 – 25 September 2018 | Rp. 7.900.000 Per Peserta di Hotel Ibis Kemayoran, Jakarta – CONFIRMED

Jadwal Training 2018 Selanjutnya …



IT Security Audit Course Background

The IT Security Audit course is designed to provide practical view in conducting IT audit and assurance in one organization. The course is designed to support professional staffs to expand their understanding of information technology (IT) audit.
The course presents a more in-depth view on the fundamentals of IT auditing by highlighting on topics such as: IT audit and control analysis, examination of control evidence in conducting IT audit, application control, Operating System and IT Infrastructure audit, and management of IT audit.
The course will include discussion and exercises related to general control examinations and application system auditing. The course will also focus on control research and analysis for IT-related topic areas. In addition, through discussion and exercises, participants will gain a working understanding of the process of developing audit work programs encompassing all elements of IT infrastructures.
Participants will be expected to gain a working understanding of how to identify, reference and implement IT management and control policies, standards and related auditing standards. Regarding the latter, the objective is to learn how to identify and interpret the requirements of the standards and. implement the standards in auditing process.
IT Secuity Auditing covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and valuable templates.
Each class session will include discussion on an IT audit management, security, control or audit issues that participants should be familiar with.


IT Security Audit Course Objectives

• Participants shall obtain an expanded understanding on the role of IT auditors in evaluating IT-related operational and control risk and in assessing the appropriateness and adequacy of management control practices and IT-related controls inside participants’ organization, with the focus on IT infrastructures
• The partipants shall obtain the capabilityon how to analyze Windows, UNIX, and Linux systems; secure databases; examine wireless networks and devices; and audit applications. Plus, participants get up-to-date information on legal standards and practices, privacy and ethical issues, and the CobiT standard.
• Participants shall obtain the capability in conducting IT audit and implement techniques in performing assurance, attestation, and audit engagements
• Capability to build and maintain an IT audit function within the organization with maximum effectiveness and value
• Participants shall obtain an expanded familiarity with the principle references in IT governance, control and security as related to IT audit
• Participants shall obtain the working ability to plan, conduct, and report on information technology audits with specific focus on infrastructure vulnarability assesment and assurance, and drill down upon application vulnarabilities
• Participants shall obtain an understanding of the role of IT auditors regarding IT-related compliance and regulatory audits, such as evaluating control standards
• Capability to use best prractices and methodologies such as: COSO, CobiT, ITIL, ISO, and NSA INFOSEC


IT Security Audit Course Audience

• IT Managers
• Security Managers
• Auditing Staffs
• IT Operation Staffs


IT Security Audit  Course Contents

1. Audit Overview
2. Building an Effective Internal IT Audit Function
3. The Audit Process
4. Auditing Techniques
5. Auditing Entity-Level Controls
6. Auditing Data Centers and Disaster Recovery
7. Auditing Switches, Routers, and Firewalls
8. Auditing Windows Operating Systems
9. Auditing Unix and Linux Operating Systems
10. Auditing Web Servers
11. Auditing Databases
12. Auditing Applications
13. Auditing WLAN and Mobile Devices

IT Security Audit Course Methods

  • Presentation
  • Discussion
  • Case Study


Jadwal Training 2018

Hotel Santika Kuta, Bali
Hotel Nagoya Plaza, Batam
Hotel Fave, Balikpapan
Hotel Aston, Manado
Hotel Lombok Raya, Mataram
Hotel Serela Merdeka, Bandung
Hotel Santika Pandegiling, Surabaya
Sofyan Hotel Betawi, Jakarta
Hotel Ibis Solo
Hotel Ibis Simpang Lima, Semarang
Hotel Ibis Malioboro, Yogyakarta

  • 20 – 21 Agustus 2018
  • 27 – 28 Agustus 2018
  • 03 – 04 September 2018
  • 12 – 13 September 2018
  • 17 – 18 September 2018
  • 24 – 25 September 2018
  • 01 – 02 Oktober 2018
  • 08 – 09 Oktober 2018
  • 15 – 16 Oktober 2018
  • 22 – 23 Oktober 2018
  • 29 – 30 Oktober 2018
  • 05 – 06 November 2018
  • 12 – 13 November 2018
  • 21 – 22 November 2018
  • 26 – 27 November 2018
  • 03 – 04 Desember 2018
  • 10 – 11 Desember 2018
  • 17 – 18 Desember 2018
  • 26 – 27 Desember 2018


Investasi dan Fasilitas

  • Rp.8.900.000 (Non Residential) untuk lokasi di Bali, Batam, Balikpapan, Manaado atau Lombok
  • Rp. 7.900.000 (Non Residential) untuk lokasi di Bandung, Jakarta atau Surabaya
  • Rp 6.900.000 (Non Residential) untuk Lokasi Solo, Semarang  atau Yogyakarta
  • Quota minimum 2 peserta
  • Quota minimum 3 peserta ( Untuk Manado, Balikpapan dan Lombok Quota minimal 4 peserta)
  • Fasilitas : Certificate,Training kits, USB,Lunch,Coffe Break, Souvenir
  • Untuk peserta luar kota disediakan transportasi antar-jemput dari Bandara/Stasiun ke Hotel khusus bagi perusahaan yang mengirimkan minimal 3 orang peserta)

IT Security Audit Course Lead Instruktur

Dr. Ir. Fauzi Hasan. MM, MBA, and Team



Formulir Pra-Pendaftaran Public Training / Permintaan Informasi Lebih Lanjut
  2. (required)
  3. (required)
  5. (required)
  6. (required)
  7. (required)
  8. (valid email required)
  9. (required)
  10. (required)
  11. DATA PRE REGISTRATION (Tidak Mengikat)
  12. (required)

cforms contact form by delicious:days

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.