Skip to main content

Home Specialist skills Security AUD507: Auditing and Monitoring Networks, Perimeters and Systems

AUD507: Auditing and Monitoring Networks, Perimeters and Systems

  • bullet point
    Gain confidence in whether you have the correct security controls and they are working well
  • bullet point
    Understand how to lower your audit costs with efficient security audits
  • bullet point
    Learn to improve the relevance of IT audit reporting
  • bullet point
    Improve security compliance while reducing compliance and security risks

Overview

Off the shelf (OTS)

This course is organised specifically to provide a risk-driven method for tackling the enormous task of designing an enterprise security validation program. After covering a variety of high-level audit issues and general audit best practices, students will have the opportunity to delve into the technical 'how-to' for determining the key controls that can be used to provide a high level of assurance to an organisation.

Real-world examples provide students with tips on how to verify these controls in a repeatable way, as well as many techniques for continuous monitoring and automatic compliance validation. These same real-world examples help the students learn how to be most effective in communicating risk to management and operations staff.

Delivery method
Face to face icon

Face to face

Virtual icon

Virtual

Digital icon

Digital

Course duration
Duration icon

48 hours

Competency level
Working icon

Working

Pink building representing strand 4 of the campus map
Delivery method
  • face to face icon

    Face to face

  • Virtual icon

    Virtual

  • Digital icon

    Digital

Course duration
Duration icon

48 hours

Competency level
  • Working icon

    Working