Course Info

Date:

2025-08-18

Length:

5 Days

Type:

Online

Fees:

£ 1850
Available DatesPrice
2025-09-22£ 1850
2025-10-20£ 1850
2025-11-17£ 1850
2025-12-15£ 1850

Course Details

  • Introduction

  • Objective

  • Who should attend

As digital ecosystems grow more complex and interconnected, the role of IT auditors has evolved far beyond compliance checks. Today’s IT auditors must navigate a wide range of security frameworks, technologies, and regulatory environments, often across hybrid and distributed systems. The Advanced IT Auditing Training course is designed to help professionals take that next step.


This five-day course offers experienced audit and IT professionals a deep dive into the critical areas of modern IT auditing. Participants will explore real-world challenges in cloud and multi-tiered systems, assess application and network vulnerabilities, and apply proven techniques for evaluating infrastructure, data, and access control. From analyzing encrypted communication channels to auditing mobile platforms and IoT deployments, this program equips participants with the knowledge and tools needed to operate confidently in high-stakes environments.


In addition to technical skills, the course emphasizes compliance with global regulatory standards such as GDPR, SOX, HIPAA, and ISO frameworks. By the end of the program, attendees will be able to produce meaningful audit reports, uncover actionable insights, and contribute to risk reduction strategies that support organizational resilience.


Whether you're a seasoned IT auditor, risk officer, or security lead, this course will sharpen your technical expertise and strategic understanding, empowering you to lead complex audits with precision and clarity.

Course Outline

5 days course
  • Day 1
  • Day 2
  • Day 3
  • Day 4
  • Day 5

Core IT Security and Identity Management


  • Understanding fundamental principles of information security in IT auditing
  • Identifying control and security risks in distributed computing environments
  • Describing key components of identity and access management architecture
  • Exploring access control models used in enterprise systems:


  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)
  • Role-Based Access Control (RBAC)
  • Attribute-Based Access Control (ABAC)



  • Discussing the role of enterprise directory services in user identity management
  • Understanding the impact of security awareness on organizational risk reduction

Search Course

Related Courses

Course Video

Logo

Subscribe to our newsletter

LONDON HEAD OFFICE

+44 20 80 900 464

[email protected]

DUBAI OFFICE

+971 43 88 00 94

[email protected]

PARIS OFFICE

+33 1 42 68 50 22

[email protected]

SINGAPORE OFFICE

+65 9690 4313

[email protected]

KUALA LUMPUR OFFICE

+60 19-305 5694

[email protected]

BARCELONA OFFICE

+34 934 925 700

[email protected]

Copyright © 2025 lpcentre.com All Rights Reserved. London Premier Centre For Training Ltd Registered in England and Wales, Company Number: 13694538
Contact - Terms and Conditions - Privacy Policy - Quality Policy - Become an instructor - Vacancies - Sitemap
DMCA.com Protection Status