The course is for beginners to administrator tasked to conduct IT Audit. An IT audit is different from a financial statement audit. While a financial audit’s purpose is to evaluate whether an organization is adhering to standard accounting practices, the purposes of an IT audit are to evaluate the system’s internal control design and effectiveness. This includes, but is not limited to, efficiency and security protocols, development processes, and IT governance or oversight. Installing controls are necessary but not sufficient to provide adequate security.
People responsible for security must consider if the controls are installed as
intended, if they are effective if any breach in security has occurred and if so, what actions can be done to prevent future breaches. These inquiries must be answered by independent and unbiased observers. These observers are performing the task of information systems auditing.
A.) System & Network Auditing
1. Auditor’s Role in Relation to
2. Basic Auditing and Assessing
3. Risk Assessment
4. The Six-Step Audit Process
5. Virtualization & Cloud Computing
B.) Auditing The Perimeter
2. Detailed audit of a router
3. Auditing switches
4. Testing the firewall rulebase
5. Testing third party software
6. Reviewing logs and alerts
7. The tools used
a. Router Audit Tool (RAT)
b. Scanning tools for UNIX and
Windows such as Nmap
c. Packet-building tools for
UNIX and Windows such as
-Hping2 and Nemesis
d. Sniffers such as Wire Shark
e. IDS Auditing Tools such as
8. Web Application Auditing
9. Protecting Your Customers
and Their Sensitive Data
10. Microsoft Windows: Auditing and
a. Progressive construction of
a comprehensive audit
i.Basic system information
iii.Network based services
vii.Identifying & mitigating system
viii.Group policy management
ix.Log aggregation, management and analysis
11. Unix Auditing
a. Auditing to Create a Secure
i.Building Your Own Auditing Toolkit
ii. File Integrity Assessment
iii. Fine Points of find
b. Auditing to Maintain a
For complete outline feel free to contact us.
Our instructors are top security professionals themselves from different Fortune 500 companies. They each hold certifications from different vendors such as Cisco, EC-Council, GIAC, ISC2 and many more. With our mission and our security professional instructors, we guarantee you the highest caliber of training/workshop as our instructors provide practical information and informative experiences.
Pandora Security Labs
Pandora Security Labs is a managed security service provider (MSSP) that provides a suite of IT security services to help defend and protect your company’s information. By having a security-as-a-service platform, we help your business in managing the complexity of IT security as well as significantly reducing cost. We are the preferred service provider by private and public corporations analyzing the security aspect of IT infrastructure and recommend the best solutions and countermeasures.
Your course tuition entitles you to
Certificate of Completion
Comprehensive course materials (soft copy)
Lunch, morning and afternoon snacks
Registration and Clarifications
Regular rate: P20,000.00 + VAT
Early bird rate: P19,250.00 + VAT *
Group rate: P18,300.00 + VAT **
Note: All Pandora Security Labs training courses listed are subject to VAT. Fees are inclusive of snacks, lunch, soft copy of materials, certificate of completion and exam voucher (if w/ exam) for certification course. Price and schedule is subject to change without prior notice.
Seats are limited so enroll now! See you there!
For other registration and clarification matters, please feel free to contact us.
Tel: (02) 625-6114, (02) 625-2861
Head Office: Unit 1806 Tycoon Tower, Pearl Drive, Ortigas CBD, Pasig City
Send messageto seller
Tips for Online Transactions
- Avoid scams by acting locally or paying with PayPal, Bank Deposit, LBC, or Pera Padala without the item.
- Never pay with anonymous payment services
- Don't buy or sell outside of your country. Don't accept cheques
- This site is never involved in any transaction, and does not handle payments, shipping, guarantee transactions, provide escrow services, or offer "buyer protection" or "seller certification"