Jl. kebagusan Dalam IV. Jakarta Selatan, DKI Jakarta, 12520.
0813 4958 9616
rajatrainingindo@gmail.com

TRAINING IT SECURITY AUDIT

Rajanya Training di Indonesia

TRAINING IT SECURITY AUDIT

TRAINING PENGENALAN IT SECURITY AUDIT

training

TRAINING AUDIT KEAMANAN TEKNOLOGI INFORMASI

 

The  IT Security Audit course is designed to provide practical view in
conducting  IT  audit and assurance in one organization. The course is
designed  to support professional staffs to expand their understanding
of information technology (IT) audit.
The  course  presents  a  more in-depth view on the fundamentals of IT
auditing  by  highlighting  on  topics  such  as: IT audit and control
analysis,  examination  of  control  evidence  in conducting IT audit,
application control, Operating System and IT Infrastructure audit, and
management of IT audit.
The  course  will  include discussion and exercises related to general
control  examinations and application system auditing. The course will
also  focus  on  control  research  and  analysis for IT-related topic
areas.  In  addition,  through  discussion and exercises, participants
will  gain  a working understanding of the process of developing audit
work programs encompassing all elements of IT infrastructures.
Participants  will  be expected to gain a working understanding of how
to  identify,  reference  and  implement  IT  management  and  control
policies,  standards  and  related  auditing  standards. Regarding the
latter,  the  objective  is to learn how to identify and interpret the
requirements of the standards and. implement the standards in auditing
process.
IT  Security  Auditing  covers  the  latest  auditing  tools alongside
real-world examples, ready-to-use checklists, and valuable templates.
Each  class session will include discussion on an IT audit management,
security, control or audit issues that participants should be familiar
with.

IT Security Audit Training Objectives

• Participants shall obtain an expanded understanding on the role of
IT  auditors in evaluating IT-related operational and control risk and
in  assessing  the  appropriateness and adequacy of management control
practices and IT-related controls inside participants’ organization,
with the focus on IT infrastructures

•  The  partipants  shall  obtain  the  capabilityon  how to analyze
Windows,  UNIX,  and Linux systems; secure databases; examine wireless
networks  and  devices; and audit applications. Plus, participants get
up-to-date  information  on legal standards and practices, privacy and
ethical issues, and the CobiT standard.

•  Participants  shall  obtain the capability in conducting IT audit
and  implement  techniques  in  performing assurance, attestation, and
audit engagements

•  Capability  to build and maintain an IT audit function within the
organization with maximum effectiveness and value

•  Participants  shall  obtain  an  expanded  familiarity  with  the
principle references in IT governance, control and security as related
to IT audit

•  Participants  shall  obtain the working ability to plan, conduct,
and  report  on  information  technology audits with specific focus on
infrastructure  vulnarability  assesment and assurance, and drill down
upon application vulnarabilities

•  Participants  shall  obtain  an  understanding  of the role of IT
auditors  regarding  IT-related compliance and regulatory audits, such
as evaluating control standards

• Capability to use best prractices and methodologies such as: COSO,
CobiT, ITIL, ISO, and NSA INFOSEC.

IT Security Audit Training Audience

• IT Managers
• Security Managers
• Auditing Staffs
• IT Operation Staffs

IT Security Audit  Training Contents

1. Audit Overview
2. Building an Effective Internal IT Audit Function
3. The Audit Process
4. Auditing Techniques
5. Auditing Entity-Level Controls
6. Auditing Data Centers and Disaster Recovery
7. Auditing Switches, Routers, and Firewalls
8. Auditing Windows Operating Systems
9. Auditing Unix and Linux Operating Systems
10. Auditing Web Servers
11. Auditing Databases
12. Auditing Applications
13. Auditing WLAN and Mobile Devices

IT Security Audit Training Methods
* Presentation
* Discussion
* Case Study

IT Security Audit Training Lead Instructor

Dr. Ir. Fauzi Hasan. MM, MBA, and Team

JADWAL TRAINING TAHUN 2026

03 – 04 Januari 2026 | 16 – 17 Januari 2026

06 – 07 Februari 2026 | 20 – 21 Februari 2026

05 – 06 Maret 2026 | 19 – 20 Maret 2026

03 – 04 April 2026 | 23 – 24 April 2026

07 – 08 Mei 2026 | 21 – 22 Mei 2026

05 – 06 Juni 2026 | 25 – 26 Juni 2026

09 – 10 Juli 2026 | 23 – 24 Juli 2026

06 – 07 Agustus 2026 | 20 – 21 Agustus 2026

04 – 05 September 2026 | 18 – 19 September 2026

08 – 09 Oktober 2026 | 22 – 23 Oktober 2026

06 – 07 November 2026 | 26 – 27 November 2026

04 – 05 Desember 2026 | 18 – 19 Desember 2026

Metode Training

  1. Tatap Muka/offline
  2. Online via zoom

Kota Penyelenggaraan jika offline :

  1. Bandung
  2. Jogjakarta
  3. Surabaya
  4. Jakarta

fasilitas yang didapatkan

  1. Training Kit Eksklusif
    • Tas
    • Name Tag
    • Modul
    • Flash disk
    • Ballpoint
    • Block Note
    • Souvenir
  2. Harga yang Reliable
  3. Trainer Kompeten di bidangnya
  4. Pelayanan Maksimal untuk peserta
  5. Penjemputan dari dan ke bandara
Investasi :

Public training : Rp. 4.500.000 (minimum 3 pax)

In House Training : on Call