Online: Auditing the Cybersecurity Program Certificate

Kurs Online 29/09/2025 20 CPE-points
Online: Auditing the Cybersecurity Program Certificate
Påmelding

15/09/2025

2.400,00 kr (3.000,00 kr inkl. MVA)

1.900,00 kr (2.375,00 kr inkl. MVA)
Nyttig informasjon

29 September 2025 - 09:00

3 October 2025 - 13:00

Online

Engelsk

Nybegynner

20 CPE-points

Due to the cost, risk, and reputational damage that can result from a cyber incident or data breach, every
organisation needs a cyber strategy and response plan.

Participants who complete the course are eligible to sit for the certificate exam which is administered on the IIA’s LMS platform.

Each course segment concludes with a short multiple-choice quiz, requiring an 80% score to pass. Participants can retake these quizzes as often as needed to achieve mastery. After completing all segments, participants must pass a 40 multiple-choice certificate exam. The exam allows up to three attempts before a retake fee is required.

Learning Objectives

  • Recognize what drives cyber risk and how internal audit can assess control effectiveness
  • Identify how to assess data storage solutions
  • Define digital transformation, digitalization risks, and associated controls
  • Recognize characteristics of a typical, timely patch management process
  • Explain key concepts relating to the vulnerability management program,
    including commonly applied vulnerability management maturity models
  • Identify how automation of business impacts the methods used in audit
    testing
  • Investigate méthodes to reduce risk exposure from common API and web
    services vulnerabilities
  • Determine how to mitigate risk exposure from common privileged access
    management vulnerabilities
  • Identify methods to adjust audit approches for DevSecOps
  • Review how to mitigate risk exposure from common SoD vulnerabilities in
    DevSecOps Applications
  • Understand internal audit’s role in continuous monitoring and continuous
    auditing
  • Recall objectives and methods deployed in red team exercises
  • Recall important factors relating Security Operations Centers (SOC) and
    incident management, monitoring, detection, and response frameworks
  • Identify controls, and associated assessments, needed to operate a SOC

Who will benefit?

  • This certificate program is designed to ensure the internal audit community processes the fundamental competencies to effectively assess an organisation’s cybersecurity governance and management practices, including their cybersecurity program capabilities. This program is
    intended for operational internal auditors and audit leaders who want to deepen their understanding and gain recognition of their cybersecurity knowledge.
  • Participants who successfully complete this program are el igible to plus themselves by obtaining The Auditing the Cybersecurity Program Certificate – a wonderful addition to both your resume
    and LinkedIn profile.

Course informtaion

  • Course duration : 2,5 days (5*4 hours)
  • Participants who complete the course are eligible to sit for the certificate exam which is administered on The IIA’s LMS platform.
  • CPE Hours available : 20
  • Competency level : Applied knowledge
  • Prerequisites: Fundementals of Cybersecurity or equivalent knowledge
  • Exam : 40 questions

Price & Sessions

  • 1 900€ ex VAT for members (2 400€ ex VAT for non-members)
  • 5* 9h-13h CET – by Zoom
  • September 29th to October 3rd

Course content

  1. Auditing the Cybersecurity Program :
  • Importance of the cybersecurity Program
  • Drivers of cybersecurity risk
  • Manage cybersecurity risk
  • The cybersecurity program audit plan
  1. Auditing Storage Management Solution and Containers :
  • Overview of storage management solutions and containers
  • Data storage compliance landscape
  • Auditing ephemeral and micro-services
  • Cloud provider data storage tools and their benefits
  • Adopting continuous auditing for data protection, retention, and destruction
  1. Auditing Digital Transformation and Digitization Programs :
  • Key concepts of digital transformation and digitization
  • Digital technologies and risks
  • Internal audit’s role in digital initiatives
  • Auditing digitization programs
  • Auditing digital transformation programs
  1. Auditing the Vulnerability Management Program
  • Vulnerability management program overview
  • Understand common vulnerability management maturity models used to assess organizational cybersecurity vulnerabilities
  • Review key metrics for auditing the vulnerability program
  • How to implement appropriate actions when auditing vulnerabilities

5. Auditing the Patch Management Program

  • Key concepts of patch management
  • Understand typical, timely patch management process
  • How the patch management program reduces cybersecurity risk and organizational vulnerabilities
  • How the patch management program reduces data breach risk and loss
  1. Auditing automation
  • Automation impact on audit testing
  • Effective audit automation
  • Visualize the risks of automation when establishing the internal audit scope
  • Auditing automation
  1. Auditing API and Web Services
  • API and web services overview
  • Audit and test API and web services security
  • Reduce API-bases web services risk
  1. Auditing privileged Access Management
  • Key concepts of privileged access management
  • Types and purposes of privileged access management
  • Inventory and audit privileged access management
  • Mitigate risk exposure from common privileged access management cyberattacks
  1. Auditing DevSecOps
  • DevSecOps overview
  • The DevSecOps development process
  • Issues and controls
  • Auditing DevSecOps

10. Auditing Continuous Monitoring

  • Auditing continuous monitoring process components
  • Internal audit’s role in incorporating data analytics and continuous monitoring into the organization
  • Develop a simplified yet high-impact reporting mechanism to meet a variety of stakeholders needs
  • Continuous monitoring, high impact reporting, agile audit approach and dynamic risk assessment methodologies
  1. Auditing Red, Blue, and Purple Team Testing
  • Overview of the kill chain and types of attacks
  • Points of vulnerability as it relates to people, technologies and systems
  • Identify areas of improvement in defensive incident response processes across every phase of the kill chain
  • Establish the organization’s first-hand experience to detect and contain a targeted attack

12. Auditing the Security Operations Center (SOC)

  • Key concepts of the SOC
  • SOC processes and checklists
  • Controls needed to operate a SOC

Register Deadline

You need to sign up for this course minimum 14 days in advance. (Deadline September 15th)

IIA Norge bruker informasjonskapsler slik at du automatisk kan logge inn på nettsiden. Vi bruker Googles informasjonskapsler for å analysere aktiviteter på nettsiden. Vi kan derfor også se hvordan nettssiden brukes og hvilke funksjoner du finner interessante. Du kan du endre preferansene dine under 'Innstillinger for informasjonskapsler' om du ønsker.

Les mer om informasjonskapsler i vår cookie policy eller ta en titt på vår personvernerklæring for å se hvordan vi håndterer dine personopplysninger.

Cookie preferanser