Technology Competence Initiative

Size: px
Start display at page:

Download "Technology Competence Initiative"

Transcription

1 THE INSTITUTE OF CHARTERED ACCOUNTANTS OF NIGERIA (Established by Act of Parliament No. 15 of 1965) Technology Competence Initiative Initial Implementation of IFAC Education Guideline No 11 on Information Technology Competence for Professional Accountants Designation Information Handbook & A. J. SILICON (Financial & Information Technology Consultants)

2 ICAN TCI Designation Handbook - page 2

3 Introduction... 4 Rationale... 4 OBJECTIVES OF THE CACITP PROGRAM... 6 The certification program has four objectives:... 7 BENEFITS OF THE PROGRAM... 8 ACCREDITATION REQUIREMENTS... 9 The CACITP Test... 9 Eligibility Requirements for the CACITP Test... 9 Method of Application The CACITP Course of Study Registration For Test Preparing for the CACITP Test Remedial Course in Computing Testing Areas Submission of materials for issues of Certificate Application Audit Receiving the Designation ACCREDITATION ENTITLEMENTS POST ACCREDITATION REQUIREMENTS MCPE Credit Hours Method of Payment PROGRAM DEVELOPMENT AND IMPLEMENTATION CONSULTANTS Appendix Description of Relevant IT Business Experience Systems Auditing and Internal Control Information Technology Strategic Planning Management of Information Systems Computer Systems Architecture Business Applications and E-Business Information Technology Security and Contingency Planning Information System Delivery and Project Management Databases and Database Management Syllabus and Recommended Reading Reference Proficiency Course In Computing CACITP Syllabus... 1 Registration Form ICAN TCI Designation Handbook - page 3

4 " " # $$ % &'( ) * " +) ), -, ', ',. - -,' ', / ), ),, ) ICAN TCI Designation Handbook - page 4

5 ' ' ) ',,, ), -., - -,, ) )- 2 ' *-', ) ' ' ' ' ' 3, ICAN TCI Designation Handbook - page 5

6 /, /,. / /' 1/ 1/' 10 - ' ),, 3 / 4, 5, % ( ), -,, ' *, )', ) ' ), - ),, - ) +) ) * & & 2 1. /.6 & )7 4. "#, && 2 ICAN TCI Designation Handbook - page 6

7 , -, ', - & & ' *, $ % &' ($ %)* + 1.,,, ) 4. ' ' * & - 6, & & ICAN TCI Designation Handbook - page 7

8 ##, * ' / / 5 "$9':;;;',, ', "& '2 #'- < *, ' ' ', ) * & & &2 - # )' ' + +, / / / / + ), 3 +,, ICAN TCI Designation Handbook - page 8

9 ,-. & )'2 3 < <446 /= ' ' " $>;+ )1'?;+)' ' '51' 516'1 && ', )+ -& $ * & '.' :;;. ) ' + ).. ' & & ) *, ) * A9) ) ')/ 0 ( %$ ),&' $>;?; +) ICAN TCI Designation Handbook - page 9

10 $%&& " 6 1 : ' :';;; >;';;;9BC') & /( $ ) ( / /, /1 $ %/ *&$>; & ),.>;';;;-- $>;?;,& ' # ) $;';;; ', &, & '%$ & & ' ' ' & + ' ) ),& - &' - ICAN TCI Designation Handbook - page 10

11 ( (&' *, * ' %& ( +' D;','.' E &<'$9';;;'- - ' - 2 %( / (' 2345, ' / ' ) ' ' 1) %( $'/ ' '2345, '. ) F' '' ','F '( %%( / (, ' ' ' ' ' ',' ICAN TCI Designation Handbook - page 11

12 ++ ' *+ +, (& / ($ 2365, 1' ', ' 1' && 2365, G+G, + ' ' - ' ' ' + ' ' ' + / ' / '2375, ' ' + ' + ' ' ' %( / (, + / * '( 2385, ' 16E' *' ' ), ), '( 295, ) ', 3 ICAN TCI Designation Handbook - page 12

13 )(%( % % % /)' 2 1. & && ) +) ) * && " +'$, ' ) &' & &, & ' 2 + ' %15, 2 "' ' & ' 0 & ',-. '& + +)2 ICAN TCI Designation Handbook - page 13

14 5 D; &$:;>9B +) 5& $% /( ' &') %, :; ' (%<" $( ( ICAN TCI Designation Handbook - page 14

15 ,,. ' 6&, H 1 ) 2 4C'E4' 4'/.3 '4@- ' 3 31-'&/3-$;AI:'H' 2;$DA;+:AI:'D?;+AAD:':::+$99?';?;9>:D+>>;: #152;?;:I$>+$I9A';?;II9$+$A99'"-2;$:::+$99?' 2, J A. J. SILICON (Financial & Information Technology Consultants) $6'&6 5/#,.36,.'E 1' 2;$DA;+;A$:'DA;+$A>K'AKD+A$I; ;?;ID;:+;A9D';?;IIK9+I$DD 2.J ICAN TCI Designation Handbook - page 15

16 && =, &% + =& ' ' ' ' ' ' ' ' ' ' 2 / (' - &@- 6 ' %( $'/ ' ' 6 ) 6 '( %%( / (, ) 4 E (& / ($ & ') &, ' ' ', ' ' && < %( $'/ / ' / ' " ICAN TCI Designation Handbook - page 16

17 '+''' ', & %( / (, + / * '( 6)4"& & )@ 6, ), ) '( 6 6 ', + &' 0 (, & ) ICAN TCI Designation Handbook - page 17

18 ICAN TCI Designation Handbook - page 18 / ) (( ' % 1 44

19 % / (&' A. History of Computers B. Introduction to Hardware 1. Components of a Computer Systems 2. Computer Peripherals 3. Computer Shopping C. Computer Maintenance 1. Hardware maintenance 2. Software Maintenance D. Introduction to Software 1. Types of Software - Systems Software - Application software 2. Software Licensing and Piracy Issues 3. Viruses and Anti-virus Software. E. Operating Systems 1. History of Operating Systems 2. Single/Multi-user Operating Systems 3. Network Operating Systems F. Word Processing Applications 1. Concept of Word Processors 2. Special features of Word Processors G. Spreadsheet Applications 1. Concept of Spreadsheet Applications 2. Special features of Spreadsheet Applications H. Introduction to Databases 1. Concepts 2. Database Management Systems. 1$ 1. Evolution of the Internet 2. Web Browsers and Web Servers. ICAN TCI Designation Handbook - page 19

20 1 %( / (' 2345 A. 6 B. 1 i. & ii. & iii. /. iv. 4 v. 6 C. 1 i. ii. 4, iii. iv. v. 5 D. E 4 i. 3,1 314 ii. 3@64 iii. & iv. 5 v. E 1 E. 1 F. C1 i. /. ii. 1 G. # i. / 1 ii. 16 iii. <1 iv. v. 6/ H. i. ii. & iii. / I. 61 J. 1+1 i. 114, ii. " 1. " 2. "6 K. 11 i ii. 1 /4+1 iii. 6 iv. 3 v.,1'1 L. 1 i. *4 ii. 4, iii. 14 iv. 1 ICAN TCI Designation Handbook - page 20

21 / (' i. & ii. 3 iii. 6 = iv. 5/. v. 1 vi. # vii. & 5 6 viii. -& 1& ix N.,/ 11 O. / P. ) F E0A i. 6 6 ii. 6"1 iii. = 4 iv. 6 3"1/. v vi. L 4 - Q. 2 % ' 1. 1 'H< /.4 'I E00,,6+4/5 6. ICAN TCI Designation Handbook - page 21

22 ' '%%( $'/2345 A. 5 *4 B. 1 C. /1 & D. &1& a. 01&M b. 1& c. &1& d. & 41=6 e. 4/1 f. &.41& E. 61 & a. b. 4 c. & F. 3E + & G. 1"',) H. L1 & I. 1 3 a. 3& b. 4 6 c d. 1 e. C6 f g. / h. J. 1 1 a. +3 b. 4, c. " K. &.5 a. 6E16= b. &.1 c. &.5 5 d. &.5 L. E M. 1E N. 1& O. 5 1 & P. 51 & ICAN TCI Designation Handbook - page 22

23 % ' ''4/346#EE41'6E 2. &#11 & 3. 1 & 1H0H& 4. 'I ICAN TCI Designation Handbook - page 23

24 ' ( %%( / (2365 A. Quality Issues in IS Management 1. Policies, Procedures and methodologies that support a strategic plan 2. Organizational structure policy and procedures 3. Human resource policies including career paths, performance evaluation and job descriptions / training 4. Hardware and software in alignment with technology plan 5. Data accuracy, validity and reliability 1( %% / %% + 1. Efficiency of organization structure 2. Effectiveness of processes, i.e. people, skill sets, adequate training 3. Hardware, software, speed and throughput 4. Data Integrity 1 %% + 1. Evaluation of ROI and other ratios and performance metrics 2. Analyse and evaluate organisation structure, people, skills sets, hardware, software and data,1 ' ' ( 1. Contracts, licensing 2. Benefits and issues of forms of control and management of intellectual property 3. Data ownership image and text material, domain name rights and ownership, International Issues % ' H/*3 3. 1=H#'H1#1 ICAN TCI Designation Handbook - page 24

25 (& / ($ ; a. Stand alone computers b. Networked computers and file servers c. Input and output devices d. Generic input devices (Palm Pilot, pocket PC) e. Data Storage media f. Network connectivity resources (routers, switches, hubs, cabling, NICs) 1& '/ ( (( a., b. 6, c. C. & : ' ( %/ (&& D. ''/ (.&' E., (( a. 1/145 b. &@&'&N@1&N F. && %/ ($ % ' 1. 1I' / H6 3. <112 ICAN TCI Designation Handbook - page 25

26 && < 2365 A. Business Application Systems a) Overview of business applications systems b) Classes of applications systems I. Financial systems (banking applications, insurance and underwriting systems, accounting systems) II. Office automation applications (word processors, spreadsheets, systems) III. Human resource management systems (payroll systems, staff benefit and tax computation systems, human resource management systems) IV. Manufacturing and distribution systems (inventory systems, Purchase and ordering systems, scheduling systems etc) V. Specialized systems (expert systems, decision support systems, artificial intelligence). VI. E-business applications (EDI, EFT, EBT, ATMs etc). c) Business applications systems controls I. Data input controls II. Systems development controls III. Data processing controls IV. Data file access and controls V. Audit trails VI. Data back up and recovery mechanisms B. E-Business And E-Commerce d) Definition of e-business e) Tools and channels pf e-businesses I. EDIs II. The World wide Web III. EFTs IV. Telecommunication channels f) E-commerce Models I. Business to Business II. Business to customers III. Business to employee IV. Business to Government g) E-commerce risks and exposures I. Confidentiality risks II. Integrity risks III. Availability risks IV. Authentication and non repudiation h) E-commerce audit and control issues. I. Use of Firewalls II. Public key infrastructure III. Encryptions IV. Password management V. Digital signatures ICAN TCI Designation Handbook - page 26

27 VI. Intrusion detection systems. VII. Proxy servers C. Management of Application Systems a. Systems development /outsourcing issues. b. System modifications and maintenance controls. c. User support d. Data back up and contingency plans. e. Software licensing and legal issues. D. The Internet Concepts and Issues f. The world wide web (WWW) concept g. WWW as enablers of business and competition. h. Designing and creating websites for organizations i. Hosting websites j. Communication Channels k. Service providers l. Administering websites E. Application Integration m. Customer relationship mgt n. Enterprise resource planning o. Supply-Chain mgt p. Selling-chain mgt q. Operation Resource mgt, r. Enterprise application Integration tools. F. Impact of E-business s. Mass Customisation t. Disintermediation u. Cultural Transformation (Change mgt) v. Competitive Pressure. G. E-Banking Regulation in Nigeria 1. +3H #' H1<'H = + 40' 4. 32"1 &5 '6/ & ICAN TCI Designation Handbook - page 27

28 %( $'/ / ' / '2375 A. / a. Developing Corporate Information Security Management Program i. 1 ii iii. 4 iv C,C& b. 1 i. 0C ii. 6, iii. 1 iv. v. 4 C c. +1 d. 4,1 e. f. 4 E 1 i. & ii. iii. 6 '&' iv., v. 3 vi. vii. + h. i. 15 F''+ ii. 6'& iii. C5 iv. 4& v. <,15 i. ) j. E111 ICAN TCI Designation Handbook - page 28

29 A. + / a. &&61 b. 14 & c. &4 d. 1 i. 333/ ii. iii. 4=1 0 ' / '% / a. 0&6 b. 164, c. 3& 5 d. 3 e. 6 f. /& g. 6 0& h. i. E5.6 j. - 64& '1## 2.,14&, 3. 16# & I ICAN TCI Designation Handbook - page 29

30 %( / (, + / * ' ( 2385 &'1' 16& 1. Definition of User and Developer requirements 2. Current System Analysis 3. Feasibility Study 4. Analysis of requirements a) User Input b) Gather documents and reports 5. Design to specifications 6. Construct systems solutions, i.e. develop, test and validate prototype 7. Gain User feedback 8. Develop procedures and documentation 9. Implementation 10. Continuous review and quality assurance Systems development life cycle (SDLC) 2. Waterfall approach 3. Spiral approach 4. Iterative approach 5. Alternate development tools 6. Unified modelling language (UML) 6 1. Data Flow Diagrams 2. Data Dictionary 3. Flow diagrams 4. International Standards Organisation (ISO) Standards 5. Standards bodies a) Object Management Group (OMG) b) Nigerian Standards Organization (NSO) 61)5 1. Needs analysis and other investigative techniques, including the rule (Pareto Principle) 2. Sensitivity Analysis in Criteria Setting 3. Arithmetic of Risk Assessment 4. Tangible and Intangible Assessments 5. Isolate and gain consensus on what is to be preserved. &.5 1. Defining project objectives including budgeting 2. Staffing and roles 3. Planning and scheduling, e.g. setting tasks and milestones 4. Estimating, e.g. resource loading and allocation Tools, i.e. PERT, CPM and Gantt Charts F. Package Selection ICAN TCI Designation Handbook - page 30

31 % ' &.5 45E' H #31 ' 3. $'/&.5 ' '1H1C' H"# 'H < 5. I ICAN TCI Designation Handbook - page 31

32 , ), ) ' ( 295 A. 6 a. 66 b. / c. 6& F+6 d. 65 & e. 5 6" f. 6 g. E6"& B C. 6 D. 5 a. +45 b. +46 c d. "4 5 E. 45 F a b. --4 c. 1-45= 45 G. /E E5 a. ""1 b. <65 c.,65 H. " a. "6 b. 16 c. 6" d. =+ 6 e. "" f. 1" g. " h. 3@" i. /" j. 16 I. 6E a. 66E 45 b. 65E 45 c. 6LE d. -)) e. & J. 1LE46LE a. 46 b. = 6 c. 3L d. # 14 K. 60 L. 65 M. /& N. 5 1 ICAN TCI Designation Handbook - page 32

33 #C& '&H&'H, ''5 &4' 4. 6& "'6 '65, ICAN TCI Designation Handbook - page 33

34 ' #( THE INSTITUTE OF CHARTERED ACCOUNTANTS OF NIGERIA (Established by Act of Parliament No. 15 of 1965) Passport REGISTRATION FORM 1. 13,E 2. / 3. 52OOOOOOOOOOOOOOOOOOOOOO@" 2OOOOOOOOOOOOOOOOOOOOOO / D< 9/ #15< >2, ' ' Technology Competence Initiative (TCI) ")>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> 4 A@ 2 ICAN TCI Designation Handbook - page 34

35 ?1&/1/4*16E1 52 /66411P&2 =& %($' ( ' 6&, H 1 E & * -) ICAN TCI Designation Handbook - page 35

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

Risk Management in Electronic Banking: Concepts and Best Practices

Risk Management in Electronic Banking: Concepts and Best Practices Risk Management in Electronic Banking: Concepts and Best Practices Jayaram Kondabagil BICENTENNIAL B1CBNTENNIAL John Wiley & Sons (Asia) Pte Ltd. Contents List of Figures xiii List of Tables xv Preface

More information

BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016

BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 This professional certification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification

More information

CompTIA Project+ (2009 Edition) Certification Examination Objectives

CompTIA Project+ (2009 Edition) Certification Examination Objectives CompTIA Project+ (2009 Edition) Certification Examination Objectives DRAFT INTRODUCTION The Project + examination is designed for business professionals involved with projects. This exam will certify that

More information

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing

More information

General Instructions

General Instructions Project Management Professional (PMP) General Instructions Introduction: Being a project manager in the organization is an ideal post that employees dream of. Don t let your dreams vanish in the air; stop

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post

More information

CITY OF MONTEBELLO SYSTEMS MANAGER

CITY OF MONTEBELLO SYSTEMS MANAGER CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and

More information

GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION

GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation

More information

BCS Foundation Certificate in Software Asset Management Essentials Syllabus

BCS Foundation Certificate in Software Asset Management Essentials Syllabus BCS Foundation Certificate in Software Asset Management Essentials Syllabus Version 4.6 March 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification

More information

DIPLOMA COURSE IN INTERNAL AUDIT

DIPLOMA COURSE IN INTERNAL AUDIT DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

HRSD Position Description: UNIX Systems Administrator

HRSD Position Description: UNIX Systems Administrator HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position

More information

Altius IT Policy Collection

Altius IT Policy Collection Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Position Description IT Auditor

Position Description IT Auditor Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership

More information

CHARTERING SITE QUICK START GUIDE

CHARTERING SITE QUICK START GUIDE CHARTERING SITE QUICK START GUIDE Accessing the Chartering Site To access Volunteers of America s Chartering Site, please use the following link: https://charter.voa.org This will launch the initial log-in.

More information

Certificate Software Asset Management Essentials Syllabus. Version 2.0

Certificate Software Asset Management Essentials Syllabus. Version 2.0 Certificate Software Asset Management Essentials Syllabus Version 2.0 June 2010 Certificate in Software Asset Management Essentials Leaning Objectives Holders of the ISEB Certificate in SAM Essentials

More information

- OQSF - Occupational Qualifications Sub-framework

- OQSF - Occupational Qualifications Sub-framework All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

ISE North America Leadership Summit and Awards

ISE North America Leadership Summit and Awards ISE North America Leadership Summit and Awards November 6-7, 2013 Presentation Title: Presenter: Presenter Title: Company Name: Embracing Cyber Security for Top-to-Bottom Results Larry Wilson Chief Information

More information

Your IT Audit and Information Security Partner. CISA Exam Preparation June 2015 Session 6 : 14 April 2015 Starting around 4:45pm..

Your IT Audit and Information Security Partner. CISA Exam Preparation June 2015 Session 6 : 14 April 2015 Starting around 4:45pm.. www.itsec.org.za Your IT Audit and Information Security Partner CISA Exam Preparation June 2015 Session 6 : 14 April 2015 Starting around 4:45pm.. Agenda Introductions Facilitator Participants Recap on

More information

IT123: SABSA Foundation Training

IT123: SABSA Foundation Training IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom

More information

John Snare Chair Standards Australia Committee IT/12/4

John Snare Chair Standards Australia Committee IT/12/4 John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC

More information

Level 4 Diploma in Computing

Level 4 Diploma in Computing Level 4 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that

More information

The CIA Challenge Exam. August 2018

The CIA Challenge Exam. August 2018 The CIA Challenge Exam August 2018 The IIA is committed to providing a clearly defined, professionally relevant suite of global certifications to support internal auditors as they progress through their

More information

Learning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019

Learning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019 Learning with the IIA Refreshing the profession: The New Internal Auditor Jan Olivier 6 February 2019 Contents title Qualifications framework CIA syllabus update Learning support Qualifications framework

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

E-Business. Level 6 L Module Descriptor

E-Business. Level 6 L Module Descriptor The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act,

More information

FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC

FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC DISCLAIMER THIS PAPER IS NOT A LEGAL ADVISE OR OPINION IT DOES NOT SPEAK FOR OR

More information

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.

More information

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value

More information

BCS Practitioner Certificate in Information Risk Management Syllabus

BCS Practitioner Certificate in Information Risk Management Syllabus BCS Practitioner Certificate in Information Risk Management Syllabus Version 6.5 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales,

More information

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional

More information

FDIC InTREx What Documentation Are You Expected to Have?

FDIC InTREx What Documentation Are You Expected to Have? FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

CISA ITEM DEVELOPMENT GUIDE

CISA ITEM DEVELOPMENT GUIDE CISA ITEM DEVELOPMENT GUIDE Updated March 2017 TABLE OF CONTENTS Content Page Purpose of the CISA Item Development Guide 3 CISA Exam Structure 3 Writing Quality Items 3 Multiple-Alternative Items 4 Steps

More information

Policy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme. Version 1.2

Policy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme. Version 1.2 Policy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme Version 1.2 July 2015 Copyright, Cradle to Cradle Products Innovation Institute, 2015

More information

Reference Framework for the FERMA Certification Programme

Reference Framework for the FERMA Certification Programme Brussels, 23/07/2015 Dear Sir/Madam, Subject: Invitation to Tender Reference Framework for the FERMA Certification Programme Background The Federation of European Risk Management Associations (FERMA) brings

More information

Accreditation Services Council Governing Charter

Accreditation Services Council Governing Charter Accreditation Services Council Governing Charter 2 Accreditation Services Council Governing Charter I. Introduction The Accreditation Services Council (Council) is established as a standing committee of

More information

Terms of Reference for the. IFMS Security review consultancy

Terms of Reference for the. IFMS Security review consultancy Ministry of Finance Planning & Economic Development Terms of Reference for the IFMS Security review consultancy Table of Contents 1 Introduction... 1 1.1 Background... 1 1.2 The IFMS Environment... 1 1.3

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Code of practice for information security management

ISO/IEC INTERNATIONAL STANDARD. Information technology Code of practice for information security management INTERNATIONAL STANDARD ISO/IEC 17799 First edition 2000-12-01 Information technology Code of practice for information security management Technologies de l'information Code de pratique pour la gestion

More information

Security Management Models And Practices Feb 5, 2008

Security Management Models And Practices Feb 5, 2008 TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related

More information

Advent IM Ltd ISO/IEC 27001:2013 vs

Advent IM Ltd ISO/IEC 27001:2013 vs Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater

More information

Agenda. Bibliography

Agenda. Bibliography Humor 2 1 Agenda 3 Trusted Digital Repositories (TDR) definition Open Archival Information System (OAIS) its relevance to TDRs Requirements for a TDR Trustworthy Repositories Audit & Certification: Criteria

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

BCS Level 4 Award in Operating Systems (Cyber Intrusion Analyst) Syllabus 603/2894/0

BCS Level 4 Award in Operating Systems (Cyber Intrusion Analyst) Syllabus 603/2894/0 BCS Level 4 Award in Operating Systems (Cyber Intrusion Analyst) Syllabus 603/2894/0 Version 1.1 February 2018 This is a United Kingdom government regulated qualification which is administered and approved

More information

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager. Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led

More information

BCS Level 3 Certificate in Software Development Context and Methodologies Syllabus QAN 603/1191/5

BCS Level 3 Certificate in Software Development Context and Methodologies Syllabus QAN 603/1191/5 Making IT good for society BCS Level 3 Certificate in Software Development Context and Methodologies Syllabus QAN 603/1191/5 Version 3.1 March 2018 This is a United Kingdom government regulated qualification

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

IT risks and controls

IT risks and controls Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2018 Agenda I IT GOVERNANCE IT evolution, objectives, roles

More information

IT Audit Process Prof. Liang Yao Week Two IT Audit Function

IT Audit Process Prof. Liang Yao Week Two IT Audit Function Week Two IT Audit Function Why we need IT audit A Case Study What You Can Learn about Risk Management from Societe Generale? https://www.cio.com/article/2436790/security0/what-you-can-learn-about-risk-management-fromsociete-generale.html

More information

Level 5 Diploma in Computing

Level 5 Diploma in Computing Level 5 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that

More information

Information Systems and Tech (IST)

Information Systems and Tech (IST) Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of

More information

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Operating System Security (Windows 2008 Server) COURSE NUMBER: CIST-0254 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE

More information

NATIONAL DIPLOMA: INFORMATION TECHNOLOGY: BUSINESS APPLICATIONS Qualification code: NDIB12 - NQF Level 6

NATIONAL DIPLOMA: INFORMATION TECHNOLOGY: BUSINESS APPLICATIONS Qualification code: NDIB12 - NQF Level 6 NATIONAL DIPLOMA: INFORMATION TECHNOLOGY: BUSINESS APPLICATIONS Qualification code: NDIB12 - NQF Level 6 Campus where offered: Soshanguve South Campus Important notification to new applicants: No new applications

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

Trusted Identities That Drive Global Commerce

Trusted Identities That Drive Global Commerce Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance

More information

CISA EXAM PREPARATION - Weekend Program

CISA EXAM PREPARATION - Weekend Program CISA EXAM PREPARATION - Weekend Program THE CISA QUALIFICATION: CERTIFICATION PREPARATION COURSE SYLLABUS PT. RIALACHAS TATHYA PRAYUKTI Menara Palma 12th Floor Jalan HR Rasuna Said Blok X2 Kav 6 Jakarta,

More information

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco

More information

VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk

VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18 ocr.org.uk Contents Introduction 1 Key to forms of assessment 1 Version control 2 1 Skills for Business 3 1.1 Administration (Business Professional) 3 1.2

More information

SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION

SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SD? This comprehensive official ITIL lifecycle certification course will provide you with critical knowledge and practical guidance

More information

CISA Training.

CISA Training. CISA Training www.austech.edu.au WHAT IS CISA TRAINING? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual

More information

Improving a Trustworthy Data Repository with ISO 16363

Improving a Trustworthy Data Repository with ISO 16363 Improving a Trustworthy Data Repository with ISO 16363 Robert R. Downs 1 1 rdowns@ciesin.columbia.edu NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science Information

More information

cimc Information Brochure Chartered Institute of Management Consultants

cimc Information Brochure   Chartered Institute of Management Consultants cimc Chartered Institute of Management Consultants // Membership // CIMC Program // Capella Partnership // Business and Aquisition Certificate // Information Brochure Take a career leap with the Chartered

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

Standard PMI e certificazioni professionali: novità 2009

Standard PMI e certificazioni professionali: novità 2009 Standard PMI e certificazioni professionali: novità 2009 Walter Ginevri, PMP Firenze, 4 Giugno 2009 NIC in NUMBERS in EMEA REGION PMI Standards (project) Practice Standard for Scheduling Practice Standard

More information

E-guide Getting your CISSP Certification

E-guide Getting your CISSP Certification Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International

More information

PCI compliance the what and the why Executing through excellence

PCI compliance the what and the why Executing through excellence PCI compliance the what and the why Executing through excellence Tejinder Basi, Partner Tarlok Birdi, Senior Manager May 27, 2009 Agenda 1. Introduction 2. Background 3. What problem are we trying to solve?

More information

Paper 1 BUSINESS LAWS

Paper 1 BUSINESS LAWS Paper 1 BUSINESS LAWS UNIT I INDIAN CONTRACT ATC 1872 Offer, acceptance, Essentials of valid contract. Company Lawsformation of company, memorandum of association, articles of association, Prospectus,

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION. The National Quality Infrastructure Project for Nigeria (NQIP) Project ID

UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION. The National Quality Infrastructure Project for Nigeria (NQIP) Project ID UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION The National Quality Infrastructure Project for Nigeria (NQIP) Project ID 130220 Terms of Reference for the Lead Auditor/ Training of Trainers (ToT) Courses

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

This course includes 14 lessons and 5 Course Activities. Each lesson contains one or more Lesson Activities. The lessons cover the following topics:

This course includes 14 lessons and 5 Course Activities. Each lesson contains one or more Lesson Activities. The lessons cover the following topics: Syllabus Computer Science 1B Overview This one-semester course is intended as a practical, hands-on guide to help you understand various phases of the Software Development Life Cycle (SDLC). This course

More information

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

Information Security Controls Policy

Information Security Controls Policy Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January

More information

CPM Certification Examination

CPM Certification Examination CPM Certification Examination Preparation and Registration Information REAL ESTATE INSTITUTE of CANADA Institut canadien de l immeuble 5407 Eglinton Avenue West, Suite 208 Toronto ON M9C 5K6 Introduction

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Objectives of the Security Policy Project for the University of Cyprus

Objectives of the Security Policy Project for the University of Cyprus Objectives of the Security Policy Project for the University of Cyprus 1. Introduction 1.1. Objective The University of Cyprus intends to upgrade its Internet/Intranet security architecture. The University

More information

Business Advantage Through Structured Skills Development

Business Advantage Through Structured Skills Development Business Advantage Through Structured Skills Development Business Advantage through Structured Skills Development BCS Career Developer is a powerful browser-based solution to help you define, manage and

More information

Cyber Criminal Methods & Prevention Techniques. By

Cyber Criminal Methods & Prevention Techniques. By Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Meeting Agenda Trends Attacker Motives and Methods Areas of Concern Typical Assessment Findings ISO-17799 & NIST Typical Remediation

More information

GRADUATE CERTIFICATE IN RISK MANAGEMENT

GRADUATE CERTIFICATE IN RISK MANAGEMENT GRADUATE CERTIFICATE IN RISK MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with your ability to

More information

ITSS Model Curriculum. - To get level 3 -

ITSS Model Curriculum. - To get level 3 - ITSS Model Curriculum - To get level 3 - (Corresponding with ITSS V3) IT Skill Standards Center IT Human Resources Development Headquarters Information-Technology Promotion Agency (IPA), JAPAN Company

More information

INTERNATIONAL EDUCATION PRACTICE STATEMENT (IEPS) 2 INFORMATION TECHNOLOGY FOR PROFESSIONAL ACCOUNTANTS (FINAL DRAFT) CONTENTS

INTERNATIONAL EDUCATION PRACTICE STATEMENT (IEPS) 2 INFORMATION TECHNOLOGY FOR PROFESSIONAL ACCOUNTANTS (FINAL DRAFT) CONTENTS INTERNATIONAL EDUCATION PRACTICE STATEMENT (IEPS) 2 INFORMATION TECHNOLOGY FOR PROFESSIONAL ACCOUNTANTS (FINAL DRAFT) CONTENTS Paragraph Introduction... 1-4 Definitions... 5 Scope and Structure of this

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Qualification Specification

Qualification Specification BCS Level 2 Certificate in IT User Skills (ECDL Core) Version 2.0 March 2018 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following:

More information

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

itexamdump 최고이자최신인 IT 인증시험덤프  일년무료업데이트서비스제공 itexamdump 최고이자최신인 IT 인증시험덤프 http://www.itexamdump.com 일년무료업데이트서비스제공 Exam : CISA Title : Certified Information Systems Auditor Vendor : ISACA Version : DEMO Get Latest & Valid CISA Exam's Question and

More information