Technology Competence Initiative
|
|
- Eustace Cross
- 6 years ago
- Views:
Transcription
1 THE INSTITUTE OF CHARTERED ACCOUNTANTS OF NIGERIA (Established by Act of Parliament No. 15 of 1965) Technology Competence Initiative Initial Implementation of IFAC Education Guideline No 11 on Information Technology Competence for Professional Accountants Designation Information Handbook & A. J. SILICON (Financial & Information Technology Consultants)
2 ICAN TCI Designation Handbook - page 2
3 Introduction... 4 Rationale... 4 OBJECTIVES OF THE CACITP PROGRAM... 6 The certification program has four objectives:... 7 BENEFITS OF THE PROGRAM... 8 ACCREDITATION REQUIREMENTS... 9 The CACITP Test... 9 Eligibility Requirements for the CACITP Test... 9 Method of Application The CACITP Course of Study Registration For Test Preparing for the CACITP Test Remedial Course in Computing Testing Areas Submission of materials for issues of Certificate Application Audit Receiving the Designation ACCREDITATION ENTITLEMENTS POST ACCREDITATION REQUIREMENTS MCPE Credit Hours Method of Payment PROGRAM DEVELOPMENT AND IMPLEMENTATION CONSULTANTS Appendix Description of Relevant IT Business Experience Systems Auditing and Internal Control Information Technology Strategic Planning Management of Information Systems Computer Systems Architecture Business Applications and E-Business Information Technology Security and Contingency Planning Information System Delivery and Project Management Databases and Database Management Syllabus and Recommended Reading Reference Proficiency Course In Computing CACITP Syllabus... 1 Registration Form ICAN TCI Designation Handbook - page 3
4 " " # $$ % &'( ) * " +) ), -, ', ',. - -,' ', / ), ),, ) ICAN TCI Designation Handbook - page 4
5 ' ' ) ',,, ), -., - -,, ) )- 2 ' *-', ) ' ' ' ' ' 3, ICAN TCI Designation Handbook - page 5
6 /, /,. / /' 1/ 1/' 10 - ' ),, 3 / 4, 5, % ( ), -,, ' *, )', ) ' ), - ),, - ) +) ) * & & 2 1. /.6 & )7 4. "#, && 2 ICAN TCI Designation Handbook - page 6
7 , -, ', - & & ' *, $ % &' ($ %)* + 1.,,, ) 4. ' ' * & - 6, & & ICAN TCI Designation Handbook - page 7
8 ##, * ' / / 5 "$9':;;;',, ', "& '2 #'- < *, ' ' ', ) * & & &2 - # )' ' + +, / / / / + ), 3 +,, ICAN TCI Designation Handbook - page 8
9 ,-. & )'2 3 < <446 /= ' ' " $>;+ )1'?;+)' ' '51' 516'1 && ', )+ -& $ * & '.' :;;. ) ' + ).. ' & & ) *, ) * A9) ) ')/ 0 ( %$ ),&' $>;?; +) ICAN TCI Designation Handbook - page 9
10 $%&& " 6 1 : ' :';;; >;';;;9BC') & /( $ ) ( / /, /1 $ %/ *&$>; & ),.>;';;;-- $>;?;,& ' # ) $;';;; ', &, & '%$ & & ' ' ' & + ' ) ),& - &' - ICAN TCI Designation Handbook - page 10
11 ( (&' *, * ' %& ( +' D;','.' E &<'$9';;;'- - ' - 2 %( / (' 2345, ' / ' ) ' ' 1) %( $'/ ' '2345, '. ) F' '' ','F '( %%( / (, ' ' ' ' ' ',' ICAN TCI Designation Handbook - page 11
12 ++ ' *+ +, (& / ($ 2365, 1' ', ' 1' && 2365, G+G, + ' ' - ' ' ' + ' ' ' + / ' / '2375, ' ' + ' + ' ' ' %( / (, + / * '( 2385, ' 16E' *' ' ), ), '( 295, ) ', 3 ICAN TCI Designation Handbook - page 12
13 )(%( % % % /)' 2 1. & && ) +) ) * && " +'$, ' ) &' & &, & ' 2 + ' %15, 2 "' ' & ' 0 & ',-. '& + +)2 ICAN TCI Designation Handbook - page 13
14 5 D; &$:;>9B +) 5& $% /( ' &') %, :; ' (%<" $( ( ICAN TCI Designation Handbook - page 14
15 ,,. ' 6&, H 1 ) 2 4C'E4' 4'/.3 '4@- ' 3 31-'&/3-$;AI:'H' 2;$DA;+:AI:'D?;+AAD:':::+$99?';?;9>:D+>>;: #152;?;:I$>+$I9A';?;II9$+$A99'"-2;$:::+$99?' 2, J A. J. SILICON (Financial & Information Technology Consultants) $6'&6 5/#,.36,.'E 1' 2;$DA;+;A$:'DA;+$A>K'AKD+A$I; ;?;ID;:+;A9D';?;IIK9+I$DD 2.J ICAN TCI Designation Handbook - page 15
16 && =, &% + =& ' ' ' ' ' ' ' ' ' ' 2 / (' - &@- 6 ' %( $'/ ' ' 6 ) 6 '( %%( / (, ) 4 E (& / ($ & ') &, ' ' ', ' ' && < %( $'/ / ' / ' " ICAN TCI Designation Handbook - page 16
17 '+''' ', & %( / (, + / * '( 6)4"& & )@ 6, ), ) '( 6 6 ', + &' 0 (, & ) ICAN TCI Designation Handbook - page 17
18 ICAN TCI Designation Handbook - page 18 / ) (( ' % 1 44
19 % / (&' A. History of Computers B. Introduction to Hardware 1. Components of a Computer Systems 2. Computer Peripherals 3. Computer Shopping C. Computer Maintenance 1. Hardware maintenance 2. Software Maintenance D. Introduction to Software 1. Types of Software - Systems Software - Application software 2. Software Licensing and Piracy Issues 3. Viruses and Anti-virus Software. E. Operating Systems 1. History of Operating Systems 2. Single/Multi-user Operating Systems 3. Network Operating Systems F. Word Processing Applications 1. Concept of Word Processors 2. Special features of Word Processors G. Spreadsheet Applications 1. Concept of Spreadsheet Applications 2. Special features of Spreadsheet Applications H. Introduction to Databases 1. Concepts 2. Database Management Systems. 1$ 1. Evolution of the Internet 2. Web Browsers and Web Servers. ICAN TCI Designation Handbook - page 19
20 1 %( / (' 2345 A. 6 B. 1 i. & ii. & iii. /. iv. 4 v. 6 C. 1 i. ii. 4, iii. iv. v. 5 D. E 4 i. 3,1 314 ii. 3@64 iii. & iv. 5 v. E 1 E. 1 F. C1 i. /. ii. 1 G. # i. / 1 ii. 16 iii. <1 iv. v. 6/ H. i. ii. & iii. / I. 61 J. 1+1 i. 114, ii. " 1. " 2. "6 K. 11 i ii. 1 /4+1 iii. 6 iv. 3 v.,1'1 L. 1 i. *4 ii. 4, iii. 14 iv. 1 ICAN TCI Designation Handbook - page 20
21 / (' i. & ii. 3 iii. 6 = iv. 5/. v. 1 vi. # vii. & 5 6 viii. -& 1& ix N.,/ 11 O. / P. ) F E0A i. 6 6 ii. 6"1 iii. = 4 iv. 6 3"1/. v vi. L 4 - Q. 2 % ' 1. 1 'H< /.4 'I E00,,6+4/5 6. ICAN TCI Designation Handbook - page 21
22 ' '%%( $'/2345 A. 5 *4 B. 1 C. /1 & D. &1& a. 01&M b. 1& c. &1& d. & 41=6 e. 4/1 f. &.41& E. 61 & a. b. 4 c. & F. 3E + & G. 1"',) H. L1 & I. 1 3 a. 3& b. 4 6 c d. 1 e. C6 f g. / h. J. 1 1 a. +3 b. 4, c. " K. &.5 a. 6E16= b. &.1 c. &.5 5 d. &.5 L. E M. 1E N. 1& O. 5 1 & P. 51 & ICAN TCI Designation Handbook - page 22
23 % ' ''4/346#EE41'6E 2.  & 3. 1 & 1H0H& 4. 'I ICAN TCI Designation Handbook - page 23
24 ' ( %%( / (2365 A. Quality Issues in IS Management 1. Policies, Procedures and methodologies that support a strategic plan 2. Organizational structure policy and procedures 3. Human resource policies including career paths, performance evaluation and job descriptions / training 4. Hardware and software in alignment with technology plan 5. Data accuracy, validity and reliability 1( %% / %% + 1. Efficiency of organization structure 2. Effectiveness of processes, i.e. people, skill sets, adequate training 3. Hardware, software, speed and throughput 4. Data Integrity 1 %% + 1. Evaluation of ROI and other ratios and performance metrics 2. Analyse and evaluate organisation structure, people, skills sets, hardware, software and data,1 ' ' ( 1. Contracts, licensing 2. Benefits and issues of forms of control and management of intellectual property 3. Data ownership image and text material, domain name rights and ownership, International Issues % ' H/*3 3. 1=H#'H1#1 ICAN TCI Designation Handbook - page 24
25 (& / ($ ; a. Stand alone computers b. Networked computers and file servers c. Input and output devices d. Generic input devices (Palm Pilot, pocket PC) e. Data Storage media f. Network connectivity resources (routers, switches, hubs, cabling, NICs) 1& '/ ( (( a., b. 6, c. C. & : ' ( %/ (&& D. ''/ (.&' E., (( a. 1/145 b. &@&'&N@1&N F. && %/ ($ % ' 1. 1I' / H6 3. <112 ICAN TCI Designation Handbook - page 25
26 && < 2365 A. Business Application Systems a) Overview of business applications systems b) Classes of applications systems I. Financial systems (banking applications, insurance and underwriting systems, accounting systems) II. Office automation applications (word processors, spreadsheets, systems) III. Human resource management systems (payroll systems, staff benefit and tax computation systems, human resource management systems) IV. Manufacturing and distribution systems (inventory systems, Purchase and ordering systems, scheduling systems etc) V. Specialized systems (expert systems, decision support systems, artificial intelligence). VI. E-business applications (EDI, EFT, EBT, ATMs etc). c) Business applications systems controls I. Data input controls II. Systems development controls III. Data processing controls IV. Data file access and controls V. Audit trails VI. Data back up and recovery mechanisms B. E-Business And E-Commerce d) Definition of e-business e) Tools and channels pf e-businesses I. EDIs II. The World wide Web III. EFTs IV. Telecommunication channels f) E-commerce Models I. Business to Business II. Business to customers III. Business to employee IV. Business to Government g) E-commerce risks and exposures I. Confidentiality risks II. Integrity risks III. Availability risks IV. Authentication and non repudiation h) E-commerce audit and control issues. I. Use of Firewalls II. Public key infrastructure III. Encryptions IV. Password management V. Digital signatures ICAN TCI Designation Handbook - page 26
27 VI. Intrusion detection systems. VII. Proxy servers C. Management of Application Systems a. Systems development /outsourcing issues. b. System modifications and maintenance controls. c. User support d. Data back up and contingency plans. e. Software licensing and legal issues. D. The Internet Concepts and Issues f. The world wide web (WWW) concept g. WWW as enablers of business and competition. h. Designing and creating websites for organizations i. Hosting websites j. Communication Channels k. Service providers l. Administering websites E. Application Integration m. Customer relationship mgt n. Enterprise resource planning o. Supply-Chain mgt p. Selling-chain mgt q. Operation Resource mgt, r. Enterprise application Integration tools. F. Impact of E-business s. Mass Customisation t. Disintermediation u. Cultural Transformation (Change mgt) v. Competitive Pressure. G. E-Banking Regulation in Nigeria 1. +3H #' H1<'H = + 40' 4. 32"1 &5 '6/ & ICAN TCI Designation Handbook - page 27
28 %( $'/ / ' / '2375 A. / a. Developing Corporate Information Security Management Program i. 1 ii iii. 4 iv C,C& b. 1 i. 0C ii. 6, iii. 1 iv. v. 4 C c. +1 d. 4,1 e. f. 4 E 1 i. & ii. iii. 6 '&' iv., v. 3 vi. vii. + h. i. 15 F''+ ii. 6'& iii. C5 iv. 4& v. <,15 i. ) j. E111 ICAN TCI Designation Handbook - page 28
29 A. + / a. &&61 b. 14 & c. &4 d. 1 i. 333/ ii. iii. 4=1 0 ' / '% / a. 0&6 b. 164, c. 3& 5 d. 3 e. 6 f. /& g. 6 0& h. i. E5.6 j. - 64& '1## 2.,14&, 3. 16# & I ICAN TCI Designation Handbook - page 29
30 %( / (, + / * ' ( 2385 &'1' 16& 1. Definition of User and Developer requirements 2. Current System Analysis 3. Feasibility Study 4. Analysis of requirements a) User Input b) Gather documents and reports 5. Design to specifications 6. Construct systems solutions, i.e. develop, test and validate prototype 7. Gain User feedback 8. Develop procedures and documentation 9. Implementation 10. Continuous review and quality assurance Systems development life cycle (SDLC) 2. Waterfall approach 3. Spiral approach 4. Iterative approach 5. Alternate development tools 6. Unified modelling language (UML) 6 1. Data Flow Diagrams 2. Data Dictionary 3. Flow diagrams 4. International Standards Organisation (ISO) Standards 5. Standards bodies a) Object Management Group (OMG) b) Nigerian Standards Organization (NSO) 61)5 1. Needs analysis and other investigative techniques, including the rule (Pareto Principle) 2. Sensitivity Analysis in Criteria Setting 3. Arithmetic of Risk Assessment 4. Tangible and Intangible Assessments 5. Isolate and gain consensus on what is to be preserved. &.5 1. Defining project objectives including budgeting 2. Staffing and roles 3. Planning and scheduling, e.g. setting tasks and milestones 4. Estimating, e.g. resource loading and allocation Tools, i.e. PERT, CPM and Gantt Charts F. Package Selection ICAN TCI Designation Handbook - page 30
31 % ' &.5 45E' H #31 ' 3. $'/&.5 ' '1H1C' H"# 'H < 5. I ICAN TCI Designation Handbook - page 31
32 , ), ) ' ( 295 A. 6 a. 66 b. / c. 6& F+6 d. 65 & e. 5 6" f. 6 g. E6"& B C. 6 D. 5 a. +45 b. +46 c d. "4 5 E. 45 F a b. --4 c. 1-45= 45 G. /E E5 a. ""1 b. <65 c.,65 H. " a. "6 b. 16 c. 6" d. =+ 6 e. "" f. 1" g. " h. 3@" i. /" j. 16 I. 6E a. 66E 45 b. 65E 45 c. 6LE d. -)) e. & J. 1LE46LE a. 46 b. = 6 c. 3L d. # 14 K. 60 L. 65 M. /& N. 5 1 ICAN TCI Designation Handbook - page 32
33 #C& '&H&'H, ''5 &4' 4. 6& "'6 '65, ICAN TCI Designation Handbook - page 33
34 ' #( THE INSTITUTE OF CHARTERED ACCOUNTANTS OF NIGERIA (Established by Act of Parliament No. 15 of 1965) Passport REGISTRATION FORM 1. 13,E 2. / 3. 52OOOOOOOOOOOOOOOOOOOOOO@" 2OOOOOOOOOOOOOOOOOOOOOO / D< 9/ #15< >2, ' ' Technology Competence Initiative (TCI) ")>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> 4 A@ 2 ICAN TCI Designation Handbook - page 34
35 ?1&/1/4*16E1 52 /66411P&2 =& %($' ( ' 6&, H 1 E & * -) ICAN TCI Designation Handbook - page 35
"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationCCISO Blueprint v1. EC-Council
CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance
More informationANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And
ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief
More informationRisk Management in Electronic Banking: Concepts and Best Practices
Risk Management in Electronic Banking: Concepts and Best Practices Jayaram Kondabagil BICENTENNIAL B1CBNTENNIAL John Wiley & Sons (Asia) Pte Ltd. Contents List of Figures xiii List of Tables xv Preface
More informationBCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016
BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 This professional certification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification
More informationCompTIA Project+ (2009 Edition) Certification Examination Objectives
CompTIA Project+ (2009 Edition) Certification Examination Objectives DRAFT INTRODUCTION The Project + examination is designed for business professionals involved with projects. This exam will certify that
More informationISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard
Certification Exam Outline Effective Date: April 2013 About CISSP-ISSMP The Information Systems Security Management Professional (ISSMP) is a CISSP who specializes in establishing, presenting, and governing
More informationGeneral Instructions
Project Management Professional (PMP) General Instructions Introduction: Being a project manager in the organization is an ideal post that employees dream of. Don t let your dreams vanish in the air; stop
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationChapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC
Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post
More informationCITY OF MONTEBELLO SYSTEMS MANAGER
CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationGRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION
GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationControlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:
Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information
More informationUK Permanent Salary Index November 2013 Based on registered vacancies and actual placements
UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation
More informationBCS Foundation Certificate in Software Asset Management Essentials Syllabus
BCS Foundation Certificate in Software Asset Management Essentials Syllabus Version 4.6 March 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification
More informationDIPLOMA COURSE IN INTERNAL AUDIT
DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at
More informationInformation Technology General Control Review
Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor
More informationHRSD Position Description: UNIX Systems Administrator
HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position
More informationAltius IT Policy Collection
Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationPosition Description IT Auditor
Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership
More informationCHARTERING SITE QUICK START GUIDE
CHARTERING SITE QUICK START GUIDE Accessing the Chartering Site To access Volunteers of America s Chartering Site, please use the following link: https://charter.voa.org This will launch the initial log-in.
More informationCertificate Software Asset Management Essentials Syllabus. Version 2.0
Certificate Software Asset Management Essentials Syllabus Version 2.0 June 2010 Certificate in Software Asset Management Essentials Leaning Objectives Holders of the ISEB Certificate in SAM Essentials
More information- OQSF - Occupational Qualifications Sub-framework
All qualifications and part qualifications registered on the National Qualifications Framework are public property. Thus the only payment that can be made for them is for service and reproduction. It is
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationAltius IT Policy Collection Compliance and Standards Matrix
Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions
More informationISE North America Leadership Summit and Awards
ISE North America Leadership Summit and Awards November 6-7, 2013 Presentation Title: Presenter: Presenter Title: Company Name: Embracing Cyber Security for Top-to-Bottom Results Larry Wilson Chief Information
More informationYour IT Audit and Information Security Partner. CISA Exam Preparation June 2015 Session 6 : 14 April 2015 Starting around 4:45pm..
www.itsec.org.za Your IT Audit and Information Security Partner CISA Exam Preparation June 2015 Session 6 : 14 April 2015 Starting around 4:45pm.. Agenda Introductions Facilitator Participants Recap on
More informationIT123: SABSA Foundation Training
IT123: SABSA Foundation Training IT123 Rev.002 CMCT COURSE OUTLINE Page 1 of 8 Training Description: SABSA is the world s leading open security architecture framework and methodology. SABSA is a top-tobottom
More informationJohn Snare Chair Standards Australia Committee IT/12/4
John Snare Chair Standards Australia Committee IT/12/4 ISO/IEC 27001 ISMS Management perspective Risk Management (ISO 31000) Industry Specific Standards Banking, Health, Transport, Telecommunications ISO/IEC
More informationLevel 4 Diploma in Computing
Level 4 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that
More informationThe CIA Challenge Exam. August 2018
The CIA Challenge Exam August 2018 The IIA is committed to providing a clearly defined, professionally relevant suite of global certifications to support internal auditors as they progress through their
More informationLearning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019
Learning with the IIA Refreshing the profession: The New Internal Auditor Jan Olivier 6 February 2019 Contents title Qualifications framework CIA syllabus update Learning support Qualifications framework
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationTHE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK
GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER
More informationAltius IT Policy Collection Compliance and Standards Matrix
Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions
More informationE-Business. Level 6 L Module Descriptor
The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act,
More informationFORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC
FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC DISCLAIMER THIS PAPER IS NOT A LEGAL ADVISE OR OPINION IT DOES NOT SPEAK FOR OR
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006
ISO / IEC 27001:2005 A brief introduction Dimitris Petropoulos Managing Director ENCODE Middle East September 2006 Information Information is an asset which, like other important business assets, has value
More informationBCS Practitioner Certificate in Information Risk Management Syllabus
BCS Practitioner Certificate in Information Risk Management Syllabus Version 6.5 April 2017 This qualification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification in Wales,
More informationIT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.
Corporate Profile Company Profile IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades. As a resource partner, we offer personalized and professional
More informationFDIC InTREx What Documentation Are You Expected to Have?
FDIC InTREx What Documentation Are You Expected to Have? Written by: Jon Waldman, CISA, CRISC Co-founder and Executive Vice President, IS Consulting - SBS CyberSecurity, LLC Since the FDIC rolled-out the
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationCISA ITEM DEVELOPMENT GUIDE
CISA ITEM DEVELOPMENT GUIDE Updated March 2017 TABLE OF CONTENTS Content Page Purpose of the CISA Item Development Guide 3 CISA Exam Structure 3 Writing Quality Items 3 Multiple-Alternative Items 4 Steps
More informationPolicy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme. Version 1.2
Policy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme Version 1.2 July 2015 Copyright, Cradle to Cradle Products Innovation Institute, 2015
More informationReference Framework for the FERMA Certification Programme
Brussels, 23/07/2015 Dear Sir/Madam, Subject: Invitation to Tender Reference Framework for the FERMA Certification Programme Background The Federation of European Risk Management Associations (FERMA) brings
More informationAccreditation Services Council Governing Charter
Accreditation Services Council Governing Charter 2 Accreditation Services Council Governing Charter I. Introduction The Accreditation Services Council (Council) is established as a standing committee of
More informationTerms of Reference for the. IFMS Security review consultancy
Ministry of Finance Planning & Economic Development Terms of Reference for the IFMS Security review consultancy Table of Contents 1 Introduction... 1 1.1 Background... 1 1.2 The IFMS Environment... 1 1.3
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Code of practice for information security management
INTERNATIONAL STANDARD ISO/IEC 17799 First edition 2000-12-01 Information technology Code of practice for information security management Technologies de l'information Code de pratique pour la gestion
More informationSecurity Management Models And Practices Feb 5, 2008
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related
More informationAdvent IM Ltd ISO/IEC 27001:2013 vs
Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater
More informationAgenda. Bibliography
Humor 2 1 Agenda 3 Trusted Digital Repositories (TDR) definition Open Archival Information System (OAIS) its relevance to TDRs Requirements for a TDR Trustworthy Repositories Audit & Certification: Criteria
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationBCS Level 4 Award in Operating Systems (Cyber Intrusion Analyst) Syllabus 603/2894/0
BCS Level 4 Award in Operating Systems (Cyber Intrusion Analyst) Syllabus 603/2894/0 Version 1.1 February 2018 This is a United Kingdom government regulated qualification which is administered and approved
More informationCISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.
Course Outline CISM - Certified Information Security Manager 20 Nov 2017 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led
More informationBCS Level 3 Certificate in Software Development Context and Methodologies Syllabus QAN 603/1191/5
Making IT good for society BCS Level 3 Certificate in Software Development Context and Methodologies Syllabus QAN 603/1191/5 Version 3.1 March 2018 This is a United Kingdom government regulated qualification
More informationMeltem Özturan misprivate.boun.edu.tr/ozturan/mis515
Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility
More informationREPORT 2015/149 INTERNAL AUDIT DIVISION
INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationIT risks and controls
Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2018 Agenda I IT GOVERNANCE IT evolution, objectives, roles
More informationIT Audit Process Prof. Liang Yao Week Two IT Audit Function
Week Two IT Audit Function Why we need IT audit A Case Study What You Can Learn about Risk Management from Societe Generale? https://www.cio.com/article/2436790/security0/what-you-can-learn-about-risk-management-fromsociete-generale.html
More informationLevel 5 Diploma in Computing
Level 5 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that
More informationInformation Systems and Tech (IST)
Information Systems and Tech (IST) 1 Information Systems and Tech (IST) Courses IST 101. Introduction to Information Technology. 4 Introduction to information technology concepts and skills. Survey of
More informationSYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Operating System Security (Windows 2008 Server) COURSE NUMBER: CIST-0254 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE
More informationNATIONAL DIPLOMA: INFORMATION TECHNOLOGY: BUSINESS APPLICATIONS Qualification code: NDIB12 - NQF Level 6
NATIONAL DIPLOMA: INFORMATION TECHNOLOGY: BUSINESS APPLICATIONS Qualification code: NDIB12 - NQF Level 6 Campus where offered: Soshanguve South Campus Important notification to new applicants: No new applications
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationTrusted Identities That Drive Global Commerce
Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance
More informationCISA EXAM PREPARATION - Weekend Program
CISA EXAM PREPARATION - Weekend Program THE CISA QUALIFICATION: CERTIFICATION PREPARATION COURSE SYLLABUS PT. RIALACHAS TATHYA PRAYUKTI Menara Palma 12th Floor Jalan HR Rasuna Said Blok X2 Kav 6 Jakarta,
More informationCybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016
Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco
More informationVOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk
VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18 ocr.org.uk Contents Introduction 1 Key to forms of assessment 1 Version control 2 1 Skills for Business 3 1.1 Administration (Business Professional) 3 1.2
More informationSERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION
SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SD? This comprehensive official ITIL lifecycle certification course will provide you with critical knowledge and practical guidance
More informationCISA Training.
CISA Training www.austech.edu.au WHAT IS CISA TRAINING? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual
More informationImproving a Trustworthy Data Repository with ISO 16363
Improving a Trustworthy Data Repository with ISO 16363 Robert R. Downs 1 1 rdowns@ciesin.columbia.edu NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science Information
More informationcimc Information Brochure Chartered Institute of Management Consultants
cimc Chartered Institute of Management Consultants // Membership // CIMC Program // Capella Partnership // Business and Aquisition Certificate // Information Brochure Take a career leap with the Chartered
More informationIT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)
Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving
More informationStandard PMI e certificazioni professionali: novità 2009
Standard PMI e certificazioni professionali: novità 2009 Walter Ginevri, PMP Firenze, 4 Giugno 2009 NIC in NUMBERS in EMEA REGION PMI Standards (project) Practice Standard for Scheduling Practice Standard
More informationE-guide Getting your CISSP Certification
Getting your CISSP Certification Intro to the 10 CISSP domains of the Common Body of Knowledge : The Security Professional (CISSP) is an information security certification that was developed by the International
More informationPCI compliance the what and the why Executing through excellence
PCI compliance the what and the why Executing through excellence Tejinder Basi, Partner Tarlok Birdi, Senior Manager May 27, 2009 Agenda 1. Introduction 2. Background 3. What problem are we trying to solve?
More informationPaper 1 BUSINESS LAWS
Paper 1 BUSINESS LAWS UNIT I INDIAN CONTRACT ATC 1872 Offer, acceptance, Essentials of valid contract. Company Lawsformation of company, memorandum of association, articles of association, Prospectus,
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More informationUNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION. The National Quality Infrastructure Project for Nigeria (NQIP) Project ID
UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION The National Quality Infrastructure Project for Nigeria (NQIP) Project ID 130220 Terms of Reference for the Lead Auditor/ Training of Trainers (ToT) Courses
More informationIT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)
Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving
More informationThis course includes 14 lessons and 5 Course Activities. Each lesson contains one or more Lesson Activities. The lessons cover the following topics:
Syllabus Computer Science 1B Overview This one-semester course is intended as a practical, hands-on guide to help you understand various phases of the Software Development Life Cycle (SDLC). This course
More informationAuditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC
Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements
More informationInformation Security Controls Policy
Information Security Controls Policy Classification: Policy Version Number: 1-00 Status: Published Approved by (Board): University Leadership Team Approval Date: 30 January 2018 Effective from: 30 January
More informationCPM Certification Examination
CPM Certification Examination Preparation and Registration Information REAL ESTATE INSTITUTE of CANADA Institut canadien de l immeuble 5407 Eglinton Avenue West, Suite 208 Toronto ON M9C 5K6 Introduction
More informationTARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationObjectives of the Security Policy Project for the University of Cyprus
Objectives of the Security Policy Project for the University of Cyprus 1. Introduction 1.1. Objective The University of Cyprus intends to upgrade its Internet/Intranet security architecture. The University
More informationBusiness Advantage Through Structured Skills Development
Business Advantage Through Structured Skills Development Business Advantage through Structured Skills Development BCS Career Developer is a powerful browser-based solution to help you define, manage and
More informationCyber Criminal Methods & Prevention Techniques. By
Cyber Criminal Methods & Prevention Techniques By Larry.Boettger@Berbee.com Meeting Agenda Trends Attacker Motives and Methods Areas of Concern Typical Assessment Findings ISO-17799 & NIST Typical Remediation
More informationGRADUATE CERTIFICATE IN RISK MANAGEMENT
GRADUATE CERTIFICATE IN RISK MANAGEMENT If you are looking to develop expertise in a specialized area and broaden your knowledge base, but time and cost limitations are interfering with your ability to
More informationITSS Model Curriculum. - To get level 3 -
ITSS Model Curriculum - To get level 3 - (Corresponding with ITSS V3) IT Skill Standards Center IT Human Resources Development Headquarters Information-Technology Promotion Agency (IPA), JAPAN Company
More informationINTERNATIONAL EDUCATION PRACTICE STATEMENT (IEPS) 2 INFORMATION TECHNOLOGY FOR PROFESSIONAL ACCOUNTANTS (FINAL DRAFT) CONTENTS
INTERNATIONAL EDUCATION PRACTICE STATEMENT (IEPS) 2 INFORMATION TECHNOLOGY FOR PROFESSIONAL ACCOUNTANTS (FINAL DRAFT) CONTENTS Paragraph Introduction... 1-4 Definitions... 5 Scope and Structure of this
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationQualification Specification
BCS Level 2 Certificate in IT User Skills (ECDL Core) Version 2.0 March 2018 This is a United Kingdom government regulated qualification which is administered and approved by one or more of the following:
More informationitexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공
itexamdump 최고이자최신인 IT 인증시험덤프 http://www.itexamdump.com 일년무료업데이트서비스제공 Exam : CISA Title : Certified Information Systems Auditor Vendor : ISACA Version : DEMO Get Latest & Valid CISA Exam's Question and
More information