Technology Competence Initiative

Similar documents
"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

CCISO Blueprint v1. EC-Council

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

Risk Management in Electronic Banking: Concepts and Best Practices

BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016

CompTIA Project+ (2009 Edition) Certification Examination Objectives

ISSMP is in compliance with the stringent requirements of ANSI/ISO/IEC Standard

General Instructions

Certified Information Systems Auditor (CISA)

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

CITY OF MONTEBELLO SYSTEMS MANAGER

GRADUATE CERTIFICATE IN MANAGEMENT SYSTEMS ADMINISTRATION

Certified Information Security Manager (CISM) Course Overview

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

UK Permanent Salary Index November 2013 Based on registered vacancies and actual placements

BCS Foundation Certificate in Software Asset Management Essentials Syllabus

DIPLOMA COURSE IN INTERNAL AUDIT

Information Technology General Control Review

HRSD Position Description: UNIX Systems Administrator

Altius IT Policy Collection

TEL2813/IS2820 Security Management

Position Description IT Auditor

CHARTERING SITE QUICK START GUIDE

Certificate Software Asset Management Essentials Syllabus. Version 2.0

- OQSF - Occupational Qualifications Sub-framework

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Altius IT Policy Collection Compliance and Standards Matrix

ISE North America Leadership Summit and Awards

Your IT Audit and Information Security Partner. CISA Exam Preparation June 2015 Session 6 : 14 April 2015 Starting around 4:45pm..

IT123: SABSA Foundation Training

John Snare Chair Standards Australia Committee IT/12/4

Level 4 Diploma in Computing

The CIA Challenge Exam. August 2018

Learning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

Altius IT Policy Collection Compliance and Standards Matrix

E-Business. Level 6 L Module Descriptor

FORENSIC LABORATORY DEVELOPMENT AND MANAGEMENT: INTERNATIONAL BEST PRACTICES BY AGWEYE, BENEDICT HEAD OF FORENSICS, EFCC

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

ISO / IEC 27001:2005. A brief introduction. Dimitris Petropoulos Managing Director ENCODE Middle East September 2006

BCS Practitioner Certificate in Information Risk Management Syllabus

IT People has been offering end-to-end IT outsourcing & staffing solutions to companies since two decades.

FDIC InTREx What Documentation Are You Expected to Have?

Accelerate Your Enterprise Private Cloud Initiative

CISA ITEM DEVELOPMENT GUIDE

Policy for Accrediting Assessment Bodies Operating within the Cradle to Cradle Certified Product Certification Scheme. Version 1.2

Reference Framework for the FERMA Certification Programme

Accreditation Services Council Governing Charter

Terms of Reference for the. IFMS Security review consultancy

ISO/IEC INTERNATIONAL STANDARD. Information technology Code of practice for information security management

Security Management Models And Practices Feb 5, 2008

Advent IM Ltd ISO/IEC 27001:2013 vs

Agenda. Bibliography

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

BCS Level 4 Award in Operating Systems (Cyber Intrusion Analyst) Syllabus 603/2894/0

CISM - Certified Information Security Manager. Course Outline. CISM - Certified Information Security Manager.

BCS Level 3 Certificate in Software Development Context and Methodologies Syllabus QAN 603/1191/5

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

REPORT 2015/149 INTERNAL AUDIT DIVISION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

IT risks and controls

IT Audit Process Prof. Liang Yao Week Two IT Audit Function

Level 5 Diploma in Computing

Information Systems and Tech (IST)

SYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

NATIONAL DIPLOMA: INFORMATION TECHNOLOGY: BUSINESS APPLICATIONS Qualification code: NDIB12 - NQF Level 6

Checklist: Credit Union Information Security and Privacy Policies

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

Trusted Identities That Drive Global Commerce

CISA EXAM PREPARATION - Weekend Program

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

VOCATIONAL QUALIFICATIONS ENTRY CODES 2017/18. ocr.org.uk

SERVICE DESIGN ITIL INTERMEDIATE TRAINING & CERTIFICATION

CISA Training.

Improving a Trustworthy Data Repository with ISO 16363

cimc Information Brochure Chartered Institute of Management Consultants

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Standard PMI e certificazioni professionali: novità 2009

E-guide Getting your CISSP Certification

PCI compliance the what and the why Executing through excellence

Paper 1 BUSINESS LAWS

ROLE DESCRIPTION IT SPECIALIST

UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION. The National Quality Infrastructure Project for Nigeria (NQIP) Project ID

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

This course includes 14 lessons and 5 Course Activities. Each lesson contains one or more Lesson Activities. The lessons cover the following topics:

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Information Security Controls Policy

CPM Certification Examination

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Objectives of the Security Policy Project for the University of Cyprus

Business Advantage Through Structured Skills Development

Cyber Criminal Methods & Prevention Techniques. By

GRADUATE CERTIFICATE IN RISK MANAGEMENT

ITSS Model Curriculum. - To get level 3 -

INTERNATIONAL EDUCATION PRACTICE STATEMENT (IEPS) 2 INFORMATION TECHNOLOGY FOR PROFESSIONAL ACCOUNTANTS (FINAL DRAFT) CONTENTS

POSITION DESCRIPTION

Security and Privacy Governance Program Guidelines

Qualification Specification

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Transcription:

THE INSTITUTE OF CHARTERED ACCOUNTANTS OF NIGERIA (Established by Act of Parliament No. 15 of 1965) Technology Competence Initiative Initial Implementation of IFAC Education Guideline No 11 on Information Technology Competence for Professional Accountants Designation Information Handbook & A. J. SILICON (Financial & Information Technology Consultants)

ICAN TCI Designation Handbook - page 2

Introduction... 4 Rationale... 4 OBJECTIVES OF THE CACITP PROGRAM... 6 The certification program has four objectives:... 7 BENEFITS OF THE PROGRAM... 8 ACCREDITATION REQUIREMENTS... 9 The CACITP Test... 9 Eligibility Requirements for the CACITP Test... 9 Method of Application... 10 The CACITP Course of Study... 10 Registration For Test... 10 Preparing for the CACITP Test... 10 Remedial Course in Computing... 11 Testing Areas... 11 Submission of materials for issues of Certificate... 13 Application Audit... 13 Receiving the Designation... 13 ACCREDITATION ENTITLEMENTS... 13 POST ACCREDITATION REQUIREMENTS... 13 MCPE Credit Hours... 14 Method of Payment... 14 PROGRAM DEVELOPMENT AND IMPLEMENTATION CONSULTANTS... 15 Appendix... 16 Description of Relevant IT Business Experience... 16 Systems Auditing and Internal Control... 16 Information Technology Strategic Planning... 16 Management of Information Systems... 16 Computer Systems Architecture... 16 Business Applications and E-Business... 16 Information Technology Security and Contingency Planning... 16 Information System Delivery and Project Management... 17 Databases and Database Management... 17 Syllabus and Recommended Reading Reference... 18 Proficiency Course In Computing... 19 CACITP Syllabus... 1 Registration Form... 34 ICAN TCI Designation Handbook - page 3

" " # $$ % &'( ) * " +) ), -, ', ',. - -,' ', / 0 1 - ), ),, ) ICAN TCI Designation Handbook - page 4

' ' ) ',,, ), -., - -,, ) )- 2 ' *-', ) ' ' ' ' ' 3, ICAN TCI Designation Handbook - page 5

/, /,. / /' 1/ 1/' 10 - ' ),, 3 / 4, 5, % ( ), -,, ' *, )', ) ' ), - ),, - ) +) ) * & & 2 1. /.6 & 7 2. 3 7 3. 4)7 4. "#, && 2 ICAN TCI Designation Handbook - page 6

7 7 7 7, -, ', - & & ' *, $ % &' ($ %)* + 1.,,, 2. 3. ) 4. ' ' * & - 6, 2 1 1 & 5 1 1 3+3 18 16&.5 5 6165 ICAN TCI Designation Handbook - page 7

##, * ' / / 5 "$9':;;;',, ', "& '2 #'- < *, ' ' ', ) * & & &2 - # )' ' + +, / / / / + ), 3 +,, ICAN TCI Designation Handbook - page 8

,-. & )'2 3 < <446 /= ' ' " $>;+ )1'?;+)' ' '51' 516'1 && 6:- @ ', )+ -& $ * & '.' :;;. ) ' + ).. ' & & ) *, ) * A9) ) & @( ')/ 0 ( %$ ),&' 5 5 -+ + $>;?; +) ICAN TCI Designation Handbook - page 9

$%&& " 6 1 : ' :';;; >;';;;9BC') & /( $ ) ( / /, /1 $ %/ *&$>; & ),.>;';;;-- $>;?;,& ' # ) $;';;; ', &, & '%$ & & ' ' ' & + ' ) ),& - &' - ICAN TCI Designation Handbook - page 10

( (&' '' @,' *, * ' %& ( +' D;','.' E &<'$9';;;'- - ' - 2 %( / (' 2345, ' / ' ) ' ' ' @' 1) %( $'/ ' '2345, '. ) F' '' ','F '( %%( / (, ' ' ' ' ' ',' ICAN TCI Designation Handbook - page 11

++ ' *+ +, (& / ($ 2365, 1' ', ' 1' && 2365, G+G, + ' ' - ' ' ' + ' ' ' + / ' / '2375, ' ' + ' + ' ' @' ' ' %( / (, + / * '( 2385, ' 16E' *' ' ), ), '( 295, ) ', 3 ICAN TCI Designation Handbook - page 12

)(%( % % % /)' 2 1. & 2. 1-3. 1 4. && ) +) ) * && " ' @ +'$, ' ) &' & &, & ' 2 + ' %15, 2 "' ' & ' 0 & ',-. '& + +)2 ICAN TCI Designation Handbook - page 13

5 D; &$:;>9B +) 5& $% /( ' &') %, :; ' (%<" $( ( ICAN TCI Designation Handbook - page 14

,,. ' 6&, H 1 ) 2 4C'E4' 4'/.3 '4@- ' 3 31-'&/3-$;AI:'H' 2;$DA;+:AI:'D?;+AAD:':::+$99?';?;9>:D+>>;: #152;?;:I$>+$I9A';?;II9$+$A99'"-2;$:::+$99?' 2, J A. J. SILICON (Financial & Information Technology Consultants) $6'&6 5/#,.36,.'E 1' 2;$DA;+;A$:'DA;+$A>K'AKD+A$I; ;?;ID;:+;A9D';?;IIK9+I$DD 2.J ICAN TCI Designation Handbook - page 15

&& =, &% + =& 3- -- + 2 ' ' ' ' ' ' ' ' ' ' 2 / (' - &@- 6 ' %( $'/ ' ' 6 ) 6 '( %%( / (, ) 4 E (& / ($ & ') &, ' ' ', ' ' && < 6 0 + %( $'/ / ' / ' " ICAN TCI Designation Handbook - page 16

'+''' ', & %( / (, + / * '( 6)4"& & )@ 6, ), ) '( 6 6 ', + 6 @ &' 0 (, - 2 6 & 6 +- -) ICAN TCI Designation Handbook - page 17

ICAN TCI Designation Handbook - page 18 / ) (( ' % 1 44

% / (&' A. History of Computers B. Introduction to Hardware 1. Components of a Computer Systems 2. Computer Peripherals 3. Computer Shopping C. Computer Maintenance 1. Hardware maintenance 2. Software Maintenance D. Introduction to Software 1. Types of Software - Systems Software - Application software 2. Software Licensing and Piracy Issues 3. Viruses and Anti-virus Software. E. Operating Systems 1. History of Operating Systems 2. Single/Multi-user Operating Systems 3. Network Operating Systems F. Word Processing Applications 1. Concept of Word Processors 2. Special features of Word Processors G. Spreadsheet Applications 1. Concept of Spreadsheet Applications 2. Special features of Spreadsheet Applications H. Introduction to Databases 1. Concepts 2. Database Management Systems. 1$ 1. Evolution of the Internet 2. Web Browsers and Web Servers. ICAN TCI Designation Handbook - page 19

1 %( / (' 2345 A. 6 B. 1 i. & ii. & iii. /. iv. 4 v. 6 C. 1 i. ii. 4, iii. iv. v. 5 D. E 4 i. 3,1 314 ii. 3@64 iii. & iv. 5 v. E 1 E. 1 F. C1 i. /. ii. 1 G. # i. / 1 ii. 16 iii. <1 iv. v. 6/ H. i. ii. & iii. / I. 61 J. 1+1 i. 114, ii. " 1. " 2. "6 K. 11 i. 1 65 16351 ii. 1 /4+1 iii. 6 iv. 3 v.,1'1 L. 1 i. *4 ii. 4, iii. 14 iv. 1 ICAN TCI Designation Handbook - page 20

/ (' i. & ii. 3 iii. 6 = iv. 5/. v. 1 vi. # vii. & 5 6 viii. -& 1& ix. 6 0 4 N.,/ 11 O. / P. ) F E0A i. 6 6 ii. 6"1 iii. = 4 iv. 6 3"1/. v. 4 44 vi. L 4 - Q. 2 % ' 1. 1 'H< 2. 140 3. /.4 'I 4. 11 5. E00,,6+4/5 6. ICAN TCI Designation Handbook - page 21

' '%%( $'/2345 A. 5 *4 B. 1 C. /1 & D. &1& a. 01&M b. 1& c. &1& d. & 41=6 e. 4/1 f. &.41& E. 61 & a. b. 4 c. & F. 3E + & G. 1"',) H. L1 & I. 1 3 a. 3& b. 4 6 c. +0+ 1 d. 1 e. C6 f. 6 3+6 g. / h. J. 1 1 a. +3 b. 4, c. " K. &.5 a. 6E16= b. &.1 c. &.5 5 d. &.5 L. E M. 1E N. 1& O. 5 1 & P. 51 & ICAN TCI Designation Handbook - page 22

% ' 1. 1 5 2 1 5 1''4/346#EE41'6E 2. &#11 & 3. 1 & 1H0H& 4. 'I ICAN TCI Designation Handbook - page 23

' ( %%( / (2365 A. Quality Issues in IS Management 1. Policies, Procedures and methodologies that support a strategic plan 2. Organizational structure policy and procedures 3. Human resource policies including career paths, performance evaluation and job descriptions / training 4. Hardware and software in alignment with technology plan 5. Data accuracy, validity and reliability 1( %% / %% + 1. Efficiency of organization structure 2. Effectiveness of processes, i.e. people, skill sets, adequate training 3. Hardware, software, speed and throughput 4. Data Integrity 1 %% + 1. Evaluation of ROI and other ratios and performance metrics 2. Analyse and evaluate organisation structure, people, skills sets, hardware, software and data,1 ' ' ( 1. Contracts, licensing 2. Benefits and issues of forms of control and management of intellectual property 3. Data ownership image and text material, domain name rights and ownership, International Issues % ' 1. 15 1 2. 5 125 + 3H/*3 3. 1=H#'H1#1 ICAN TCI Designation Handbook - page 24

(& / ($ 2365 1 ; a. Stand alone computers b. Networked computers and file servers c. Input and output devices d. Generic input devices (Palm Pilot, pocket PC) e. Data Storage media f. Network connectivity resources (routers, switches, hubs, cabling, NICs) 1& '/ ( (( a., b. 6, c. C. & : ' ( %/ (&& D. ''/ (.&' E., (( a. 1/145 b. &@&'&N@1&N F. && %/ ($ % ' 1. 1I'555 2. 1/ H6 3. <112 ICAN TCI Designation Handbook - page 25

&& < 2365 A. Business Application Systems a) Overview of business applications systems b) Classes of applications systems I. Financial systems (banking applications, insurance and underwriting systems, accounting systems) II. Office automation applications (word processors, spreadsheets, e-mail systems) III. Human resource management systems (payroll systems, staff benefit and tax computation systems, human resource management systems) IV. Manufacturing and distribution systems (inventory systems, Purchase and ordering systems, scheduling systems etc) V. Specialized systems (expert systems, decision support systems, artificial intelligence). VI. E-business applications (EDI, EFT, EBT, ATMs etc). c) Business applications systems controls I. Data input controls II. Systems development controls III. Data processing controls IV. Data file access and controls V. Audit trails VI. Data back up and recovery mechanisms B. E-Business And E-Commerce d) Definition of e-business e) Tools and channels pf e-businesses I. EDIs II. The World wide Web III. EFTs IV. Telecommunication channels f) E-commerce Models I. Business to Business II. Business to customers III. Business to employee IV. Business to Government g) E-commerce risks and exposures I. Confidentiality risks II. Integrity risks III. Availability risks IV. Authentication and non repudiation h) E-commerce audit and control issues. I. Use of Firewalls II. Public key infrastructure III. Encryptions IV. Password management V. Digital signatures ICAN TCI Designation Handbook - page 26

VI. Intrusion detection systems. VII. Proxy servers C. Management of Application Systems a. Systems development /outsourcing issues. b. System modifications and maintenance controls. c. User support d. Data back up and contingency plans. e. Software licensing and legal issues. D. The Internet Concepts and Issues f. The world wide web (WWW) concept g. WWW as enablers of business and competition. h. Designing and creating websites for organizations i. Hosting websites j. Communication Channels k. Service providers l. Administering websites E. Application Integration m. Customer relationship mgt n. Enterprise resource planning o. Supply-Chain mgt p. Selling-chain mgt q. Operation Resource mgt, r. Enterprise application Integration tools. F. Impact of E-business s. Mass Customisation t. Disintermediation u. Cultural Transformation (Change mgt) v. Competitive Pressure. G. E-Banking Regulation in Nigeria 1. +3H #' 2. 1 +3H1<'H4 3 3. = + 40' 4. 32"1 &5 '6/ 5. 21 53++3 & ICAN TCI Designation Handbook - page 27

%( $'/ / ' / '2375 A. / a. Developing Corporate Information Security Management Program i. 1 ii. 6 11 iii. 4 iv. 1 1. 3 2. 3. C,C& 4. 5. b. 1 i. 0C ii. 6, iii. 1 iv. v. 4 C c. +1 d. 4,1 e. f. 4 E 1 g. @ i. & ii. iii. 6 '&' iv., v. 3 vi. vii. + h. i. 15 F''+ ii. 6'& iii. C5 iv. 4& v. <,15 i. ) j. E111 ICAN TCI Designation Handbook - page 28

A. + / a. &&61 b. 14 & c. &4 d. 1 i. 333/ ii. iii. 4=1 0 ' / '% / a. 0&6 b. 164, c. 3& 5 d. 3 e. 6 f. /& g. 6 0& h. i. E5.6 j. - 64& 1. 1364 '1## 2.,14&, 3. 16# 4. 35 6 5. & 646416 6. I ICAN TCI Designation Handbook - page 29

%( / (, + / * ' ( 2385 &'1' 16& 1. Definition of User and Developer requirements 2. Current System Analysis 3. Feasibility Study 4. Analysis of requirements a) User Input b) Gather documents and reports 5. Design to specifications 6. Construct systems solutions, i.e. develop, test and validate prototype 7. Gain User feedback 8. Develop procedures and documentation 9. Implementation 10. Continuous review and quality assurance 36 1. Systems development life cycle (SDLC) 2. Waterfall approach 3. Spiral approach 4. Iterative approach 5. Alternate development tools 6. Unified modelling language (UML) 6 1. Data Flow Diagrams 2. Data Dictionary 3. Flow diagrams 4. International Standards Organisation (ISO) Standards 5. Standards bodies a) Object Management Group (OMG) b) Nigerian Standards Organization (NSO) 61)5 1. Needs analysis and other investigative techniques, including the 80 20 rule (Pareto Principle) 2. Sensitivity Analysis in Criteria Setting 3. Arithmetic of Risk Assessment 4. Tangible and Intangible Assessments 5. Isolate and gain consensus on what is to be preserved. &.5 1. Defining project objectives including budgeting 2. Staffing and roles 3. Planning and scheduling, e.g. setting tasks and milestones 4. Estimating, e.g. resource loading and allocation Tools, i.e. PERT, CPM and Gantt Charts F. Package Selection ICAN TCI Designation Handbook - page 30

% ' 1. 162&.5 45E' H 2. 16 ++#31 ' 3. $'/&.5 '11 4. 16 '1H1C' H"# 'H < 5. I ICAN TCI Designation Handbook - page 31

, ), ) ' ( 295 A. 6 a. 66 b. / 1 661 c. 6& F+6 d. 65 & e. 5 6" f. 6 g. E6"& B. 65 1 C. 6 D. 5 a. +45 b. +46 c. +4546 d. "4 5 E. 45 F. 3465 a. 5 +46 46351 b. --4 c. 1-45= 45 G. /E E5 a. ""1 b. <65 c.,65 H. " a. "6 b. 16 c. 6" d. =+ 6 e. "" f. 1" g. " h. 3@" i. /" j. 16 I. 6E a. 66E 45 b. 65E 45 c. 6LE d. -)) e. & J. 1LE46LE a. 46 b. = 6 c. 3L d. # 14 K. 60 L. 65 M. /& N. 5 1 ICAN TCI Designation Handbook - page 32

1. 65 126 3 3++ #C& 2. 65 '&H&'H, 3. 6126 ''5 &4' 4. 6& "'6 '65, ICAN TCI Designation Handbook - page 33

' #( THE INSTITUTE OF CHARTERED ACCOUNTANTS OF NIGERIA (Established by Act of Parliament No. 15 of 1965) Passport REGISTRATION FORM 1. 13,E 2. / 3. 52OOOOOOOOOOOOOOOOOOOOOO@" 2OOOOOOOOOOOOOOOOOOOOOO / D< 9/ #15< >2, ' ' Technology Competence Initiative (TCI) ")>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> 4 A@ 2 ICAN TCI Designation Handbook - page 34

?1&/1/4*16E1 52 /66411P&2 1*1 @6 1*1 @6 =& %($' ( ' 6&, H 1 E & * -) ICAN TCI Designation Handbook - page 35