|| CPE Credit: 2 |
Course Level: Intermediate
Prerequisite: An understanding of the technology available to uncover fraud during audits
In modern information technology (IT) shops, there are important technology resources available to assist you with auditing an IT network and discovering hidden fraud. These can include software and hardware inventory systems, vulnerability assessment tools and log management systems that may already exist in your target environment. This course explores the vast array of technology resources available to assist with auditing for fraud.
You Will Learn How To:
Recognize target networks and systems
Determine which inventory tools are available for use in finding the size and extent of the problem.
Identify vulnerability assessment tools, which are useful in exploring open ports, security vulnerabilities, and known issues with servers, PCs, and common network devices.
Examine security and other event log management and collection systems to help trace activity back to a device or user
Requires FREE Adobe Acrobat Reader available at
PRESENTER: John Christly, CFE, CISSP, PMP, PI
RECORDING DATE: May 29, 2014
DURATION: 100 MINUTES
FIELD OF STUDY: Auditing
Last Updated: March 2018
ACFE Ordering and Return Policy
Online CPE exam grading available for this course:
Online grading is available for ACFE self-study courses. Complete the course offline at your convenience, but take the exam online the moment you're ready. Featuring instant exam results and a printable certificate, online grading offers a quick and convenient way to earn CPE.
Benefits of online exam grading include:
Instant exam results
Printable CPE certificate
Complete the course at your own pace
Take the exam online the moment you're ready
Click here for instructions on accessing your online exam.