Using Readily Available IT Resources to Assist with Auditing for Fraud (On-Demand Webinar)


CPE Credit: 2 
Course Level: Intermediate
Prerequisite: An understanding of the technology available to uncover fraud during audits


Description:

In modern information technology (IT) shops, there are important technology resources available to assist you with auditing an IT network and discovering hidden fraud. These can include software and hardware inventory systems, vulnerability assessment tools and log management systems that may already exist in your target environment. This course explores the vast array of technology resources available to assist with auditing for fraud. 

You Will Learn How To: 

  • Recognize target networks and systems
  • Determine which inventory tools are available for use in finding the size and extent of the problem.
  • Identify vulnerability assessment tools, which are useful in exploring open ports, security vulnerabilities, and known issues with servers, PCs, and common network devices.
  • Examine security and other event log management and collection systems to help trace activity back to a device or user

ACFE Ordering and Return Policy


Webinar Information:

PRESENTER: JOHN CHRISTLY, CFE, CISSP, PMP, PI
RECORDING DATE: MAY 29, 2014
DURATION: 100 MINUTES  


CPE Information:


ADVANCED PREPARATION: NONE

FIELD OF STUDY: AUDITING

LAST UPDATED: MARCH 2018

DELIVERY METHOD: QAS SELF-STUDY

ACFE On-Demand Webinar Courses Feature:

24/7 access to courses through your Internet browser
Save time and quickly earn CPE credits with Instant access, grading and printable certificate
The flexibility to start or stop a course and pick-up right where you left off
No additional shipping fees

System Requirements:

Internet access: High-speed connection recommended

Free Adobe Flash Player

Speakers required for video sound