In modern information technology (IT) shops, there are important technology resources available to assist you with auditing an IT network and discovering hidden fraud. These can include software and hardware inventory systems, vulnerability assessment tools and log management systems that may already exist in your target environment. This course explores the vast array of technology resources available to assist with auditing for fraud.
You Will Learn How To:
- Recognize target networks and systems
- Determine which inventory tools are available for use in finding the size and extent of the problem.
- Identify vulnerability assessment tools, which are useful in exploring open ports, security vulnerabilities, and known issues with servers, PCs, and common network devices.
- Examine security and other event log management and collection systems to help trace activity back to a device or user
ACFE Ordering and Return Policy
PRESENTER: JOHN CHRISTLY, CFE, CISSP, PMP, PI
RECORDING DATE: MAY 29, 2014
DURATION: 100 MINUTES
ADVANCED PREPARATION: NONE
FIELD OF STUDY: AUDITING
LAST UPDATED: MARCH 2018
DELIVERY METHOD: QAS SELF-STUDY
ACFE On-Demand Webinar Courses Feature:
24/7 access to courses through your Internet browser
Save time and quickly earn CPE credits with Instant access, grading and printable certificate
The flexibility to start or stop a course and pick-up right where you left off
No additional shipping fees
Internet access: High-speed connection recommended
Free Adobe Flash Player
Speakers required for video sound