Training overview

An overview of our training offering for business and IT professionals, for internal controllers, risk managers and auditors, or management representatives. The schedule for the beginning of 2020 is presented below:

FebruaryMarchApril
10-14 February • CISA ⊛ EN 2 March • Mastering privacy regulation (GDPR) ⦿ EN 2 April • Managing privacy risk ℗ EN
17-20 Février • CISM ⊛ EN 9-10 March • COBIT 2019 Foundation ⊛ EN 20-21 April • COBIT Design & Implementation ⊛ EN
  16 March • COBIT 2019 Bridge ⊛ EN 27 April • Agile Auditing ⦿ EN
  17 March • ISO 27001 Information security ⦿ EN 27-30 April • NIST Cybersecurity ⊛ EN
  23 March • Introduction to IT audit ⦿ EN 28 April • Auditing outsourcing risk ⦿ EN
  30 March • Internal control framework COSO ⦿ EN May
  7 May • Implementing privacy with ISO 27701 ⦿ EN
    11 May • Operational Risk Management fundamentals ⦿ EN
    28 May • IT General Controls ⦿ EN

 Legend: ⊛ Certifying training; ⦿ 𝒾𝓃sight; ℗ Practice

All courses in the catalogue are listed below and recently added courses are marked ***NEW***.

Business Process Modelling for Auditors ℗ractice

***New***

Control and audit functions require a full understanding of the business process context...

Internal audit * Foundations and ℗ractice

***New Version***

As an internal auditor, you aim to take ownership of an audit process that is easy to use and transposable into your business environment.

Agile internal auditing ⦿𝒾𝓃sight

***New***

Understand why and how Agile Auditing can be applied in your organisation.

Internal control framework COSO 2013 ⦿𝒾𝓃sight

For more than 20 years, the COSO has been a key reference in the field of internal control worldwide.

Audit recommendation follow-up ⦿𝒾𝓃sight

As required by the Performance Standard of IIA's International Standards for the Professional Practice of Internal Auditing, ...

Building an audit plan ⦿𝒾𝓃sight

According to the IPPF (International Professional Practices Framework) standard on ‘Planning’, “The chief audit executive must establish an audit plan ...

Audit tools and techniques * ℗ractice

As an internal auditor, you want to gain efficiency, relevance and reliability in the development of your audit evidence.

Audit of  User Developed Applications ⦿𝒾𝓃sight

Every year billions are spent worldwide on new (versions of) application systems.

NIST Cybersecurity Professional Bootcamp ⊛ Certification

Quickly master the NIST CSF and implement and maintain your cybersecurity framework.

Audit of business processes and applications combined * ℗ractice

Digitisation has accelerated the automation of business processes.

Auditing outsourcing risk ⦿𝒾𝓃sight

The outsourcing of certain business processes has become unavoidable in today's information society.

Introduction to IT audit ⦿𝒾𝓃sight

To be successful as an audit professional in any sector, you must be able to follow and understand the changes in the world of information technology.

COBIT 2019 Foundation with ⊛ certification exam

COBIT® is an IT practice framework developed by ISACA since 1996. COBIT 2019 is designed to continuously evolve to address new and ever-changing technologies and challenges that businesses encounter today and into the future.

COBIT 2019 for auditors ⦿𝒾𝓃sight

As an IT auditor, you know better than anyone else the importance of sound IT governance and digital innovation

COBIT 2019 Bridge ⊛ Certification

***New***

COBIT® 2019 is an evolution of the previous version, COBIT® 5, building on its solid foundation by adding the latest developments affecting ...

COBIT 2019 Design & Implementation ⊛ Certification

***New***

This Design and Implementation course is intended for more experienced users to COBIT® who are interested in designing governance systems and running governance improvement programs.

Certified Information Systems Auditor (CISA) ⊛

Since 1978, the ISACA® Certified Information Systems Auditor (CISA) program has been the globally accepted standard of achievement among ...

Certified Information Security Manager (CISM) ⊛

CISM defines the core competencies and international standards of performance that information security managers are expected to master. ...

ISO 27001 Information Security ⦿𝒾𝓃sight

Information and security are vital for every organisation. But whether the information is stored electronically or printed on paper, ...

Mastering privacy regulation (GDPR) ⦿𝒾𝓃sight

A major challenge facing business risk management today is protecting personal data, such as customer identification files ...

Managing privacy risks (GDPR) ℗ractice

A major challenge facing business risk management today is protecting personal data, such as customer identification files ...

Big data

***New***

Big Data is used to process large and complex data sets that are beyond the capabilities of traditional data processing applications. Get your CCC Big Data Foundation certification.