Book
Business Skills
- Agile Auditing: Fundamentals and Applications
- Audit Risk Alert: General Accounting and Auditing Developments 2019/2020
- Auditing and Accounting Guide: Not-for-Profit Entities, 2019
- Beyond Audit: Auditing Remotely and Delivering Value
- International Auditing Standards in the United States: Comparing and Understanding Standards for ISA and PCAOB, Second Edition
Finance and Accounting
- AICPA Audit Guide: Government Auditing Standards and Single Audits
- Auditing Business Continuity: Global Best Practices
- Auditing for Dummies
- IT Auditing and Application Controls for Small and Mid-Sized Enterprises: Revenue, Expenditure, Inventory, Payroll, and More
- Lean Auditing: Driving Added Value and Efficiency in Internal Audit
Operating Systems and Servers
Operations Management
Security
- Auditing Cloud Computing: A Security and Privacy Guide
- Fundamentals of Information Risk Management Auditing: An Introduction for Managers and Auditors
- IS Standards and Summaries of Guidelines and Procedures for Auditing and Control Professionals
- ISO 27001 Controls: A Guide to Implementing and Auditing
- IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement
- IT Auditing: Using Controls to Protect Information Assets, Third Edition
- Nessus Network Auditing, Second edition
- Security and Auditing of Smart Devices: Managing Proliferation of Confidential Data on Corporate and BYOD Devices
- Swanson on Internal Auditing: Raising the Bar
- Understanding and Conducting Information Systems Auditing
Social Media
Video Course
Cloud Native Computing Foundation (CNCF)
Cybersecurity Collection
Information Systems Audit and Control Association (ISACA)
Information Technology
- Encore Session 1: Encryption, Data Access, Permissions, and Auditing
- Live Session 1: Encryption, Data Access, Permissions, and Auditing
- Post-Test 1: Encryption, Data Access, Permissions, and Auditing
- Pre-Test 1: Encryption, Data Access, Permissions, and Auditing
- Pre-Test 5: Plan, Deploy, and Manage Compliance, Archiving, eDiscovery, and Auditing
Internet and Network Technologies Solution Area
Networks and Telecommunications
Sysadmin & DevOps Collection
Bootcamp
Information Technology
- Encore Session 1: Encryption, Data Access, Permissions, and Auditing
- Live Session 1: Encryption, Data Access, Permissions, and Auditing
- Post-Test 1: Encryption, Data Access, Permissions, and Auditing
- Pre-Test 1: Encryption, Data Access, Permissions, and Auditing
- Pre-Test 5: Plan, Deploy, and Manage Compliance, Archiving, eDiscovery, and Auditing