An intensive professional development training course on

Cybersecurity Audit Masterclass

Modules

This training course is split into two modules:

Module I - Cybersecurity Audit Essentials

Module II - Auditing a Cybersecurity Programme

Each module is structured and can be taken as a stand-alone training course; however, delegates will maximise their benefits by taking Module 1 and 2 back-to-back as a 2-week training course.

Why Choose Cybersecurity Audit Masterclass Training Course?

The Structure

This comprehensive training course consists of two modules which can be booked as a 10 Day Training event, or as individual, 5 Day training courses.

Module 1 – Cybersecurity Audit Essentials

Module 2 – Auditing a Cybersecurity Programme

The Course Content

Module 1: Cybersecurity Audit Essentials
  • Categorizing Physical and Electronic Risk
  • Networking and Communication Technology
  • Computer Systems Design
  • Legal and Regulatory Considerations
  • Current Threat and Trend Analysis
  • Review and Case Study
  • IPv6 Configuration and Risks
  • Domain Name System Security Extensions (DNSSEC)
  • Crisis Management Planning
  • Forensic and Electronic investigations
  • Responding to Business Continuity
  • Review and Case Study
  • NIST Cybersecurity Framework
  • Cyber incident response policy requirements
  • COBIT 5 framework
  • Audit plan as per the NIST Cybersecurity Framework
  • Audit plan using the COBIT 5 framework
  • Review and Case Study
  • Using BowTie method for cybersecurity risk management
  • Using AuditXP software for cybersecurity audit
  • Creating NIST Cybersecurity Framework audit questionnaire in AuditXP
  • Creating COBIT 5 framework audit questionnaire in AuditXP
  • Performing the Cybersecurity audit on the example entity
  • Review and Case Study
  • Forming the team, audit plan and the framework
  • Executing the audit
  • Review of the audit findings
  • Preparing recommendations
  • Discussing the findings and recommendation and their implementation
  • Constant monitoring and upgrade
Module 2: Auditing a Cybersecurity Programme
  • Vulnerability assessment
  • Threat analysis 
  • Cybersecurity risk assessment
  • Cybersecurity program
  • Cybersecurity risk auditing
  • Inventory authorized and unauthorized devices
  • Inventory authorized and unauthorized software
  • Secure configurations
  • Continuous vulnerability assessment and remediation
  • Control use of administrative privileges
  • Maintenance, monitoring and analysis of audit logs
  • Email and web browser protection
  • Malware defenses
  • Security configurations for network devices 
  • Wireless access control
  • Limitation and control of network ports, protocols and services
  • Data protection
  • Controlled data access based on need to know
  • Data recovery capability
  • Boundary defenses
  • Account monitoring and control
  • Security skills assessment and training
  • Application software security
  • Cybersecurity Incidents
  • Incident response management
  • Penetration tests
  • Red team exercises

Certificate and Accreditation

  • AZTech Certificate of Completion for delegates who attend and complete the training course
Do you want to learn more about this course?

Frequently Asked Questions

There are several convenient ways to register for our training programs:

  • Online: Explore our training calendar, choose the course that suits your needs, and click the “Register Now” button on the course details page.
  • Email: Share your details, including your name, organization, email address, and selected course, by sending an email to  info@aztechtraining.com
  • Phone: Reach out to us directly at +971 4 427 5400 or +971 4 427 5401, and our team will guide you through the registration process.

Once your registration is successfully completed, you will receive a confirmation email within 24 hours. This email will contain your registration details, invoice, and the necessary joining instructions for the course.

The training fees include full access to the training venue, along with comprehensive training materials to enhance your learning experience. Additionally, participants will be provided with writing supplies and stationery. To ensure comfort and convenience, the fee also covers lunch and refreshing coffee breaks throughout the duration of the course.

Our training programs are hosted at luxurious five-star hotels in prestigious destinations across the globe. Some of our popular locations include Dubai, London, Kuala Lumpur, Amsterdam, New York, Paris, Vienna, and many other iconic cities.

Yes, we offer tailored corporate training solutions to meet your organization's specific needs. Please contact us at info@aztechtraining.com or call +971 4 427 5400 for more information.

Do you know someone who'd love this course?
Tell them about it...

Find the right course for you

See your personalised recommendations based on your interests and goals.
layers icon
pin icon
View courses
Copyright © 2025 AZTech Training & Consultancy - All rights reserved.

AZTech Training & Consultancy
Chat with an assistant

Amina
Hello there
how can I assist you?
1:40
×