Cybersecurity Audit Essentials

Professional training course

Cybersecurity Audit Essentials

Course Introduction Cybersecurity threats and risks are increasingly prominent in the news, often with exaggerated portr... The outline covers IT Security Evolution, Identifying and Responding to Data Breaches - Risk Ass...

Classroom

15 sessions
8 - 12 June 2026 Amsterdam €2,975 Register
10 - 14 August 2026 Istanbul €1,995 Register
14 - 18 September 2026 Vienna €2,975 Register
5 - 9 October 2026 Barcelona €2,695 Register
16 - 20 November 2026 Paris €3,150 Register
7 - 11 December 2026 Frankfurt €2,275 Register
15 - 19 June 2026 Istanbul €1,995 Register
3 - 7 August 2026 Barcelona €2,695 Register
7 - 11 September 2026 Paris €3,150 Register
12 - 16 October 2026 Frankfurt €2,275 Register
9 - 13 November 2026 Barcelona €2,695 Register
14 - 18 December 2026 Barcelona €2,695 Register
Scroll for more

Online / Live

15 sessions
Scroll for more

Introduction

Course overview

Course Introduction

Cybersecurity threats and risks are increasingly prominent in the news, often with exaggerated portrayals of their severity. Despite the media hype, these threats are real and can have significant consequences for various industries and organizations.

Beyond the direct impact on assets, the reputational damage, as seen with cases like Facebook and Cambridge Analytica, underscores the importance of managing cybersecurity risks effectively.

To address these challenges, companies and institutions must perform comprehensive Cybersecurity Audits. These audits are crucial for identifying vulnerabilities, assessing risks, and ensuring robust cybersecurity measures are in place.

The ability to manage and mitigate these threats can prevent both financial and reputational harm.

This Cybersecurity Audit Essentials training course is specifically designed to provide the knowledge and skills needed to plan and execute effective Cybersecurity Audits.

Participants will learn how to conduct thorough assessments, enabling their organizations to safeguard their assets and maintain a strong security posture.

This training course will feature:

  • An Overview of Information Security standards and practices
  • Risk Appraisal and available methods for Risk Assessment
  • Technical specification of cybersecurity
  • Secure network architecture and intrusion detection systems
  • IPv6, IPv4 Configuration and Risks
  • Case studies of Cybersecurity breaches and its consequences

Training Objectives

By the end of this training course, delegates will be able to:

  • Perform risk analysis of IT security breaches
  • Get acquainted with ISO 27001 and COBIT5
  • Acquire the knowledge of Information Security Management
  • Understand the approach for Crisis Management and Disaster Recovery

Who should Attend?

This training course is suitable to a wide range of professionals but will greatly benefit:

  • Risk Managers
  • Auditors
  • Application designers
  • Product designers
  • Marketing and research specialists
  • Statistical and Research Analysts
  • Key Application Development and data Research Personnel
  • Technology Engineers, Telecommunication engineers

Course content

Five focused days of learning and application

Day 1

IT Security Evolution

  • Categorizing Physical and Electronic Risk
  • Networking and Communication Technology
  • Computer Systems Design
  • Legal and Regulatory Considerations
  • Current Threat and Trend Analysis
  • Review and Case Study

Day 2

Identifying and Responding to Data Breaches - Risk Assessment and Crisis Management

  • IPv6 Configuration and Risks
  • Domain Name System Security Extensions (DNSSEC)
  • Crisis Management Planning
  • Forensic and Electronic investigations
  • Responding to Business Continuity
  • Review and Case Study

Day 3

Preparing the Cybersecurity Audit Scope

  • NIST Cybersecurity Framework
  • Cyber incident response policy requirements
  • COBIT 5 framework
  • Audit plan as per the NIST Cybersecurity Framework
  • Audit plan using the COBIT 5 framework
  • Review and Case Study

Day 4

Executing the Cybersecurity Audit

  • Using BowTie method for cybersecurity risk management
  • Using AuditXP software for cybersecurity audit
  • Creating NIST Cybersecurity Framework audit questionnaire in AuditXP
  • Creating COBIT 5 framework audit questionnaire in AuditXP
  • Performing the Cybersecurity audit on the example entity
  • Review and Case Study

Day 5

Cybersecurity Audit Workshop

  • Forming the team, audit plan and the framework
  • Executing the audit
  • Review of the audit findings
  • Preparing recommendations
  • Discussing the findings and recommendation and their implementation
  • Constant monitoring and upgrade

FAQ

Frequently asked questions

What does Cybersecurity Audit Essentials cover?

This course covers IT Management and Cyber Security through a structured five-day outline focused on practical application, discussion, and implementation planning.

When is the next available session?

The next scheduled session starts on 11 - 15 May 2026, with additional classroom dates and mirrored Online / Live options listed in the course schedules section.

Who should attend this course?

This programme is designed for professionals responsible for strategy, operations, transformation, or delivery leadership.

How can I register for a session?

Use any Register button next to the available course dates to open the participant registration page and submit your booking request for the selected session.

Is this course available online as well as classroom-based?

Yes. The course detail page includes both classroom sessions and Online / Live sessions, with online options aligned to the same course dates for easier planning.

Where are classroom sessions delivered?

Current classroom venues include Munich, Amsterdam, London, Istanbul, Vienna, Barcelona, Paris, Frankfurt.

Still Have Questions?

Contact the academy team for course details, delivery options, and delegate guidance.

Contact Us