Loading Events

Auditing of Computerized Accounting system Training

June 3 - June 14

Auditing of Computerized Accounting system Course 

Learning outcomes

At the end of the instruction, the participants will be able to

  • Understand the concept of computerized accounting systems
  • Understand the processes of computerized accounting
  • Be aware of the advantages and risks involved in information technology auditing
  • Appreciate the importance of computerization of auditing
  • Receive information on techniques and methods of IT auditing
  • Be aware of the specific features of the audit of computerized accounting

Main Training Modules

   Audit, Assurance Services & Theory of Auditing

  • Evolution of Auditing
  • Major Influences on Auditing
  • Field of Auditing
  • Basic Concepts of Auditing
  • Evidence in Auditing.
  • The nature of assessing services
  • The chronology of an audit
  • The postulates of auditing, Agency theory, Imported theories.

Computer Fraud and Control

  • Definition of computer fraud
  • Fraud opportunities
  • Nature of computer fraud
  • Opportunities in advanced technology
  • Internet fraud
  • Stopping the hackers
  • What is predication and how does it work

Abilities of the IT Fraud Auditor

  • Goals and objectives of the IT fraud auditor
  • What makes a good IT auditor
  • Finding the right auditor
  • Progression of the fraud examination
  • The auditor’s toolkit

    Computer in auditing:

  • Approach to Computer Auditing
  • Types of Computer Systems,
  • Characteristics of a CIS Environment
  • Internal Controls in a CIS Environment.
  • Auditing in a CIS environment
  • Risk assessments and internal control in a CIS environment.
  • Standalone microcomputers.
  • Online computer systems Data Base System
  • Limitations of accounting and control systems
  • Use of service organizations for computer facilities
  • Systems development, Computers in audit management
  • Computer Security issues in computerized systems.
  • Organization and content of information
  • Functional scope of accounting software’s
  • Standards of design and choice of accounting software
  • Governance and IT audit methodologies
  • Concepts and principles of the COBIT methodology
  • Audit of a file of accounting entries
  • Approach to computer security

 Forming an auditing judgment:

  • Overall review of financial statements.
  • Opening balances, ISA 510 Comparatives.
  • Other information in documents containing audited financial statements.
  • Subsequent events. Contingencies,
  • Going Concern.
  • Management Responsibilities
  • Communication of audit matters with those charged with governance.
  • Completion of the audit.

 Management letters

  • Management Letters.
  • The contract of management letters.
  • Procedures for assembling and submitting the management letter
  • Points to note when drafting management letter possible reporting items.
  • Management letters – examples of layout.

Audit Reporting

  • Statutory requirement.
  • The auditor’s report on financial statements

Way forward After the Training

Participants will develop a work plan through the help of facilitators that stipulates application of skills acquired in improving their organizations. ASPM will continuously monitor implementation progress after the training. 

Training Evaluation:

Participants will undertake a simple assessment before the training to gauge the participant’s knowledge & skills and another assessment will be done after the training in-order to monitor knowledge gained through the training

Institutional Re-Engineering & Change Management
June 3 - June 14

Organizer

ASPM
+254 737 022726
info@aspm.co.ke

Venue

Nairobi
Nairobi Kenya + Google Map
+254 737 022726

Add a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

error: Content is protected !!