Auditing database activity is a core component to any company data governance. A company policy often set up auditing for security, privacy, or protection purposes, for example, to ensure that those without the permission to access information do not access it. It involves observing a database so as to be aware of the actions of database users. These actions requires to track and analyze any database activity including database security, access and usage, data creation, change or deletion. To become a database auditor, you need to learn Database (such as Oracle DBMS, MS SQL Server, etc) and CAATs (such as JCAATs, ACL, IDEA, etc.) .
Course Outline
Fundamental
24 CPE Credits
Understanding Database Legal and Ethical Issues for Computer Auditors Access and Extract Data from Database Workshop: Computer Auditing for Phantom User Account in the Database Workshop: Computer Auditing for Sod in the Database Workshop: Computer Auditing for Audit Log Trail in the Database Hands-On Experiment and Course Project
Recommended Training Methodology
These causes are practical training courses. The course must choose a CAATs, such as JCAATs, ACL, IDEA, etc., and a DBMS, such as Oracle, MS SQL, DB2, etc. as the course major tools to teach students. The use of case studies and projects are highly recommended. After the fundamental course, students can join an examination to earn a CDAP designation.
Prerequisite Knowledge
Specifically, students must thoroughly understand CAATs and DBMS.
ICAEA--International Computer Auditing Education Association