A Highly Interactive Training Course On

Auditing a Cybersecurity Programme

Assess and Improve the Readiness of your Cybersecurity

Auditing a Cybersecurity Programme
Course Schedule

CLASSROOM

06-10 Oct 2025
Dubai
$5,950
09-13 Feb 2026
Dubai
$5,950
Certificate
  • Coventry Academy Certificate of Attendance will be provided to delegates who attend and complete the course.

Training Overview

Training Overview

The security risks that need to be audited are rapidly increasing today. In order to prevent the data breaches that executives fear, auditors must be equipped to evaluate the effectiveness of a company’s cybersecurity program. To do so, they need to understand the required controls, how to implement them, and how to conduct tests to assess their effectiveness.

Throughout this training course, participants will engage in a series of exercises designed to reinforce and solidify their knowledge of designing and executing effective security solutions. The Auditing a Cybersecurity Programme training course will equip participants with the essential skills and expertise to conduct cyber assessments, helping them become a more valuable asset to their organization's cybersecurity defense team.

This Auditing a Cybersecurity Programme training course will feature:

  • Simulations of a real cybersecurity program audit
  • Cybersecuirty auditing tips
  • Cyber risk assessments
  • Threat analysis
  • Case studies of Cybersecurity breaches and its consequences

What are the goals?

By the end of this training course, delegates will be able to:

  • Perform risk analysis of IT security breaches
  • Get acquainted with ISO 27001 and COBIT5
  • Acquire the knowledge of Information Security Management
  • Understand the approach for incident response, Crisis Management and Disaster Recovery

Who is this Training Course for?

This training course is suitable for many professionals but will greatly benefit:

  • Auditors
  • IT professionals who are interested in conducting cybersecurity audits, risk assessments, vulnerability and threat analysis or control self-assessments

How will this Training Course be Presented?

This Auditing a Cybersecurity Programme training course will utilise a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented.  This includes theoretical presentation of the concepts, but the emphasis will be on the exercises performed by the delegates with the guidance of the instructor, when it comes to the performance of Risk Assessments and Risk Management. The delegates will be “learning by doing” as the training course is designed around the project of preparing and executing Cybersecurity audit. Delivery will be by presentation, group syndicate exercises, training e-manual and interactive seminars, video presentations and active use of software, as well as group discussion on the results of the exercises. The delegates will also use free software for risk management as well as for auditing.

The Course Content

Day One: Introduction to Cybersecurity
  • Vulnerability assessment
  • Threat analysis 
  • Cybersecurity risk assessment
  • Cybersecurity program
  • Cybersecurity risk auditing
Day Two: Inventory Security Management
  • Inventory authorized and unauthorized devices
  • Inventory authorized and unauthorized software
  • Secure configurations
  • Continuous vulnerability assessment and remediation
  • Control use of administrative privileges
  • Maintenance, monitoring and analysis of audit logs
Day Three: Network Security Management
  • Email and web browser protection
  • Malware defenses
  • Security configurations for network devices 
  • Wireless access control
  • Limitation and control of network ports, protocols and services
Day Four: Data Security Management
  • Data protection
  • Controlled data access based on need to know
  • Data recovery capability
  • Boundary defenses
  • Account monitoring and control
  • Security skills assessment and training
Day Five: Security Incident Management
  • Application software security
  • Cybersecurity Incidents
  • Incident response management
  • Penetration tests
  • Red team exercises

Providers and Associations

Aztech Training
Aztech Training