• Home
    • Principals Profile
    • Public Benefit Plan
    • About
    • Contact
    • Careers
    • TRADEMARK - USPTO
  • Training
    • AICPA-NASBA: ISC Credential Exam Preparation Course
    • Regulators and Corporate & Government IT Manager Training
    • Customized Onsite Hands-on Corporate Group Training
    • Academic Conferences >
      • Request A Conference
  • Publications
    • Vol. I: Standards - Principles - Rules
    • Vol II: Testing Strategy - Test Procedures - Test Cases
    • Vol. III: Practical Application of Automated Testing Techniques, Platforms, and Tools
    • Vol. IV: How to Conduct Risk Assessment in the CLOUD Ecosystem
    • Vol. V: How to Confirm Cash and Other General Ledger Accounts in the CLOUD
    • Vol. VI: What 21st Century Financial Statement Auditing Standards Look Like
    • Vol. VII: A Blockchain Solution for the PCAOB to Conduct Its Oversight & Inspection Activities
    • Vol. VIII: A Global Framework for Planning, Designing, Implementing, and Configuring CLOUD-based Business Solutions
    • Vol. IX: How to Conduct Computer Forensic Investigation in the CLOUD Ecosystem
    • Vol. X: Integrated Process Engineering Solution for the CLOUD Ecosystem
  • Store
  • CERTIFY A TOOL
    • Certification Lab
    • PaaS Security Questionnaire
    • Network Security Questionnaire
    • Logical Security Questionnaire
    • IaaS-Questionnaire
    • SaaS Questionnaire
    • PaaS Questionnaire
    • Metadata Audit (ETL) Questionnaire
    • API Questionnaire

Picture
Most IT auditing test cases require some level of Computer Forensic Investigation to verify the origin of electronic evidence. These test cases also require identification of the path the electronic evidence took and the number of hops the electronic evidence took to get to its final resting place in the ERP database or the financial statements database. Finally, financial auditors will needs to know the chain of custody of financial transactions that end up in financial statements.

In this Computer Forensic Investigation course you will learn about the various types of computer forensic tools used to trace, verify, and validate electronic evidence that culminate in the company's financial statement assertions.  
Powered by Create your own unique website with customizable templates.
  • Home
    • Principals Profile
    • Public Benefit Plan
    • About
    • Contact
    • Careers
    • TRADEMARK - USPTO
  • Training
    • AICPA-NASBA: ISC Credential Exam Preparation Course
    • Regulators and Corporate & Government IT Manager Training
    • Customized Onsite Hands-on Corporate Group Training
    • Academic Conferences >
      • Request A Conference
  • Publications
    • Vol. I: Standards - Principles - Rules
    • Vol II: Testing Strategy - Test Procedures - Test Cases
    • Vol. III: Practical Application of Automated Testing Techniques, Platforms, and Tools
    • Vol. IV: How to Conduct Risk Assessment in the CLOUD Ecosystem
    • Vol. V: How to Confirm Cash and Other General Ledger Accounts in the CLOUD
    • Vol. VI: What 21st Century Financial Statement Auditing Standards Look Like
    • Vol. VII: A Blockchain Solution for the PCAOB to Conduct Its Oversight & Inspection Activities
    • Vol. VIII: A Global Framework for Planning, Designing, Implementing, and Configuring CLOUD-based Business Solutions
    • Vol. IX: How to Conduct Computer Forensic Investigation in the CLOUD Ecosystem
    • Vol. X: Integrated Process Engineering Solution for the CLOUD Ecosystem
  • Store
  • CERTIFY A TOOL
    • Certification Lab
    • PaaS Security Questionnaire
    • Network Security Questionnaire
    • Logical Security Questionnaire
    • IaaS-Questionnaire
    • SaaS Questionnaire
    • PaaS Questionnaire
    • Metadata Audit (ETL) Questionnaire
    • API Questionnaire