IT50 ● Certified Information Systems Auditor (CISA) I Certifying sign

Since 1978, the ISACA® Certified Information Systems Auditor (CISA) program has been the globally accepted standard of achievement among ...

IS50 ● Certified Information Security Manager (CISM) I Certifying sign

CISM defines the core competencies and international standards of performance that information security managers are expected to master. ...

IS60 ● NIST Cybersecurity Professional Bootcamp I Certifying sign Certification

Quickly master the NIST CSF and implement and maintain your cybersecurity framework.

IG11 ● COBIT 2019 Bridge I Certifying sign Certification

COBIT® 2019 is an evolution of the previous version, COBIT® 5, building on its solid foundation by adding the latest developments affecting ...

IS ● INFORMATION SECURITY PATH

Next an overview of our Information Security courses.

IA ● INTERNAL CONTROL & AUDIT PATH

Next an overview of our Internal control & audit basic courses.

AA ● INTERNAL AUDIT ADVANCED PATH

Next an overview of our Internal audit advanced courses.

IG ● IT GOVERNANCE PATH

Next an overview of our IT Governance courses.

IT ● IT AUDIT PATH

Next an overview of our IT audit courses.

AA80 ● Audit and Fraud I Insight sign𝒾𝓃sight

***New 2022***

While fraud is not the main focus of an audit, the auditing standards do require auditors to have sufficient knowledge to assess the risk of fraud and how it is managed by the organisation.

LM ● LEAN MANAGEMENT PATH

Next an overview of our Lean mgt courses.

PR10 ● PRIVACY PATH

Next an overview of our Privacy courses.

AT ● INTERNAL AUDIT TECHNIQUES PATH

Next an overview of our Internal audit techniques courses.

LM30 ● Lean Value Stream Mapping & Supply Chain Costing I Certifying sign

***Nouveau***

Calculer les coûts des améliorations du flux de vos chaines de valeurs (VSM) et de vos chaines de réapprovisionnement (Supply chain). 

IA30 ● Internal audit ● Foundations & I Practice signractice

***New version 2020***

As an internal auditor, you aim to take ownership of an audit process that is easy to use and transposable into your business environment.

IA20 ● Internal control framework COSO 2013 I Insight sign𝒾𝓃sight

For more than 20 years, the COSO has been a key reference in the field of internal control worldwide.

AT30 ● Building an audit plan I Insight sign𝒾𝓃sight

According to the IPPF (International Professional Practices Framework) standard on ‘Planning’, “The chief audit executive must establish an audit plan ...

AT20 ● Audit recommendation follow-up I Insight sign𝒾𝓃sight

As required by the Performance Standard of IIA's International Standards for the Professional Practice of Internal Auditing, ...

AT10 ● Audit tools and techniques I Practice signractice

As an internal auditor, you want to gain efficiency, relevance and reliability in the development of your audit evidence.

IT10 ● IT Audit Essentials I Insight sign𝒾𝓃sight

***Reviewed 2020***

To be successful as an audit professional in any sector, you must be able to follow and understand the changes in the world of information technology.

IG10 ● COBIT 2019 Foundation with certification exam I Certifying sign

COBIT® is an IT practice framework developed by ISACA since 1996. COBIT 2019 is designed to continuously evolve to address new and ever-changing technologies and challenges that businesses encounter today and into the future.

IT30 ● COBIT 2019 for auditors I Insight signractice

As an IT auditor, you know better than anyone else the importance of sound IT governance and digital innovation

IS10 ● ISO 27001 Information Security I Insight sign𝒾𝓃sight

Information and security are vital for every organisation. But whether the information is stored electronically or printed on paper, ...

AA11 ● Application Controls (AC) in Oprational Processes Uncovered I Practice signractice

Digitisation has accelerated the automation of business processes.

AA50 ● Audit of  User Developed Applications I Insight sign𝒾𝓃sight

Every year billions are spent worldwide on new (versions of) application systems.

AA30 ● Auditing outsourcing strategy and risks I Insight sign𝒾𝓃sight

The outsourcing of some business and/or IT processes has become unavoidable in today's information society.

PR30 ● Managing privacy risks (GDPR) I Practice signractice

A major challenge facing business risk management today is protecting personal data, such as customer identification files ...

LM50 ● Formation certifiante Lean Healthcare Green Belt I Certifying sign

***Nouveau***

Les concepts, les principes, les outils de base et les éléments d’une nouvelle culture de gestion participative

IG20 ● COBIT 2019 Design & Implementation I Certifying sign Certification

***New 2020***

This Design and Implementation course is intended for more experienced users to COBIT® who are interested in designing governance systems and running governance improvement programs.

IA60 ● Agile internal auditing I Insight sign𝒾𝓃sight

***New 2020***

Understand why and how Agile Auditing can be applied in your organisation.

PR10 ● GDPR Foundation I Insight sign𝒾𝓃sight

A major challenge facing business risk management today is protecting personal data, such as customer identification files ...

IA10 ● Business Process Modelling for Auditors I Practice signractice

***New***

Control and audit functions require a full understanding of the business process context...

AA10 ● Understanding & Auditing Business Processes’ risks related to IT I Practice signractice

***New 2020***

The digitalisation of business processes means that internal auditors need to understand IT and IT risks in their business audits.

LM20 ● Masterclass Value Stream Mapping I Certifying sign

***Nouveau***

A la recherche de l’Excellence Opérationnelle dans nos chaînes de valeur.

PR50 ● GDPR & Microsoft 365 Security Practice signractice

Learn how to ensure security and GDPR privacy in the MS 365 Cloud environment.

News & Glossary

21.05.2024

Adoption of the Belgian NIS2 Law

Belgian NIS2 law becomes effective on 18th October 2024.

21.04.2024

Cybersecurity awareness trainings

Organisation of cybersecurity awareness sessions with business partners.

Partners

Ifaci logo
Data Protection Institute logo
IIabel logo
Clipeum logo
2ab logo
DP Kwadraat logo
GDPR Agency logo
ISACA Belgium logo