What you will learn

Information Assurance Training

IT Audit/ ITGC Framework/ SOX 404 Testing

Risk Management Framwork-RMF(NIST)

SOC1, SOC2, SOC3 (SSAE 18) Compliance Training

ERP - SAP Audit Framework (End To End Testing Training)

ERP - JDE Audit Framework (End To End Testing Training)

Non ERP Audit Framework Trainings (End To End Testing Training)

On Job Support For All Audits

Domains (Syllabus)

  • Control: Management approves the nature and extent of user-access privileges for new and modified user access, including standard application profiles/roles, critical financial reporting transactions, and segregation of duties (SOD).
  • Control: Access for terminated and/or transferred users is removed or modified in a timely manner.
  • Control: User access is periodically reviewed.
  • Control: SOD is monitored and conflicting access is either removed or mapped to mitigating controls, which are documented and tested.
  • Control: Access is authenticated through unique user IDs and passwords or other methods as a mechanism for validating that users are authorized to gain access to the system. Password parameters meet company and/or industry standards (such as, password minimum length and complexity, expiration, account lockout).
  • Control: Privileged-level access (such as configuration and security administrators) is authorized and appropriately restricted.
  • Control: The key attributes of the security configuration are appropriately implemented.
  • Control: Application changes are appropriately tested and approved before moving into the production environment.
  • Control: Access to implement changes into the application production environment is appropriately restricted and segregated from the development environment.
  • Control: Management approves the results of the conversion of data (such as balancing and reconciliation activities) from the old application system or data structure to the new application system or data structure. Management also monitors that the conversion is performed in accordance with established conversion policies and procedures.
  • Control: Only authorized users have the access to update the batch jobs (including interface jobs) in the job scheduling software.
  • Control: Critical systems, programs, and/or jobs are monitored and processing errors are corrected to ensure successful completion.

$3,000.00

Overview:

  • In this course you will learn JD Edwards ERP (JDE) and basic technology concepts in ERP. Identify basic control mechanisms that exist in JDE. Recognize JDE-specific
  • GITCs as per the standard Framework and Identify the standard developed tools that analyze JD Edwards Security.
  • We will cover all 3 types of JDE environment :
    JDE World (AS400 Integrated)
    JDE One World
    JDE Enterprise One (E1)