Professional Training

Auditing Oracle's Fusion ERP Cloud Application

ACI Learning, In Worldwide
Length
2 days
Next course start
Enquire for dates and prices See details
Course delivery
In Company
Length
2 days
Next course start
Enquire for dates and prices See details
Course delivery
In Company

Auditing Oracle's Fusion ERP Cloud Application

Auditing Oracle's Fusion ERP Cloud Application

This course examines Oracle's cloud application, its core elements, technical architecture, security model, role design, user configuration, patching, change management, profile options, controls monitoring and reporting, and workflow issues. NOTE: Attendees are encouraged, but not required, to bring a laptop. This course will be a combination of direct teaching and interactive activities to the extent that the attendees have access to their organization's instance.

Upcoming start dates

1 start date available

Enquire for dates and prices

  • In Company
  • Worldwide

Suitability - Who should attend?

Internal Auditors, IT Auditors, Functional and IT teams implementing or supporting Oracle’s ERP Cloud applications.

Prerequisites

None

Outcome / Qualification etc.

NASBA Certified CPE: 16 Credits Auditing

IT Audit Certificate

What You'll learn

You will learn about the application's risks and controls, the core elements of the application, and how to audit the application effectively.

Training Course Content

1. Architectural Overview:

  • cloud: differences from other applications
  • presentation layer
  • application layer
  • database layer
  • example

2. Common Elements:

  • key flexfields
  • descriptive flexfields
  • value sets / values
  • security rules
  • cross-validation rules
  • profile options / values

3. Organization Structure

4. Master Data Overview:

  • bank account
  • supplier
  • customer
  • item
  • employee

5. Building a Proper Audit Trail:

  • why an audit trail
  • types of technologies to build audit trail
  • what to audit

6. Application Security Configurations and Administration:

  • users
  • roles
  • data security
  • flexfield security

7. Application Security Best Practices:

  • RBAC principles
  • role design principles – end users and IT
  • seeded users
  • generic users
  • role assignments
  • impersonizations
  • job scheduling users
  • password controls

8. Workflow Security and Controls:

  • workflow policies
  • approve workflows via email
  • delegate or transfer workflows

9. Risks and Controls Related to Privileged Users:

  • risks
  • ways to monitor privileged users

10. Change Management Best Practices:

  • types of changes
  • impact of IIA GTAG 2
  • best practices
  • common challenges

11. Designing and Auditing Application Controls:

  • application controls types and examples
  • impact of IIA GTAG 8
  • benchmarking
  • best practices
  • common challenges

12. Protecting Sensitive Data in Production and Non-production:

  • statutory requirements
  • identifying and classifying
  • impact on application security
  • impact on database security
  • impact on change management process

13. Project Risks and Implementation Audits:

  • key project risks
  • internal audit involvement

14. Common Audit Issues

15. Auditor Resources

Customer Outreach Award

customer-outreach-badge-2019

We believe that it should be easy for you to find and compare training courses. 

Our Customer Outreach Award is presented to trusted providers who are excellent at responding to enquiries, making your search quicker, more efficient and easier, too.

Ads