HOME
 

Auditing Oracle's Fusion ERP Cloud Application

ACI Learning
Course summary
Professional Training
2 days
Worldwide
Course Dates
Worldwide
Enquire for dates and prices

Auditing Oracle's Fusion ERP Cloud Application

Auditing Oracle's Fusion ERP Cloud Application

This course examines Oracle's cloud application, its core elements, technical architecture, security model, role design, user configuration, patching, change management, profile options, controls monitoring and reporting, and workflow issues. NOTE: Attendees are encouraged, but not required, to bring a laptop. This course will be a combination of direct teaching and interactive activities to the extent that the attendees have access to their organization's instance.

Suitability - Who should attend?

Internal Auditors, IT Auditors, Functional and IT teams implementing or supporting Oracle’s ERP Cloud applications.

Prerequisites

None

Outcome / Qualification etc.

NASBA Certified CPE: 16 Credits Auditing

IT Audit Certificate

What You'll learn

You will learn about the application's risks and controls, the core elements of the application, and how to audit the application effectively.

Training Course Content

1. Architectural Overview:

  • cloud: differences from other applications
  • presentation layer
  • application layer
  • database layer
  • example

2. Common Elements:

  • key flexfields
  • descriptive flexfields
  • value sets / values
  • security rules
  • cross-validation rules
  • profile options / values

3. Organization Structure

4. Master Data Overview:

  • bank account
  • supplier
  • customer
  • item
  • employee

5. Building a Proper Audit Trail:

  • why an audit trail
  • types of technologies to build audit trail
  • what to audit

6. Application Security Configurations and Administration:

  • users
  • roles
  • data security
  • flexfield security

7. Application Security Best Practices:

  • RBAC principles
  • role design principles – end users and IT
  • seeded users
  • generic users
  • role assignments
  • impersonizations
  • job scheduling users
  • password controls

8. Workflow Security and Controls:

  • workflow policies
  • approve workflows via email
  • delegate or transfer workflows

9. Risks and Controls Related to Privileged Users:

  • risks
  • ways to monitor privileged users

10. Change Management Best Practices:

  • types of changes
  • impact of IIA GTAG 2
  • best practices
  • common challenges

11. Designing and Auditing Application Controls:

  • application controls types and examples
  • impact of IIA GTAG 8
  • benchmarking
  • best practices
  • common challenges

12. Protecting Sensitive Data in Production and Non-production:

  • statutory requirements
  • identifying and classifying
  • impact on application security
  • impact on database security
  • impact on change management process

13. Project Risks and Implementation Audits:

  • key project risks
  • internal audit involvement

14. Common Audit Issues

15. Auditor Resources

Provider: ACI Learning

ACI Learning

At ACI Learning, we train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, we're with you every step of the way. We believe that training is not a...


Read more and show all courses with this provider

Customer Outreach Award

customer-outreach-badge-2019

We believe that it should be easy for you to find and compare training courses. 

Our Customer Outreach Award is presented to trusted providers who are excellent at responding to enquiries, making your search quicker, more efficient and easier, too.

Contact information for ACI Learning

ACI Learning

MIS Training Institute
30 Crown Place
EC2A 4EB London

 Show phone number


Find a course for you!

  Read the course
 summary on this page

 Fill in your details and Request information

 Receive all the info you need

Find more courses here