Course description
Auditing Oracle's Fusion ERP Cloud Application
This course examines Oracle's cloud application, its core elements, technical architecture, security model, role design, user configuration, patching, change management, profile options, controls monitoring and reporting, and workflow issues. NOTE: Attendees are encouraged, but not required, to bring a laptop. This course will be a combination of direct teaching and interactive activities to the extent that the attendees have access to their organization's instance.
Do you work at this company and want to update this page?
Is there out-of-date information about your company or courses published here? Fill out this form to get in touch with us.
Upcoming start dates
Who should attend?
Internal Auditors, IT Auditors, Functional and IT teams implementing or supporting Oracle’s ERP Cloud applications.
Prerequisites
None
Training content
1. Architectural Overview:
- cloud: differences from other applications
- presentation layer
- application layer
- database layer
- example
2. Common Elements:
- key flexfields
- descriptive flexfields
- value sets / values
- security rules
- cross-validation rules
- profile options / values
3. Organization Structure
4. Master Data Overview:
- bank account
- supplier
- customer
- item
- employee
5. Building a Proper Audit Trail:
- why an audit trail
- types of technologies to build audit trail
- what to audit
6. Application Security Configurations and Administration:
- users
- roles
- data security
- flexfield security
7. Application Security Best Practices:
- RBAC principles
- role design principles – end users and IT
- seeded users
- generic users
- role assignments
- impersonizations
- job scheduling users
- password controls
8. Workflow Security and Controls:
- workflow policies
- approve workflows via email
- delegate or transfer workflows
9. Risks and Controls Related to Privileged Users:
- risks
- ways to monitor privileged users
10. Change Management Best Practices:
- types of changes
- impact of IIA GTAG 2
- best practices
- common challenges
11. Designing and Auditing Application Controls:
- application controls types and examples
- impact of IIA GTAG 8
- benchmarking
- best practices
- common challenges
12. Protecting Sensitive Data in Production and Non-production:
- statutory requirements
- identifying and classifying
- impact on application security
- impact on database security
- impact on change management process
13. Project Risks and Implementation Audits:
- key project risks
- internal audit involvement
14. Common Audit Issues
15. Auditor Resources
Course delivery details
Bring this course to your organization at your convenience. ACI Learning can deliver this instructor-led course for your team at a chosen location or virtually. Alternatively, choose the topic(s) you need and ACI will craft a training solution to keep your team future-proof.
Certification / Credits
NASBA Certified CPE: 16 Credits Auditing
IT Audit Certificate
What You'll learn
You will learn about the application's risks and controls, the core elements of the application, and how to audit the application effectively.
ACI Learning
At ACI Learning, we train leaders in Cybersecurity, Audit, and Information Technology. Whether you're starting your IT career, mastering your profession, or developing your team, we're with you every step of the way. We believe that training is not a...