{"id":15874,"date":"2020-04-13T23:45:16","date_gmt":"2020-04-13T20:45:16","guid":{"rendered":"https:\/\/www.proya.com.tr\/?page_id=15874"},"modified":"2022-02-10T23:53:24","modified_gmt":"2022-02-10T20:53:24","slug":"applied-computer-aided-audit-techniques-training","status":"publish","type":"page","link":"https:\/\/www.proya.com.tr\/en\/applied-computer-aided-audit-techniques-training\/","title":{"rendered":"Applied Computer Aided Audit Techniques Training"},"content":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1644524932499{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2020\/08\/autosar.jpg?id=15220) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">Applied Computer Aided Audit Techniques Training<\/span><\/h3>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1644525837407{padding-right: 5% !important;padding-left: 5% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1644525340044{padding-top: 20px !important;padding-bottom: 10px !important;}&#8221;]<\/p>\n<h5><span style=\"color: #0070c4;\">Aim<\/span><\/h5>\n<p>[\/vc_column_text][vc_column_text]For the Audit and Control units; It is to ensure that the audit practices can be carried out in the computer environment with the data sets prepared in accordance with the field of activity and audit subjects of the companies.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1644525360450{padding-top: 10px !important;padding-bottom: 10px !important;}&#8221;]<\/p>\n<h5><span style=\"color: #0070c4;\">Method<\/span><\/h5>\n<p>[\/vc_column_text][vc_column_text]\u2022 Our trainer has 20 years of experience in the field, so a customized training will be given to each Company according to their needs.<br \/>\n\u2022 The training period is 3 days in total. A half-day study will be conducted beforehand, company-specific methods will be determined, data will be prepared and training will be carried out practically.<br \/>\n\u2022 Training will be provided with software currently used as control or open source user-friendly software.<br \/>\n\u2022 At the end of the training, analytical control methods that you can use directly in your own systems will be delivered.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1644525390514{padding-top: 10px !important;padding-bottom: 10px !important;}&#8221;]<\/p>\n<h5><span style=\"color: #0070c4;\">Target group<\/span><\/h5>\n<p>[\/vc_column_text][vc_column_text]The target audience of the training, employees of companies for the purpose of Audit, Control, Anomaly detection and experts who want to improve their work with analytical techniques can participate.[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1644525414035{padding-top: 10px !important;padding-bottom: 10px !important;}&#8221;]<\/p>\n<h5><span style=\"color: #0070c4;\">Training Program (4 days)<\/span><\/h5>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1644525433129{padding-top: 5px !important;padding-bottom: 10px !important;}&#8221;]<\/p>\n<h6><span style=\"color: #7d7d7d;\">Day One: Control Program Usage<\/span><\/h6>\n<p><em>If the training is given through an application that the participants already know, this content will not be made. <\/em>[\/vc_column_text]<div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Installing the control program and making its basic settings<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Presentation and usage of the program<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Data access from different sources with data access functions<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Data cleaning functions<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Data processing functions<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Data mapping functions<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Statistical analysis functions<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Reporting functions<\/p>\n<\/div>[vc_column_text css=&#8221;.vc_custom_1644525639490{padding-top: 5px !important;padding-bottom: 10px !important;}&#8221;]<\/p>\n<h6><span style=\"color: #7d7d7d;\">Second Day: Audit Method<\/span><\/h6>\n<p>The components of Computer Aided Auditing are created and the most accurate methodology is determined for the institution. Lectures are made on the template method developed with previous experiences. The internal processes of the institution, how the auditor&#8217;s point of view should be changed, how he should communicate with other units, are explained through concepts and processes. At the end of the training, these templates are distributed to the participants.[\/vc_column_text]<div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Examination of the control area<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Converting control headers into scenarios<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Creation of the audit model<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Enterprise data systems and access methods<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Establishment of audit technical specs<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Making basic data accesses<\/p>\n<\/div>[vc_column_text css=&#8221;.vc_custom_1644525701094{padding-top: 5px !important;padding-bottom: 10px !important;}&#8221;]<\/p>\n<h6><span style=\"color: #7d7d7d;\">Third and Fourth Day (Practice)<\/span><\/h6>\n<p>In the third stage of the training, analyzes are made on the previously obtained ready-made data with the audit method determined through the Audit Program. Here, it is aimed to gain the basic analytical competencies that an auditor will need. By going over each command, it will be explained how to use it in accordance with the control.[\/vc_column_text]<div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Access to prepared data<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Organizing and preparing data<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Creation of control commands and rules<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Designing audit scenarios on the program<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Analyzing outputs and interpreting results<\/p>\n<\/div><div  class=\"mkdf-icon-list-item mkdf-icon-list-item-headings-font-family\">\n\t<div class=\"mkdf-icon-list-icon-holder\">\n        <div class=\"mkdf-icon-list-icon-holder-inner clearfix\">\n\t\t\t<i class=\"mkdf-icon-font-awesome fa fa-check \" style=\"color:#03a9f4\" ><\/i>\t\t<\/div>\n\t<\/div>\n\t<p class=\"mkdf-icon-list-text\" style=\"font-size:15px;font-weight: 400\" > Reporting<\/p>\n<\/div>[vc_empty_space height=&#8221;20px&#8221;]<a href=\"#ninja-popup-15877\" title=\"Applied Computer Aided Audit Techniques Training\"  data-id=\"mpc_button-1369ec80fc7a8a1\" class=\"mpc-button mpc-init mpc-transition mpc-typography--mpc_preset_20 mpc-display--block \" ><div class=\"mpc-button__content mpc-effect-type--none mpc-effect-side--none\"><span class=\"mpc-button__title mpc-transition\">Pre-Registration \/ Request Form<\/span><\/div><div class=\"mpc-button__background mpc-transition mpc-effect-type--slide mpc-effect-side--right\"><\/div><\/a>[vc_empty_space][\/vc_column][\/vc_row][vc_row enable_bottom_separator=&#8221;true&#8221; bottom_separator_style=&#8221;arrow-right&#8221; bottom_separator_color=&#8221;#e6e4e4&#8243;][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css=&#8221;.vc_custom_1644524932499{padding-left: 5% !important;background-image: url(https:\/\/www.proya.com.tr\/wp-content\/uploads\/2020\/08\/autosar.jpg?id=15220) !important;}&#8221;][vc_column css=&#8221;.vc_custom_1474490360423{padding-right: 9% !important;}&#8221;][vc_empty_space height=&#8221;30px&#8221;][vc_column_text] Applied Computer Aided Audit Techniques Training [\/vc_column_text][vc_empty_space height=&#8221;60px&#8221;][\/vc_column][\/vc_row][vc_row][vc_column css=&#8221;.vc_custom_1644525837407{padding-right: 5% !important;padding-left: 5% !important;}&#8221;][vc_column_text css=&#8221;.vc_custom_1644525340044{padding-top: 20px !important;padding-bottom: 10px !important;}&#8221;] Aim [\/vc_column_text][vc_column_text]For the Audit and Control units; It is to ensure that<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":[],"categories":[81],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/15874"}],"collection":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/comments?post=15874"}],"version-history":[{"count":0,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/pages\/15874\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/media?parent=15874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/categories?post=15874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proya.com.tr\/en\/wp-json\/wp\/v2\/tags?post=15874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}