• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to footer

MIS5208 - Spring 2020 - Data Analytics for IT Auditors

DATA ANALYTICS FOR IT AUDITORS AND CYBERSECURITY

Data Analytics for IT Auditors

MIS 5208.001 ■ Spring 2020 ■ Caswell Anderson
  • Home
    • Instructor
  • Class Materials
    • Classroom Recordings
    • Lectures
  • Class Blogs
    • About Blogs
    • Read Blogs Here
  • Schedule 2020
    • ACL
      • Part 01 – Introduction to the Course and to Fraud
      • Part 02 – Fighting and Preventing Fraud
      • Part 04 – Data Driven Fraud Detection – Investigating Concealment and Money Laundering
    • ACL Labs
      • Lab 01 – Install ACL / Review and Work with On-Line Documentation
      • Lab 02 – ACL Analytics Basics | CPE (1.5)
      • Lab 03 – Fraud Scandals of Note
      • Lab 04 – ACL Analytics Foundations (CPE) (ACL 101 V4 CPE)
      • Lab 05 – Remediating Issues & Reporting Results (CPE) (ACL 105 V1 CPE)
      • Lab 06 – ACL Analytics Introduction to Scripting (CPE) (ACL 106 V1 CPE)
      • Lab 07 – Basics of Datetime Fields Learning Series (Basic-Intermediate) (ACL 210)
      • Lab 08 – Basics of Datetime Fields Learning Series (Basic-Intermediate) (ACL 210) (Continued…)
  • Quizzes and Tests
    • Mid-Term Exam
    • Final Exam
  • Grading and Policies
  • WEBEX
You are here: Home / Class Materials

Class Materials

Required Texts (All texts are available through various resellers including Temple University’s Bookstore.)

Textbooks and ACL Labs

Fraud Examination 6th Edition

by W. Steve Albrecht (Author), Chad O. Albrecht (Author), Conan C. Albrecht (Author), Mark F. Zimbelman (Author)

 

coderre

Computer Aided Fraud Prevention and Detection: A Step by Step Guide 1st Edition

by David Coderre (Author)

ACL Videos

http://community.mis.temple.edu/mis5208sec001spring2020/files/2018/01/Introduction-to-ACL-Analytics-Module-1-What-is-ACL.mp4
http://community.mis.temple.edu/mis5208sec001spring2020/files/2018/01/Introduction-to-ACL-Analytics-Module-2-Importing-Data.mp4
http://community.mis.temple.edu/mis5208sec001spring2020/files/2018/01/Introduction-to-ACL-Analytics-Module-3-Defining-Fields.mp4
http://community.mis.temple.edu/mis5208sec001spring2020/files/2018/01/Introduction-to-ACL-Analytics-Module-4-Classifying-and-Summarizing-Data.mp4
http://community.mis.temple.edu/mis5208sec001spring2020/files/2018/01/Introduction-to-ACL-Analytics-Module-5-Sorting-Extracting-and-Exporting-Data.mp4
http://community.mis.temple.edu/mis5208sec001spring2020/files/2018/01/Introduction-to-ACL-Analytics-Module-6-Joining-Data.mp4
http://community.mis.temple.edu/mis5208sec001spring2020/files/2018/01/Introduction-to-ACL-Analytics-Module-7-Age-and-Stratify-Data.mp4
http://community.mis.temple.edu/mis5208sec001spring2020/files/2018/01/Introduction-to-ACL-Analytics-Module-8-Sample.mp4
Iv, K. (2015). Introduction to Audit Command Language. YouTube.Com: YoutTube.Com.

 Credit Card Fraud Videos (Source: Youtube.com)

http://community.mis.temple.edu/mis5208sec001spring2020/files/2015/01/How-credit-card-skimmers-work.mp4
http://community.mis.temple.edu/mis5208sec001spring2020/files/2015/01/Chip-PIN-Fraud-Explained-Computerphile.mp4
http://community.mis.temple.edu/mis5208sec001spring2020/files/2015/01/BASH-USB-Credit-Card-Swiper-Script-Code-for-Magnetic-Stripe-HID-Linux-Shell.mp4

Websites

Association of Certified Fraud Examiners

We are the world’s largest anti-fraud organization and premier provider of anti-fraud training and education.

  • What’s a CFE?
  • Learn About Membership
  • 4 Key Steps to Certification

Join the ACFE

Renew Membership

Audit Tools

ACL-Logo Highbond – Audit Control Language –  (Windows Only)
Note: MAC users first install VMWare Fusion, Windows 7 or 10, and then ACL.

Cybersecurity Forensic Tools

 

SIFT Workstation

The SIFT Workstation is a group of free open-source incident response and forensic tools designed to perform detailed digital forensic examinations in a variety of settings. It can match any current incident response and forensic tool suite. SIFT demonstrates that advanced incident response capabilities and deep dive digital forensic techniques to intrusions can be accomplished using cutting-edge open-source tools that are freely available and frequently updated.

https://digital-forensics.sans.org/community/downloads#overview

General Purpose Tools

LOGO1  Download VMware Workstation Player – used for Linux systems that need to run Windows.
windows-logo If you have a Mac or Linux machine you will need to run Windows in a VM to use this software. Temple students are entitled to one copy each of the following software:

  • Windows 7 or 10
  • Microsoft Office

See the following Temple Website: Microsoft Work At Home

 TEMPLE SOFTWARE DOWNLOAD PAGE

Explanation page:  http://community.mis.temple.edu/technology/get-microsoft-software/

Download Login page:  http://e5.onthehub.com/WebStore/ProductsByMajorVersionList.aspx?ws=933e35a0-db9b-e011-969d-0030487d8897&vsro=8

Security Concerns

Tech Bits: Remove Hidden Information in Office Files

You’ve worked hard and got feedback on an important document for your class or job and are now ready to submit it.

Be aware that unless you take precautions, you can easily include information that you do not want to make public. This can include revisions and review comments incorporated using the Track Changes feature, as well as personal metadata that Microsoft automatically appends to documents. Depending on the content, this information could place you in a compromising or embarrassing position.

Before distributing final electronic copies of your documents, get into the habit of making sure that review comments and hidden information are removed. To learn how, see Removing hidden information from Microsoft Office files.

Have suggestions or feedback? Reply to this message or to templetech@temple.edu.

Tech Bits Archives

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in