


His current research areas include cybersecurity, penetration testing and data science.This paper aims to identify key factors driving auditors’ adoption of Generalized Audit Software (GAS) in a large developing country, Indonesia, through the lens of the technology, organization and environment (TOE) framework. Samuel is a well experienced professional, he has worked with top brands and his valuable contribution to the growth of business is second to none. As a consultant, he has also taught participants from different organisations. He has passion for teaching, He taught in the high school and helped students with their academics. He has also turned data into information for business process owners for strategic business decisions. With work experience of over 7 years , He has implemented audit processes for Banks, manufacturing and Insurance Companies in Nigeria, instituted controls to mitigate IT risks, revenue leakages and cyber fraud. He has diverse skills in the following IT related areas - Programming, Website Design & Development, Digital Marketing, Computer Networks and Servers, Revenue Assurance, Information Systems Audits, Control and Security,Data analysis and visualizations.

He holds a Bachelor’s Degree in Computer Science, a CISA and CISM. Cheers!.Ī passionate and business oriented IT consultant. You will also be required to provide answers to assignments given by the instructor.Wish you a great learning experience as you enroll for this course. Throughout the course, real life scenarios were given for better assimilation.All the resources used for the course are also attached in section one for you to practice. They can still be executed successfully in the newer versions.

The key commands and concepts taught in this course had not changed. It is worth noting that though there had been a lot of changes to ACL over the years. In Module 5, you will see how ACL commands effortlessly isolate, profile, reorder and combine data.Module 6 shows you how to report results or findings using ACL GUI. In addition, Module 4 will show you how to use ACL commands for data integrity verification. Module 1 features the fundamentals of ACL.In module 2, you will learn to use ACL import data from data sources such as oracle database, delimited files, excel files.Module 3 will empower you with the tools to create logical and arithmetic expressions, perform mathematical computations and recalculations on transactions. The course contains 21 video lectures and 6 modules. You will learn how to use ACL powerful features to audit, profile, manipulate and visualize data. Are you looking for a career in audit, data science and other assurance functions?.
